Schematic Aid to Help Understand ‘Multi-Layer’ and ‘Multi-Entrance

Hitoshi Kokumai
1 min readNov 8, 2023

--

In my latest post (*1), I referred to MFA which system designers of identity security systems often incorporate into their systems without clear knowledge of whether it is deployed in a multi-layer/in-series/conjunction formation or deployed in a multi-entrance/in-parallel/disjunction formation.

I today offer a schematic explanation below to help understand the opposite security effects of ‘multi-layer’ and ‘multi-entrance’ deployments.

*1 “Which MFA Configuration Adopted at OKTA?” (6Nov2023) https://www.linkedin.com/posts/hitoshikokumai_okta-hack-blamed-on-employee-using-personal-activity-7127186788212740097-0uHK

To the best of my knowledge, most of the MFA sold on the market involve probabilistic biometrics as an authentication factor and deployed in a security-destroying multi-entrance formation, on which I wrote a lot of comments (*2).

*2 “Probabilistic Biometrics Unravelled : How it brings down identity security” https://www.linkedin.com/pulse/biometrics-unravelled-password-dependent-hitoshi-kokumai/

Should you be trapped in a pitfall of wrongly deployed biometrics, I am always ready to help you to get out of the quagmire.

--

--

Hitoshi Kokumai
Hitoshi Kokumai

Written by Hitoshi Kokumai

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

No responses yet