Beruflich Dokumente
Kultur Dokumente
Introduction
Authentication Schemes Functionalities Required
Security Analysis
Attacks and Countermeasures Conclusion
INTRODUCTION
Commonly used authentication schemes are textual
To be authenticated,
werequirea3Dvirtualenvironment.
based systems.
Users choice to select the type of authentication
technique.
AUTHENTICATION SCHEMES
KNOWLEDGE BASED Textual password Recognition based TOKEN BASED
eg : smart card
BIOMETRIC BASED Fingerprint ,palm prints ,hand geometry ,face recognition Intrusiveness upon a users personal characteristics.
FUNCTIONALITIES REQUIRED
New scheme should combine the existing
authentication schemes
Freedom to select the type of authentication
technique.
Should provide secrets that are easy to remember
difficult to guess.
users3D password.
environment
(10,24,91) Action=Open the office door; (10,24,91) Action=Close the office door; (4,34,18) Action= Typing,F; (4,34,18) Action= Typing,A; (4,34,18) Action= Typing,L; (4,34,18) Action= Typing,C; (4,34,18) Action= Typing,O; (4,34,18) Action= Typing,N; (10,24,80) Action= Pick up the pen; (1,18,80) Action= Drawing, point=(330,130).
Virtual Computer where user typing a textual password as a part of users 3D Password
environment
APPLICATIONS
Critical servers. Nuclear and military facilities. Airplanes and jetfighters. ATMs, PDAs, desktop computers and laptops.
Advantages
Flexibility Strength Ease to Memorize Respect of Privacy
CONCLUSION
Commonly used authentication schemes are
vulnerable to attacks. 3D Password is a multifactor authentication scheme. Design of 3D virtual environment, selection of objects inside the environment, and the object type reflects the resulted password space. Users choice and decision to construct the desired and preferred 3D password