INTRODUCTION Normally the authentication scheme the user undegoes is paticularly very lenient or very strict.Throughout the yeras authentication has been a very interesting approach.With all the means of technology developing ,it can be very easy for 'others' to fabricate or to steal identity or to hack someones password.Therefore many algorithms have come up each with an interesting approach toward calculation of a secret key.The algorithms are such based to pick a random number in the range of 10^6 and therefore the possbilities of the sane number coming is rare. Users nowadays are provided with major password stereotypes such as textual passwords,biometric scanning,tokens or cards(such as an ATM) etc.Mostly textual passwords follow an encryption algorithm as mentioned above.Biometric scanning is your "natural" signature and Cards or Tokens prove your validity.But some people hate the fact to carry around their cards,some refuse to undergo strong IR exposure to their retinas(Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names,grilfriends etc.Ten years back Klein performed such tests and he could crack 10-15 passwords per day.Now with the technology change,fast processors and many tools on the Internet this has become a Child's Play. Therefore we preset our idea, the 3D passwords which are more customisable, and very interesting way of authentication.

WORKING Now the passwords are based on the fact of Human memory.Generally simple passwords are set so as to quickly recall them.The human memory,in our scheme has to undergo the facts of Recognition,Recalling,Biometrics or Token based authentication. Once implemented and you log in to a secure site,the 3D password GUI opens up.This is an additional textual passwords which the user can simply put.Once he goes through the first authentication, a 3D virtual room will open on the screen.In our case, lets say a virtual garage. Now in a day to day garage one will find all sorts of tools, equipments ,etc.each of them having a unique properties.The user will then interact with these properties accordingly.Each object in the 3D space, can be moved around in an (x,y,z) plane.Thats the moving attribute of each object.This property is common to all the objects in the space.Suppose a user logs in and enters the garage.He

sees and picks a screw-driver(initial position in xyz coordinates (5. 5.Interestingly.The 3D environment can change according to users request.a city or simply a garage.com/Thread-3d-password-for-more-secure-authenticationfull-report#ixzz1CofiDcMq .In that scenario a virtual environment can be developed as a globe.the scheme becomes almost unbreakable. Reference: http://www.This is the Recall and Recognition part of human memeory coming into play.The user can decide his own authentication schemes.5. 6.There can be levels of authentication a user can undergo.a password can be set as approaching a radio and setting its frequency to number only the user knows.5.That can be identified as an authentication.Can be used in critical areas such as Nuclear Reactors.Added with biometrics and card verification.It would be difficult to crack using regular techniques. EXPECTED FUNCTIONALITIES 1. 4.Higher the security higher the timer.Say after 20 seconds a weak password will be thrown out.Since all the algorithms follow steps to authenticate.More the confidentiality more the complexity. Security can be enhanced by the fact of including Cards and Biometric scanner as input. Only the true user understands and recognizes the object which he has to choose among many.Missile Guiding Systems etc.seminarprojects.5).The authentication can be improved since the unauthorised persons will not interact with the same object as a legitimate user would. 3.If he's comfortable with Recall and Recognition methods then he can choose the 3d authentication just used above.5)) and moves it 5 palces to his right (in XY plane ie (10.Hence to calculate all those possibilites and decipher them is not easy.We can also include a timer. 2.our project has no fixed number of steps.

which maintain the task bubble in the area when the bubble carrier is no longer present. In our implementation. Our design is resilient to periods when no mobiles pass through the bubble area and is capable of µµreloading´ the task into the bubble region. specifically. microphone. This task bubble state is ephemeral and times out when no bubble carriers or bubble anchors are in the area. Task bubbles are maintained at locations through the interaction of ´bubble carriers´. The system relies on other mobile phones that opportunistically pass through bubble-sensing locations to acquire tasks and do the sensing on behalf of the initiator. creating a living documentary of places of interest in the physical world. accelerometers.11g radio to transfer task state and maintain the task in the region of interest. Nokia¶s N80 and N95 (with GPS. camera). We describe an implementation of the bubble-sensing system using sensor-enabled mobile phones. that remains active for a duration set by the user. in essence. .Bubble sensing ABSTRACT We propose bubble-sensing. bubble carriers and bubble anchors implement a number of simple mobile phone based protocols that refresh the task bubble state as new mobile phones move through the area. and deliver the data to the bubble-sensing server for retrieval by the user who initiated the task. which carry the sensing task into the area of interest. Phones communicate using the local Ad-Hoc 802. a new sensor network abstraction that allows mobile phone users to create a binding between sensing tasks and the physical world at locations of interest. and ´bubble anchors´. We envision mobile phones being able to affix sensing task bubbles at places of interest and then receive sensed data as it becomes available in a delay-tolerant fashion.

