Hitoshi Kokumai

1 year ago · 2 min. reading time · ~10 ·

Contact the author

Relevant Share Comment
Blogging
>
Hitoshi blog
>
So, what should we do when we see a correct user falsely rejected?

So, what should we do when we see a correct user falsely rejected?

pad a&&
="B& EE

Today's topic is this report “Thales launches payment card with onboard fingerprint scanner”  https://www.theregister.com/2021/07/22/thales_fingerprint_payment/

Is the user expected to give up the payment opportunity altogether or is expected to feed the default password as a fallback measure?

Alleging ‘improved usability’ would be misleading in the former case, whereas alleging ‘improved security’ would be misleading in the latter case.

As such, what they claim is false. 

More of our reasoning is offered here – “Negative Security Effect of Biometrics Deployed in Cyberspace”

Incidentally, a nice figure is quoted as False Acceptance Rate, but such a figure makes no sense unless it comes with the empirical False Rejection Rate that corresponds to the said False Acceptance Rate; these two rates are in the trade-off.

Secret Credenti

 
   
 

Memories

Episodic Memory

Key References 
 

 “What we need to do for NOT achieving Solid Digital Identity”

Removal of Passwords and Its Security Effect 

Negative Security Effect of Biometrics Deployed in Cyberspace

External Body Features Viewed as ‘What We Are’

Ais made of

 

 

It's a no
Rjt5F.png


Additional References
 

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens
 Image-to-Code Conversion by Expanded Password System

Summary and Brief History - Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

Account Recovery with Expanded Password System 

 History, Current Status and Future Scenarios of Expanded Password System 

Availability-First Approach 

Update: Questions and Answers - Expanded Password System and Related Issues 

jSFYk.jpeg


 

 < Videos on YouTube>
 

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes - narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space - "below-one" factor authentication

SRF9l.png
 
Relevant Share Comment
Comments

More articles from Hitoshi Kokumai

View blog
9 months ago · 2 min. reading time

Another topic for today is “Passwordless made simple with user empowerment” · https://www.securitym ...

9 months ago · 3 min. reading time

I today take up this The Register report - “Client-side content scanning as an unworkable, insecure ...

9 months ago · 2 min. reading time

The quantum computer held in a bad guy’s hand is indeed a big threat. So is the artificial intellige ...

Related professionals

You may be interested in these jobs