SlideShare ist ein Scribd-Unternehmen logo
1 von 18
INTRODUCTION
 The 3-D password is a multifactor authentication scheme.
 It can combine all existing authentication schemes into a single 3-D virtual
environment.
 This 3-D virtual environment contains several objects or items with which the user
can interact.
 The type of interaction varies from one item to another.
 The 3-D password is constructed by observing the actions and interactions of the
user and by observing the sequences of such actions.
Visit www.seminarlinks.blogspot.com to download
EXISTING SYSTEM
Human Authentication
techniques
Knowledge Based
What you KNOW
Textual Password
Graphical Password
Token Based-What
you HAVE
ATM cards
Keys
ID Cards
Biometrics - What you
ARE
Fingerprints, Palmprints
Hand geometry
Face, Iris,Voice, Retina
recognition
Human Authentication Techniques - Classification
•A 3D password is a multifactor
authentication scheme that
combine
RECOGNITION
+RECALL
+TOKENS
+BIOMETRICS
in one authentication system.
3D PASSWORD
BRIEF DESCRIPTION OF SYSTEM
 The 3D password presents a virtual environment containing various
virtual objects.
 The user walks through the environment and interacts with the objects.
 It is the combination and sequence of user interactions that occur in the
3D environment.
BRIEF DESCRIPTION OF SYSTEM
 The user is presented with this 3d virtual environment where the user navigates and
interacts with various objects.
 The sequence of actions and interactions towards the objects inside the 3d
environment constructs the user’s 3d password.
SYSTEM IMPLEMENTATION
 For example, the user can enter the virtual environment and type something on a
computer that exists in (x1 , y1 , z1 ) position
 then enter a room that has a fingerprint recognition device that exists in a position
(x2 , y2 , z2 ) and provide his/her fingerprint.
 Then, the user can go to the virtual garage, open the car door, and turn on the radio
to a specific channel.
 The combination and the sequence of the previous actions toward the specific
objects construct the user’s 3D password.
Virtual objects can be any object we encounter in real life:
 A computer on which the user can type in
 A fingerprint reader that requires users fingerprint
 A paper or white board on which user can type
 An Automated teller(ATM) machine that requires a token
 A light that can be switched on/off
 A television or radio
 A car that can be driven
 A graphical password scheme
VIRTUAL OBJECTS
•3-D virtual environment affects the usability, effectiveness, and
acceptability of a 3-D password system.
• 3-D environment reflects the administration needs and the security
requirements.
3D Virtual Environment
3DVIRTUAL ENVIRONMENT
The design of 3D virtual environments should follow these guidelines:
DESIGN GUIDELINES
ADVANTAGES
 Provides security.
 3D password can’t take by any other person.
 3D graphical password has no limit.
 Password can change easily.
 Implementation of the system is easy.
 Password can remember easily.
 Password helps to keep lot of personal
details.
APPLICATIONS
The 3D password’s main application domains are protecting critical systems and resources.
 Critical Servers
 Nuclear Reactors & military Facilities
 Airplanes and missile Guiding
 In addition, 3D passwords can be used in less critical systems
 A small virtual environment can be used in the following systems like
 ATM
 Personal Digital Assistance
 Desktop computers & laptops
 Web authentication etc.
State Diagram
ATTACKS AND COUNTERMEASURES
 To realize and understand how far an authentication scheme is secure, all possible
attack methods should be considered.
 Thorough study has to be done , whether the authentication scheme proposed is
immune against such attacks or not.
 Moreover, if the proposed authentication scheme is not immune, the countermeasures
have to be found that prevent such attacks.
Visit www.seminarlinks.blogspot.com to download
ATTACKS AND COUNTERMEASURES
 Brute Force Attack:The attacker has to try all possible 3-D passwords.This kind of attack is very
difficult for the following reasons:
 Time required to login
 Cost of attacks
 Well-Studied Attack:The attacker tries to find the highest probable distribution of 3-D passwords.
However, to launch such an attack, the attacker has to acquire knowledge of the most probable 3-D
password distributions.
 Shoulder Surfing Attack:An attacker uses a camera to record the user’s 3-D password or tries to
watch the legitimate user while the 3-D password is being performed.This attack is the most
successful type of attack against 3-D passwords and some other graphical passwords.
 Timing Attack: In this attack, the attacker observes how long it takes the legitimate user to perform
a correct sign-in using the 3-D password.This observation gives the attacker an indication of the
legitimate user’s 3-D password length.
VIDEO DEMO
CONCLUSION
• The authentication can be improved with 3d password ,because the unauthorized person may not
interact with same object at a particular location as the legitimate user.
• It is difficult to crack ,because it has no fixed number of steps and a particular procedure.
• Added with biometrics and token verification this schema becomes almost unbreakable.
 The 3-D password is still in its early stages. Designing various kinds of 3-D virtual environments,
deciding on password spaces, and interpreting user feedback and experiences from such environments
will result in enhancing and improving the user experience of the 3-D password
3D Password PPT

Weitere ähnliche Inhalte

Was ist angesagt?

