Solid Secret Credential for Blockchain

Today’s topic is this report — “How blockchain technology can create secure digital identities” https://ibsintelligence.com/blogs/how-blockchain-technology-can-create-secure-digital-identities/

The title of this report reads “How blockchain technology can create secure digital identities”. I would have made it read “How blockchain technology, when it comes with solid secret credentials, can create secure digital identities”.

“How come?”

The lock authenticates the key and the key authenticates the lock. But neither the key nor the lock authenticates the person who holds the lock or key. It is imperative to check the secret credential of the person who claims to be the owner of the lock or key. It’s so plain and simple.

“Conventional text passwords are too hard to manage and yet too vulnerable to abuse?”

Then, why not look at non-text secret credentials?

For more, please refer to “Why the password isn’t an enemy of people”

Key References

Bring a healthy second life to legacy password systems

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens

Image-to-Code Conversion by Expanded Password System

Summary and Brief History — Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

Account Recovery with Expanded Password System

Additional References

Removal of Passwords and Its Security Effect

Step-by-Step Analysis of Why and How Biometrics Brings Down Security

Negative Security Effect of Biometrics Deployed in Cyberspace

External Body Features Viewed as ‘What We Are’

History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers — Expanded Password System and Related Issues

< Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes — narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space — “below-one” factor authentication

--

--

--

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Anyswap Multichain Router V3 is Free for ONE More Month!

NFTY Labs — Discord Bot Release

Cleaning Your Memory FoamMattress https://t.co/As6snjz1Mi

Guest Post: Ethereum Berlin Upgrade Announcement

IOTA and CYBERCRYPT Announce New Lightweight Trinary Cryptographic Hash Function

10 Reasons to Choose Veeam to Protect Your Data on AWS

Twitter contest results

Archive 202 1— Comments Posted since January 2021 on Digital Identity and Threats to It

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Hitoshi Kokumai

Hitoshi Kokumai

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

More from Medium

All In on Godot — The SceneGate 2.0 Problem

Fundamental Difference between ‘Authentication’ and ‘Identification

IT #shorts How to configure our devices (virtual) + small talk about routing

Some Thoughts on Deterministic Netcode in GameMaker