Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction Authentication Schemes Functionalities Required 3D Password selection and Input Virtual Environment Design Guidelines Applications Security.

Similar presentations


Presentation on theme: "Introduction Authentication Schemes Functionalities Required 3D Password selection and Input Virtual Environment Design Guidelines Applications Security."— Presentation transcript:

1

2 Introduction Authentication Schemes Functionalities Required 3D Password selection and Input Virtual Environment Design Guidelines Applications Security Analysis Attacks and Countermeasures Conclusion CONTENTS

3 Commonly used authentication schemes are textual passwords, graphical passwords and biometrics. 3D password is a multifactor authentication scheme. To be authenticated, werequirea3Dvirtualenvironment. INTRODUCTION

4 Combines recognition-,recall-,token-,and biometrics-based systems. Users choice to select the type of authentication technique.

5 KNOWLEDGE BASED Recall based Recognition based TOKEN BASED eg : smart card AUTHENTICATION SCHEMES

6 BIOMETRIC BASED Fingerprint,palm prints,hand geometry,face recognition Intrusiveness upon a user’s personal characteristics. GRAPHICAL PASSWORDS Recognition based Recall based

7 New scheme should combine the existing authentication schemes Freedom to select the type of authentication technique. Should provide secrets that are easy to remember,difficult toguess. FUNCTIONALITIES REQUIRED

8 3D environment space represented by the co-ordinates User navigate into the 3D virtual environment using any input device. The sequence of actions and interactions forms the users3D password. 3D PASSWORD SELECTION AND INPUT

9 Representation of user actions in the 3D virtual environment (10,24,91) Action=Open the office door; (10,24,91) Action=Close the office door; (4,34,18) Action= Typing,“F”; (4,34,18) Action= Typing,”A”; (4,34,18) Action= Typing,”L”; (4,34,18) Action= Typing,”C”; (4,34,18) Action= Typing,”O”; (4,34,18) Action= Typing,”N”; (10,24,80) Action= Pick up the pen; (1,18,80) Action= Drawing, point=(330,130).

10 VIRTUAL COMPUTER WHERE USER TYPING A TEXTUAL PASSWORD AS A PART OF USER’S 3D PASSWORD

11 SNAPSHOT OF A PROOF-OF- CONCEPT VIRTUAL ART GALLERY

12 STATE DIAGRAM OF A 3D PASSWORD APPLICATION

13 Real-life similarity Object uniqueness and distinction Three-dimensional virtual environment System importance 3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES

14 Critical servers. Nuclear and military facilities. Airplanes and jetfighters. ATMs, PDA’s, desktop computers and laptops. APPLICATIONS

15 3D Password Space Size. 3D Password Distribution Knowledge. SECURITY ANALYSIS

16 Brute Force Attack Well-Studied Attack Shoulder Surfing Attack Timing Attack ATTACKS AND COUNTERMEA SURES

17 Commonly used authentication schemes are vulnerable to attacks. 3D Password is a multifactor authentication scheme. Design of 3D virtual environment, selection of objects inside the environment, and the object type reflects the resulted password space. User’s choice and decision to construct the desired and preferred 3D password CONCLUSION

18


Download ppt "Introduction Authentication Schemes Functionalities Required 3D Password selection and Input Virtual Environment Design Guidelines Applications Security."

Similar presentations


Ads by Google