Hitoshi Kokumai

3 months ago · 2 min. reading time · visibility ~10 ·

chat Contact the author

thumb_up Relevant message Comment

Don’t be so reckless as to rush to removing passwords

“Expanded Password System

wane = Only I can select all of
BS] them correctly

Broader choices with both images and characters accepted






Easy to manage relenons between accounts and corresponding passwords.


Torturous login is history. Login is now comfortable, relaxing and healing



“US House Rep on cyber committees tweets Gmail password, PIN in Capitol riot lawsuit outrage” https://www.theregister.com/2021/06/07/brooks_gmail_password/

It says “Brooks, who sits on the House's Cyber, Innovative Technologies, and Information Systems subcommittee, and the Science, Space, and Technology committee, tweeted a photo from an iPad of his Windows computer, attached to which was a piece of paper with login credentials written on it.”

Being vulnerable to abuse does not mean being detrimental, just as an army vulnerable to air strike is not detrimental.


Relation of Accounts & Passwords


* Unique matrices of images allocated to different accounts.

+ Ata glance you will immediately realize what images you should pick
up as your passwords for this or that account.


Removing the password altogether would only destroy identity security, just as the removal of an army would destroy national defense.

The password headache could be mitigated if our passwords to be fed for login are made of two components – one half to recall and the other half to recover from a memo or device. 

This is actually what I am practicing for feeding 200-bit strong passwords every day at present, that is, until our leak-free password manager is put on the market.

By the way, you would quickly realize what the leak-proof password manager will be like if you try and experience the flow of image-to-code conversion at our new website - https://www.mnemonicidentitysolutions.com/

Ifonlytextand fare OK [SUV BIOKUW

to memonze
text/number passwords

{Text Mode)
Recall the remembered

J 2


<veco N=

Ox ma

XxXBFr mow



Low memory ceiling

to lighten the load of

text passwords


{Graphics Mode)
Recognize the pictures
remembered mn stones


High memory ceiling



to make use of
memorized images

{Ongimal Picture Mode)

Recognize the unforgettable
pictures of episodic memories

sRBO yr
L@ S00




Very high memory cuiding

— Think ofall those adders you have to climb in Donkey Kong 1+)

Key References 

Account Recovery with Expanded Password System

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens

Image-to-Code Conversion by Expanded Password System

Summary and Brief History - Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

Secret Credenti



Episodic Memory


Additional References

Removal of Passwords and Its Security Effect
Negative Security Effect of Biometrics Deployed in Cyberspace

External Body Features Viewed as ‘What We Are’

 History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers - Expanded Password System and Related Issues 




 < Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes - narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space - "below-one" factor authentication

thumb_up Relevant message Comment
Zacharias 🐝 Voulgaris

Zacharias 🐝 Voulgaris

3 months ago #3

Hitoshi Kokumai

Hitoshi Kokumai

3 months ago #2

Zacharias 🐝 Voulgaris

Zacharias 🐝 Voulgaris

3 months ago #1

It's funny how we have the most sophisticated confidentiality methods the world has ever seen (from encryption to steganography, to various combinations of the two, as well as fully homomorphic encryption), yet we still haven't mastered the habit of proper password usage and management. It's really fascinating how Authentication still remains the most relevant part of Cryptography, even today after it's matured to levels previously considered unfathomable. Cheers

More articles from Hitoshi Kokumai

View blog
1 week ago · 2 min. reading time
Hitoshi Kokumai

Nonpredictable Passwords Carried Around on Memo

I got interested in this article -on the password ...

1 month ago · 2 min. reading time
Hitoshi Kokumai

Dual Causes of Password Predicament

Our password headache may well be the consequence ...

1 month ago · 2 min. reading time
Hitoshi Kokumai

Quantum Computing and Identity Assurance

Bad guys, who have a quantum computer at hand, wou ...