3D Password: For More Secure Authentication
3D Password: For More Secure Authentication
3D Password: For More Secure Authentication
INDRODUCTION
EXISTING SYSTEM
Current authentication systems suffer from many
weakness Textual password are commonly used Many available graphical passwords have a password space that is less than or equal to the textual password space Smart cards or tokens can be stolen Moreover, biometrics cannot be revoked. The 3Dpassword is a multifactor authentication scheme
PROPOSED SYSTEM
The proposed system is a multifactor authentication scheme that combines the benefits of various authentication schemes The following requirements are satisfied in the proposed scheme 1.The new scheme provide secrets that are easy to remember and very difficult for intruders to guess 2.The new scheme provides secrets that are not easy to write down on paper. Moreover, the scheme secrets should be difficult to share with others. 3.The new scheme provides secrets that can be easily revoked or changed.
SYSTEM IMPLEMENTATION
For example, the user can enter the virtual environment and type something on a computer that exists in (x1, y1, z1) position, then enter a room that has a fingerprint recognition device that exists in a position (x2, y2, z2) and provide his/her fingerprint. then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the users 3D password
OBJECTS REQUIRED
1) 2) 3) 4) A computer with which the user can type. A fingerprint reader that requires the users fingerprint. A biometric recognition device. A paper or a white board that a user can write, sign, or draw on. 5) An automated teller machine (ATM) that requests a token. 6) A light that can be switched on/off. 7) A television or radio where channels can be selected. 8) A staple that can be punched. 9) A car that can be driven. 10) A book that can be moved from one place to another. 11) Any graphical password scheme. 12) Any real life object. 13) Any upcoming authentication scheme
PRINCIPLE
The action toward an object (assume a fingerprint recognition device) that exists in location (x1, y1,z1) is different from the action towards a similar object (another fingerprint recognition device) that exists in location (x2, y2 z2), where x1=x2, y1=y2, z1=z2. Therefore, to perform the legitimate3D password, the user must follow the same scenario performed by the legitimate user. This means interaction with the same objects that reside at the exact locations and perform the exact actions in the proper sequence.
(10, 24, 91) Action = Open the office door; (10, 24, 91) Action = Close the office door; (4, 34, 18) Action = Typing, F; (4, 34, 18) Action = Typing, A; (4, 34, 18) Action = Typing, L; (4, 34, 18) Action = Typing, C; (4, 34, 18) Action = Typing, O; (4, 34, 18) Action = Typing, N;
3D PASSWORD APPLICATION
The 3D password can have a password space that is very large compared to other authentication schemes, so the 3D passwords main application domains are protecting critical systems and resources. 1)Critical server 2) Nuclear and military facilities 3) Airplanes and jet fighters
In addition, 3D passwords can be used in less critical systems A small virtual environment can be used in the following systems like 1) ATM 2) Personal Digital Assistance 3) Desktop Computers & laptop logins 4) Web Authentication 5) Security Analysis
STATE DAIGRAM
SECURITY ANALYSIS
3D Password space size 3D password distribution knowledge
Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.
Alternative Proxies: