Documente Academic
Documente Profesional
Documente Cultură
4/15/12
Introduction
1. Textual passwords- simple password consisting of alphabets, number or special characters. 2. biometric authenticationfingerprint verification, face recognition, IRIS scan.
4/15/12
Types of authentications
Authentication areas
Mail providers- Gmail, Yahoo mail, Msn, etc. Social networking websites- Orkut, Facebook. Personal computer/ office computers.
4/15/12
textual passwords
Biometric authentication
4/15/12
Proposed System
The users freedom of selection. The following requirements are satisfied in the proposed scheme
1. The new scheme provide secrets that are easy to remember and very difficult for intruders to guess. 2. The new scheme provides secrets that are not easy to write down on paper.
4/15/12
The proposed system is a multi factor authentication scheme that combines the benefits of various authentication schemes.
Virtual environment can be any real life objects Any obvious actions and interactions toward the real life objects can be done in the virtual 3D environment toward the virtual objects. any user input in the virtual 3D environment can be considered as a part of the 3D password. The action toward an object that exists in location (x1, y1 , z1 ) is different from the actions toward a similar object that exists in location (x2 , y2 , z2 ), where x1 != x2 , y1 != y2 , and z1 != z2 . Therefore, to perform the legitimate 3D password, the user
4/15/12
4/15/12
Brute Force Attack Shoulder Surfing Attack Timing Attack Session hijacking
4/15/12
Conclusion
A multi factor authentication scheme. Contains any existing authentication scheme or even any upcoming authentication scheme simple and easy to use 3D virtual environment user's 3D password reflects the user's preferences and requirements.
4/15/12
Questions ?
4/15/12
References
D. V. Klein, Foiling the cracker: A survey of, and improvement to passwords security, in Proc. USENIX Security Workshop, 1990, pp. 514.
NBC news, ATM Fraud: Banking on Your Money, Dateline Hidden Cameras Show Criminals Owning ATMs, Dec. 11, 2003.
BBC news, Cash Machine Fraud up, Say Banks, Nov. 4, 2006.
4/15/12
X. Suo, Y Zhu, and G. S. Owen, Graphical passwords: A . survey, in Proc. 21st Annu. Comput. Security Appl. Conf., Dec. 59, 2005, pp. 463472.