SlideShare ist ein Scribd-Unternehmen logo
1 von 18
3D Password3D Password
PRESENTED BY:-PRESENTED BY:-
Meera yadavMeera yadav
Asim baigAsim baig
S7,CSE DepartmentS7,CSE Department
TTable of contentable of content
S.no. Topic name Page no.
1 Introduction 4
2 Existing system 5
3 Human authentication techniques 6
4 3D password 7
5 Brief description of system 8-9
6 Virtual object 10
7 3D virtual environment 11
8 Design guidelines 12
9 System implementation 13
10 Application 14
11 State diagram 15
12 Advantages 16
13 Conclusion 17
14 Query or any doubts 18
IIntroductionntroduction::(Need and Purpose)(Need and Purpose)
Need:-Need:-
 Current Authentication suffers from many weaknessCurrent Authentication suffers from many weakness
because simple password is only based on humanbecause simple password is only based on human
memory . So now a days a new technique are usememory . So now a days a new technique are use
called 3D password is used.called 3D password is used.
Purpose:-Purpose:-
 3D password provide secure services you with a3D password provide secure services you with a
password to protect your online transactions.password to protect your online transactions.
 Easy to accessEasy to access
EExisting system for securityxisting system for security
 Textual passwordTextual password
 Graphical passwordGraphical password
 BiometricsBiometrics
 Token basedToken based
HHuman authentication techniquesuman authentication techniques
 Knowledge based (what you know)Knowledge based (what you know)
Textual passwordTextual password
 TokenToken based(what you have)based(what you have)
ATM cardsATM cards
KeysKeys
ID cardsID cards
 Biometrics(what you are)Biometrics(what you are)
Fingerprints,PalmprintsFingerprints,Palmprints
Hand geometryHand geometry
Face,Iris,Voice,RetinaFace,Iris,Voice,Retina
33D passwordD password
 A 3D passwords which areA 3D passwords which are
more customizable, and verymore customizable, and very
interesting way ofinteresting way of
authentication.authentication.
 A 3D password isA 3D password is
multifactor authenticationmultifactor authentication
scheme that combines-scheme that combines-
RecognitionRecognition
+Recall+Recall
+Tokens+Tokens
+Biometrics+Biometrics
is one authentication system.is one authentication system.
BBrief description of systemrief description of system
 The 3D password presents in theThe 3D password presents in the VirtualVirtual
environmentenvironment containing various virtual objects.containing various virtual objects.
 The user walks through in the environment andThe user walks through in the environment and
interacts with the objects.interacts with the objects.
 It is the combination and sequence of userIt is the combination and sequence of user
interactions that occur in the 3d environment.interactions that occur in the 3d environment.
The user presented with this 3D virtualThe user presented with this 3D virtual
environment where the user navigates andenvironment where the user navigates and
interacts with various objects.interacts with various objects.
The sequence of action and interaction towardsThe sequence of action and interaction towards
the objects inside the 3D environment constructsthe objects inside the 3D environment constructs
the user’s 3D password.the user’s 3D password.
VVirtual objectsirtual objects
Virtual objects can be any object weVirtual objects can be any object we
encounter in real Life-encounter in real Life-
 A computer on which user can type.A computer on which user can type.
 A fingerprint reader that requires userA fingerprint reader that requires user
fingerprints.fingerprints.
 An automated teller (ATM) machineAn automated teller (ATM) machine
that requires a token.that requires a token.
 A light that can be switched on/off.A light that can be switched on/off.
 A television or radio.A television or radio.
 A car that can be driven.A car that can be driven.
 A graphical password scheme.A graphical password scheme.
33D virtual environmentD virtual environment
The 3D environment effects the usability,The 3D environment effects the usability,
effectiveness and acceptability of the 3Deffectiveness and acceptability of the 3D
password system.password system.
The 3D environment reflects the administrationThe 3D environment reflects the administration
needs and security requirements.needs and security requirements.
DDesign guidelineesign guideline
 The design of 3D virtual environment shouldThe design of 3D virtual environment should
follows these guidelines:follows these guidelines:
SSystem implementationystem implementation
For example, the user can enter the virtualFor example, the user can enter the virtual
environment and type something on a computer thatenvironment and type something on a computer that
exists in (x1,y1,z1) position.exists in (x1,y1,z1) position.
Then enter in a room that has a fingerprint recognitionThen enter in a room that has a fingerprint recognition
device that exists in a position (x2,y2,z2) and providedevice that exists in a position (x2,y2,z2) and provide
his/her fingerprint.his/her fingerprint.
Then the user can go the virtual garage, open the carThen the user can go the virtual garage, open the car
door and turn on the radio to a specific channel.door and turn on the radio to a specific channel.
AApplicationspplications
The 3D password’s main application domains areThe 3D password’s main application domains are
protecting critical systems and resources.protecting critical systems and resources.
 Critical serversCritical servers
 Nuclear reactors and military facilitiesNuclear reactors and military facilities
 Airplanes and missile guidingAirplanes and missile guiding
 In addition, the 3D password can be used in theIn addition, the 3D password can be used in the
less critical systemsless critical systems
 A small virtual environment can be used in theA small virtual environment can be used in the
following system like: ATM, personal digitalfollowing system like: ATM, personal digital
assistance, desktop computers and laptops, webassistance, desktop computers and laptops, web
authentication etc.
SState diagramtate diagram
AAdvantagesdvantages
 Provide securityProvide security
 3D password can not take by3D password can not take by
other personother person
 3D graphical password has no3D graphical password has no
limitlimit
 Implementation of system is easyImplementation of system is easy
 Password can remember easilyPassword can remember easily
 Password helps to keep lot ofPassword helps to keep lot of
personal details.personal details.
CConclusiononclusion
 The authenticationThe authentication can be improved with 3Dcan be improved with 3D
passwordpassword, because unauthorized person may not, because unauthorized person may not
interact with same object at a particular locationinteract with same object at a particular location
as the legitimate user.as the legitimate user.
 It isIt is difficult to crackdifficult to crack, because it has no fixed, because it has no fixed
number of steps and a particular procedure.number of steps and a particular procedure.
 Added with token and biometrics this schemaAdded with token and biometrics this schema
becomes almostbecomes almost unbreakableunbreakable..
All of youAll of you
Any Doubts????????????Any Doubts????????????

