3D Shapes Technique to Improve Mail Services Authentication
Abstract
In today’s world, security is important aspect in day to day life .So, everyone used various ways for security purpose. users use passwords for their mail security and Generally, everyone uses textual password. Textual password is combination of alphabets, characters and numbers. users keep textual password as name of their favorite things, actors or actress, dish and meaningful word from dictionary. But the person who is very close to that person can easily guess the password. Graphical password is advanced version of password. Graphical passwords have received considerable attention lately as Potential alternatives to text-based passwords .Graphical password is composed of images, parts of images, or sketches. These passwords are very easy to use and remember.To Drawbacks of previously existing authentication techniques. We present A new improved authentication technique ,The proposed system is about a new technique to generate password ; there are three password fields each field is about one character and one number, when the user fill the three fields the system security generate a special algorithm which is available in the user’s machine itself to convert the content of the three password’s fields to a 3D graphical shape which are saved and transfer in the form of 3D shape in server side . so all the password have been stored in the form of 3D shape at the server . so anybody want to hack password he will face difficulty to guess the exact password because he can see only the shape not real password ( the three pairs of characters and numbers) .
Keywords : Authentication , 3D Shape , Processing 2.0 mode P3D technique .
To list your conference here. Please contact the administrator of this platform.
Paper submission email: IKM@iiste.org
ISSN (Paper)2224-5758 ISSN (Online)2224-896X
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org