3D PASSWORD FOR MORE SECURE AUTHENTICATION

Published on June 2016 | Categories: Documents | Downloads: 35 | Comments: 0 | Views: 1258
of 10
Download PDF   Embed   Report

Comments

Content

3D PASSWORD FOR MORE SECURE AUTHENTICATION
INTRODUCTION Normally the authentication scheme the user undegoes is paticularly very lenient or very strict.Throughout the yeras authentication has been a very interesting approach.With all the means of technology developing ,it can be very easy for 'others' to fabricate or to steal identity or to hack someones password.Therefore many algorithms have come up each with an interesting approach toward calculation of a secret key.The algorithms are such based to pick a random number in the range of 10^6 and therefore the possbilities of the sane number coming is rare. Users nowadays are provided with major password stereotypes such as textual passwords,biometric scanning,tokens or cards(such as an ATM) etc.Mostly textual passwords follow an encryption algorithm as mentioned above.Biometric scanning is your "natural" signature and Cards or Tokens prove your validity.But some people hate the fact to carry around their cards,some refuse to undergo strong IR exposure to their retinas(Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names,grilfriends etc.Ten years back Klein performed such tests and he could crack 10-15 passwords per day.Now with the technology change,fast processors and many tools on the Internet this has become a Child's Play. Therefore we preset our idea, the 3D passwords which are more customisable, and very interesting way of authentication.

WORKING Now the passwords are based on the fact of Human memory.Generally simple passwords are set so as to quickly recall them.The human memory,in our scheme has to undergo the facts of Recognition,Recalling,Biometrics or Token based authentication. Once implemented and you log in to a secure site,the 3D password GUI opens up.This is an additional textual passwords which the user can simply put.Once he goes through the first authentication, a 3D virtual room will open on the screen.In our case, lets say a virtual garage. Now in a day to day garage one will find all sorts of tools, equipments ,etc.each of them having a unique properties.The user will then interact with these properties accordingly.Each object in the 3D space, can be moved around in an (x,y,z) plane.Thats the moving attribute of each object.This property is common to all the objects in the space.Suppose a user logs in and enters the garage.He

sees and picks a screw-driver(initial position in xyz coordinates (5,5,5)) and moves it 5 palces to his right (in XY plane ie (10,5,5).That can be identified as an authentication. Only the true user understands and recognizes the object which he has to choose among many.This is the Recall and Recognition part of human memeory coming into play.Interestingly,a password can be set as approaching a radio and setting its frequency to number only the user knows. Security can be enhanced by the fact of including Cards and Biometric scanner as input.There can be levels of authentication a user can undergo.More the confidentiality more the complexity.In that scenario a virtual environment can be developed as a globe,a city or simply a garage.

EXPECTED FUNCTIONALITIES 1.The user can decide his own authentication schemes.If he's comfortable with Recall and Recognition methods then he can choose the 3d authentication just used above. 2.The authentication can be improved since the unauthorised persons will not interact with the same object as a legitimate user would.We can also include a timer.Higher the security higher the timer.Say after 20 seconds a weak password will be thrown out. 3.The 3D environment can change according to users request. 4.It would be difficult to crack using regular techniques.Since all the algorithms follow steps to authenticate,our project has no fixed number of steps.Hence to calculate all those possibilites and decipher them is not easy. 5.Can be used in critical areas such as Nuclear Reactors,Missile Guiding Systems etc. 6.Added with biometrics and card verification,the scheme becomes almost unbreakable.

Reference: http://www.seminarprojects.com/Thread-3d-password-for-more-secure-authenticationfull-report#ixzz1CofiDcMq

Bubble sensing
ABSTRACT
We propose bubble-sensing, a new sensor network abstraction that allows mobile phone users to create a binding between sensing tasks and the physical world at locations of interest, that remains active for a duration set by the user. We envision mobile phones being able to affix sensing task bubbles at places of interest and then receive sensed data as it becomes available in a delay-tolerant fashion, in essence, creating a living documentary of places of interest in the physical world. The system relies on other mobile phones that opportunistically pass through bubble-sensing locations to acquire tasks and do the sensing on behalf of the initiator, and deliver the data to the bubble-sensing server for retrieval by the user who initiated the task. We describe an implementation of the bubble-sensing system using sensor-enabled mobile phones, specifically, Nokia¶s N80 and N95 (with GPS, accelerometers, microphone, camera). Task bubbles are maintained at locations through the interaction of ´bubble carriers´, which carry the sensing task into the area of interest, and ´bubble anchors´, which maintain the task bubble in the area when the bubble carrier is no longer present. In our implementation, bubble carriers and bubble anchors implement a number of simple mobile phone based protocols that refresh the task bubble state as new mobile phones move through the area. Phones communicate using the local Ad-Hoc 802.11g radio to transfer task state and maintain the task in the region of interest. This task bubble state is ephemeral and times out when no bubble carriers or bubble anchors are in the area. Our design is resilient to periods when no mobiles pass through the bubble area and is capable of µµreloading´ the task into the bubble region.

