Maximizing Entropy of Secret Credentials while Minimizing Burden on Citizens

There is actually a valid methodology that enable us to maximize the entropy of the secret credentials for solid identity assurance and, at the same time, enables us to minimize the burden of managing the secret credential.

Too good to believe?

It’s real. We only need to follow logic and make use of our own episodic image memory that we had pleasantly acquired years or decades ago. What has firmly survived years and decades deep in our brain is very unlikely to evaporate in coming months and years. We can recognise these emotion-coloured images straight away even when we are caught in panic.

For more, please visit “Dual Causes of Password Predicament” and “Quantum Computing and Password Authentication”

Key References

Bring a healthy second life to legacy password systems

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens

Image-to-Code Conversion by Expanded Password System

Summary and Brief History — Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

Account Recovery with Expanded Password System

Additional References

Removal of Passwords and Its Security Effect

Step-by-Step Analysis of Why and How Biometrics Brings Down Security

Negative Security Effect of Biometrics Deployed in Cyberspace

External Body Features Viewed as ‘What We Are’

History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers — Expanded Password System and Related Issues

< Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes — narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space — “below-one” factor authentication

--

--

--

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Phishing 101 at the School of Hard Knocks

Part of BGSU's messaging to students and faculty about the new 2FA requirements for university portal access.

How to Protect your Network from BGP Attacks with BGPAlerter

NOVEMBER MONTHLY COMMUNITY UPDATE; App Release on Playstore!

‘In Series vs In Parallel’ and ‘2-Layer vs 2-Entrance

Truly Big Threat

The HR Guide to Employee Data Protection

The HR Guide to Employee Data Protection

CoinEx Introduction: Anti-Phishing Protection for Enhanced Account Security

Cyber talents Digital Forensics(Listen Carefully) write-up

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Hitoshi Kokumai

Hitoshi Kokumai

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

More from Medium

With Episodic Memory, ‘What We Remember’ Makes ‘What We Are’

ODROID-HC4 64 Camera NVR

Protecting the All of the Layers Within a Server

CS373 Spring 2022: John Powers