Weitere ähnliche Inhalte

Was ist angesagt?

SRAVYA
SRAVYASRAVYA
SRAVYA
pvpsit
 

Was ist angesagt? (20)

3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
3D password
3D password 3D password
3D password
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
3 d password
3 d password3 d password
3 d password
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3d passwords
3d passwords3d passwords
3d passwords
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3 d password
3 d password3 d password
3 d password
 
3d password
3d password3d password
3d password
 
SRAVYA
SRAVYASRAVYA
SRAVYA
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 

Andere mochten auch (13)

3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Senior Project: Final Presentation
Senior Project: Final PresentationSenior Project: Final Presentation
Senior Project: Final Presentation
 
Kanishka_3D Passwords
Kanishka_3D PasswordsKanishka_3D Passwords
Kanishka_3D Passwords
 
Iptv
IptvIptv
Iptv
 
5 PEN PC TECHNOLOGY
5 PEN PC TECHNOLOGY5 PEN PC TECHNOLOGY
5 PEN PC TECHNOLOGY
 
5 pen pc technology ppt for seminor
5 pen pc technology ppt for seminor5 pen pc technology ppt for seminor
5 pen pc technology ppt for seminor
 
5pen pc Technology
5pen pc Technology5pen pc Technology
5pen pc Technology
 
Doc of 5 pen pc technology
Doc of 5 pen pc technologyDoc of 5 pen pc technology
Doc of 5 pen pc technology
 
3D Password
3D Password3D Password
3D Password
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Ähnlich wie Ppt on 3d password (2)

wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
SamruddhiGorhe1
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.doc
Ajay Kumar
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
sunil kumar
 

Ähnlich wie Ppt on 3d password (2) (20)

3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
Vivek
VivekVivek
Vivek
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3D - password
3D - password3D - password
3D - password
 
3d authentication
3d authentication3d authentication
3d authentication
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
C0361419
C0361419C0361419
C0361419
 
3d pass words
3d pass words3d pass words
3d pass words
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
 
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
3 d
3 d3 d
3 d
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.doc
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 

Kürzlich hochgeladen

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 

Kürzlich hochgeladen (20)

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 

Ppt on 3d password (2)

