Sizeducation||3DPassword by@mydreamworld20%reward for siz-official

in hive-181430 •  8 months ago 
Assalamualaikum all steemians.I am very happy because it is my very first post in this community. Today I am feeling very excited to share about a very informative topic of Information Technology that is

3D Password

IMG_20211129_214843.jpg

Source

What is 3D password technology?


We are using different verifications such as textual passwords, biometric scanning, tokens or cards etc in present days .
Biometric scanning is our personal signature and Cards or Tokens to prove our validity. But some people don’t like to carry cards, some refuse to undergo Biometric scanning.Mostly textual passwords, nowadays, are kept very simple a small word their siblings names, date of birth etc.
Therefore the idea of the 3D passwords verification is presented which is more customized and very interesting method of authentication.These passwords are based on the fact of Human memory. Generally simple passwords are set because it is to quickly recall them.

Our-collaborative-3D-virtual-environment-mixing_Q640.jpg
Source

How 3D password system works?

IMG_20211129_215119.jpg
Source
In 3d password authenticationsystem the human memory has to undergo the facts of Recognition, Recalling, Biometrics or Token based verifications. When it is implemented and we log in to a secure site, the 3D password GUI opens . This is an additional password which the we can simply enter. Once we go through the first authentication, a 3D virtual room will open on the screen.

IMG_20211129_215206.jpg
Source
In this virtual room we shall find all sorts of tools, equipments having uniqueand specified properties.We’ll then interact with these properties accordingly. Each object in the 3D space, can be moved around in a 3 dimensional space (x,y,z) plane.It is the moving attribute of each object. Suppose if we logs in and enters the virtual room, w e see and pick a screw-driver (initial position in xyz coordinates (4, 4, 4)) and moves it 3 places to his right (in XY plane i.e. (7, 4, 4).It can be identified as an authentication.

The actual user can only understands and recognizes the object. . This is the Recall and Recognition style of human memory coming into application. . Security can be increased by the fact of addition of Cards and Biometric scanner as input.

Virtual Objects

A Virtual object may be any object that we use in real life. We can have the following virtual objects:
Source
•Computer to type
•Fingerprint reader to reade the prints
• Biometric recognition device for authentication
•White board to write
•An (ATM)
•Light that can be switched on/off
•Television or radio to select channels
•Staple for punching
•A book moveable from one place to another;
•Any real life object;
•Any upcoming authentication scheme.

Problems of existing system

Current authentication system have weaknesses.
•Textual passwords are commonly used are easy to break and brute force attacks.
•The graphical passwords have a password space less than the textual password space.
• Smart cards and tokens ave a chance to be stolen.
•Many biometric identification have been introduced but users tend to resist using biometrics due to their privacy.
•Biometrics cannot be revoked.

Benefits of 3d password


Authenticationsystem
•It is a multi factor authentication phenomena.
•We as user eget a chance to freely select whether the 3D password will be entirely to recall, recognition, or based on token , or combination of different.
•It ensure high user acceptability.
•The 3d system provides secrets that are easy to remember and very difficult to guess.
•It provides secret codes that are not easy to write down on paper.
•These secret codes are difficult to share with others.
•This system Secrets can be easily revoked or changed.

3D Password application in different fields


•Most of the 3D password have a space that is very large as compared to other authentication systems
•In large organizations having critical servers
•Nuclear and military facilities: s
•Aeroplanes and fighter jets Because the possiblity of threatening and hijacking
•Automatic Telling Machine
•PC logins
•Authentication of web etc
Hope this will be informative to you. Thanks for your time.I Will be back with a new topic.
Many thanks to @cryptokraze,
@suboohi,
@siz-official and siz staff.

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

Please used space between words on your title.
Thank you so much for your attention i o our community.

T
Regards, Faran Nabeel