This website uses cookies to ensure you have the best experience. Learn more

3d Password Essay

620 words - 3 pages

Definition of 3D password

Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc .Mostly textual passwords follow an encryption algorithm as mentioned above. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas(Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.
Introduction of 3D password
Therefore we present our idea, the 3D passwords which are more customizable ...view middle of the document...

The 3D password presents a 3D virtual environment containing various virtual objects. The user navigates through this environment and interacts with the objects. The 3D password is simply the combination and the sequence of user interactions that occur in the 3D virtual environment. The 3D password can combine recognition, recall, token, and biometrics based systems into one authentication scheme. This can be done by designing a 3D virtual environment that contains objects that request information to be recalled, information to be recognized, tokens to be presented, and biometric data to be verified.
For example, the user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the user's 3D password.
Virtual objects can be any object that we encounter in real life. Any obvious actions and interactions toward the real life objects can be done in the virtual 3D environmenttoward the virtual objects. Moreover, any user input (such as speaking in a specific location) in the virtual 3D environment can be considered as a part of the 3D password.
We can have the following objects:
1) A computer with which the user can type;
2) A fingerprint reader that requires the user's fingerprint;
3) A biometric recognition device;
4) A paper or a white board that a user can write, sign, or draw on;
5) An automated teller machine (ATM) that requests a token;
6) A light that can be switched on/off;
7) A television or radio where channels can be selected;
8) A staple that can be punched;
9) A car that can be driven;
10) A book that can be moved from one place to another;
11) Any graphical password scheme;
12) Any real life object;
13) Any upcoming authentication scheme.

Other Papers Like 3d Password

Television as a Babysitter Essay

1536 words - 7 pages (Federal Communications Commission, 2000). The V-chip reads an electronic code transmitted with television signals and is used with the current television rating systems. Caregivers can enter a password by remote which programs the television to which ratings are acceptable for children to view. The chip will block the display of unacceptable programming. The usage of the V-chip can be optional for caregivers to use (Figliola, 2005). The V-chip is a

Csec 610 Final Exam Essay

5358 words - 22 pages stronger the encryption key. The iOS escalates time delays each time a wrong password is entered to add more of a deterrent for brute-force attacks. Users can also set their phones to be automatically wiped if the wrong passcode is entered 10 consecutive times. 2) From a technological standpoint, iPhone encryption is a great feature to have available to the general public and that individuals who are not particularly technically savvy can still

Facebook Utilization That Affects the Study Habits

2498 words - 10 pages instead using their idea to build a competing product. The three complained to the Crimson, and the newspaper began an investigation. Zuckerberg knew about the investigation so he used TheFacebook.com to find members in the site who identified themselves as members of the Crimson. He examined a history of failed logins to see if any of the Crimson members have ever entered an incorrect password into TheFacebook.com. In the cases in which they had

Development of an E-Commerce Website for a Brick and Mortar Business

3946 words - 16 pages total, figures the state sales tax, calculates the change back from the amount tendered, and automatically adjusts the store's inventory levels to debit the amount of inventory sold. • Subscriptions: Manages all aspects of subscription-based websites including real-time authorization and payment acceptance in the form of electronic checks or credit cards, password and login management, real-time reporting, and customized process-driven emails

Networking

4679 words - 19 pages server where they can upload and download their important documents to the server and also share information over the network without having to physically transfer files or external storage device. The company is managed by a Domain controller server, this facilitate the functions of the network, creating accounts and password and give them permission to access the network. One of the first decisions in computer environment design is the

Plastic Money

5228 words - 21 pages information; can be with or without captions that prevent the signature to be rubbed off. Hologram - A holographic sticker that is pressed onto a card under high temperature; functions as an additional level of protection from creating imitation cards; comes in two types, 2D and 3D. Fraud in Plastic Money: Scams targeting plastic money are on the rise, and are becoming more sophisticated by the day (Wahyoe Boediwardhana and Urip Hudiono

Course Project

4288 words - 18 pages needing to purchase new devices (vcr, dvd, blu-ray, 3d player, etc) (Smith, 2009). A quick password entry is all that is needed to share the entertainment wherever they are on the internet ("Disney Movie," n.d.). The late teenager crowd that grew up watching Hannah Montana is already being groomed by Disney to trust the digital technology, so the Disney organization needs to constantly stay in touch with them through their Facebook accounts and

Gsl Scientific Library

4796 words - 20 pages documented (and with an implementation available to the public in source code form), and must require no special password or key for unpacking, reading or copying. 7. Additional Terms. “Additional permissions” are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to

Freedom And Responsibility

2141 words - 9 pages Built within the Constitution of the United States are specifically defined freedoms that are guaranteed to all citizens. Conversely, with every constitutional freedom there comes a corresponding responsibility. On September 25, 1789, the state legislature’s twelve proposed amendments were transmitted by congress, the first two dealing with congressional representation and congressional pay. The following numbers three through twelve were

Hate Crime Laws

2348 words - 10 pages On June 7, 1998, 49-year-old James Byrd Jr. of Texas accepted a ride from three white men, who then beat him severely, urinated on him, chained him by his ankles to the back of their pick-up truck, dragged him for three miles into the countryside, and dumped his corpse in front of an African-American cemetery (Graczyk). A little over a year later, a jury sentenced ring leader John King to death by lethal injection (“Man Executed for Dragging

Rational Emotional Behavior Therapy Case Study Conceptualization And Treatment Plan

2140 words - 9 pages Rational Emotional Behavior Therapy Case Study of Sarah: A Conceptualization and Treatment Plan Rational emotive behavior therapy, REBT, was developed by Albert Ellis and holds the central belief that the events in our lives do not cause our disturbances but that they are instead caused by our view of the events (Murdock, 2009). Murdock (2009) states that “people are seen as responsible for their behavior” (p. 279) but, because they are

Related Essays

Rationale Essay

3396 words - 14 pages No.________. Prepared under the supervision of Mr. Mark Cañete. Introduction Three dimensional technologies is the latest innovation when it comes in directory system. With 3D software, you can rotate your models so you can get a look at any side you want. Bachelor of Science in Nursing program in Cavite State University is first offered at the College of Arts and Sciences in SY 2002-2003. In October 8, 2005, a separate

Biometrics Essay

1950 words - 8 pages information security is the correct arrangement of the access rights to the information. Current methods of authentication have a number of disadvantages: password can be easily lost or given to different person or stolen somehow, strong passwords (combination of numbers, letters, etc.) are hard to remember, also it is time consuming to enter passwords into the different systems (Email, File, DB System), high maintenance cost of those passwords, keys

Computer Tricks Essay

3238 words - 13 pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-1 CHAPTER 4 Web-Based Password Cracking Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-1 CHAPTER 5 Hacking Web Browsers

Securing Online Tranactions Essay

3628 words - 15 pages business ensure that through ecommerce there are solutions to help increase productivity at the same time ensuring security. One piece of technology that is out there and being used it Cyberplat MPI module. Cyberplat MPI Module is a full-fledged e-commerce solution based on the 3D security protocol that significantly increases web payment security and makes electronic transactions easier both for user and business (Cyberplat). Such software like