This document proposes a 3D password authentication scheme that combines existing schemes like knowledge-based, token-based, and biometric-based authentication. It involves users navigating a 3D virtual environment using inputs to perform a sequence of actions and interactions that form their unique 3D password. Guidelines for designing the virtual environment emphasize real-life similarity, object uniqueness, three-dimensional space, and system importance. Potential applications include critical servers, military facilities, and computers. Security analysis covers the password space size and distribution knowledge, while attacks and countermeasures address brute force, shoulder surfing, and timing attacks.
Related topics: