Beruflich Dokumente
Kultur Dokumente
Top of Form
3d passw o
Search Documents
Bottom of Form
Explore
Documents
Books - Fiction Books - Non-fiction Health & Medicine Brochures/Catalogs Government Docs How-To Guides/Manuals Magazines/Newspapers Recipes/Menus School Work + all categories Featured Recent Authors Students Researchers Publishers Government & Nonprofits Businesses Musicians Artists & Designers Teachers + all categories Most Followed Popular Sign Up |
People
Log In
1
First Page Previous Page Next Page
1
/ 31
Sections not available Zoom Out Zoom In Fullscreen Exit Fullscreen Select View Mode
Search w it
Bottom of Form
Reading should be social! Post a message on your social networks to let others know what you're reading. Select the sites below and start sharing. Readcast this Document
Top of Form
Submit
4gen
Bottom of Form
SEMIN AR
REPOR T
Submitt ed by
Departme nt Of Informatio
n Technolog y
EAST WEST INSTITUTE OF
TECHNOLO GY BANGALOR E
CONTENT S
1. INTRODUCTION 32.
4 4. B RI EF D E SCRIPTION O
F T HE SYST EM
5
5. INNOV A
IS 3 D P A SS W ORD 77.
ST A T E DI AG R AM 88.
D E SI G N O F3 D VIRTU
NC E S 24
TECHNOLOGY DERRICKPage
3
INTRODUC TION
Users nowadays are
scanning, tokens or cards (such as an ATM) etc.Current authenticatio n systems suffer from
users do not followtheir requirements. Users tend to choose meaningful words from dictionary
or their pet names, girlfriends etc. Ten years back Klein performed such tests andhe could
crack 10-15 passwords per day. On the other hand, if a password ishard to guess, then it
is often hard to remember. Users have difficultyreme mbering a password that is long and random
appearing. So, they createshort, simple, and insecure passwords that are susceptible
The strengthof graphical passwords comes from the fact that users can recall and
recognize pict ures more than words. Most graphical passwords are vulnerable
for shoulder surfi ng attacks, where an attacker can observe or record the legitimate
usersgraphic al password by camera. Token based systems such as ATMs are widelyapplied in banking
systems and in laboratories entrances as a mean of authenticat ion. However, Smart cards
or tokens are vulnerable to loss or theft.Moreove r, the user has to carry the token whenever
access required. Biometricsca nning is your "natural" signature and Cards or Tokens prove
your validity.But some people hate the fact to carry around their cards, some refuse
toundergo strong IR exposure to their retinas (Biometric scanning).In this paper, we present
and evaluate our contribution, i.e., the 3D password. The 3-D password is a multifactor
authenticatio n scheme. To beauthentica ted, we present a 3-D virtual environment where the
user navigatesand interacts with various objects. The sequence of actions and interactionsto
ward the objects inside the 3-D environment constructs the users 3D password. The 3-D
The design of the 3-D virtual environment andthe type of objects selected determine
WHA
T IS
UT
H
ENTIC
A
TION?
Authenticatio n is the act of establishing or confirmingso mething as authentic, that is, that
claims made by or about the subject aretrue. This might involve confirming the identity of a person,
tracing the originsof an artifact, ensuring that a product is what its packaging and labeling
For example, when you show proper identification credentials toa bank teller, you are asking to be
you become authorized toaccess the accounts of that account holder, but no others.
UT
H
ENTIC
A
TION MET
ODS
There are two types of techniques for doing this.The first
is comparing the attributes of the object itself towhat is known about objects of that origin. For example,
an art expert mightlook for similarities in the style of painting, check the location and form of
carbon dating to verify the age of an artifact, do a chemical analysis of thematerials used, or
compare the style of construction or decoration to other artifact s of similar origin. The
physics of sound and light, and comparison witha known physical environment, can be used
second type relies on documentatio n or other externalaffir mations. For example, the rules of
evidence in criminal courts often requireestabli shing the chain of custody of evidence
from the policedetectiv es and forensics staff that handled it. Some antiques are accompanied
bycertificates attesting to their authenticity. External records have their own problems
of forgery and perjury, and are also vulnerable to being separatedfro m the artifact and
lost.Currency and other financial instruments commonly use thefirst type of authenticatio
imagery, which are easy for receivers toverify.Cons umer goods such as pharmaceutic
als, perfume, fashionclothin g can use either type of authenticatio n method to prevent counterfeitgo
ods from taking advantage of a popular brand's reputation (damaging the brand
brand-name goods.
RIEF DESCRIPTI ON OF T
H
E SYSTEM
The proposed system is a
multi factor authenticatio n scheme. Itcan combine all existing authenticatio n schemes into a single
which the user can interact. The user is presented with this 3D virtualenviron ment where
the user navigates and interacts with various objects. Thesequence of actions and interactions
toward the objects inside the 3Denvironme nt constructs the users 3Dpassword.T he 3D
graphical pas swords, and various types of biometrics into a 3D virtual environment. The choice of
what authenticatio n schemes will be part of theuser's 3D password reflects the user's
preferences and requirements. A user who prefers to remember and recall a password
might choose textual and graphical pas sword as part of their 3D password. On the other hand users
who have moredifficulty with memory or recall might prefer to choose smart cards or biometrics
as part of their 3D password. Moreover user who prefers to keep anykind of biometric
data private might not interact with object that requires biom etric information. Therefore it is
the user's choice and decision to constructthe desired and preferred 3D password.
INNOV
A
TIVE COMPONE NT
The proposed system is a multi factor authenticatio n schemethat combines the benefits of various
authenticatio n schemes. Users have thefreedom to select whether the 3D password will be solely
freedom of selectionis necessary because users are different and they have different
requirements .Therefore, to ensure high user acceptability, the users freedom of selection
The new scheme provide secrets that are easy to remember and very
secrets that are not easy to write down on paper.Moreov er, the scheme secrets
Suffer from many weaknesses. Textual passwords arecommonly used. Users tend to
choose meaningful words from dictionaries,w hich make textual passwords easy to break
passwords have a password spacethat is less than or equal to the textual password
space. Smart cards or tokenscan be stolen. Many biometric authenticatio ns have been proposed.
However,user s tend to resist using biometrics because of their intrusiveness and the
effecton their privacy. Moreover, biometrics cannot be revoked. The 3D password isa multi
factor authenticatio n scheme. The design of the 3D virtual environmenta nd the type of objects
selected determine the 3D password key space. User have freedom to select
whether the 3D password will be solely recall,recogni tion, or token based, or combination of two
schemes or more.
3D Password Seminar Report10
TECHNOLOGY DERRICKPage
8
WHA
T IS
A
3D P
SS
W
ORD?
The 3-D password is a multifactor
authenticatio n scheme. Itcan combine all existing authenticatio n schemes into a single
itemswith which the user can interact. The type of interaction varies from one item
toanother. The 3-D password is constructed by observing the actions andinteractio ns of the user
and by observing the sequences of such actions. It is theusers choice to select which
type of authenticatio n techniques will be part of their 3-D password. This is achieved
through interacting only with the objectsthat acquire information that the user is
comfortable in providing and ignoringthe objects that request information that the user
prefers not to provide.For example, if an item requests an iris scan and the user is notcomfortabl
e in providing such information, the user simply avoids interactingwit h that item. Moreover,
giving the user the freedom of choice as to what typeof authenticatio n schemes will be part of
their 3-D password and given the largenumber of objects and items in the environment, the number
of possible 3D passwords will increase. Thus, it becomes much more difficult for the
STATE DIAGRAM OF A
3
D PASSWORD APPLICATION
3D Password Seminar Report10
TECHNOLOGY DERRICKPage
10
3D PASSWORD
Download this Document for FreePrintMobileCollectionsReport Document Report this document? Please tell us reason(s) for reporting this document
Top of Form
doc
Spam or junk Porn adult content Hateful or offensive If you are the copyright owner of this document and want to report it, please follow these directions to submit a copyright infringement notice. Report Cancel
Bottom of Form
28 p.
19 p.
14 p. 2.
18 p.
18 p.
18 p. 3.
18 p.
18 p.
18 p. 4.
18 p.
18 p.
18 p. 5.
18 p.
18 p.
18 p. 6.
18 p.
18 p.
18 p. 7.
18 p.
18 p.
31 p.
8 p.
Recent Readcasters
Add a Comment
Top of Form
c107cf88539439
Rafeetha Fidhuleft a comment up loading the details of 3d password 07 / 03 / 2011 Reply Print This Document
High Quality
Open the downloaded document, and select print from the file menu (PDF reader required). Download and Print You Must be Logged in to Download a Document Use your Facebook login and see what your friends are reading and sharing. Other login options
Bottom of Form
Signup
I don't have a Facebook account
Top of Form
email address (required) create username (required) password (required) Send me the Scribd Newsletter, and occasional account related communications. Sign Up Privacy policy You will receive email notifications regarding your account activity. You can manage these notifications in your account settings. We promise to respect your privacy.
Bottom of Form
Login Successful
Now bringing you back...
Reset Your Password Back to Login Please enter your email address below to reset your password. We will send you an email with instructions on how to continue.
Top of Form
c107cf88539439
Email Address: You need to provide a login for this account as well. Login Submit
Bottom of Form
Upload a Document
3d passw o
Top of Form
Search Documents
Bottom of Form
Follow Us! scribd.com/scribd twitter.com/scribd facebook.com/scribd About Press Blog Partners Scribd 101 Web Stuff
Copyright 2012 Scribd Inc. Language: English Choose the language in which you want to experience Scribd: English Espaol Portugus (Brasil)