SlideShare ist ein Scribd-Unternehmen logo
1 von 36
3-D password
By:
Rahul vaza
Nishant viramgama
(5th by ce)
Agenda
• Identification
• Passwords
• Passphrase
• Biometrics
• 3-d password
Three Basic Identification Methods of password
•Password
•PIN
•Keys
•Passport
•Smart Card
•Face
•Fingerprint
•Iris
Possession
(“something I have”)
Biometrics
(“something I am”)
Knowledge
(“something I know”)
Password
• It is basically an encryption algorithms.
• Usually it is 8-15 character or slightly more
than that.
• Mostly textual passwords nowadays, are
kept very simple say a word from the
dictionary or their pet names, friends etc.
• Ten years back Klein performed such
tests and he could crack 10-15 passwords
per day. Now with the technology change,
fast processors and many tools on the
Internet this has become a Child's Play.
passphrase
• It’s nothing but the enhance version of
password.
• Usually it is a combination of words or
simply collection of password in proper
sequence is passphrase.
• It contains any well known thought also.
• Length of passphrase is about 30-50
character or more than that also.
• But it has also some limitations because
30-50 character is creates ambiguity to
remember if there is no any proper
sequence.
Biometrics
• Refer to a broad range of technologies
• Automate the identification or verification of an
individual
• Based on human characteristics or body organs
– Physiological: Face, fingerprint, iris
– Behavioral: Hand-written signature, voice
Characteristics
011001010010101…
011010100100110…
001100010010010...
Templates
• But biometrics has also some drawbacks.
• Suppose you select your fingerprint as a
biometrics..
• But what to do when you have crack or
wound in your finger.
• In this situation you might be in trouble.
• And now a days some hackers even
implement exact copy of your biometrics
also….
• After seeing all the different security
scheme now it is time to do something
advance in this security system.
• Here, the 3d password come into the
picture.
3-D password
• The 3D passwords which are more
customisable, and very interesting way of
authentication.
• The 3-D password is a multifactor
authentication scheme. To be
authenticated, we present a 3-D virtual
environment where the
user navigates and interacts with various
objects. The sequence
of actions and interactions toward the
objects inside the 3-D environment
constructs the user’s 3-D password.
• The 3-D password
can combine most existing
authentication schemes such as textual
passwords, graphical passwords, and
various types of biometrics
into a 3-D virtual environment.
The design of the 3-D virtual
environment and the type of objects
selected determine the 3-D
password key space.
• This is achieved through interacting only
with the objects that acquire information
that the user is comfortable in providing
and ignoring the objects that request
information that the user prefers not to
provide.
For example, if an item requests an iris
scan and the user is not comfortable in
providing such information, the user
simply avoids interacting with that item.
Moreover, giving the user the freedom of
choice as to what type of authentication
schemes will be part of their 3-D password
and given the large number of objects and
items in the environment, the number of
possible 3-D passwords will increase.
Thus, it becomes much more difficult for
the attacker to guess the user’s 3-D
password.
• For example, the user can enter the virtual
environment
and type something on a computer that exists in
(x1, y1, z1)position, then enter a room that has a
fingerprint recognition device that exists in a
position (x2, y2, z2) and provide his/her
fingerprint. Then, the user can go to the virtual
garage, open the car door, and turn on the radio
to a specific channel. The combination and the
sequence of the previous actions toward
the specific objects construct the user’s 3-D
password.
• Virtual objects can be any object that we
encounter in real life. Any obvious actions
and interactions toward the real-life
objects can be done in the virtual 3-D
environment toward the
virtual objects. Moreover, any user input
(such as speaking in a specific location) in
the virtual 3-D environment can be
considered as a part of the 3-D password.
We can have the
following objects:
• 1) a computer with which the user can
type;
2) a fingerprint reader that requires the
user’s fingerprint;
3) a biometrical recognition device;
4) a paper or a white board that a user can
write, sign, or draw on;
5) an automated teller machine (ATM) that
requests a token;
6) a light that can be switched on/off;
7) a television or radio where channels can
be selected;
8) a staple that can be punched;
9) a car that can be driven;
10) a book that can be moved from one
place to another;
11) any graphical password scheme;
12) any real-life object;
