METHODOLOGY OF SECURE AUTHENTICATION SCHEMES USING VIRTUAL ENVIRONMENT
It is the user’s decision to choose which kind of verification strategies will be a part of their 2-D secret word. This is accomplished through communicating just with the items that obtain data that the user is agreeable in giving and overlooking the object’s that demand data that the user favors not to give. For instance, if a thing demands an iris scan and the user isn’t happy in giving such data, the user basically abstains from collaborating with that thing. Besides, giving the user the opportunity of decision with respect to what sort of validation method will be a part of their 2-D secret word and given the huge number of object and things in nature, the quantity of conceivable 2-D passwords will increment. In this manner, it turns out to be considerably harder for the attacker to guess the user’s 2-D secret phrase.