Maximizing Entropy of Secret Credentials while Minimizing Burden on Citizens
There is actually a valid methodology that enable us to maximize the entropy of the secret credentials for solid identity assurance and, at the same time, enables us to minimize the burden of managing the secret credential.
Too good to believe?
It’s real. We only need to follow logic and make use of our own episodic image memory that we had pleasantly acquired years or decades ago. What has firmly survived years and decades deep in our brain is very unlikely to evaporate in coming months and years. We can recognise these emotion-coloured images straight away even when we are caught in panic.
For more, please visit "Dual Causes of Password Predicament" and "Quantum Computing and Password Authentication"
Key References
Bring a healthy second life to legacy password systems
For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)
What We Know for Certain about Authentication Factors
Digital Identity for Global Citizens
Image-to-Code Conversion by Expanded Password System
Summary and Brief History - Expanded Password System
Proposition on How to Build Sustainable Digital Identity Platform
Account Recovery with Expanded Password System
a NAzZZIoaw + Low memory ceiling to lighten the load of text passwords {Graphics Mode) Recognize the pictures remembered mn stones High memory ceiling [RE RET RSI to make use of memorized images {Ongimal Picture Mode) Recognize the unforgettable pictures of episodic memories sRBO yr L@ S00 afson fa Very high memory cuiding — Think ofall those adders you have to climb in Donkey Kong 1+)">Additional References
Removal of Passwords and Its Security Effect
Step-by-Step Analysis of Why and How Biometrics Brings Down Security
Negative Security Effect of Biometrics Deployed in Cyberspace
External Body Features Viewed as ‘What We Are’
History, Current Status and Future Scenarios of Expanded Password System
Update: Questions and Answers - Expanded Password System and Related Issues
< Videos on YouTube>
Slide: Outline of Expanded Password System (3minutes 2seconds)
Digital Identity for Global Citizens (10minutes - narrated)
Demo: Simplified Operation on Smartphone for consumers (1m41s)
Demo: High-Security Operation on PC for managers (4m28s)
Demo: Simple capture and registration of pictures by users (1m26s)
Slide: Biometrics in Cyber Space - "below-one" factor authentication
Articles from Hitoshi Kokumai
View blogI take up this report today - “Facebook's metaverse plans labelled as 'dystopian' and 'a bad idea'” ...
https://aitechtrend.com/quantum-computing-and-password-authentication/ · My latest article titled ‘Q ...
I got interested in this article -on the password problem · “Tech Q&A” · https://www.unionleader.c ...
You may be interested in these jobs
-
Community Safety Warden
Found in: Talent UK C2 - 1 day ago
District Enforcement Ltd Ebbw Vale, United Kingdom Full timeDo you enjoy working outdoors, helping people and care about your community? Do you value personal integrity and seek to challenge anti-social behaviour? Do you have excellent interpersonal skills, having worked in a security or customer service role previously? · If yes, then yo ...
-
First Line Support Engineer in Gloucester)
Found in: beBee S2 UK - 13 hours ago
Brite Recruitment Gloucester, United Kingdom PermanentFIRST LINE SUPPORT ENGINEER · GLOUCESTERSHIRE · £24,000 · Our client in the Technology Industry, is looking for a First Line Support Engineer to play a crucial role in providing first-line technical support to clients, troubleshooting software-related problems, and ensuring se ...
-
Retail Customer Advisor
Found in: Talent UK C2 - 1 week ago
Three UK Warrington, United Kingdom Full timeJob DescriptionOffer solutions to customers with general mobile or network queries (we'll teach you how to answer these) · Drive our customer experience by engaging in great conversations with customers and ensuring they leave our stores happy. · Matching our products and service ...
Comments