Hitoshi Kokumai

1 year ago · 2 min. reading time · ~100 ·

Contact the author

Like Share Comment
Blogging
>
Hitoshi blog
>
Solid Secret Credential for Blockchain

Solid Secret Credential for Blockchain

The lock authenticates the key.
The key authenticates the lock.

  

Does the key authenticate
the person who holds it?

 

Today's topic is this report - “How blockchain technology can create secure digital identities”  https://ibsintelligence.com/blogs/how-blockchain-technology-can-create-secure-digital-identities/

The title of this report reads “How blockchain technology can create secure digital identities”. I would have made it read “How blockchain technology, when it comes with solid secret credentials, can create secure digital identities”.  

 “How come?”  

 The lock authenticates the key and the key authenticates the lock. But neither the key nor the lock authenticates the person who holds the lock or key. It is imperative to check the secret credential of the person who claims to be the owner of the lock or key. It’s so plain and simple.   

“Conventional text passwords are too hard to manage and yet too vulnerable to abuse?”   

Then, why not look at non-text secret credentials?   

For more, please refer to “Why the password isn’t an enemy of people”

 

Relation of Accounts & Passwords

   

* Unique matrices of images allocated to different accounts.

+ Ata glance you will immediately realize what images you should pick
up as your passwords for this or that account. - “Expanded Password System

wane = Only I can select all of
BS] them correctly

Broader choices with both images and characters accepted

i

 

 

 

 

Easy to manage relenons between accounts and corresponding passwords.

&

Torturous login is history. Login is now comfortable, relaxing and healing

BO
250
08 - “Expanded Password System

wane = Only I can select all of
BS] them correctly

Broader choices with both images and characters accepted

i

 

 

 

 

Easy to manage relenons between accounts and corresponding passwords.

&

Torturous login is history. Login is now comfortable, relaxing and healing

BO
250
08

Key References 


 Bring a healthy second life to legacy password systems

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens

Image-to-Code Conversion by Expanded Password System

Summary and Brief History - Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

Account Recovery with Expanded Password System

Ifonlytextand fare OK [SUV BIOKUW

to memonze
text/number passwords

{Text Mode)
Recall the remembered
password

J 2

co-o0o

<veco N=

Ox ma

XxXBFr mow

<ozo>a

NAzZZIoaw
+

Low memory ceiling

to lighten the load of

text passwords

 

{Graphics Mode)
Recognize the pictures
remembered mn stones

 

High memory ceiling

 

[RE RET RSI

to make use of
memorized images

{Ongimal Picture Mode)

Recognize the unforgettable
pictures of episodic memories

sRBO yr
L@ S00

afson
fa

 

 

Very high memory cuiding

— Think ofall those adders you have to climb in Donkey Kong 1+) - Relation of Accounts & Passwords

   

* Unique matrices of images allocated to different accounts.

+ Ata glance you will immediately realize what images you should pick
up as your passwords for this or that account. - Relation of Accounts & Passwords

   

* Unique matrices of images allocated to different accounts.

+ Ata glance you will immediately realize what images you should pick
up as your passwords for this or that account.

Additional References


Removal of Passwords and Its Security Effect

Step-by-Step Analysis of Why and How Biometrics Brings Down Security

Negative Security Effect of Biometrics Deployed in Cyberspace

External Body Features Viewed as ‘What We Are’

 History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers - Expanded Password System and Related Issues 

Secret Credenti

 
   
 

Memories

Episodic Memory - Ifonlytextand fare OK [SUV BIOKUW

to memonze
text/number passwords

{Text Mode)
Recall the remembered
password

J 2

co-o0o

<veco N=

Ox ma

XxXBFr mow

<ozo>a

NAzZZIoaw
+

Low memory ceiling

to lighten the load of

text passwords

 

{Graphics Mode)
Recognize the pictures
remembered mn stones

 

High memory ceiling

 

[RE RET RSI

to make use of
memorized images

{Ongimal Picture Mode)

Recognize the unforgettable
pictures of episodic memories

sRBO yr
L@ S00

afson
fa

 

 

Very high memory cuiding

— Think ofall those adders you have to climb in Donkey Kong 1+) - Ifonlytextand fare OK [SUV BIOKUW

to memonze
text/number passwords

{Text Mode)
Recall the remembered
password

J 2

co-o0o

<veco N=

Ox ma

XxXBFr mow

<ozo>a

NAzZZIoaw
+

Low memory ceiling

to lighten the load of

text passwords

 

{Graphics Mode)
Recognize the pictures
remembered mn stones

 

High memory ceiling

 

[RE RET RSI

to make use of
memorized images

{Ongimal Picture Mode)

Recognize the unforgettable
pictures of episodic memories

sRBO yr
L@ S00

afson
fa

 

 

Very high memory cuiding

— Think ofall those adders you have to climb in Donkey Kong 1+)


 

 < Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes - narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space - "below-one" factor authentication

Secret Credenti

 
   
 

Memories

Episodic Memory
Like Share Comment
Comments

More articles from Hitoshi Kokumai

View blog
11 months ago · 2 min. reading time

Some friends directed my attention to this news report - · “Biometric auth bypassed using fingerpri ...

1 year ago · 3 min. reading time

I today take up this The Register report - “Client-side content scanning as an unworkable, insecure ...

1 year ago · 2 min. reading time

The quantum computer held in a bad guy’s hand is indeed a big threat. So is the artificial intellige ...

You may be interested in these jobs

  • Logic Resourcing Ltd

    Business Development Executive

    Found in: beBee S2 UK - 6 days ago


    Logic Resourcing Ltd Newcastle Full time

    If you favour the relationship-building side of business development over hard sales, and you re looking to move away from needless KPI s, then this role, working for one of the area's most reputable Digital Market Agencies, could be for you. · What you ll get · The flexibility ...

  • Workango Ltd

    Retail Branch Manager

    Found in: Jooble GB - 5 days ago


    Workango Ltd Chester, Cheshire

    Friday, November 11, 2022 Permanent Full Time Employers · Retail Branch Manager · Starting Salary: · £19,525per year (OTE £28,000)++ Fantastic Annual bonus based on company performanceYou will work 37.5 hours per week on a rotational shift pattern of 4 days on 3 days off giving ...


  • GPW Recruitment Skelmersdale Full time

    We're looking for talented CNC Miller Setter and Programmer to work for our client, which is a days' role working weekdays, with the potential to change to shifts in the future, if business needs require. · If that's you then you could be exactly what they're looking for. · The R ...