0% found this document useful (0 votes)
50 views4 pages

3D Password: A Secure Authentication Method

This document introduces a new 3D password authentication technique that aims to overcome the drawbacks of existing authentication schemes. The 3D password consists of a virtual 3D environment containing real-time object scenarios. It provides a more advanced and secure form of multi-factor authentication compared to techniques like text or graphical passwords. The document discusses what a 3D password is, how it is created and works, and some design principles for the 3D virtual environment.

Uploaded by

Jagan MOhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views4 pages

3D Password: A Secure Authentication Method

This document introduces a new 3D password authentication technique that aims to overcome the drawbacks of existing authentication schemes. The 3D password consists of a virtual 3D environment containing real-time object scenarios. It provides a more advanced and secure form of multi-factor authentication compared to techniques like text or graphical passwords. The document discusses what a 3D password is, how it is created and works, and some design principles for the 3D virtual environment.

Uploaded by

Jagan MOhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd

3D-PASSWORD

BY
BHAVYARANI.K

ABSTRACT
.
The melodramatic increase of computer usage has given
rise to many security concerns. ne ma!or security concern
is Authentication" process of validating #ho you are to #ho
you claimed to $e.Authentication provides more security to
the system. %any e&isting authentication schemes such as
te&tual pass#ord' graphical pass#ord etc. are availa$le'
each one having its o#n dra#$ac(s and limitations. This
paper introduced a ne# authentication techni)ue' called *+
,ass#ord that overcomes the dra#$ac( of previously
e&isting authentication schemes. The *+ ,ass#ord is multi-
factor and multi-pass#ord authentication techni)ues that
consist of *+ virtual environment containing real time
o$!ect cenarios. *+ virtual environment is the user interface
that loo(s li(e same as real time environment $ut is not
actual real time environment. .ompared to other
authentication techni)ues *+ ,ass#ord is more advanced
and secure' as it is easy to use and difficult to $rea(. This
paper also focuses on e&plaining #hat is *+ ,ass#ord/'
ho# to create *+ pass#ord' #or(ing of *+ ,ass#ord and
some design principles for designing in *+-virtual
environment
INTRODUCTION

0enerally' the authentication scheme that user e&periences
are mostly very (ind or very firm. Authentication has
$een a very remar(a$le approach' throughout the years.
The tremendous rise and use of internet and related
technologies has made easy for the 1intruders1 to formulate
or to steal identity or to hac( someone2s pass#ord.
Authentication is the utmost significant security service
that can $e provided to the system $y different
authentication schemes. Authentication protects any system
from unauthori3ed access' so that only authori3ed
persons can have right to use or handle that system 4 data
related to that system securely. %any effective and
secure authentication schemes are availa$le' having some
dra#$ac(. 5arlier' many authentication procedures
#ere presented such as graphical pass#ord' te&t pass#ord'
Biometric authentication' to(en-$ased etc.
.ommonly' four types of authentication techni)ues are
availa$le such as6
7. Kno#ledge $ased6 means #hat you (no#. The $est
e&ample of this authentication scheme is te&tual
pass#ord.
8. Recognition Based6 means #hat you recogni3e. 5&ample
includes graphical pass#ord' iris recognition' face
recognition' etc.
*. Biometrics6 means #hat you are. Includes Thum$
impression' voice recognition' etc.
9. To(en $ased6 means #hat you have. This includes .redit
cards' AT% cards' etc. as an e&ample

You might also like