3d password ppt
TRANSCRIPT
![Page 1: 3d Password Ppt](https://reader033.vdocuments.us/reader033/viewer/2022061106/54474e6fb1af9f800a8b4e17/html5/thumbnails/1.jpg)
3-D password
By:G.Chaitanya08N71A0519CSE-A
![Page 2: 3d Password Ppt](https://reader033.vdocuments.us/reader033/viewer/2022061106/54474e6fb1af9f800a8b4e17/html5/thumbnails/2.jpg)
Agenda
• Identification
• Passwords
• Passphrase
• Biometrics
• 3-d password
![Page 3: 3d Password Ppt](https://reader033.vdocuments.us/reader033/viewer/2022061106/54474e6fb1af9f800a8b4e17/html5/thumbnails/3.jpg)
Three Basic Identification Methods of password
•Password•PIN
•Keys•Passport•Smart Card
•Face•Fingerprint•Iris
Possession(“something I have”)
Biometrics(“something I am”)
Knowledge(“something I know”)
![Page 4: 3d Password Ppt](https://reader033.vdocuments.us/reader033/viewer/2022061106/54474e6fb1af9f800a8b4e17/html5/thumbnails/4.jpg)
Password
• It is basically an encryption algorithms.
• Usually it is 8-15 character or slightly more than that.
• Mostly textual passwords nowadays, are kept very simple say a word from the dictionary or their pet names, friends etc.
![Page 5: 3d Password Ppt](https://reader033.vdocuments.us/reader033/viewer/2022061106/54474e6fb1af9f800a8b4e17/html5/thumbnails/5.jpg)
passphrase
• It’s nothing but the enhance version of password.
• Usually it is a combination of words or simply collection of password in proper sequence is passphrase.
• It contains any well known thought also.
![Page 6: 3d Password Ppt](https://reader033.vdocuments.us/reader033/viewer/2022061106/54474e6fb1af9f800a8b4e17/html5/thumbnails/6.jpg)
• Length of passphrase is about 30-50 character or more than that also.
• But it has also some limitations because 30-50 character is creates ambiguity to remember if there is no any proper sequence.
![Page 7: 3d Password Ppt](https://reader033.vdocuments.us/reader033/viewer/2022061106/54474e6fb1af9f800a8b4e17/html5/thumbnails/7.jpg)
Biometrics
• Refer to a broad range of technologies• Automate the identification or verification of an
individual• Based on human characteristics or body organs
– Physiological: Face, fingerprint, iris– Behavioral: Hand-written signature, voice
Characteristics
011001010010101…011010100100110…001100010010010...
Templates
![Page 8: 3d Password Ppt](https://reader033.vdocuments.us/reader033/viewer/2022061106/54474e6fb1af9f800a8b4e17/html5/thumbnails/8.jpg)
3-D password• The 3D passwords which are more customizable,
and very interesting way of authentication.• The 3-D password is a multifactor authentication
scheme. • To be authenticated, we present a 3-D virtual
environment where the user navigates and interacts with various objects.
• The sequence of actions and interactions toward the objects inside the 3-D environment constructs the user’s 3-D password.
![Page 9: 3d Password Ppt](https://reader033.vdocuments.us/reader033/viewer/2022061106/54474e6fb1af9f800a8b4e17/html5/thumbnails/9.jpg)
3-D Virtual Environment
![Page 10: 3d Password Ppt](https://reader033.vdocuments.us/reader033/viewer/2022061106/54474e6fb1af9f800a8b4e17/html5/thumbnails/10.jpg)
• Virtual objects can be any object that we encounter in real life.
• Moreover, any user input (such as speaking in a specific location) in the virtual 3-D environment can beconsidered as a part of the 3-D password.
![Page 11: 3d Password Ppt](https://reader033.vdocuments.us/reader033/viewer/2022061106/54474e6fb1af9f800a8b4e17/html5/thumbnails/11.jpg)
Snapshot of a proof-of-concept virtual art gallery, which contains 36
pictures and six computers.
![Page 12: 3d Password Ppt](https://reader033.vdocuments.us/reader033/viewer/2022061106/54474e6fb1af9f800a8b4e17/html5/thumbnails/12.jpg)
![Page 13: 3d Password Ppt](https://reader033.vdocuments.us/reader033/viewer/2022061106/54474e6fb1af9f800a8b4e17/html5/thumbnails/13.jpg)
![Page 14: 3d Password Ppt](https://reader033.vdocuments.us/reader033/viewer/2022061106/54474e6fb1af9f800a8b4e17/html5/thumbnails/14.jpg)
DESIGN
• Designing a well-studied 3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system.
• The design of 3-D virtual environments should follow these guidelines…..
![Page 15: 3d Password Ppt](https://reader033.vdocuments.us/reader033/viewer/2022061106/54474e6fb1af9f800a8b4e17/html5/thumbnails/15.jpg)
1) Real-life similarity
2) Object uniqueness and distinction
3) Three-dimensional virtual environment size
4) Number of objects (items) and their types
5) System importance
![Page 16: 3d Password Ppt](https://reader033.vdocuments.us/reader033/viewer/2022061106/54474e6fb1af9f800a8b4e17/html5/thumbnails/16.jpg)
• Possible critical applications include the
following….
1) Critical servers
2) Nuclear and military facilities
3) Airplanes and jetfighters
![Page 17: 3d Password Ppt](https://reader033.vdocuments.us/reader033/viewer/2022061106/54474e6fb1af9f800a8b4e17/html5/thumbnails/17.jpg)
• A small 3-D virtual environment can be used in many systems, including the following:
1) ATMs
2) personal digital assistants
3) desktop computers and laptop logins
4) web authentication
![Page 18: 3d Password Ppt](https://reader033.vdocuments.us/reader033/viewer/2022061106/54474e6fb1af9f800a8b4e17/html5/thumbnails/18.jpg)
THANK YOU