Are you interested in this topic.Then mail to us immediately to get the full report.

email :-




Custom Search









3d Password Wikipedia


Definition of 3D password

Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc .Mostly textual passwords follow an encryption algorithm as mentioned above. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas(Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.

Introduction of 3D password

Therefore we present our idea, the 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human memory. Generally simple passwords are set so as to quickly recall them. The human memory, in our scheme has to undergo the facts of Recognition, Recalling, Biometrics or Token based authentication. Once implemented and you log in to a secure site, the 3D password GUI opens up. This is an additional textual password which the user can simply put. Once he goes through the first authentication, a 3D virtual room will open on the screen. In our case, let's say a virtual garage

The 3D password is a multi factor authentication scheme. The 3D password presents a 3D virtual environment containing various virtual objects. The user navigates through this environment and interacts with the objects. The 3D password is simply the combination and the sequence of user interactions that occur in the 3D virtual environment. The 3D password can combine recognition, recall, token, and biometrics based systems into one authentication scheme. This can be done by designing a 3D virtual environment that contains objects that request information to be recalled, information to be recognized, tokens to be presented, and biometric data to be verified.

For example, the user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the user's 3D password.

Virtual objects can be any object that we encounter in real life. Any obvious actions and interactions toward the real life objects can be done in the virtual 3D environment toward the virtual objects. Moreover, any user input (such as speaking in a specific location) in the virtual 3D environment can be considered as a part of the 3D password.

We can have the following objects:

1) A computer with which the user can type;

2) A fingerprint reader that requires the user's fingerprint;

3) A biometric recognition device;

4) A paper or a white board that a user can write, sign, or draw on;

5) An automated teller machine (ATM) that requests a token;

6) A light that can be switched on/off;

7) A television or radio where channels can be selected;

8) A staple that can be punched;

9) A car that can be driven;

10) A book that can be moved from one place to another;

11) Any graphical password scheme;

12) Any real life object;

13) Any upcoming authentication scheme.

To Download Seminar Report of 3D Password Click Here

You may also like this : 3D Internet Technology,3d Internet Browser,3d Internet Explorer,3d Internet PDF Abstract,3d Internet PPT Free Download,3d Internet Seminar Report Free Download,3d Internet TV Telivision,3d Internet Wikipedia,3d Map Internet,3d Password Abstract,3d Password for More Secure Authentication PDF,3d Password Introduction,3d Password PPT Download,3d Password Seminar Report PDF,3D Password Technology,3d Password Wikipedia,3D Searching Technology,3d Searching PPT Powerpoint,3d Searching Seminar Abstract,3d Searching Seminar PDF PPT,3d Searching Seminar Report,3d Searching Wikipedia,3d Web,4G Broadband Technology,4g Bandwidth,4g Broadband PDF Free Download,4g Broadband PPT Free Download,4g Broadband Providers,4g Broadband Radar,4g Broadband Seminar Report,4g Broadband Unlimited,4g Broadband Verizon,4g Mobile Broadband,4g Technology Features,4g Technology PPT,4g Technology Presentation,4g Wireless Broadband,4g Wireless Internet,4G Wireless Systems,4g Wireless Systems Abstract,4g Wireless Systems PPT,4g Wireless Systems PPT Free Download,4g Wireless Systems Seminar,5 Pen PC Technology,5 Pen PC Technology Documentation Free Download,5 Pen PC Technology PDF,5 Pen PC Technology PPT,5 Pen PC Technology PPT Free Download,5 Pen PC Technology Seminar Report,Smart Note Taker Images

<<Back to Topics Page


copyright © 2006 V2 Computers E-mail :-