SlideShare a Scribd company logo
Ppt on 3d password (2)
3D Password3D Password
PRESENTED BY:-PRESENTED BY:-
Meera yadavMeera yadav
Asim baigAsim baig
S7,CSE DepartmentS7,CSE Department
TTable of contentable of content
S.no. Topic name Page no.
1 Introduction 4
2 Existing system 5
3 Human authentication techniques 6
4 3D password 7
5 Brief description of system 8-9
6 Virtual object 10
7 3D virtual environment 11
8 Design guidelines 12
9 System implementation 13
10 Application 14
11 State diagram 15
12 Advantages 16
13 Conclusion 17
14 Query or any doubts 18
IIntroductionntroduction::(Need and Purpose)(Need and Purpose)
Need:-Need:-
 Current Authentication suffers from many weaknessCurrent Authentication suffers from many weakness
because simple password is only based on humanbecause simple password is only based on human
memory . So now a days a new technique are usememory . So now a days a new technique are use
called 3D password is used.called 3D password is used.
Purpose:-Purpose:-
 3D password provide secure services you with a3D password provide secure services you with a
password to protect your online transactions.password to protect your online transactions.
 Easy to accessEasy to access
EExisting system for securityxisting system for security
 Textual passwordTextual password
 Graphical passwordGraphical password
 BiometricsBiometrics
 Token basedToken based
HHuman authentication techniquesuman authentication techniques
 Knowledge based (what you know)Knowledge based (what you know)
Textual passwordTextual password
 TokenToken based(what you have)based(what you have)
ATM cardsATM cards
KeysKeys
ID cardsID cards
 Biometrics(what you are)Biometrics(what you are)
Fingerprints,PalmprintsFingerprints,Palmprints
Hand geometryHand geometry
Face,Iris,Voice,RetinaFace,Iris,Voice,Retina
33D passwordD password
 A 3D passwords which areA 3D passwords which are
more customizable, and verymore customizable, and very
interesting way ofinteresting way of
authentication.authentication.
 A 3D password isA 3D password is
multifactor authenticationmultifactor authentication
scheme that combines-scheme that combines-
RecognitionRecognition
+Recall+Recall
+Tokens+Tokens
+Biometrics+Biometrics
is one authentication system.is one authentication system.
BBrief description of systemrief description of system
 The 3D password presents in theThe 3D password presents in the VirtualVirtual
environmentenvironment containing various virtual objects.containing various virtual objects.
 The user walks through in the environment andThe user walks through in the environment and
interacts with the objects.interacts with the objects.
 It is the combination and sequence of userIt is the combination and sequence of user
interactions that occur in the 3d environment.interactions that occur in the 3d environment.
The user presented with this 3D virtualThe user presented with this 3D virtual
environment where the user navigates andenvironment where the user navigates and
interacts with various objects.interacts with various objects.
The sequence of action and interaction towardsThe sequence of action and interaction towards
the objects inside the 3D environment constructsthe objects inside the 3D environment constructs
the user’s 3D password.the user’s 3D password.
VVirtual objectsirtual objects
Virtual objects can be any object weVirtual objects can be any object we
encounter in real Life-encounter in real Life-
 A computer on which user can type.A computer on which user can type.
 A fingerprint reader that requires userA fingerprint reader that requires user
fingerprints.fingerprints.
 An automated teller (ATM) machineAn automated teller (ATM) machine
that requires a token.that requires a token.
 A light that can be switched on/off.A light that can be switched on/off.
 A television or radio.A television or radio.
 A car that can be driven.A car that can be driven.
 A graphical password scheme.A graphical password scheme.
33D virtual environmentD virtual environment
The 3D environment effects the usability,The 3D environment effects the usability,
effectiveness and acceptability of the 3Deffectiveness and acceptability of the 3D
password system.password system.
The 3D environment reflects the administrationThe 3D environment reflects the administration
needs and security requirements.needs and security requirements.
DDesign guidelineesign guideline
 The design of 3D virtual environment shouldThe design of 3D virtual environment should
follows these guidelines:follows these guidelines:
SSystem implementationystem implementation
For example, the user can enter the virtualFor example, the user can enter the virtual
environment and type something on a computer thatenvironment and type something on a computer that
exists in (x1,y1,z1) position.exists in (x1,y1,z1) position.
Then enter in a room that has a fingerprint recognitionThen enter in a room that has a fingerprint recognition
device that exists in a position (x2,y2,z2) and providedevice that exists in a position (x2,y2,z2) and provide
his/her fingerprint.his/her fingerprint.
Then the user can go the virtual garage, open the carThen the user can go the virtual garage, open the car
door and turn on the radio to a specific channel.door and turn on the radio to a specific channel.
AApplicationspplications
The 3D password’s main application domains areThe 3D password’s main application domains are
protecting critical systems and resources.protecting critical systems and resources.
 Critical serversCritical servers
 Nuclear reactors and military facilitiesNuclear reactors and military facilities
 Airplanes and missile guidingAirplanes and missile guiding
 In addition, the 3D password can be used in theIn addition, the 3D password can be used in the
less critical systemsless critical systems
 A small virtual environment can be used in theA small virtual environment can be used in the
following system like: ATM, personal digitalfollowing system like: ATM, personal digital
assistance, desktop computers and laptops, webassistance, desktop computers and laptops, web
authentication etc.
SState diagramtate diagram
AAdvantagesdvantages
 Provide securityProvide security
 3D password can not take by3D password can not take by
other personother person
 3D graphical password has no3D graphical password has no
limitlimit
 Implementation of system is easyImplementation of system is easy
 Password can remember easilyPassword can remember easily
 Password helps to keep lot ofPassword helps to keep lot of
personal details.personal details.
CConclusiononclusion
 The authenticationThe authentication can be improved with 3Dcan be improved with 3D
passwordpassword, because unauthorized person may not, because unauthorized person may not
interact with same object at a particular locationinteract with same object at a particular location
as the legitimate user.as the legitimate user.
 It isIt is difficult to crackdifficult to crack, because it has no fixed, because it has no fixed
number of steps and a particular procedure.number of steps and a particular procedure.
 Added with token and biometrics this schemaAdded with token and biometrics this schema
becomes almostbecomes almost unbreakableunbreakable..
All of youAll of you
Any Doubts????????????Any Doubts????????????

