18-04-2011, 11:29 AM
Presented By
Shilpa.M
ppt of 3d password.pptx (Size: 99.52 KB / Downloads: 96)
3D PASSWORD FOR MORE SECURE AUTHENTICATION
Aim
We propose the 3D passwords for more secure authentications, which are more customizable and very interesting way of authentication.
Introduction
Multifactor authentication scheme.
3D virtual environment.
Selection of objects.
System administrator.
Higher user acceptability.
Choice of authentication scheme.
Existing system
Current authentication.
Textual password.
Graphical password.
Smart cards or token.
Biometric authentication.
Proposed system
Multi factor.
Freedom to select.
Provides secrets
Difficult to share with others.
Easily revoked or share.
typing letter or number clicks
sp
specific key pressed
clicking specific key pressed
graphical
password item
biometric item
is clicked
login pressed
move object
turn on/off
access access granted
not granted
Advantages
Several authentication schemes.
Designed according to protected system.
Decide own authentication.
Used in critical areas.
3D environment can be changed.
Difficult to crack.
Added with biometrics and card verification.
Disadvantages
Determining password space.
Shoulder surfing attack.
Timing attack.
Applications
In critical system:
Critical server.
Nuclear and Military.
Airplanes and Jet fighters.
Applications in small virtual environment
ATM.
Personal Digital Assistance.
Desktop computer and Laptop logins.
Web authentications.
Security Analysis.
Shilpa.M
ppt of 3d password.pptx (Size: 99.52 KB / Downloads: 96)
3D PASSWORD FOR MORE SECURE AUTHENTICATION
Aim
We propose the 3D passwords for more secure authentications, which are more customizable and very interesting way of authentication.
Introduction
Multifactor authentication scheme.
3D virtual environment.
Selection of objects.
System administrator.
Higher user acceptability.
Choice of authentication scheme.
Existing system
Current authentication.
Textual password.
Graphical password.
Smart cards or token.
Biometric authentication.
Proposed system
Multi factor.
Freedom to select.
Provides secrets
Difficult to share with others.
Easily revoked or share.
typing letter or number clicks
sp
specific key pressed
clicking specific key pressed
graphical
password item
biometric item
is clicked
login pressed
move object
turn on/off
access access granted
not granted
Advantages
Several authentication schemes.
Designed according to protected system.
Decide own authentication.
Used in critical areas.
3D environment can be changed.
Difficult to crack.
Added with biometrics and card verification.
Disadvantages
Determining password space.
Shoulder surfing attack.
Timing attack.
Applications
In critical system:
Critical server.
Nuclear and Military.
Airplanes and Jet fighters.
Applications in small virtual environment
ATM.
Personal Digital Assistance.
Desktop computer and Laptop logins.
Web authentications.
Security Analysis.