Try and experience the simulation of ‘On-the-fly Key Regeneration’ by yourself
With the trial course of ‘Image-to-Code Conversion by Expanded Password System’ provided at our new website https://www.mnemonicidentitysolutions.com/, you can try a simulation of having cryptographic keys re-generated on the fly from your image memory.
Select the same images again and notice the same code is generated, even when the images are shuffled, the same code is generated for the same set of images. This high-entropy code could be used as a mighty seed of cryptographic key. Imagine that a key opens a digital lock, the key is never stored *anywhere*, it is generated on each invocation.
More information is provided in this article — “Account Recovery with Expanded Password System” https://www.linkedin.com/pulse/account-recovery-expanded-password-system-hitoshi-kokumai/
Incidentally, besides the new corporate website, we now have our company page on LinkedIn at https://www.linkedin.com/company/mnemonic-identity-solutions-limited/
Key References
Account Recovery with Expanded Password System
For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)
What We Know for Certain about Authentication Factors
Digital Identity for Global Citizens
Image-to-Code Conversion by Expanded Password System
Summary and Brief History — Expanded Password System
Proposition on How to Build Sustainable Digital Identity Platform
Additional References
Removal of Passwords and Its Security Effect
Negative Security Effect of Biometrics Deployed in Cyberspace
External Body Features Viewed as ‘What We Are’
History, Current Status and Future Scenarios of Expanded Password System
Update: Questions and Answers — Expanded Password System and Related Issues
< Videos on YouTube>
Slide: Outline of Expanded Password System (3minutes 2seconds)
Digital Identity for Global Citizens (10minutes — narrated)
Demo: Simplified Operation on Smartphone for consumers (1m41s)
Demo: High-Security Operation on PC for managers (4m28s)
Demo: Simple capture and registration of pictures by users (1m26s)
Slide: Biometrics in Cyber Space — “below-one” factor authentication