More Related Content

PDF
3D Password PPT
PPTX
3d password
PPT
3 d password
PPT
3D-Password: A More Secure Authentication
PPTX
3D-Password
PPTX
3D Password
PDF
3D password
PPTX
3D Password M Sc BHU Sem 1
3D Password PPT
3d password
3 d password
3D-Password: A More Secure Authentication
3D-Password
3D Password
3D password
3D Password M Sc BHU Sem 1

What's hot (20)

PPTX
3D PASSWORD
PPT
3D password
PPTX
3D Password and its importance
PPT
3D PASSWORD
PPTX
3D Password
PPTX
3D PASSWORD SEMINAR
PPT
3D Password Presentation
PPT
3 d password
PDF
SEMINAR REPORT ON 3D PASSWORD
PPTX
3d password ppt
PPTX
3d passwords
PPT
3D PASSWORD
PPTX
3 d password
PPTX
3d password
PPTX
SRAVYA
PPSX
3D PASSWORD
PPTX
3D PASSWORD
PPTX
3d password 23 mar 14
PDF
3d password - Report
PPT
3d password ppt
3D PASSWORD
3D password
3D Password and its importance
3D PASSWORD
3D Password
3D PASSWORD SEMINAR
3D Password Presentation
3 d password
SEMINAR REPORT ON 3D PASSWORD
3d password ppt
3d passwords
3D PASSWORD
3 d password
3d password
SRAVYA
3D PASSWORD
3D PASSWORD
3d password 23 mar 14
3d password - Report
3d password ppt
Ad

Viewers also liked (13)

PPTX
3d password by suresh
PPT
3D PASSWORD
PPTX
Senior Project: Final Presentation
PPTX
Kanishka_3D Passwords
PPTX
PPTX
5 PEN PC TECHNOLOGY
PPTX
5 pen pc technology ppt for seminor
PPTX
5pen pc Technology
DOCX
Doc of 5 pen pc technology
PPT
3D Password
PPTX
bluejacking.ppt
PPTX
5 pen-pc-technology complete ppt
PDF
How to Become a Thought Leader in Your Niche
3d password by suresh
3D PASSWORD
Senior Project: Final Presentation
Kanishka_3D Passwords
5 PEN PC TECHNOLOGY
5 pen pc technology ppt for seminor
5pen pc Technology
Doc of 5 pen pc technology
3D Password
bluejacking.ppt
5 pen-pc-technology complete ppt
How to Become a Thought Leader in Your Niche
Ad