13) any upcoming authentication scheme.
Snapshot of a proof-of-concept virtual
art gallery, which contains 36
pictures and six computers.
• Designing a well-studied 3-D virtual
environment affects the usability,
effectiveness, and acceptability of a 3-D
password system. Therefore, the first step
in building a 3-D password system is to
design a 3-D environment that reflects the
administration needs and the security
requirements. The design of 3-D
virtual environments should follow these
guidelines.
• 1) Real-life similarity: The prospective 3-D
virtual environment should reflect what
people are used to seeing inreal life. Objects
used in virtual environments should be
relatively similar in size to real objects (sized
to scale).
• Possible actions and interactions toward
virtual objects should reflect real-life
situations. Object responses should be
realistic. The target should have a 3-D
virtual environment that users can interact
with, by using common sense.
• 2) Object uniqueness and distinction: Every virtual
object or item in the 3-D virtual environment is different
from any other virtual object.
• The uniqueness comes from the fact that every virtual
object has its own attributes
such as position.
Thus, the prospective interaction with
object 1 is not equal to the interaction with object 2.
However, having similar objects such as 20 computers
in one place might confuse the user. Therefore, the
design of the 3-D virtual environment should consider
that every object should be distinguishable from other
objects.
A simple real-life example is home numbering.
Assume that there are 20 or more homes that
look like each other and the homes are not
numbered. It would be difficult to distinguish
which house was visited a month ago.
Similarly,
in designing a 3-D virtual environment, it should
be easy for users to navigate through and to
distinguish between objects. The distinguishing
factor increases the user’s recognition of
objects. Therefore, it improves the system
usability.
• 3) Three-dimensional virtual environment
size:
• A 3-D virtual environment can depict a city
or even the world. On the other hand, it
can depict a space as focused as a single
room or office. The size of a 3-D
environment should be carefully studied. A
large 3-D virtual environment
will increase the time required by the user
to perform a 3-D password.
Moreover, a large 3-D virtual environment
can contain a large number of virtual
objects.
Therefore, the probable 3-D password
space broadens.
However, a small 3-D virtual environment
usually contains only a few objects, and
thus, performing a 3-D password will take
less time.
• 4) Number of objects (items) and their types:
Part of designing a 3-D virtual environment is
determining the types of objects and how many
objects should be placed in the environment.
The types of objects reflect what kind of
responses the object will have.
For simplicity, we can consider requesting a
textual password or a fingerprint as an object
response type. Selecting the right object
response types and the number of objects
affects the probable password space of a 3-D
password.
• 5) System importance:
The 3-D virtual environment should
consider what systems will be protected by
a 3-D password.
The number of objects and the types of
objects that have been used in the 3-D
virtual environment should reflect the
importance of the protected
system.
• Possible critical applications include the
following.
1) Critical servers: Many large
organizations have critical servers that are
usually protected by a textual password.
A 3-D password authentication proposes a
sound replacement for a textual password.
Moreover, entrances to such locations are
usually protected by access cards and
sometimes PIN numbers.
Therefore, a 3-D password can be used to
protect the entrance to such locations and
protect the usage of such servers.
• 2) Nuclear and military facilities: Such
facilities should be protected by the most
powerful authentication systems.
The 3-D password has a very large
probable password space, and since it can
contain token-, biometrics-,recognition-,
and knowledge-based authentications in a
single authentication system, it is a sound
choice for high level security locations.
• 3) Airplanes and jetfighters: Because of
the possible threat of misusing airplanes
and jetfighters for religious-political
agendas, usage of such airplanes should
be protected by a powerful authentication
system.
• The 3-D password is recommended for
these systems.
• In addition, 3-D passwords can be used in
less critical systems because the 3-D
virtual environment can be designed to fit
any system’s needs.
A small 3-D virtual environment can be
used in many systems, including the
following:
1) ATMs;
2) personal digital assistants;
3) desktop computers and laptop logins;
4) web authentication.
3 dpswd