Screenless Display PPT
Screenless Display PPTScreenless Display PPT
Screenless Display PPTVikas Kumar
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importanceshubhangi singh
 
Screenless displays seminar report
Screenless displays seminar reportScreenless displays seminar report
Screenless displays seminar reportJeevan Kumar D
 
Project synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceProject synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceNitesh Dubey
 
eye phone technology
eye phone technologyeye phone technology
eye phone technologyNaga Dinesh
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password PresentationSambit Mishra
 
Seminar report on augmented and virtual reality
Seminar report on augmented and virtual realitySeminar report on augmented and virtual reality
Seminar report on augmented and virtual realityDheeraj Chauhan
 
Screenless displays ppt
Screenless displays ppt Screenless displays ppt
Screenless displays ppt Jeevan Kumar D
 
Presentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTIONPresentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTIONShantaJha2
 
Silverlight
SilverlightSilverlight
SilverlightBiTWiSE
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes pptdeepu427
 
BLUE EYES TECHNOLOGY
BLUE EYESTECHNOLOGYBLUE EYESTECHNOLOGY
BLUE EYES TECHNOLOGYChaitanya Ram
 
The sixth sense technology complete ppt
The sixth sense technology complete pptThe sixth sense technology complete ppt
The sixth sense technology complete pptatinav242
 

Was ist angesagt? (20)

Screenless Display PPT
Screenless Display PPTScreenless Display PPT
Screenless Display PPT
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
Screenless displays seminar report
Screenless displays seminar reportScreenless displays seminar report
Screenless displays seminar report
 
Project synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceProject synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendance
 
Google glass ppt
Google glass pptGoogle glass ppt
Google glass ppt
 
3D Password
3D Password3D Password
3D Password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
3D password
3D password3D password
3D password
 
Smart note-taker
Smart note-takerSmart note-taker
Smart note-taker
 
Seminar report on augmented and virtual reality
Seminar report on augmented and virtual realitySeminar report on augmented and virtual reality
Seminar report on augmented and virtual reality
 
Screenless displays ppt
Screenless displays ppt Screenless displays ppt
Screenless displays ppt
 
Presentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTIONPresentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTION
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Silverlight
SilverlightSilverlight
Silverlight
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
BLUE EYES TECHNOLOGY
BLUE EYESTECHNOLOGYBLUE EYESTECHNOLOGY
BLUE EYES TECHNOLOGY
 
The sixth sense technology complete ppt
The sixth sense technology complete pptThe sixth sense technology complete ppt
The sixth sense technology complete ppt
 

Andere mochten auch

3d password by suresh
3d password by suresh3d password by suresh
3d password by sureshsuresh5c2
 
3d passwords
3d passwords3d passwords
3d passwordsshwetaag
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)ASIM MIRZA
 
Blue brain project ppt
Blue brain project pptBlue brain project ppt
Blue brain project pptLishita Shah
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakadkuldeepdhakad
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
 
Senior Project: Final Presentation
Senior Project: Final PresentationSenior Project: Final Presentation
Senior Project: Final PresentationBrian_Elliott
 
Voice based web browser
Voice based web browserVoice based web browser
Voice based web browserGowsalyasri
 

Andere mochten auch (20)

3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3d passwords
3d passwords3d passwords
3d passwords
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
3d password
3d password3d password
3d password
 
3D Searching by ruchi
3D Searching by ruchi3D Searching by ruchi
3D Searching by ruchi
 
Blue Brain
Blue Brain Blue Brain
Blue Brain
 
Kanishka_3D Passwords
Kanishka_3D PasswordsKanishka_3D Passwords
Kanishka_3D Passwords
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Blue brain project ppt
Blue brain project pptBlue brain project ppt
Blue brain project ppt
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
Senior Project: Final Presentation
Senior Project: Final PresentationSenior Project: Final Presentation
Senior Project: Final Presentation
 
Voice based web browser
Voice based web browserVoice based web browser
Voice based web browser
 

Ähnlich wie 3D Password PPT (20)

3 d password
3 d password3 d password
3 d password
 
3D-Password
3D-Password 3D-Password
3D-Password
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
3d authentication
3d authentication3d authentication
3d authentication
 
