Maximizing Entropy of Secret Credentials while Minimizing Burden on Citizens

There is actually a valid methodology that enable us to maximize the entropy of the secret credentials for solid identity assurance and, at the same time, enables us to minimize the burden of managing the secret credential.

Too good to believe?

It’s real. We only need to follow logic and make use of our own episodic image memory that we had pleasantly acquired years or decades ago. What has firmly survived years and decades deep in our brain is very unlikely to evaporate in coming months and years. We can recognise these emotion-coloured images straight away even when we are caught in panic.

For more, please visit “Dual Causes of Password Predicament” and “Quantum Computing and Password Authentication”

Key References

Bring a healthy second life to legacy password systems

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens

Image-to-Code Conversion by Expanded Password System

Summary and Brief History — Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

Account Recovery with Expanded Password System

Additional References

Removal of Passwords and Its Security Effect

Step-by-Step Analysis of Why and How Biometrics Brings Down Security

Negative Security Effect of Biometrics Deployed in Cyberspace

External Body Features Viewed as ‘What We Are’

History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers — Expanded Password System and Related Issues

< Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes — narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space — “below-one” factor authentication

--

--

--

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Your Data and its Privacy

SHA-256 was first introduced to blockchain technology with the launch of Bitcoin.

The Second Inspector General Election Will Commence October 2020

{UPDATE} Sodoku - 10000 Sodoku Puzzles Hack Free Resources Generator

Special campaign for FLy Reddit

{UPDATE} My Pizza Shop - Pizza Maker Hack Free Resources Generator

Octopus Protocol Whitelist Results

Unlucky 2017: Two Parity Fiascos Explained

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Hitoshi Kokumai

Hitoshi Kokumai

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

More from Medium

‘In Series vs In Parallel’ and ‘2-Layer vs 2-Entrance

They Said a CISO Does What?

Cryptography and how it is used to secure today’s WIFI networks — part 01

Is Google left behind in 2021?