3. TTable of contentable of content
S.no. Topic name Page no.
1 Introduction 4
2 Existing system 5
3 Human authentication techniques 6
4 3D password 7
5 Brief description of system 8-9
6 Virtual object 10
7 3D virtual environment 11
8 Design guidelines 12
9 System implementation 13
10 Application 14
11 State diagram 15
12 Advantages 16
13 Conclusion 17
14 Query or any doubts 18
4. IIntroductionntroduction::(Need and Purpose)(Need and Purpose)
Need:-Need:-
Current Authentication suffers from many weaknessCurrent Authentication suffers from many weakness
because simple password is only based on humanbecause simple password is only based on human
memory . So now a days a new technique are usememory . So now a days a new technique are use
called 3D password is used.called 3D password is used.
Purpose:-Purpose:-
3D password provide secure services you with a3D password provide secure services you with a
password to protect your online transactions.password to protect your online transactions.
Easy to accessEasy to access
5. EExisting system for securityxisting system for security
Textual passwordTextual password
Graphical passwordGraphical password
BiometricsBiometrics
Token basedToken based
6. HHuman authentication techniquesuman authentication techniques
Knowledge based (what you know)Knowledge based (what you know)
Textual passwordTextual password
TokenToken based(what you have)based(what you have)
ATM cardsATM cards
KeysKeys
ID cardsID cards
Biometrics(what you are)Biometrics(what you are)
Fingerprints,PalmprintsFingerprints,Palmprints
Hand geometryHand geometry
Face,Iris,Voice,RetinaFace,Iris,Voice,Retina
7. 33D passwordD password
A 3D passwords which areA 3D passwords which are
more customizable, and verymore customizable, and very
interesting way ofinteresting way of
authentication.authentication.
A 3D password isA 3D password is
multifactor authenticationmultifactor authentication
scheme that combines-scheme that combines-
RecognitionRecognition
+Recall+Recall
+Tokens+Tokens
+Biometrics+Biometrics
is one authentication system.is one authentication system.
8. BBrief description of systemrief description of system
The 3D password presents in theThe 3D password presents in the VirtualVirtual
environmentenvironment containing various virtual objects.containing various virtual objects.
The user walks through in the environment andThe user walks through in the environment and
interacts with the objects.interacts with the objects.
It is the combination and sequence of userIt is the combination and sequence of user
interactions that occur in the 3d environment.interactions that occur in the 3d environment.
9. The user presented with this 3D virtualThe user presented with this 3D virtual
environment where the user navigates andenvironment where the user navigates and
interacts with various objects.interacts with various objects.
The sequence of action and interaction towardsThe sequence of action and interaction towards
the objects inside the 3D environment constructsthe objects inside the 3D environment constructs
the user’s 3D password.the user’s 3D password.
10. VVirtual objectsirtual objects
Virtual objects can be any object weVirtual objects can be any object we
encounter in real Life-encounter in real Life-
A computer on which user can type.A computer on which user can type.
A fingerprint reader that requires userA fingerprint reader that requires user
fingerprints.fingerprints.
An automated teller (ATM) machineAn automated teller (ATM) machine
that requires a token.that requires a token.
A light that can be switched on/off.A light that can be switched on/off.
A television or radio.A television or radio.
A car that can be driven.A car that can be driven.
A graphical password scheme.A graphical password scheme.
11. 33D virtual environmentD virtual environment
The 3D environment effects the usability,The 3D environment effects the usability,
effectiveness and acceptability of the 3Deffectiveness and acceptability of the 3D
password system.password system.
The 3D environment reflects the administrationThe 3D environment reflects the administration
needs and security requirements.needs and security requirements.
12. DDesign guidelineesign guideline
The design of 3D virtual environment shouldThe design of 3D virtual environment should
follows these guidelines:follows these guidelines:
13. SSystem implementationystem implementation
For example, the user can enter the virtualFor example, the user can enter the virtual
environment and type something on a computer thatenvironment and type something on a computer that
exists in (x1,y1,z1) position.exists in (x1,y1,z1) position.
Then enter in a room that has a fingerprint recognitionThen enter in a room that has a fingerprint recognition
device that exists in a position (x2,y2,z2) and providedevice that exists in a position (x2,y2,z2) and provide
his/her fingerprint.his/her fingerprint.
Then the user can go the virtual garage, open the carThen the user can go the virtual garage, open the car
door and turn on the radio to a specific channel.door and turn on the radio to a specific channel.
14. AApplicationspplications
The 3D password’s main application domains areThe 3D password’s main application domains are
protecting critical systems and resources.protecting critical systems and resources.
Critical serversCritical servers
Nuclear reactors and military facilitiesNuclear reactors and military facilities
Airplanes and missile guidingAirplanes and missile guiding
In addition, the 3D password can be used in theIn addition, the 3D password can be used in the
less critical systemsless critical systems
A small virtual environment can be used in theA small virtual environment can be used in the
following system like: ATM, personal digitalfollowing system like: ATM, personal digital
assistance, desktop computers and laptops, webassistance, desktop computers and laptops, web
authentication etc.
16. AAdvantagesdvantages
Provide securityProvide security
3D password can not take by3D password can not take by
other personother person
3D graphical password has no3D graphical password has no
limitlimit
Implementation of system is easyImplementation of system is easy
Password can remember easilyPassword can remember easily
Password helps to keep lot ofPassword helps to keep lot of
personal details.personal details.
17. CConclusiononclusion
The authenticationThe authentication can be improved with 3Dcan be improved with 3D
passwordpassword, because unauthorized person may not, because unauthorized person may not
interact with same object at a particular locationinteract with same object at a particular location
as the legitimate user.as the legitimate user.
It isIt is difficult to crackdifficult to crack, because it has no fixed, because it has no fixed
number of steps and a particular procedure.number of steps and a particular procedure.
Added with token and biometrics this schemaAdded with token and biometrics this schema
becomes almostbecomes almost unbreakableunbreakable..
18. All of youAll of you
Any Doubts????????????Any Doubts????????????