You are on page 1of 19

3D PASSWORD

Authentication
A U T H E N T I C A T I O N I S A P R O C E S S O F V A L I D A T I N G W H O

ARE YOU TO WHOM YOU CLAIMED TO BE.


T O P R O T E C T A N Y S Y S T E M A U T H E N T I C A T I O N M U S T B E

PROVIDED.
A U T H E N T I C A T I O N M U S T B E U S E D F O R P R I V A T E A N D

CONFIDENTIAL DATA.

Three Basic Methods of


Password Authentication
Possession
(something I have)
Keys
Passport
Smart Card
Biometrics
(something I am)
Face
Fingerprint
Iris

Knowledge
(something I know)
Password
PIN

ATTACKS AND
COUNTERMEASURES

Brute Force Attack


Well studied Attack
Shoulder-surfing Attack

Drawbacks Of
Existing Systems

Forces you to remember


username/password combinations to
access accounts

Brute Force Attacks and Complexity

Biometrics require special scanning


device.

3D Password
The 3D Password is a multifactor
authentication scheme that combine
RECOGNITION
+ RECALL
+TOKENS
+BIOMETRIC
In one authentication system

The 3D password presents a virtual


environment containing various virtual
objects.

The user walks through the environment


and interacts with the objects

The 3d Password is simply the combination


and sequence of user interactions that
occur in the 3D environment

VIRTUAL OBJECTS
Virtual objects can be any object we encounter in real life:
A computer on which the user can type in
A fingerprint reader that requires users fingerprint
A paper or white board on which user can type
An Automated teller(ATM) machine that requires a
token
A light that can be switched on/off
A television or radio
A car that can be driven
A graphical password scheme

D VIRTUAL ENVIRONMEN
3-D environment reflects the administration needs and the
security requirements.

Real Life Similarity

Object Uniqueness & Distinction

3D Virtual Environment Size

Number of objects & their types

System Importance

EXAMPLES

Fig(a) : Personal Room

Fig(b) : Living Room

Fig(c) : Study Room

OBJECTIVES
To provide more secure authentication technique
To design & develop more user friendly & easier

authentication scheme

To overcome the drawbacks & limitations of

previously existing systems


New scheme should be combination of recall-,

recognition -, biometrics-, and token based


authentication schemes.

HOW IS THE MECHANISM


ACHIEVED?

Filling
Username

Click on
graphical
passwor
d
item

Specifc key
pressed

Moving inside
Virtual 3D
environment

Verifying

Performing
Graphical
Passwords

S
pr pec
es if
se c k
d ey

Specifc key
pressed

Typing
Textual
Passwords

Performing
Biometrics
Biometric item is
clicked

Mo
Ob ve
Tu ject
rn
on
/ of

ACCESS
GRANTED

Changing
object status

ADVANTAGES
Flexibility
Strength
Easy to Memorize
Respect of Privacy

Applications
The 3D password can have a password space that
is very large compared to other authentication
schemes, so the 3D passwords main application
domains are protecting critical systems and
resources.

Critical Servers
Nuclear Reactors & military Facilities
Airplanes and missile Guiding

A small virtual environment can be used in the


following systems like :

ATM
P E R S O N A L D I G I TAL A S S I S TAN C E
DESKTOP COMPUTERS & LAPTOPS
W E B AU T H E N T I C ATI O N E T C .

CONCLUSION
The authentication can be improved with 3d password ,because the
unauthorized person may not interact with same object at a particular
location as the legitimate user.
It is difficult to crack ,because it has no fixed number of steps and a
particular procedure.
Added with biometrics and token verification this schema becomes
almost unbreakable.

You might also like