SRAVYA
SRAVYASRAVYA
SRAVYA
 
3 d password
3 d password 3 d password
3 d password
 
3 d ppt
3 d ppt3 d ppt
3 d ppt
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
3d pass words
3d pass words3d pass words
3d pass words
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3d password
3d password3d password
3d password
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
Vivek
VivekVivek
Vivek
 
3D Password
3D Password3D Password
3D Password
 
3D password
3D password 3D password
3D password
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
3d password
3d  password3d  password
3d password
 

Mehr von Seminar Links

Artificial Intelligence (A.I.) in Schools (PPT)
Artificial Intelligence (A.I.) in Schools (PPT)Artificial Intelligence (A.I.) in Schools (PPT)
Artificial Intelligence (A.I.) in Schools (PPT)Seminar Links
 
Sustainable Materials Management (SMM)
Sustainable Materials Management (SMM)Sustainable Materials Management (SMM)
Sustainable Materials Management (SMM)Seminar Links
 
Are Top Grades Enough (PPT)
Are Top Grades Enough (PPT)Are Top Grades Enough (PPT)
Are Top Grades Enough (PPT)Seminar Links
 
AI and Youth Employment (PPT)
AI and Youth Employment (PPT)AI and Youth Employment (PPT)
AI and Youth Employment (PPT)Seminar Links
 
Environmental Impacts of COVID-19 Pandemic: PPT
Environmental Impacts of COVID-19 Pandemic: PPTEnvironmental Impacts of COVID-19 Pandemic: PPT
Environmental Impacts of COVID-19 Pandemic: PPTSeminar Links
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging TechnologiesSeminar Links
 
Claytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPTClaytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPTSeminar Links
 
Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018Seminar Links
 
MicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPTMicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPTSeminar Links
 
Performance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPTPerformance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPTSeminar Links
 
Box Pushing Technique
Box Pushing TechniqueBox Pushing Technique
Box Pushing TechniqueSeminar Links
 
Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018Seminar Links
 
Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE) Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE) Seminar Links
 
Artificial photosynthesis PPT
Artificial photosynthesis PPTArtificial photosynthesis PPT
Artificial photosynthesis PPTSeminar Links
 
How to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareHow to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareSeminar Links
 
Babbitt material ppt
Babbitt material pptBabbitt material ppt
Babbitt material pptSeminar Links
 
Carbon Foam Military Applications
Carbon Foam Military ApplicationsCarbon Foam Military Applications
Carbon Foam Military ApplicationsSeminar Links
 

Mehr von Seminar Links (20)

Artificial Intelligence (A.I.) in Schools (PPT)
Artificial Intelligence (A.I.) in Schools (PPT)Artificial Intelligence (A.I.) in Schools (PPT)
Artificial Intelligence (A.I.) in Schools (PPT)
 
Sustainable Materials Management (SMM)
Sustainable Materials Management (SMM)Sustainable Materials Management (SMM)
Sustainable Materials Management (SMM)
 
Are Top Grades Enough (PPT)
Are Top Grades Enough (PPT)Are Top Grades Enough (PPT)
Are Top Grades Enough (PPT)
 
AI and Youth Employment (PPT)
AI and Youth Employment (PPT)AI and Youth Employment (PPT)
AI and Youth Employment (PPT)
 
Environmental Impacts of COVID-19 Pandemic: PPT
Environmental Impacts of COVID-19 Pandemic: PPTEnvironmental Impacts of COVID-19 Pandemic: PPT
Environmental Impacts of COVID-19 Pandemic: PPT
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
Claytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPTClaytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPT
 
Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018
 
MicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPTMicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPT
 
Performance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPTPerformance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPT
 
Box Pushing Technique
Box Pushing TechniqueBox Pushing Technique
Box Pushing Technique
 
Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018
 
Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE) Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE)
 
Artificial photosynthesis PPT
Artificial photosynthesis PPTArtificial photosynthesis PPT
Artificial photosynthesis PPT
 
How to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareHow to prevent WannaCry Ransomware
How to prevent WannaCry Ransomware
 
Dams PPT
Dams PPTDams PPT
Dams PPT
 
Bio mass Energy
Bio mass EnergyBio mass Energy
Bio mass Energy
 
Babbitt material ppt
Babbitt material pptBabbitt material ppt
Babbitt material ppt
 
Ceramic Bearing ppt
Ceramic Bearing pptCeramic Bearing ppt
Ceramic Bearing ppt
 
Carbon Foam Military Applications
Carbon Foam Military ApplicationsCarbon Foam Military Applications
Carbon Foam Military Applications
 