Also we have discussed the drawbacks of PILL CAMERA and how these drawbacks can be overcome using Grain sized motor and bi-directional wireless telemetry capsule . Research in this direction started way back in eighties. but the manufacturing technology is at macro level. ulcer and anemia.Besides this we have reviewed the process of manufacturing products using nanotechnology. The current technologies have attained a part of it. This process can help in tracking any kind of disease related to digestive system. without causing any harm. which is used for the treatment of cancer. At that time manufacturing at molecular and atomic level was laughed about. This tiny capsule can pass through our body. Some other important applications are also discussed along with their potential impacts on various fields .Pill camera The aim of technology is to make products in a large scale for cheaper prices and increased quality. It has made revolution in the field of medicine. It takes pictures of our intestine and transmits the same to the receiver of the Computer analysis of our digestive system. The future lies in manufacturing product right from the molecular level. But due to advent of nanotecnlogy we have realized it to a certain level. One such product manufactured is PILL CAMERA.

not his/her visual appearance. and the motion capture system can capture the camera and props as well as the actor's performance. In motion capture sessions. such as the 1978 The Lord of the Rings animated film where the visual appearance of the motion of an actor was filmed. and for validation of computer vision[1] and robotics. In filmmaking it refers to recording actions of human actors.Motion Capture Motion capture. motion tracking. This is comparable to the older technique of rotoscope. then the film used as a guide for the frame-by-frame motion of a handdrawn animated character. movements of one or more actors are sampled many times per second. entertainment. When it includes face and fingers or captures subtle expressions. sports. This animation data is mapped to a 3D model so that the model performs the same actions as the actor. providing the desired camera positions in terms of objects in the set. It is used in military. Retroactively obtaining camera movement data from the captured footage is known as match moving or camera tracking. or dolly around the stage driven by a camera operator while the actor is performing. A computer processes the data and displays the movements of the actor. Camera movements can also be motion captured so that a virtual camera in the scene will pan. images and sets to have the same perspective as the video images from the camera. . and medical applications. This allows the computer-generated characters. or mocap are terms used to describe the process of recording movement and translating that movement on to a digital model. and using that information to animate digital character models in 2D or 3D computer animation. it is often referred to as performance capture. motion capture records only the movements of the actor. although with most techniques (recent developments from Weta use images for 2D motion capture and project into 3D). tilt.

Switching over to the spreadsheet software Numbers would reconfigure the buttons on the screen to allow for commands in that respective application.Apple I mouse Apple's filing notes that the usability of a computer might become easier through input devices that are "more communicative" to the user." by allowing users to change the look of it by customizing what is displayed on the screen. . by projecting the image onto an outer surface of "collimated glass. As an example. The image could even be displayed on the back of a curved surface. like a mouse. the application describes displaying a number of icons for quickly selectable options when a user is running Apple's Pages word processing application. The proposed invention would provide "observable data" to a user through the input device itself. It also notes that the addition of a screen could make a device more "aesthetically pleasing." The display on the mouse would change according to what the user may be doing on their Mac.

users could quickly input numbers right from . the mouse displays a virtual depiction of a traditional number pad. commonly found on a full-size keyboard.In another example. With this.

The iPhone sketch also lacks a home button on the hardware. The application notes that the dynamic touch-display input method could be employed on other devices like a keyboard. . Calendar and Photos. and below that is a virtual clickable surface for using a cursor to select objects on a traditional computer. or even a mobile device like an iPhone or iPod touch. an iPhone is shown with the top third of its screen occupied by the handset's traditional applications like SMS.their mouse using its touch-sensitive back panel. In one illustration. But the bottom two-third of the display are occupied by a trackpad-like area.


Apple first filed for the proposed invention in July of 2009. As for controlling a device with an iPhone. available on the App Store. those types of gestures were only capable on an iPhone. or a multi-touch trackpad on a MacBook.The patent application revealed this week is credited to Gordie Freeman. of course -. Ubiquipous nwng Project oxygen Pillcamera Bubble sesing Tripwire Vision 4g Hp java Java ring Virtual keyboard Logarithmic keying Robotics surgery Iscsi . Jacob Farkas. to the pointer. when the Magic Trackpad was released. Apple introduced its multi-touch Magic Mouse -. iPod touch or iPad.without a display on it. That software. such as two-finger scrolling. but brings multi-touch gestures. Apple already allows that with its own free Remote application. The flat trackpad surface offers input similar to a MacBook on a desktop Mac.in 2009. and Toby Charles Wood Patterson. allows iOS users to control their Apple TV wirelessly from anywhere in their home. Previously. The effort to add multi-touch input to Apple's entire line of products continued in July 2010. The wireless mouse lacks any physical buttons.

Sign up to vote on this title
UsefulNot useful