The Tremendous Power of PIN

Can a PIN do what the password cannot do?

‘PIN’ belongs to the secret credential as a numbers-only weak password. Where the PIN is warmly welcomed for providing some security to a passwordless login, we would be watching a ‘password-dependent password-less’ solution. What a feat!

I hear that there are people who do not view the PIN as a member of the password family and allege that the PIN linked to a hardware is more secure than the password not linked to a hardware. It looks another feat! But what would we see if someone starts linking a password to the same kind of hardware?

Where a biometrics is also linked to a hardware together with a PIN in a multi-entrance deployment, the overall security is made even lower than a PIN-only login. It’s no good for the glorious PIN.

All those funny phenomena might have come from a simple mistake of mixing up the discussion of ‘authenticators’ with that of ‘deployment of authenticators’.

‘Authenticators’ and ‘Deployment of Authenticators’

Incidentally, where the ‘passwordless’ means ‘removal of the whole password family including PIN’ from digital identity altogether, the ‘passwordless’ login scheme would be tantamount to an ATM that automatically dispenses your money against your bank card without asking for your PIN. Can it be a great feat by any chance?

Key References

“Removal of Passwords and Its SecurityEffect”

“Aiming to Destroy Democracy?”

Digital Identity for Global Citizens

Image-to-Code Conversion by Expanded Password System

Summary and Brief History — Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

Additional References

Account Recovery with Expanded Password System

External Body Features Viewed as ‘What We Are’

History, Current Status and Future Scenarios of Expanded Password System

Negative Security Effect of Biometrics Deployed in Cyberspace

Availability-First Approach

Update: Questions and Answers — Expanded Password System and Related Issues (30/June/2020)

< Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes — narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space — “below-one” factor authentication

< Media Articles Published in 2020 >

Digital Identity — Anything Used Correctly Is Useful

‘Easy-to-Remember’ is one thing ‘Hard-to-Forget’ is another

Identity Assurance And Teleworking In Pandemic





Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How to Scan GCP Storage Files for Viruses in Go

The Magic of Lattice and The Eye of a Falcon

There trying to delete me out of the system.

Chrome CVE-2022–1096

Apple has fixed a major macOS issue

Hackthebox Valentine Walkthrough (NO Metasploit) OSCP Prep

Alice and Bob go public

Hack The Box — Networked

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Hitoshi Kokumai

Hitoshi Kokumai

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

More from Medium

With Episodic Memory, ‘What We Remember’ Makes ‘What We Are’

A Working Treatise on Non-Repudiation: Guaranteeing (Un)Fraud , Security, Privacy, Compliance, AML…

Asymmetric Key Cryptography (and Hashes)

Cryptography and how it is used to secure today’s WIFI networks — part 01