Hitoshi Kokumai

1 year ago · 2 min. reading time · ~10 ·

Contact the author

Like Share Comment
Blogging
>
Hitoshi blog
>
Nonpredictable Passwords Carried Around on Memo

Nonpredictable Passwords Carried Around on Memo

Memo with a Password written on it

Device with a Password stored on it

Is it correct to handle them as 'What We Know’
like "Remembered Password’?

I got interested in this article -on the password problem  “Tech Q&A”     https://www.unionleader.com/nh/lifestyles/tech-q-a-safeguarding-against-password-hackers/article_16d3629e-b5ba-550b-b2ac-6070403f61a4.html

Their answer is “The best defense against brute force and dictionary attacks is to use a password that is a long combination of letters, numbers and symbols that would be meaningless to anyone but you. These so-called “nonpredictable passwords” are far more difficult to hack.”

It would be fine for you if you are confident you are always able to recall all of them along with the correspondence with all the accounts to use these passwords for under any circumstances.  Then, you would not have to carry around a memo on which all the accounts and corresponding passwords are written down; the memo would work as a single point of failures and vulnerabilities.

Should you be not so certain about your such ability, you might be interested in our password discussions such as “Dual Causes of Password Predicament” 

and “Password Manager or Expanded Password System”  

“Expanded Password System

wane = Only I can select all of
BS] them correctly

Broader choices with both images and characters accepted

i

 

 

 

 

Easy to manage relenons between accounts and corresponding passwords.

&

Torturous login is history. Login is now comfortable, relaxing and healing

BO
250
08

Key References 


 Bring a healthy second life to legacy password systems

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens

Image-to-Code Conversion by Expanded Password System

Summary and Brief History - Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

Account Recovery with Expanded Password System

Relation of Accounts & Passwords

   

* Unique matrices of images allocated to different accounts.

+ Ata glance you will immediately realize what images you should pick
up as your passwords for this or that account.

Additional References


Removal of Passwords and Its Security Effect

Step-by-Step Analysis of Why and How Biometrics Brings Down Security

Negative Security Effect of Biometrics Deployed in Cyberspace

External Body Features Viewed as ‘What We Are’

 History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers - Expanded Password System and Related Issues 

Ifonlytextand fare OK [SUV BIOKUW

to memonze
text/number passwords

{Text Mode)
Recall the remembered
password

J 2

co-o0o

<veco N=

Ox ma

XxXBFr mow

<ozo>a

NAzZZIoaw
+

Low memory ceiling

to lighten the load of

text passwords

 

{Graphics Mode)
Recognize the pictures
remembered mn stones

 

High memory ceiling

 

[RE RET RSI

to make use of
memorized images

{Ongimal Picture Mode)

Recognize the unforgettable
pictures of episodic memories

sRBO yr
L@ S00

afson
fa

 

 

Very high memory cuiding

— Think ofall those adders you have to climb in Donkey Kong 1+)


 

 < Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes - narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space - "below-one" factor authentication

Secret Credenti

 
   
 

Memories

Episodic Memory
Like Share Comment
Comments

More articles from Hitoshi Kokumai

View blog
11 months ago · 2 min. reading time

I would like to take up this somewhat puzzling report - “Google advises passwords are good, spear ph ...

1 year ago · 2 min. reading time

There is actually a valid methodology that enable us to maximize the entropy of the secret credentia ...

1 year ago · 2 min. reading time

https://aitechtrend.com/quantum-computing-and-password-authentication/ · My latest article titled ‘Q ...

Related professionals

You may be interested in these jobs

  • Little Ones UK Ltd

    Nanny in Kensington, London

    Found in: Jooble GB - 5 days ago


    Little Ones UK Ltd Kensington, Greater London

    Are you energetic, active and creative? Then this is the role for you. A family in Kensington are seeking a Live In Full Time Nanny to work 5 days a week. The family have three children aged between 3 and 10 years old. The family would ideally like the Nanny to speak Greek, howev ...

  • University of Hertfordshire

    Professor of Plant Pathology

    Found in: beBee S2 UK - 1 day ago


    University of Hertfordshire Hatfield Full Time,Permanent

    Location: College Lane Campus, Hatfield · Main duties and responsibilities · To contribute to research in plant pathology, agriculture and climate change. The successful candidate will be expected to develop their career by contributing to the School's research and consultancy ou ...

  • Talent Finder

    Office Administrator

    Found in: Jooble GB - 5 days ago


    Talent Finder Bishop's Stortford, Hertfordshire

    Office Administrator | Bishop's Stortford | Monday to Friday 9.00am to 5.30pm | £21,000 to £23,000 · Established in 2006, our client has quickly become one of the UK's leading training academies. The key to their success has been their fresh, vibrant, and friendly alternative app ...