Weitere ähnliche Inhalte

Was ist angesagt?

3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
Swagato Dey
 

Was ist angesagt? (20)

3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3d
3d3d
3d
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3dpassword
3dpassword3dpassword
3dpassword
 
3 d password
3 d password 3 d password
3 d password
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3D password
3D password3D password
3D password
 
3D password
3D password 3D password
3D password
 
3 d password
3 d password3 d password
3 d password
 
3d passwords
3d passwords3d passwords
3d passwords
 
Vivek
VivekVivek
Vivek
 
3D Password
3D Password3D Password
3D Password
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3D-Password
3D-Password 3D-Password
3D-Password
 

Andere mochten auch

Andere mochten auch (13)

3 d ppt
3 d ppt3 d ppt
3 d ppt
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 
3 d password
3 d password3 d password
3 d password
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 
Learning fingerprint reconstruction from minutiae to image
Learning fingerprint reconstruction from minutiae to imageLearning fingerprint reconstruction from minutiae to image
Learning fingerprint reconstruction from minutiae to image
 
3 d password
3 d password3 d password
3 d password
 
Kanishka_3D Passwords
Kanishka_3D PasswordsKanishka_3D Passwords
Kanishka_3D Passwords
 
3 d password
3 d password3 d password
3 d password
 
3 d password
3 d password3 d password
3 d password
 
3D secure password
3D secure password3D secure password
3D secure password
 
Shape workshop
Shape workshopShape workshop
Shape workshop
 
3-D TECHNOLOGY
3-D TECHNOLOGY 3-D TECHNOLOGY
3-D TECHNOLOGY
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 

Ähnlich wie 3 dpswd

3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
ajaykumar557
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
Aakash Takale
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
bujjiflute
 
SRAVYA
SRAVYASRAVYA
SRAVYA
pvpsit
 

Ähnlich wie 3 dpswd (18)

3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
3d authentication
3d authentication3d authentication
3d authentication
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
C0361419
C0361419C0361419
C0361419
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted
 
SRAVYA
SRAVYASRAVYA
SRAVYA
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Kürzlich hochgeladen (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