Similar to Ppt on 3d password (2) (20)

PPT
3D Password ppt
PPTX
PPTX
3dpassword by janapriya
PPTX
3D - password
PPTX
3d authentication
PPTX
3D Password by Kuldeep Dhakad
PPTX
3D PASSWORD
PDF
C0361419
DOCX
3d pass words
PDF
A Novel Revolutionary highly secured Object authentication schema
PDF
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
DOCX
Graphical authintication
PPTX
DOC
Deepak 3 dpassword (2)
PPTX
3d authentication system
DOCX
3dpassword.doc
PPTX
3d password ppt presentation innovative idea
3D Password ppt
3dpassword by janapriya
3D - password
3d authentication
3D Password by Kuldeep Dhakad
3D PASSWORD
C0361419
3d pass words
A Novel Revolutionary highly secured Object authentication schema
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
Graphical authintication
Deepak 3 dpassword (2)
3d authentication system
3dpassword.doc
3d password ppt presentation innovative idea

Recently uploaded (20)

PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PPTX
Nature of X-rays, X- Ray Equipment, Fluoroscopy
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PDF
Visual Aids for Exploratory Data Analysis.pdf
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PPTX
introduction to high performance computing
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PPTX
communication and presentation skills 01
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPTX
Fundamentals of Mechanical Engineering.pptx
PPTX
Software Engineering and software moduleing
PPTX
Information Storage and Retrieval Techniques Unit III
PDF
III.4.1.2_The_Space_Environment.p pdffdf
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
Nature of X-rays, X- Ray Equipment, Fluoroscopy
Fundamentals of safety and accident prevention -final (1).pptx
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
Visual Aids for Exploratory Data Analysis.pdf
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
introduction to high performance computing
Categorization of Factors Affecting Classification Algorithms Selection
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
communication and presentation skills 01
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Fundamentals of Mechanical Engineering.pptx
Software Engineering and software moduleing
Information Storage and Retrieval Techniques Unit III
III.4.1.2_The_Space_Environment.p pdffdf

Ppt on 3d password (2)

