Professional Documents
Culture Documents
CONTENTS
Introduction History Three Basic Identification What is Biometrics Based on Human Characteristics or body organs 3D Password
3D Virtual Environment Design Guidelines State Diagram of 3D Password Advantages Disadvantages Application Attacks and Counter Measures Conclusion
INTRODUCTION
WHAT IS A PASSWORD ? It is a set of characters that is used for privacy reason
to authenticate a user. WHAT IS AUTHENTICATION ? Authentication is a process of validating who you are to whom you claim to be. WHAT IS 3D PASSWORD ? More customizable, very interesting way of authentication.
HISTORY
Years back Klein performed many tests on password
and he could crack 10-15 password per day. Now with the technology change fast processor and many tools on the internet this has become a child play. Then comes the graphical password schema of Blonder is considered to be recall based since the user must remember location. Further evolution for authentication with upcoming technology Jermyn et all had come up with drawings, making the password more complicated.
Recently used technology is biometrics which comprises of human reorganization like iris, DNA etc. Now the latest and the most complex way to authenticate the user is 3D Password.
Password Pin
WHAT IS BIOMETRICS?
Automate the identification or verification of individual based on human characteristics or body organs. Physiological : face, fingerprint, iris. Behavioral : Hand written signature, voice
3D PASSWORD
The 3D passwords which are more customizable, and very interesting way of authentication. A 3D password is a multifactor authentication scheme that combine
The 3D password presents a virtual environment containing various virtual objects. The user walks through the environment and interacts with the objects. It is the combination and sequence of user interactions that occur in the 3D environment.
AA57218752 It becomes much more difficult for the attacker to guess the users 3-D password.
System Importance
ADVANTAGE
Highly flexible Strength Ease to memorize
Respect to privacy
Difficult to share Difficult to crack
Extremely strong
Designed accordingly to protected system
DISADVANTAGES
Difficult for blind people to use this technology.
Requires sophisticated computer technology.
Expensive.
A lot of program coding is required.
Applications
The 3D passwords main application domains are protecting critical systems and resources.
Critical Servers Nuclear Reactors & military Facilities Airplanes and missile Guiding
Conclusion
The authentication can be improved with 3d password ,because the unauthorized person may not interact with same object at a particular location as the legitimate user.
It is difficult to crack ,because it has no fixed number of steps and a particular procedure.
Added with biometrics and token verification this schema becomes almost unbreakable.