3D password
By:
Abhay Thummar
Agenda
• Identification
• Passwords
• Passphrase
• Biometrics
• 3d password
Three Basic Identification Methods of password
Possession
(“something I have”)
• Keys Knowledge
• Passport (“something I know”)
• Smart Card
• Password
• PIN
Biometrics
(“something I am”)
• Face
• Fingerprint
• Iris
Password
• It is basically an encryption algorithms.
• Usually it is 8-15 character or slightly
more than that.
• Mostly textual passwords nowadays, are kept
very simple say a word from the dictionary
or their pet names, friends etc.
passphrase
• It’s nothing but the enhance version of
password.
• Usually it is a combination of words or
simply collection of password in proper
sequence is passphrase.
• It contains any well known thought also.
• Length of passphrase is about 30-50
character or more than that also.
• But it has also some limitations because 30-
50 character is creates ambiguity to remember
if there is no any proper sequence.
Biometrics
• Refer to a broad range of technologies
• Automate the identification or verification of an
individual
• Based on human characteristics or body organs
– Physiological: Face, fingerprint, iris
– Behavioral: Hand-written signature, voice
Characteristics
Templates
011001010010101…
011010100100110…
001100010010010...
3D password
• The 3D passwords which are more customizable,
and very interesting way of authentication.
• The 3D password is a multifactor
authentication
scheme.
• To be authenticated, we present a 3D virtual
environment where the user navigates
and interacts with various objects.
• The sequence of actions and interactions
toward the objects inside the 3D environment
constructs the user’s 3D password.
3-D Virtual Environment
• Virtual objects can be any object that we
encounter in real life.
• Moreover, any user input (such as speaking
in a specific location) in the virtual 3D
environment can be
considered as a part of the 3D password.
Snapshot of a proof-of-concept virtual art
gallery, which contains 36
pictures and six computers.
DESIGN
• Designing a well-studied 3D virtual
environment affects the usability,
effectiveness, and acceptability of a 3D
password system.
• The design of 3D virtual environments
should
follow these guidelines…..
1) Real-life similarity
2) Object uniqueness and distinction
3) Three-dimensional virtual environment
size
4) Number of objects (items) and their types
5) System importance
• Possible critical applications include the
following….
1) Critical servers
2) Nuclear and military facilities
3) Airplanes and jetfighters
• A small 3D virtual environment can be
used in many systems, including the following:
1) ATMs
2) personal digital assistants
3) desktop computers and laptop logins
4) web authentication
THANK YOU