  • 2. 3D Password3D Password PRESENTED BY:-PRESENTED BY:- Meera yadavMeera yadav Asim baigAsim baig S7,CSE DepartmentS7,CSE Department
  • 3. TTable of contentable of content S.no. Topic name Page no. 1 Introduction 4 2 Existing system 5 3 Human authentication techniques 6 4 3D password 7 5 Brief description of system 8-9 6 Virtual object 10 7 3D virtual environment 11 8 Design guidelines 12 9 System implementation 13 10 Application 14 11 State diagram 15 12 Advantages 16 13 Conclusion 17 14 Query or any doubts 18
  • 4. IIntroductionntroduction::(Need and Purpose)(Need and Purpose) Need:-Need:-  Current Authentication suffers from many weaknessCurrent Authentication suffers from many weakness because simple password is only based on humanbecause simple password is only based on human memory . So now a days a new technique are usememory . So now a days a new technique are use called 3D password is used.called 3D password is used. Purpose:-Purpose:-  3D password provide secure services you with a3D password provide secure services you with a password to protect your online transactions.password to protect your online transactions.  Easy to accessEasy to access
  • 5. EExisting system for securityxisting system for security  Textual passwordTextual password  Graphical passwordGraphical password  BiometricsBiometrics  Token basedToken based
  • 6. HHuman authentication techniquesuman authentication techniques  Knowledge based (what you know)Knowledge based (what you know) Textual passwordTextual password  TokenToken based(what you have)based(what you have) ATM cardsATM cards KeysKeys ID cardsID cards  Biometrics(what you are)Biometrics(what you are) Fingerprints,PalmprintsFingerprints,Palmprints Hand geometryHand geometry Face,Iris,Voice,RetinaFace,Iris,Voice,Retina
  • 7. 33D passwordD password  A 3D passwords which areA 3D passwords which are more customizable, and verymore customizable, and very interesting way ofinteresting way of authentication.authentication.  A 3D password isA 3D password is multifactor authenticationmultifactor authentication scheme that combines-scheme that combines- RecognitionRecognition +Recall+Recall +Tokens+Tokens +Biometrics+Biometrics is one authentication system.is one authentication system.
  • 8. BBrief description of systemrief description of system  The 3D password presents in theThe 3D password presents in the VirtualVirtual environmentenvironment containing various virtual objects.containing various virtual objects.  The user walks through in the environment andThe user walks through in the environment and interacts with the objects.interacts with the objects.  It is the combination and sequence of userIt is the combination and sequence of user interactions that occur in the 3d environment.interactions that occur in the 3d environment.
  • 9. The user presented with this 3D virtualThe user presented with this 3D virtual environment where the user navigates andenvironment where the user navigates and interacts with various objects.interacts with various objects. The sequence of action and interaction towardsThe sequence of action and interaction towards the objects inside the 3D environment constructsthe objects inside the 3D environment constructs the user’s 3D password.the user’s 3D password.
  • 10. VVirtual objectsirtual objects Virtual objects can be any object weVirtual objects can be any object we encounter in real Life-encounter in real Life-  A computer on which user can type.A computer on which user can type.  A fingerprint reader that requires userA fingerprint reader that requires user fingerprints.fingerprints.  An automated teller (ATM) machineAn automated teller (ATM) machine that requires a token.that requires a token.  A light that can be switched on/off.A light that can be switched on/off.  A television or radio.A television or radio.  A car that can be driven.A car that can be driven.  A graphical password scheme.A graphical password scheme.
  • 11. 33D virtual environmentD virtual environment The 3D environment effects the usability,The 3D environment effects the usability, effectiveness and acceptability of the 3Deffectiveness and acceptability of the 3D password system.password system. The 3D environment reflects the administrationThe 3D environment reflects the administration needs and security requirements.needs and security requirements.
  • 12. DDesign guidelineesign guideline  The design of 3D virtual environment shouldThe design of 3D virtual environment should follows these guidelines:follows these guidelines:
  • 13. SSystem implementationystem implementation For example, the user can enter the virtualFor example, the user can enter the virtual environment and type something on a computer thatenvironment and type something on a computer that exists in (x1,y1,z1) position.exists in (x1,y1,z1) position. Then enter in a room that has a fingerprint recognitionThen enter in a room that has a fingerprint recognition device that exists in a position (x2,y2,z2) and providedevice that exists in a position (x2,y2,z2) and provide his/her fingerprint.his/her fingerprint. Then the user can go the virtual garage, open the carThen the user can go the virtual garage, open the car door and turn on the radio to a specific channel.door and turn on the radio to a specific channel.
  • 14. AApplicationspplications The 3D password’s main application domains areThe 3D password’s main application domains are protecting critical systems and resources.protecting critical systems and resources.  Critical serversCritical servers  Nuclear reactors and military facilitiesNuclear reactors and military facilities  Airplanes and missile guidingAirplanes and missile guiding  In addition, the 3D password can be used in theIn addition, the 3D password can be used in the less critical systemsless critical systems  A small virtual environment can be used in theA small virtual environment can be used in the following system like: ATM, personal digitalfollowing system like: ATM, personal digital assistance, desktop computers and laptops, webassistance, desktop computers and laptops, web authentication etc.
  • 16. AAdvantagesdvantages  Provide securityProvide security  3D password can not take by3D password can not take by other personother person  3D graphical password has no3D graphical password has no limitlimit  Implementation of system is easyImplementation of system is easy  Password can remember easilyPassword can remember easily  Password helps to keep lot ofPassword helps to keep lot of personal details.personal details.
  • 17. CConclusiononclusion  The authenticationThe authentication can be improved with 3Dcan be improved with 3D passwordpassword, because unauthorized person may not, because unauthorized person may not interact with same object at a particular locationinteract with same object at a particular location as the legitimate user.as the legitimate user.  It isIt is difficult to crackdifficult to crack, because it has no fixed, because it has no fixed number of steps and a particular procedure.number of steps and a particular procedure.  Added with token and biometrics this schemaAdded with token and biometrics this schema becomes almostbecomes almost unbreakableunbreakable..
  • 18. All of youAll of you Any Doubts????????????Any Doubts????????????