29 Ijmtst0802099
29 Ijmtst0802099
29 Ijmtst0802099
net/publication/359353114
Article in International Journal for Modern Trends in Science and Technology · February 2022
DOI: 10.46501/IJMTST0802029
CITATIONS READS
0 451
2 authors, including:
Editor Ijmtst
International Journal for Modern Trends in Science and Technology
385 PUBLICATIONS 171 CITATIONS
SEE PROFILE
All content following this page was uploaded by Editor Ijmtst on 20 March 2022.
Anjana V R* | Sangeetha J
Department of Computer science, St. Alberts College (Autonomous) Banerjee Road, Cochin, Kerala.
*Corresponding Author Mail Id: anjanavr876@gmail.com
Article Info
Received: 20 January 2022; Accepted: 14 February 2022; Published: 20 February 2022.
ABSTRACT
Textual passwords, biometric scanning, tokens or cards (such as an ATM), and other password models are now available to
users. Textual passwords, for the most part, use an encryption method. Biometric scanning serves as your natural signature, while
Cards or Tokens serve as proof of your identity. However, some people despise having to carry their cards with them, and others
reject to have their retinas exposed to powerful IR (Biometric scanning). Nowadays, most textual passwords are kept basic, such
as a phrase from the dictionary or their pet names. Klein used to do these tests and could crack 10-15 passwords every day. With
the advancement of technology, fast computers, and a plethora of Internet-based applications, this has become a child's game.As
a result, 3D passwords are a more customised and intriguing method of authentication. Passwords are now predicated on the fact
that humans have memory. Simple passwords are usually used so that they may be remembered easily. In our concept, the human
memory must go through the processes of recognition, recall, biometrics, and token-based authentication. The 3D password GUI
appears once you've implemented it and logged in to a secure site. This is a second textual password that the user can type in. A
3D virtual room will appear on the screen after he completes the first authentication. Let's imagine we're talking about a virtual
garage. In today's garage, one will find a variety of tools, equipment, and other items.