Pill camera
The aim of technology is to make products in a large scale for cheaper prices and increased quality. The current technologies have attained a part of it, but the manufacturing technology is at macro level. The future lies in manufacturing product right from the molecular level. Research in this direction started way back in eighties. At that time manufacturing at molecular and atomic level was laughed about. But due to advent of nanotecnlogy we have realized it to a certain level. One such product manufactured is PILL CAMERA, which is used for the treatment of cancer, ulcer and anemia. It has made revolution in the field of medicine. This tiny capsule can pass through our body, without causing any harm. It takes pictures of our intestine and transmits the same to the receiver of the Computer analysis of our digestive system. This process can help in tracking any kind of disease related to digestive system. Also we have discussed the drawbacks of PILL CAMERA and how these drawbacks can be overcome using Grain sized motor and bi-directional wireless telemetry capsule .Besides this we have reviewed the process of manufacturing products using nanotechnology. Some other important applications are also discussed along with their potential impacts on various fields

Motion Capture
Motion capture, motion tracking, or mocap are terms used to describe the process of recording movement and translating that movement on to a digital model. It is used in military, entertainment, sports, and medical applications, and for validation of computer vision[1] and robotics. In filmmaking it refers to recording actions of human actors, and using that information to animate digital character models in 2D or 3D computer animation. When it includes face and fingers or captures subtle expressions, it is often referred to as performance capture. In motion capture sessions, movements of one or more actors are sampled many times per second, although with most techniques (recent developments from Weta use images for 2D motion capture and project into 3D), motion capture records only the movements of the actor, not his/her visual appearance. This animation data is mapped to a 3D model so that the model performs the same actions as the actor. This is comparable to the older technique of rotoscope, such as the 1978 The Lord of the Rings animated film where the visual appearance of the motion of an actor was filmed, then the film used as a guide for the frame-by-frame motion of a handdrawn animated character. Camera movements can also be motion captured so that a virtual camera in the scene will pan, tilt, or dolly around the stage driven by a camera operator while the actor is performing, and the motion capture system can capture the camera and props as well as the actor's performance. This allows the computer-generated characters, images and sets to have the same perspective as the video images from the camera. A computer processes the data and displays the movements of the actor, providing the desired camera positions in terms of objects in the set. Retroactively obtaining camera movement data from the captured footage is known as match moving or camera tracking.

Apple I mouse
Apple's filing notes that the usability of a computer might become easier through input devices that are "more communicative" to the user. It also notes that the addition of a screen could make a device more "aesthetically pleasing," by allowing users to change the look of it by customizing what is displayed on the screen.

The proposed invention would provide "observable data" to a user through the input device itself. The image could even be displayed on the back of a curved surface, like a mouse, by projecting the image onto an outer surface of "collimated glass."

The display on the mouse would change according to what the user may be doing on their Mac. As an example, the application describes displaying a number of icons for quickly selectable options when a user is running Apple's Pages word processing application. Switching over to the spreadsheet software Numbers would reconfigure the buttons on the screen to allow for commands in that respective application.

In another example, the mouse displays a virtual depiction of a traditional number pad, commonly found on a full-size keyboard. With this, users could quickly input numbers right from

their mouse using its touch-sensitive back panel.

The application notes that the dynamic touch-display input method could be employed on other devices like a keyboard, or even a mobile device like an iPhone or iPod touch.

In one illustration, an iPhone is shown with the top third of its screen occupied by the handset's traditional applications like SMS, Calendar and Photos. But the bottom two-third of the display are occupied by a trackpad-like area, and below that is a virtual clickable surface for using a cursor to select objects on a traditional computer. The iPhone sketch also lacks a home button on the hardware.

The patent application revealed this week is credited to Gordie Freeman, Jacob Farkas, and Toby Charles Wood Patterson. Apple first filed for the proposed invention in July of 2009. Apple introduced its multi-touch Magic Mouse -- without a display on it, of course -- in 2009. The wireless mouse lacks any physical buttons, but brings multi-touch gestures, such as two-finger scrolling, to the pointer. Previously, those types of gestures were only capable on an iPhone, or a multi-touch trackpad on a MacBook. The effort to add multi-touch input to Apple's entire line of products continued in July 2010, when the Magic Trackpad was released. The flat trackpad surface offers input similar to a MacBook on a desktop Mac. As for controlling a device with an iPhone, iPod touch or iPad, Apple already allows that with its own free Remote application. That software, available on the App Store, allows iOS users to control their Apple TV wirelessly from anywhere in their home.

Ubiquipous nwng Project oxygen Pillcamera Bubble sesing Tripwire Vision 4g Hp java Java ring Virtual keyboard Logarithmic keying Robotics surgery Iscsi

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close