3 d password

11

Upload: murlidhar-sarda

Post on 13-Apr-2017

177 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: 3 d password
Page 2: 3 d password

CONTENTS Introduction

Authentication Schemes

Functionalities Required

3D Password selection and Input

Virtual Environment Design Guidelines

Applications

Security Analysis

Attacks and Countermeasures

Conclusion

Page 3: 3 d password

INTRODUCTION

Commonly used authentication schemes are textual passwords, graphical passwords and biometrics.

3D password is a multifactor authentication scheme.

Page 4: 3 d password

AUTHENTICATION SCHEMES

KNOWLEDGE BASED Recall basedRecognition based

TOKEN BASEDeg : smart card

Page 5: 3 d password

BIOMETRIC BASEDFingerprint ,palm prints ,hand geometry ,face

recognitionIntrusiveness upon a user’s personal

characteristics.GRAPHICAL PASSWORDS

Recognition basedRecall based

Page 6: 3 d password

Virtual Computer where user typing a textual password as a part of user’s 3D Password

Page 7: 3 d password

Snapshot of a proof-of-concept virtual art gallery

Page 8: 3 d password

APPLICATIONS

Critical servers.

Nuclear and military facilities.

Airplanes and jetfighters.

ATMs, PDA’s, desktop computers and laptops.

Page 9: 3 d password

SECURITY ANALYSIS

3D Password Space Size.

3D Password Distribution Knowledge.

Page 10: 3 d password

CONCLUSIONCommonly used authentication schemes are

vulnerable to attacks.3D Password is a multifactor authentication

scheme.Design of 3D virtual environment, selection

of objects inside the environment, and the object type reflects the resulted password space.

User’s choice and decision to construct the desired and preferred 3D password

Page 11: 3 d password