What is 3D Password

3D Password: -



3D Password
3D Password


3D password is an XML-based protocol designed to be an added security layer for online transactions. This strategy was initially developed by Arcot Systems, Inc and first deployed by Visa with the purpose of refining the security of Internet payments and is offered to clients under the name Verified by Visa. The 3D password is very user friendly, and very interesting way of the authentication process. Generally, passwords are set on the bases of human memory. Usually, simple passwords like pet names, places, and phone numbers are set so on quickly recall them. But in this 3d scheme, human memory has to undertake the facts of recalling, recognition, token or biometrics-based authentication in one single authentication system.  

The user is given permission for choosing the type of authentication strategy in which he is comfortable. A user who is good at memorizing the password might prefer to select textual or graphical password schema as a part of their 3d Password. Moreover, a user who often tends to forget textual passwords prefers to select bio-metrics or smart cards as part of their 3D Password. Hence, users are given full freedom to select and choose how the perfect and desired 3D Password is going to be constructed.  



There are three basic approaches to authentication. 

  
1.Something you know. (Such as a password or a “3D password”.)  
2.Something you have. (Such as a hardware key)  
3.Something you are. (Fingerprints, etc.)  



➭ We’re getting to specialize in “Something you know” authentication because it has been found to be the foremost feasible option of password replacement thanks to its high levels of security, deploy-ability, and usability as opposed to other methods, according to the experts who wrote “The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes” (Bonneau, et al. 2012).  

Passwords must be memorable to be useful. Our passwords are only as strong as our ability to recollect them. When remembering sequences, humans are temporally limited and may only remember on the average of seven characters directly (Miller, 1957). According to NIST Special Publication 800-63, 7 characters from your keyboard doesn’t get you anywhere on the brink of a suitable level of security.  


Authentication techniques: - 

  
Textual based: - It is a process that ensures a user's identity. The user's identity can be verified by a user name and password. The textual passwords are the foremost widely used passwords for authentication. There is a standard trend among users to settle on short length passwords which are easy to memorize. However, textual passwords are susceptible to various attacks that include shoulder-surfing, brute force attack, hidden camera, and spyware attacks.  
  

Graphical based: - This technique is for those types of users, who can recall and distinguish films better than words. Some of the graphical password strategies are time-consuming to be performed. Moreover, most of the graphical password strategies are exposed to shoulder surfing attacks. Hence, presently most graphical password techniques are still in their examine phase and indulge more enhancements and usability studies.  



Token-based: - In banking authentication structures, it not only requires a knowledge-based authentication system like textual based and Graphical based systems but also a token-based system is required. However, many reports have shown that tokens are susceptible to lose, fraud, or theft by using simple techniques. Any ATM cards, swipe card are examples of token-based authentication systems.  
  
  
  
  
Bio-metric based: - A biometric authentication is a form of security that measures and matches bio-metric features of a user to verify that a person trying to access a particular device is authorized to do so. Bio-metric features are having physical and biological characteristics that are unique to private personal information and may be easily compared to authorized features saved during a database. 

If the biometric features of a user trying to access a device match the features of an approved user, access to the device is granted. Bio-metric authentication can also be installed in physical environments, controlling access points like doors and gates.  


Common Types of Bio-metric Authentication Are: - 

  
  • Scanners 
  • Facial Recognition 
  • Voice Identification 
  • Eye Scanner 



ADVANTAGES: -  

  
1. Provides security.  
2. 3D password can’t take by any other person.  
3. 3D graphical password has no limit.  
4. The password can change easily.  
5. Implementation of the system is easy.  
6. The Passwords can remember easily.  
7. The password helps to keep a lot of personal details.  



Other Post: -

Polymer Memory

Nano Concrete


Hopefully, I will be able to help you at every step along the way.  
  Note: - Please feel free to share any view about my page 



Post a Comment

0 Comments