3 dpswd

  • 1. 3-D password By: Rahul vaza Nishant viramgama (5th by ce)
  • 2. Agenda • Identification • Passwords • Passphrase • Biometrics • 3-d password
  • 3. Three Basic Identification Methods of password •Password •PIN •Keys •Passport •Smart Card •Face •Fingerprint •Iris Possession (“something I have”) Biometrics (“something I am”) Knowledge (“something I know”)
  • 4. Password • It is basically an encryption algorithms. • Usually it is 8-15 character or slightly more than that. • Mostly textual passwords nowadays, are kept very simple say a word from the dictionary or their pet names, friends etc.
  • 5. • Ten years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.
  • 6. passphrase • It’s nothing but the enhance version of password. • Usually it is a combination of words or simply collection of password in proper sequence is passphrase. • It contains any well known thought also.
  • 7. • Length of passphrase is about 30-50 character or more than that also. • But it has also some limitations because 30-50 character is creates ambiguity to remember if there is no any proper sequence.
  • 8. Biometrics • Refer to a broad range of technologies • Automate the identification or verification of an individual • Based on human characteristics or body organs – Physiological: Face, fingerprint, iris – Behavioral: Hand-written signature, voice Characteristics 011001010010101… 011010100100110… 001100010010010... Templates
  • 9. • But biometrics has also some drawbacks. • Suppose you select your fingerprint as a biometrics.. • But what to do when you have crack or wound in your finger. • In this situation you might be in trouble. • And now a days some hackers even implement exact copy of your biometrics also….
  • 10. • After seeing all the different security scheme now it is time to do something advance in this security system. • Here, the 3d password come into the picture.
  • 11. 3-D password • The 3D passwords which are more customisable, and very interesting way of authentication. • The 3-D password is a multifactor authentication scheme. To be authenticated, we present a 3-D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3-D environment constructs the user’s 3-D password.
  • 12. • The 3-D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3-D virtual environment. The design of the 3-D virtual environment and the type of objects selected determine the 3-D password key space.
  • 13. • This is achieved through interacting only with the objects that acquire information that the user is comfortable in providing and ignoring the objects that request information that the user prefers not to provide. For example, if an item requests an iris scan and the user is not comfortable in providing such information, the user simply avoids interacting with that item.
  • 14. Moreover, giving the user the freedom of choice as to what type of authentication schemes will be part of their 3-D password and given the large number of objects and items in the environment, the number of possible 3-D passwords will increase. Thus, it becomes much more difficult for the attacker to guess the user’s 3-D password.
  • 15. • For example, the user can enter the virtual environment and type something on a computer that exists in (x1, y1, z1)position, then enter a room that has a fingerprint recognition device that exists in a position (x2, y2, z2) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the user’s 3-D password.
  • 16. • Virtual objects can be any object that we encounter in real life. Any obvious actions and interactions toward the real-life objects can be done in the virtual 3-D environment toward the virtual objects. Moreover, any user input (such as speaking in a specific location) in the virtual 3-D environment can be considered as a part of the 3-D password. We can have the following objects:
  • 17. • 1) a computer with which the user can type; 2) a fingerprint reader that requires the user’s fingerprint; 3) a biometrical recognition device; 4) a paper or a white board that a user can write, sign, or draw on; 5) an automated teller machine (ATM) that requests a token;
  • 18. 6) a light that can be switched on/off; 7) a television or radio where channels can be selected; 8) a staple that can be punched; 9) a car that can be driven; 10) a book that can be moved from one place to another; 11) any graphical password scheme; 12) any real-life object; 13) any upcoming authentication scheme.
  • 19. Snapshot of a proof-of-concept virtual art gallery, which contains 36 pictures and six computers.
  • 20.
  • 21. • Designing a well-studied 3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system. Therefore, the first step in building a 3-D password system is to design a 3-D environment that reflects the administration needs and the security requirements. The design of 3-D virtual environments should follow these guidelines.
  • 22. • 1) Real-life similarity: The prospective 3-D virtual environment should reflect what people are used to seeing inreal life. Objects used in virtual environments should be relatively similar in size to real objects (sized to scale).
  • 23. • Possible actions and interactions toward virtual objects should reflect real-life situations. Object responses should be realistic. The target should have a 3-D virtual environment that users can interact with, by using common sense.
  • 24. • 2) Object uniqueness and distinction: Every virtual object or item in the 3-D virtual environment is different from any other virtual object. • The uniqueness comes from the fact that every virtual object has its own attributes such as position. Thus, the prospective interaction with object 1 is not equal to the interaction with object 2. However, having similar objects such as 20 computers in one place might confuse the user. Therefore, the design of the 3-D virtual environment should consider that every object should be distinguishable from other objects.
  • 25. A simple real-life example is home numbering. Assume that there are 20 or more homes that look like each other and the homes are not numbered. It would be difficult to distinguish which house was visited a month ago. Similarly, in designing a 3-D virtual environment, it should be easy for users to navigate through and to distinguish between objects. The distinguishing factor increases the user’s recognition of objects. Therefore, it improves the system usability.
  • 26. • 3) Three-dimensional virtual environment size: • A 3-D virtual environment can depict a city or even the world. On the other hand, it can depict a space as focused as a single room or office. The size of a 3-D environment should be carefully studied. A large 3-D virtual environment
  • 27. will increase the time required by the user to perform a 3-D password. Moreover, a large 3-D virtual environment can contain a large number of virtual objects. Therefore, the probable 3-D password space broadens. However, a small 3-D virtual environment usually contains only a few objects, and thus, performing a 3-D password will take less time.
  • 28. • 4) Number of objects (items) and their types: Part of designing a 3-D virtual environment is determining the types of objects and how many objects should be placed in the environment. The types of objects reflect what kind of responses the object will have. For simplicity, we can consider requesting a textual password or a fingerprint as an object response type. Selecting the right object response types and the number of objects affects the probable password space of a 3-D password.
  • 29. • 5) System importance: The 3-D virtual environment should consider what systems will be protected by a 3-D password. The number of objects and the types of objects that have been used in the 3-D virtual environment should reflect the importance of the protected system.
  • 30. • Possible critical applications include the following. 1) Critical servers: Many large organizations have critical servers that are usually protected by a textual password. A 3-D password authentication proposes a sound replacement for a textual password. Moreover, entrances to such locations are usually protected by access cards and sometimes PIN numbers.
  • 31. Therefore, a 3-D password can be used to protect the entrance to such locations and protect the usage of such servers.
  • 32. • 2) Nuclear and military facilities: Such facilities should be protected by the most powerful authentication systems. The 3-D password has a very large probable password space, and since it can contain token-, biometrics-,recognition-, and knowledge-based authentications in a single authentication system, it is a sound choice for high level security locations.
  • 33. • 3) Airplanes and jetfighters: Because of the possible threat of misusing airplanes and jetfighters for religious-political agendas, usage of such airplanes should be protected by a powerful authentication system.
  • 34. • The 3-D password is recommended for these systems. • In addition, 3-D passwords can be used in less critical systems because the 3-D virtual environment can be designed to fit any system’s needs.
  • 35. A small 3-D virtual environment can be used in many systems, including the following: 1) ATMs; 2) personal digital assistants; 3) desktop computers and laptop logins; 4) web authentication.

