Torturous login is history

The login can now be joyful, healing and heartening with Expanded Password System that enables us to use our pleasant episodic image memory that had been acquired decades ago and solidly inscribed deep in our brain.

Images of toys, dolls, dogs and cats, for example, that our children used to love for years would jump into our eye even when we are placed in heavy pressure and caught in severe panic. It never fails to brings us joy and comfort.

Furthermore, Expanded Password System brings us such desirable merits as

enabling us to manage dozens of different secret credentials effortlessly –https://www.linkedin.com/posts/hitoshikokumai_identity-authentication-password-activity-6794150779293982720-VZzH

reducing the burden of managing the correspondence between the accounts and the passwords — https://www.linkedin.com/posts/hitoshikokumai_identity-authentication-password-activity-6794149779996844032-LTU_

At our website, you can freely experience the on-the-fly re-generation of high-entropy text-passwords and cryptographic keys by Expanded Password System. https://www.mnemonicidentitysolutions.com/

Key References

Account Recovery with Expanded Password System

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens

Image-to-Code Conversion by Expanded Password System

Summary and Brief History — Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

Additional References

Removal of Passwords and Its Security Effect
Negative Security Effect of Biometrics Deployed in Cyberspace

External Body Features Viewed as ‘What We Are’

History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers — Expanded Password System and Related Issues

< Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes — narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space — “below-one” factor authentication

--

--

--

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Security, Spam and the Future of Email

🎰 — Token Based Gambling Games

DNS Resolution: Resolving a domain name to an IP address

Decentralized communications and security solutions.

Economics and distribution of Binance8 tokens

Decentralizing the Front Page of the Internet

Reflected XSS On target.com

Striking Case of Misperception about Secret Credential

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Hitoshi Kokumai

Hitoshi Kokumai

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

More from Medium

Elliptic Curve Cryptography (ECC)

With Episodic Memory, ‘What We Remember’ Makes ‘What We Are’

CS373 Spring 2022: John Powers

Celo Contract Subgraph Syncing Failure and Debugging