  • 1.
  • 2. 3D Password3D Password PRESENTED BY:-PRESENTED BY:- Meera yadavMeera yadav Asim baigAsim baig S7,CSE DepartmentS7,CSE Department
  • 3. TTable of contentable of content S.no. Topic name Page no. 1 Introduction 4 2 Existing system 5 3 Human authentication techniques 6 4 3D password 7 5 Brief description of system 8-9 6 Virtual object 10 7 3D virtual environment 11 8 Design guidelines 12 9 System implementation 13 10 Application 14 11 State diagram 15 12 Advantages 16 13 Conclusion 17 14 Query or any doubts 18
  • 4. IIntroductionntroduction::(Need and Purpose)(Need and Purpose) Need:-Need:-  Current Authentication suffers from many weaknessCurrent Authentication suffers from many weakness because simple password is only based on humanbecause simple password is only based on human memory . So now a days a new technique are usememory . So now a days a new technique are use called 3D password is used.called 3D password is used. Purpose:-Purpose:-  3D password provide secure services you with a3D password provide secure services you with a password to protect your online transactions.password to protect your online transactions.  Easy to accessEasy to access
  • 5. EExisting system for securityxisting system for security  Textual passwordTextual password  Graphical passwordGraphical password  BiometricsBiometrics  Token basedToken based
  • 6. HHuman authentication techniquesuman authentication techniques  Knowledge based (what you know)Knowledge based (what you know) Textual passwordTextual password  TokenToken based(what you have)based(what you have) ATM cardsATM cards KeysKeys ID cardsID cards  Biometrics(what you are)Biometrics(what you are) Fingerprints,PalmprintsFingerprints,Palmprints Hand geometryHand geometry Face,Iris,Voice,RetinaFace,Iris,Voice,Retina
  • 7. 33D passwordD password  A 3D passwords which areA 3D passwords which are more customizable, and verymore customizable, and very interesting way ofinteresting way of authentication.authentication.  A 3D password isA 3D password is multifactor authenticationmultifactor authentication scheme that combines-scheme that combines- RecognitionRecognition +Recall+Recall +Tokens+Tokens +Biometrics+Biometrics is one authentication system.is one authentication system.
  • 8. BBrief description of systemrief description of system  The 3D password presents in theThe 3D password presents in the VirtualVirtual environmentenvironment containing various virtual objects.containing various virtual objects.  The user walks through in the environment andThe user walks through in the environment and interacts with the objects.interacts with the objects.  It is the combination and sequence of userIt is the combination and sequence of user interactions that occur in the 3d environment.interactions that occur in the 3d environment.
  • 9. The user presented with this 3D virtualThe user presented with this 3D virtual environment where the user navigates andenvironment where the user navigates and interacts with various objects.interacts with various objects. The sequence of action and interaction towardsThe sequence of action and interaction towards the objects inside the 3D environment constructsthe objects inside the 3D environment constructs the user’s 3D password.the user’s 3D password.
  • 10. VVirtual objectsirtual objects Virtual objects can be any object weVirtual objects can be any object we encounter in real Life-encounter in real Life-  A computer on which user can type.A computer on which user can type.  A fingerprint reader that requires userA fingerprint reader that requires user fingerprints.fingerprints.  An automated teller (ATM) machineAn automated teller (ATM) machine that requires a token.that requires a token.  A light that can be switched on/off.A light that can be switched on/off.  A television or radio.A television or radio.  A car that can be driven.A car that can be driven.  A graphical password scheme.A graphical password scheme.
  • 11. 33D virtual environmentD virtual environment The 3D environment effects the usability,The 3D environment effects the usability, effectiveness and acceptability of the 3Deffectiveness and acceptability of the 3D password system.password system. The 3D environment reflects the administrationThe 3D environment reflects the administration needs and security requirements.needs and security requirements.
  • 12. DDesign guidelineesign guideline  The design of 3D virtual environment shouldThe design of 3D virtual environment should follows these guidelines:follows these guidelines:
  • 13. SSystem implementationystem implementation For example, the user can enter the virtualFor example, the user can enter the virtual environment and type something on a computer thatenvironment and type something on a computer that exists in (x1,y1,z1) position.exists in (x1,y1,z1) position. Then enter in a room that has a fingerprint recognitionThen enter in a room that has a fingerprint recognition device that exists in a position (x2,y2,z2) and providedevice that exists in a position (x2,y2,z2) and provide his/her fingerprint.his/her fingerprint. Then the user can go the virtual garage, open the carThen the user can go the virtual garage, open the car door and turn on the radio to a specific channel.door and turn on the radio to a specific channel.
  • 14. AApplicationspplications The 3D password’s main application domains areThe 3D password’s main application domains are protecting critical systems and resources.protecting critical systems and resources.  Critical serversCritical servers  Nuclear reactors and military facilitiesNuclear reactors and military facilities  Airplanes and missile guidingAirplanes and missile guiding  In addition, the 3D password can be used in theIn addition, the 3D password can be used in the less critical systemsless critical systems  A small virtual environment can be used in theA small virtual environment can be used in the following system like: ATM, personal digitalfollowing system like: ATM, personal digital assistance, desktop computers and laptops, webassistance, desktop computers and laptops, web authentication etc.
  • 16. AAdvantagesdvantages  Provide securityProvide security  3D password can not take by3D password can not take by other personother person  3D graphical password has no3D graphical password has no limitlimit  Implementation of system is easyImplementation of system is easy  Password can remember easilyPassword can remember easily  Password helps to keep lot ofPassword helps to keep lot of personal details.personal details.
  • 17. CConclusiononclusion  The authenticationThe authentication can be improved with 3Dcan be improved with 3D passwordpassword, because unauthorized person may not, because unauthorized person may not interact with same object at a particular locationinteract with same object at a particular location as the legitimate user.as the legitimate user.  It isIt is difficult to crackdifficult to crack, because it has no fixed, because it has no fixed number of steps and a particular procedure.number of steps and a particular procedure.  Added with token and biometrics this schemaAdded with token and biometrics this schema becomes almostbecomes almost unbreakableunbreakable..
  • 18. All of youAll of you Any Doubts????????????Any Doubts????????????