3D password ppt
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
prafulkusugal
Active In SP
**

Posts: 2
Joined: Feb 2011
#1
09-02-2011, 04:09 PM


Name:praful
I need a 3D password ppt ,I dont no anything about that.


ABSTRACT

3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human memory. Generally simple passwords are set so as to quickly recall them. The human memory, in our scheme has to undergo the facts of Recognition, Recalling, Biometrics or Token based authentication. Once implemented and you log in to a secure site, the 3D password GUI opens up. This is an additional textual password which the user can simply put. Once he goes through the first authentication, a 3D virtual room will open on the screen. In our case, let’s say a virtual garage. Now in a day to day garage one will find all sorts of tools, equipments, etc.each of them having unique properties. The user will then interact with these properties accordingly. Each object in the 3D space, can be moved around in an (x,y,z) plane. That’s the moving attribute of each object. This property is common to all the objects in the space. Suppose a user logs in and enters the garage. He sees and picks a screw-driver (initial position in xyz coordinates (5, 5, 5)) and moves it 5 places to his right (in XY plane i.e. (10, 5, 5).That can be identified as an authentication. Only the true user understands and recognizes the object which he has to choose among many. This is the Recall and Recognition part of human memory coming into play. Interestingly, a password can be set as approaching a radio and setting its frequency to number only the user knows. Security can be enhanced by the fact of including Cards and Biometric scanner as input. There can be levels of authentication a user can undergo.[/size][/font]


Attached Files
.doc   3d_password.doc (Size: 92.5 KB / Downloads: 585)
Reply
seminar class
Active In SP
**

Posts: 5,361
Joined: Feb 2011
#2
05-03-2011, 09:30 AM


.doc   3d_password.doc (Size: 93 KB / Downloads: 238)
INTRODUCTION
Normally the authentication scheme the user undergoes is particularly very lenient or very strict. Throughout the years authentication has been a very interesting approach. With all the means of technology developing, it can be very easy for 'others' to fabricate or to steal identity or to hack someone’s password. Therefore many algorithms have come up each with an interesting approach toward calculation of a secret key. The algorithms are such based to pick a random number in the range of 10^6 and therefore the possibilities of the same number coming is rare.
Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc .Mostly textual passwords follow an encryption algorithm as mentioned above. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas(Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.
Therefore we present our idea, the 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human memory. Generally simple passwords are set so as to quickly recall them. The human memory, in our scheme has to undergo the facts of Recognition, Recalling, Biometrics or Token based authentication. Once implemented and you log in to a secure site, the 3D password GUI opens up. This is an additional textual password which the user can simply put. Once he goes through the first authentication, a 3D virtual room will open on the screen. In our case, let’s say a virtual garage. Now in a day to day garage one will find all sorts of tools, equipments, etc.each of them having unique properties. The user will then interact with these properties accordingly. Each object in the 3D space, can be moved around in an (x,y,z) plane. That’s the moving attribute of each object. This property is common to all the objects in the space. Suppose a user logs in and enters the garage. He sees and picks a screw-driver (initial position in xyz coordinates (5, 5, 5)) and moves it 5 places to his right (in XY plane i.e. (10, 5, 5).That can be identified as an authentication. Only the true user understands and recognizes the object which he has to choose among many. This is the Recall and Recognition part of human memory coming into play. Interestingly, a password can be set as approaching a radio and setting its frequency to number only the user knows. Security can be enhanced by the fact of including Cards and Biometric scanner as input. There can be levels of authentication a user can undergo.
EXISTING SYSTEM
Current authentication systems suffer from many weaknesses. Textual passwords are commonly used. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have a password space that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentications have been proposed. However, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked. The 3Dpassword is a multi factor authentication scheme. The design of the 3D virtual environment and the type of objects selected determine the 3D password key space. User have freedom to select whether the 3D password will be solely recall, recognition, or token based, or combination of two schemes or more.
PROPOSED SYSTEM
The proposed system is a multi factor authentication scheme that combines the benefits of various authentication schemes. Users have the freedom to select whether the 3D password will be solely recall, biometrics, recognition, or token based, or a combination of two schemes or more. This freedom of selection is necessary because users are different and they have different requirements. Therefore, to ensure high user acceptability, the user’s freedom of selection is important.
The following requirements are satisfied in the proposed scheme
1. The new scheme provide secrets that are easy to remember and very difficult for intruders to guess.
2. The new scheme provides secrets that are not easy to write down on paper. Moreover, the scheme secrets should be difficult to share with others.
3. The new scheme provides secrets that can be easily revoked or changed.
Reply
seminar class
Active In SP
**

