Maximizing Entropy of Secret Credentials while Minimizing Burden on Citizens
There is actually a valid methodology that enable us to maximize the entropy of the secret credentials for solid identity assurance and, at the same time, enables us to minimize the burden of managing the secret credential.
Too good to believe?
It’s real. We only need to follow logic and make use of our own episodic image memory that we had pleasantly acquired years or decades ago. What has firmly survived years and decades deep in our brain is very unlikely to evaporate in coming months and years. We can recognise these emotion-coloured images straight away even when we are caught in panic.
For more, please visit “Dual Causes of Password Predicament” and “Quantum Computing and Password Authentication”
Key References
Bring a healthy second life to legacy password systems
For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)
What We Know for Certain about Authentication Factors
Digital Identity for Global Citizens
Image-to-Code Conversion by Expanded Password System
Summary and Brief History — Expanded Password System
Proposition on How to Build Sustainable Digital Identity Platform
Account Recovery with Expanded Password System
Additional References
Removal of Passwords and Its Security Effect
Step-by-Step Analysis of Why and How Biometrics Brings Down Security
Negative Security Effect of Biometrics Deployed in Cyberspace
External Body Features Viewed as ‘What We Are’
History, Current Status and Future Scenarios of Expanded Password System
Update: Questions and Answers — Expanded Password System and Related Issues
< Videos on YouTube>
Slide: Outline of Expanded Password System (3minutes 2seconds)
Digital Identity for Global Citizens (10minutes — narrated)
Demo: Simplified Operation on Smartphone for consumers (1m41s)
Demo: High-Security Operation on PC for managers (4m28s)
Demo: Simple capture and registration of pictures by users (1m26s)
Slide: Biometrics in Cyber Space — “below-one” factor authentication