In this paper, we propose and evaluate our contribution which is a new
scheme of authentication. This scheme is based on a virtual
three-dimensional environment. Users navigate through the virtual
environment and interact with items inside the virtual
three-dimensional environment. The combination of all interactions,
actions and inputs towards the items and towards the virtual
three-dimensional environment constructs the user's 3D password. The 3D
password combines most existing authentication schemes such as textual
passwords, graphical passwords, and biometrics into one virtual
three-dimensional environment. The 3D password's main application is the
protection of critical resources and systems.
INTRODUCTION
Normally the authentication scheme the user undergoes is particularly very lenient or very strict. Throughout the years authentication has been a very interesting approach. With all the means of technology developing, it can be very easy for 'others' to fabricate or to steal identity or to hack someone’s password. Therefore many algorithms have come up each with an interesting approach toward calculation of a secret key. The algorithms are such based to pick a random number in the range of 10^6 and therefore the possibilities of the sane number coming is rare.
Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc. Mostly textual passwords follow an encryption algorithm as mentioned above. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas (Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Ten years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play. Therefore we preset our idea, the 3D passwords which are more customizable, and very interesting way of authentication.
Download your Presentation Papers from the following Links.
Labels:
Seminar Topics
INTRODUCTION
Normally the authentication scheme the user undergoes is particularly very lenient or very strict. Throughout the years authentication has been a very interesting approach. With all the means of technology developing, it can be very easy for 'others' to fabricate or to steal identity or to hack someone’s password. Therefore many algorithms have come up each with an interesting approach toward calculation of a secret key. The algorithms are such based to pick a random number in the range of 10^6 and therefore the possibilities of the sane number coming is rare.
Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc. Mostly textual passwords follow an encryption algorithm as mentioned above. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas (Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Ten years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play. Therefore we preset our idea, the 3D passwords which are more customizable, and very interesting way of authentication.
Download your Presentation Papers from the following Links.
|
|
Graphical Password.pdf Graphical Password Paper Ieee.doc graphical passwords.pdf |
Graphical Password Tolerance Image Choice 2005.pdf Shoulder Surfing attack in graphical password authentication.pdf |
Responses
0 Respones to "3D Graphical Password Schema"
Post a Comment