Hitoshi Kokumai

4 months ago · 2 min. reading time · visibility ~10 ·

chat Contact the author

thumb_up Relevant message Comment

Try and experience the simulation of ‘On-the-fly Key Regeneration’ by yourself

On-the-Fly Regeneration of Cryptographic Keys

ROS
LJ 00
afson xtyax9d4294dIelEYVz
BRus wo/gadieowlUx093/x7
oREeBL ?2IwbleB4x09xIoPxLxeo
dty YDidex&&xeigo@y...

With the trial course of ‘Image-to-Code Conversion by Expanded Password System’ provided at our new website https://www.mnemonicidentitysolutions.com/, you can try a simulation of having cryptographic keys re-generated on the fly from your image memory.

Select the same images again and notice the same code is generated, even when the images are shuffled, the same code is generated for the same set of images. This high-entropy code could be used as a mighty seed of cryptographic key. Imagine that a key opens a digital lock, the key is never stored *anywhere*, it is generated on each invocation.

More information is provided in this article -  “Account Recovery with Expanded Password System”   https://www.linkedin.com/pulse/account-recovery-expanded-password-system-hitoshi-kokumai/

Incidentally, besides the new corporate website, we now have our company page on LinkedIn at https://www.linkedin.com/company/mnemonic-identity-solutions-limited/

 

“Expanded Password System

wane = Only I can select all of
BS] them correctly

Broader choices with both images and characters accepted

i

 

 

 

 

Easy to manage relenons between accounts and corresponding passwords.

&

Torturous login is history. Login is now comfortable, relaxing and healing

BO
250
08

Key References 
 

Account Recovery with Expanded Password System

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens

Image-to-Code Conversion by Expanded Password System

Summary and Brief History - Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

A

 

 

 

It's a no

Additional References
 

Removal of Passwords and Its Security Effect
Negative Security Effect of Biometrics Deployed in Cyberspace

External Body Features Viewed as ‘What We Are’

 History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers - Expanded Password System and Related Issues 

 

Secret Credenti

 
   
 

Memories

Episodic Memory


 

 < Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes - narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space - "below-one" factor authentication

 

thumb_up Relevant message Comment
Comments

Zacharias 🐝 Voulgaris

4 months ago #1

Man, if you were to work with us on this stuff, the world would experience a renaissance in Cybersecurity…

More articles from Hitoshi Kokumai

View blog
1 month ago · 2 min. reading time

Dual Causes of Password Predicament

Our password headache may well be the consequence ...

1 month ago · 2 min. reading time

Quantum Computing and Identity Assurance

Bad guys, who have a quantum computer at hand, wou ...

1 month ago · 2 min. reading time

Advantage of Biometrics Security to Criminals

Taken up today is this TechRepublic report on voic ...