3D Password

A Complete Guide about 3D Password

Definition of 3D password

Users nowadays are provided with the major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM), etc in 3D Password.

Mostly textual passwords follow the encryption algorithm mentioned above. Biometric scanning is your “the natural” signature and Cards or Tokens prove our validity.

But a number of the people hate the actual fact that they carry around their cards, some refuse to undergo strong IR exposure to the retinas(Biometric scanning).

Mostly textual passwords nowadays are kept very simple, say a word from a dictionary or their pet names, girlfriends, etc.

The Year back Klein performed such tests and he could crack 10-15 passwords on a daily basis.

Now with the technology change, the fast processors, and lots of tools on the net, this has become a Child’s Play.

Hire Dedicated Developers

Introduction of 3D password

Therefore we present the thought, the 3D passwords which are quite customizable and an awfully interesting way of authentication.

Now passwords are a supported fact of Human memory.

Generally simple the passwords are set so on quickly recall them.

The human memory, in the scheme, must undergo the facts of the popularity, Recalling, Biometrics, or Token supported authentication.

Once implemented and you log in to the secure site, the 3D password GUI releases.

This can be an extra-textual password that the user can simply put. Once he goes through the primary authentication, the 3D virtual room will open on the screen.

In our case, let’s say a virtual garage.

Existing System

  • Textual the password
  • Graphical the password
  • Biometrics
  • Token-based

3D Password System

How secure is your password?

Now with the technology change, the fast processors, and lots of tools on the net, cracking passwords has become a child’s play.

Years back Klein performed such tests and he could crack 10-15 passwords on a daily basis.

The 3D password is more customizable and it’s an awfully interesting way of authentication.

Secure Password

A 3D password may be a multifactor authentication scheme that mixes RECOGNITION+RECALL+TOKENS+BIOMETRICS in one of the authentication systems.

The 3D password presents the virtual environment containing various virtual objects.

The user walks through an environment and interacts with the objects.

It is the mix and sequence of the user interaction that happens within the 3D environment.

Brief description of the system

The user is presented with this 3D password in the virtual environment where the user navigates and interacts with various objects.

System Implementation

For example, a user can enter the virtual environment and also enter type something on a computer that exists in the (x1, y1, z1 ) position, then enter an area that incorporates a fingerprint recognition device that exists during a position (x2, y2, z2 ) and supply his/her fingerprint.

Then, the user can visit the virtual garage, open the door, and switch on the radio to a particular channel.

The mixture and therefore the sequence of the previous actions toward the precise objects construct the user’s 3D password.

Virtual Object

  • A virtual object may be any object we encounter in real life.
  • A paper or the whiteboard that a user can write, sign, or draw on.
  • An automatic teller machine (ATM) that requests a token.
  • A lightweight which will be switched on/off.
  • A television or radio where channels will be selected.
  • A computer with which a user can type.
  • A fingerprint reader that needs the user’s fingerprint.
  • A biometric recognition device.
  • A staple that may be punched;9) A car that may be driven.
  • A book that will be moved from one place to another.
  • Any graphical password scheme.
  • Any reality object.
  • An upcoming authentication scheme.

Similarly, for 3D Password

https://www.ijcsmc.com/docs/papers/May2014/V3I5201423.pdf

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.