Torturous login is history
The login can now be joyful, healing and heartening with Expanded Password System that enables us to use our pleasant episodic image memory that had been acquired decades ago and solidly inscribed deep in our brain.
Images of toys, dolls, dogs and cats, for example, that our children used to love for years would jump into our eye even when we are placed in heavy pressure and caught in severe panic. It never fails to brings us joy and comfort.
Furthermore, Expanded Password System brings us such desirable merits as
enabling us to manage dozens of different secret credentials effortlessly –https://www.linkedin.com/posts/hitoshikokumai_identity-authentication-password-activity-6794150779293982720-VZzH
reducing the burden of managing the correspondence between the accounts and the passwords — https://www.linkedin.com/posts/hitoshikokumai_identity-authentication-password-activity-6794149779996844032-LTU_
At our website, you can freely experience the on-the-fly re-generation of high-entropy text-passwords and cryptographic keys by Expanded Password System. https://www.mnemonicidentitysolutions.com/
Key References
Account Recovery with Expanded Password System
For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)
What We Know for Certain about Authentication Factors
Digital Identity for Global Citizens
Image-to-Code Conversion by Expanded Password System
Summary and Brief History — Expanded Password System
Proposition on How to Build Sustainable Digital Identity Platform
Additional References
Removal of Passwords and Its Security Effect
Negative Security Effect of Biometrics Deployed in Cyberspace
External Body Features Viewed as ‘What We Are’
History, Current Status and Future Scenarios of Expanded Password System
Update: Questions and Answers — Expanded Password System and Related Issues
< Videos on YouTube>
Slide: Outline of Expanded Password System (3minutes 2seconds)
Digital Identity for Global Citizens (10minutes — narrated)
Demo: Simplified Operation on Smartphone for consumers (1m41s)
Demo: High-Security Operation on PC for managers (4m28s)
Demo: Simple capture and registration of pictures by users (1m26s)
Slide: Biometrics in Cyber Space — “below-one” factor authentication