Hitoshi Kokumai

2 weeks ago · 2 min. reading time · visibility ~10 ·

chat Contact the author

thumb_up Relevant message Comment

Maximizing Entropy of Secret Credentials while Minimizing Burden on Citizens

Secret Credenti

 
   
 

Memories

Episodic Memory

 

There is actually a valid methodology that enable us to maximize the entropy of the secret credentials for solid identity assurance and, at the same time, enables us to minimize the burden of managing the secret credential.

 Too good to believe? 

 It’s real. We only need to follow logic and make use of our own episodic image memory that we had pleasantly acquired years or decades ago. What has firmly survived years and decades deep in our brain is very unlikely to evaporate in coming months and years. We can recognise these emotion-coloured images straight away even when we are caught in panic.

 For more, please visit  "Dual Causes of Password Predicament" and "Quantum Computing and Password Authentication"

Relation of Accounts & Passwords

   

* Unique matrices of images allocated to different accounts.

+ Ata glance you will immediately realize what images you should pick
up as your passwords for this or that account. - “Expanded Password System

wane = Only I can select all of
BS] them correctly

Broader choices with both images and characters accepted

i

 

 

 

 

Easy to manage relenons between accounts and corresponding passwords.

&

Torturous login is history. Login is now comfortable, relaxing and healing

BO
250
08

Key References 


 Bring a healthy second life to legacy password systems

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens

Image-to-Code Conversion by Expanded Password System

Summary and Brief History - Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

Account Recovery with Expanded Password System

Ifonlytextand fare OK [SUV BIOKUW

to memonze
text/number passwords

{Text Mode)
Recall the remembered
password

J 2

co-o0o

<veco N=

Ox ma

XxXBFr mow

<ozo>a

NAzZZIoaw
+

Low memory ceiling

to lighten the load of

text passwords

 

{Graphics Mode)
Recognize the pictures
remembered mn stones

 

High memory ceiling

 

[RE RET RSI

to make use of
memorized images

{Ongimal Picture Mode)

Recognize the unforgettable
pictures of episodic memories

sRBO yr
L@ S00

afson
fa

 

 

Very high memory cuiding

— Think ofall those adders you have to climb in Donkey Kong 1+) - Relation of Accounts & Passwords

   

* Unique matrices of images allocated to different accounts.

+ Ata glance you will immediately realize what images you should pick
up as your passwords for this or that account.

Additional References


Removal of Passwords and Its Security Effect

Step-by-Step Analysis of Why and How Biometrics Brings Down Security

Negative Security Effect of Biometrics Deployed in Cyberspace

External Body Features Viewed as ‘What We Are’

 History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers - Expanded Password System and Related Issues 

Secret Credenti

 
   
 

Memories

Episodic Memory - Ifonlytextand fare OK [SUV BIOKUW

to memonze
text/number passwords

{Text Mode)
Recall the remembered
password

J 2

co-o0o

<veco N=

Ox ma

XxXBFr mow

<ozo>a

NAzZZIoaw
+

Low memory ceiling

to lighten the load of

text passwords

 

{Graphics Mode)
Recognize the pictures
remembered mn stones

 

High memory ceiling

 

[RE RET RSI

to make use of
memorized images

{Ongimal Picture Mode)

Recognize the unforgettable
pictures of episodic memories

sRBO yr
L@ S00

afson
fa

 

 

Very high memory cuiding

— Think ofall those adders you have to climb in Donkey Kong 1+)


 

 < Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes - narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space - "below-one" factor authentication

Authority-Distributed CryntoMnemo

for Windows V1.0

An encryption key, which had been destroyed at the end of the previous run.
will be reproduced when (only when) 3 users work together.

 

Encryption Key

Regeneration B Encrypt/Decrypt B Deletion
thumb_up Relevant message Comment
Comments

More articles from Hitoshi Kokumai

View blog
1 week ago · 2 min. reading time

Solid Secret Credential for Blockchain

Today's topic is this report - “How blockchain tec ...

3 weeks ago · 2 min. reading time

Questions Raised over Privacy, Racial Bias, and Accuracy

Today's topic is BBC's “Facebook to end use of fac ...

1 month ago · 3 min. reading time

Serious Funny Reality

I take up this new report today - “Researchers Def ...