Hinweis der Redaktion

  1. Be it purchasing goods, boarding an airplane, crossing a border, or performing a financial transaction, reliable authorization and authentication have become necessary for many daily interactions. Essentially, these activities rely upon ensuring the identities and authenticity of the people involved. Traditionally, authentication is based upon possession-based and knowledge-based identification. What you have Examples: User IDs, Accounts, Cards, Badges, Keys Shortcomings: Can be shared May be duplicated May be lost or stolen What you know Examples: Password, PIN Shortcomings: Many passwords are easily guessed Can be shared Can be forgotten Today, daily interactions are becoming increasingly automated, interfacing people with computers. Until recently, the primary authentication components of human computer interaction consisted of passwords and personal identification numbers. However, new authentication technologies are emerging that are capable of providing higher degrees of certainty for identifying an individual. One of these technologies is biometrics. Biometrics Examples: Fingerprint, voiceprint, face, iris Not possible to share Repudiation unlikely Difficult to forge Cannot be lost or stolen Source: Bolle, R.M. et al. (2004) Guide to Biometrics , New York: Springer-Verlag: 1-5
  2. Biometrics refers to a broad range of technologies, systems, and applications that automate the identification or verification of an individual based on his or her physiological or behavioral characteristics. Source: Bolle, R.M. et al. (2004) Guide to Biometrics , New York: Springer-Verlag: 1-5 Physiological biometrics are based on direct measurements of a part of the human body at a point in time. The most common physiological biometrics involve fingerprints, face, hand geometry, and iris. Less common physiological biometrics involve DNA, ear shape, odor, retina, skin reflectance and thermogram. Source: Bolle, R.M. et al. (2004) Guide to Biometrics , New York: Springer-Verlag: 1-5 Behavioural biometrics are based on measurements and data derived from the method by which a person carries out an action over an extended period of time. The most common behavioural biometrics involve hand-written signature and voice. Less common behavioural biometrics involve gait, keystroke pattern, and lip motion. Source: Bolle, R.M. et al. (2004) Guide to Biometrics , New York: Springer-Verlag: 1-5 According to Turk and Pentland, in their seminal paper, “Eigenfaces for Recognition”, which was published in 1991, “In the language of information theory, we want to extract the relevant information in a face image, encode it as efficiently as possible, and compare one face encoding with a database of models encoded similarly.” Many rationales for deploying biometrics center on improved certainty in determining an individual’s identity and perceived cost savings from the reduced risk of financial losses for the individual or institution deploying the biometric. Source: Nanavati, S. et al. (2002) Biometrics: Identity Verification in a Networked World , New York: John Wiley & Sons, Inc: 1-5