0% found this document useful (0 votes)
16 views18 pages

3D Password Authentication Explained

Uploaded by

minaltankdsts
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views18 pages

3D Password Authentication Explained

Uploaded by

minaltankdsts
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

3D password

By:
Abhay Thummar
Agenda
• Identification
• Passwords
• Passphrase
• Biometrics
• 3d password
Three Basic Identification Methods of password

Possession
(“something I have”)

• Keys Knowledge
• Passport (“something I know”)
• Smart Card

• Password
• PIN

Biometrics
(“something I am”)

• Face
• Fingerprint
• Iris
Password
• It is basically an encryption algorithms.

• Usually it is 8-15 character or slightly


more than that.

• Mostly textual passwords nowadays, are kept


very simple say a word from the dictionary
or their pet names, friends etc.
passphrase
• It’s nothing but the enhance version of
password.

• Usually it is a combination of words or


simply collection of password in proper
sequence is passphrase.

• It contains any well known thought also.


• Length of passphrase is about 30-50
character or more than that also.

• But it has also some limitations because 30-


50 character is creates ambiguity to remember
if there is no any proper sequence.
Biometrics
• Refer to a broad range of technologies
• Automate the identification or verification of an
individual
• Based on human characteristics or body organs
– Physiological: Face, fingerprint, iris
– Behavioral: Hand-written signature, voice

Characteristics
Templates

011001010010101…
011010100100110…
001100010010010...
3D password
• The 3D passwords which are more customizable,
and very interesting way of authentication.
• The 3D password is a multifactor
authentication
scheme.
• To be authenticated, we present a 3D virtual
environment where the user navigates
and interacts with various objects.
• The sequence of actions and interactions
toward the objects inside the 3D environment
constructs the user’s 3D password.
3-D Virtual Environment
• Virtual objects can be any object that we
encounter in real life.
• Moreover, any user input (such as speaking
in a specific location) in the virtual 3D
environment can be
considered as a part of the 3D password.
Snapshot of a proof-of-concept virtual art
gallery, which contains 36
pictures and six computers.
DESIGN

• Designing a well-studied 3D virtual


environment affects the usability,
effectiveness, and acceptability of a 3D
password system.
• The design of 3D virtual environments
should
follow these guidelines…..
1) Real-life similarity

2) Object uniqueness and distinction

3) Three-dimensional virtual environment


size

4) Number of objects (items) and their types

5) System importance
• Possible critical applications include the

following….

1) Critical servers

2) Nuclear and military facilities

3) Airplanes and jetfighters


• A small 3D virtual environment can be
used in many systems, including the following:
1) ATMs
2) personal digital assistants
3) desktop computers and laptop logins
4) web authentication
THANK YOU

You might also like