Kürzlich hochgeladen

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Kürzlich hochgeladen (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

3D Password PPT

  • 1.
  • 2. INTRODUCTION  The 3-D password is a multifactor authentication scheme.  It can combine all existing authentication schemes into a single 3-D virtual environment.  This 3-D virtual environment contains several objects or items with which the user can interact.  The type of interaction varies from one item to another.  The 3-D password is constructed by observing the actions and interactions of the user and by observing the sequences of such actions. Visit www.seminarlinks.blogspot.com to download
  • 3. EXISTING SYSTEM Human Authentication techniques Knowledge Based What you KNOW Textual Password Graphical Password Token Based-What you HAVE ATM cards Keys ID Cards Biometrics - What you ARE Fingerprints, Palmprints Hand geometry Face, Iris,Voice, Retina recognition Human Authentication Techniques - Classification
  • 4. •A 3D password is a multifactor authentication scheme that combine RECOGNITION +RECALL +TOKENS +BIOMETRICS in one authentication system. 3D PASSWORD
  • 5. BRIEF DESCRIPTION OF SYSTEM  The 3D password presents a virtual environment containing various virtual objects.  The user walks through the environment and interacts with the objects.  It is the combination and sequence of user interactions that occur in the 3D environment.
  • 6. BRIEF DESCRIPTION OF SYSTEM  The user is presented with this 3d virtual environment where the user navigates and interacts with various objects.  The sequence of actions and interactions towards the objects inside the 3d environment constructs the user’s 3d password.
  • 7. SYSTEM IMPLEMENTATION  For example, the user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position  then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint.  Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel.  The combination and the sequence of the previous actions toward the specific objects construct the user’s 3D password.
  • 8. Virtual objects can be any object we encounter in real life:  A computer on which the user can type in  A fingerprint reader that requires users fingerprint  A paper or white board on which user can type  An Automated teller(ATM) machine that requires a token  A light that can be switched on/off  A television or radio  A car that can be driven  A graphical password scheme VIRTUAL OBJECTS
  • 9. •3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system. • 3-D environment reflects the administration needs and the security requirements. 3D Virtual Environment 3DVIRTUAL ENVIRONMENT
  • 10. The design of 3D virtual environments should follow these guidelines: DESIGN GUIDELINES
  • 11. ADVANTAGES  Provides security.  3D password can’t take by any other person.  3D graphical password has no limit.  Password can change easily.  Implementation of the system is easy.  Password can remember easily.  Password helps to keep lot of personal details.
  • 12. APPLICATIONS The 3D password’s main application domains are protecting critical systems and resources.  Critical Servers  Nuclear Reactors & military Facilities  Airplanes and missile Guiding  In addition, 3D passwords can be used in less critical systems  A small virtual environment can be used in the following systems like  ATM  Personal Digital Assistance  Desktop computers & laptops  Web authentication etc.
  • 14. ATTACKS AND COUNTERMEASURES  To realize and understand how far an authentication scheme is secure, all possible attack methods should be considered.  Thorough study has to be done , whether the authentication scheme proposed is immune against such attacks or not.  Moreover, if the proposed authentication scheme is not immune, the countermeasures have to be found that prevent such attacks. Visit www.seminarlinks.blogspot.com to download
  • 15. ATTACKS AND COUNTERMEASURES  Brute Force Attack:The attacker has to try all possible 3-D passwords.This kind of attack is very difficult for the following reasons:  Time required to login  Cost of attacks  Well-Studied Attack:The attacker tries to find the highest probable distribution of 3-D passwords. However, to launch such an attack, the attacker has to acquire knowledge of the most probable 3-D password distributions.  Shoulder Surfing Attack:An attacker uses a camera to record the user’s 3-D password or tries to watch the legitimate user while the 3-D password is being performed.This attack is the most successful type of attack against 3-D passwords and some other graphical passwords.  Timing Attack: In this attack, the attacker observes how long it takes the legitimate user to perform a correct sign-in using the 3-D password.This observation gives the attacker an indication of the legitimate user’s 3-D password length.
  • 17. CONCLUSION • The authentication can be improved with 3d password ,because the unauthorized person may not interact with same object at a particular location as the legitimate user. • It is difficult to crack ,because it has no fixed number of steps and a particular procedure. • Added with biometrics and token verification this schema becomes almost unbreakable.  The 3-D password is still in its early stages. Designing various kinds of 3-D virtual environments, deciding on password spaces, and interpreting user feedback and experiences from such environments will result in enhancing and improving the user experience of the 3-D password