Posts: 5,361
Joined: Feb 2011
#3
08-03-2011, 11:24 AM

Presented By:
G JYOTHSNA


.pptx   Presentation.pptx (Size: 289.33 KB / Downloads: 503)
Introduction:
 A multifactor authentication scheme.
 The user login by navigating through a 3D environment.
 Collected user action and interactions in the virtual environment construct the 3Dpassword
EXISTING SYSTEM :
 Current authentication systems suffer from many weaknesses.
 Textual passwords are commonly used
 Many available graphical passwords have a password space that is less than or equal to the textual password space
 Smart cards or tokens can be stolen.
 Moreover, biometrics cannot be revoked. The 3Dpassword is a multi factor authentication scheme
Proposed system :
The proposed system is a multi factor authentication scheme that combines the benefits of various authentication schemes.
Users have the freedom to select whether the 3D password will be solely recall, biometrics, recognition, or token based, or a combination of two schemes or more.
The following requirements are satisfied in the proposed scheme
1. The new scheme provide secrets that are easy to remember and very difficult for intruders to guess.
2. The new scheme provides secrets that are not easy to write down on paper. Moreover, the scheme secrets should be difficult to share with others.
3. The new scheme provides secrets that can be easily revoked or changed.
BRIEF DESCRIPTION OF SYSTEM
 The 3D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3D virtual environment
 The choice of what authentication schemes will be part of the user's 3D password reflects the user's preferences and requirements.
SYSTEM IMPLIMENTATION
For example, the user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint.
Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the user’s 3D password.
Objects required :
1) A computer with which the user can type.
2) A fingerprint reader that requires the user’s fingerprint.
3) A biometric recognition device.
4)A paper or a white board that a user can write, sign, or draw on.
5) An automated teller machine (ATM) that requests a token;
6) A light that can be switched on/off.
7) A television or radio where channels can be selected.
8) A staple that can be punched.
9) A car that can be driven.
10) A book that can be moved from one place to another.
11) Any graphical password scheme.
12) Any real life object.
13) Any upcoming authentication scheme.
Principle
The action toward an object (assume a fingerprint recognition device) that exists in location (x1, y1 , z1 ) is different from the actions toward a similar object (another fingerprint recognition device) that exists in location (x2 , y2 , z2 ), where x1 = x2 , y1 = y2 , and z1 = z2 .
Therefore, to perform the legitimate 3D password, the user must follow the same scenario performed by the legitimate user. This means interacting with the same objects that reside at the exact locations and perform the exact actions in the proper sequence.
Reply
manjuvs44@gmail.com
Active In SP
**

Posts: 1
Joined: Aug 2011
#4
29-08-2011, 12:11 PM

sir send me seminer topics
Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#5
30-08-2011, 10:04 AM



To get more information about the topic "3D password " please refer the link below
topicideashow-to-3d-password-ppt?pid=55800#pid55800

topicideashow-to-3d-password-ppt

topicideashow-to-3d-password-for-more-secure-authentication-full-report?page=3

topicideashow-to-3d-password-for-more-secure-authentication-full-report?page=11

topicideashow-to-3d-password-for-more-secure-authentication-full-report?page=12
topicideashow-to-3d-password-for-more-secure-authentication-full-report?page=13
topicideashow-to-3d-password-for-more-secure-authentication-full-report?page=15

topicideashow-to-3d-password--14576
Reply
surya.lakshmi59@yahoo.com
Active In SP
**

Posts: 1
Joined: Sep 2011
#6
14-09-2011, 08:58 PM

can i download ppt for 3d password seminar and presentation topic from this site
Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#7
15-09-2011, 09:21 AM

hi
you can refer these pages to get the details on 3D passward

topicideashow-to-3d-password-for-more-secure-authentication-full-report
topicideashow-to-3d-password-for-more-secure-authentication-full-report?page=3

topicideashow-to-3d-password-for-more-secure-authentication-full-report?page=11

topicideashow-to-3d-password-for-more-secure-authentication-full-report?page=12
topicideashow-to-3d-password-for-more-secure-authentication-full-report?page=13
topicideashow-to-3d-password-for-more-secure-authentication-full-report?page=15

topicideashow-to-3d-password--14576
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  password based door locking system yasminmohammad 15 12,845 08-07-2013, 10:30 AM
Last Post: study tips
  graphical password authentication using clued click points coolsarda121 0 375 23-01-2013, 12:03 PM
Last Post: coolsarda121
  GRAPHICAL PASSWORD AUTHENTICATION USING CUED POINT TECHNOLOGY Guest 0 575 29-08-2012, 11:35 AM
Last Post: Guest
  Using your mobile miss call as password (VB, /.net) Guest 2 1,148 16-07-2012, 11:27 AM
Last Post: seminar ideas
  password door lock security system Guest 1 793 13-04-2012, 09:40 AM
Last Post: seminar ideas
Bug password based door locking system sujanianprabhat 0 624 21-03-2012, 03:37 PM
Last Post: sujanianprabhat
  3D Password SuhasD 0 522 13-03-2012, 12:05 PM
Last Post: SuhasD
  3d-password Guest 1 560 12-03-2012, 10:52 AM
Last Post: seminar paper
  3D PASSWORD FOR MORE SECURE AUTHENTICATION deepikashreedhar@gmail.com 1 672 09-01-2012, 09:52 AM
Last Post: seminar addict
  3d password for more secure authenication padalaswetha 2 634 02-01-2012, 09:49 AM
Last Post: seminar addict