際際滷shows by User: HitoshiKokumai / http://www.slideshare.net/images/logo.gif 際際滷shows by User: HitoshiKokumai / Fri, 27 Oct 2023 06:34:17 GMT 際際滷Share feed for 際際滷shows by User: HitoshiKokumai Image-to-Code Converter 31July2023.pptx /slideshow/imagetocode-converter-31july2023pptx/262784180 image-to-codeconverter31july2023-231027063417-1358e35e
Image data of a picture that the user picks up will be hashed by the likes of Sha256 Sha-hashed data of the selected several pictures will be put together and hashed by the likes of Argon2id The Argon2id-hashed data will be outputted as the code to be used as a password, a crypto key, a master-password or something else depending on use cases. With unique salts added, a number of derivative codes can be automatically generated from the first code in a single process ]]>

Image data of a picture that the user picks up will be hashed by the likes of Sha256 Sha-hashed data of the selected several pictures will be put together and hashed by the likes of Argon2id The Argon2id-hashed data will be outputted as the code to be used as a password, a crypto key, a master-password or something else depending on use cases. With unique salts added, a number of derivative codes can be automatically generated from the first code in a single process ]]>
Fri, 27 Oct 2023 06:34:17 GMT /slideshow/imagetocode-converter-31july2023pptx/262784180 HitoshiKokumai@slideshare.net(HitoshiKokumai) Image-to-Code Converter 31July2023.pptx HitoshiKokumai Image data of a picture that the user picks up will be hashed by the likes of Sha256 Sha-hashed data of the selected several pictures will be put together and hashed by the likes of Argon2id The Argon2id-hashed data will be outputted as the code to be used as a password, a crypto key, a master-password or something else depending on use cases. With unique salts added, a number of derivative codes can be automatically generated from the first code in a single process <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/image-to-codeconverter31july2023-231027063417-1358e35e-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Image data of a picture that the user picks up will be hashed by the likes of Sha256 Sha-hashed data of the selected several pictures will be put together and hashed by the likes of Argon2id The Argon2id-hashed data will be outputted as the code to be used as a password, a crypto key, a master-password or something else depending on use cases. With unique salts added, a number of derivative codes can be automatically generated from the first code in a single process
Image-to-Code Converter 31July2023.pptx from Hitoshi Kokumai
]]>
92 0 https://cdn.slidesharecdn.com/ss_thumbnails/image-to-codeconverter31july2023-231027063417-1358e35e-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
More Issues on Digital Identity (24Feb2023) /slideshow/more-issues-on-digital-identity-24feb2023/256124023 moreissuesondigitalidentity24feb2023-230226080130-d957fea3
Here are the discussions that are mentioned in P19 of "Fend Off Cyberattack with Episodic Memory" /HitoshiKokumai/fend-off-cyberattack-with-episodic-memory-24feb2023 ]]>

Here are the discussions that are mentioned in P19 of "Fend Off Cyberattack with Episodic Memory" /HitoshiKokumai/fend-off-cyberattack-with-episodic-memory-24feb2023 ]]>
Sun, 26 Feb 2023 08:01:30 GMT /slideshow/more-issues-on-digital-identity-24feb2023/256124023 HitoshiKokumai@slideshare.net(HitoshiKokumai) More Issues on Digital Identity (24Feb2023) HitoshiKokumai Here are the discussions that are mentioned in P19 of "Fend Off Cyberattack with Episodic Memory" /HitoshiKokumai/fend-off-cyberattack-with-episodic-memory-24feb2023 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/moreissuesondigitalidentity24feb2023-230226080130-d957fea3-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Here are the discussions that are mentioned in P19 of &quot;Fend Off Cyberattack with Episodic Memory&quot; /HitoshiKokumai/fend-off-cyberattack-with-episodic-memory-24feb2023
More Issues on Digital Identity (24Feb2023) from Hitoshi Kokumai
]]>
30 0 https://cdn.slidesharecdn.com/ss_thumbnails/moreissuesondigitalidentity24feb2023-230226080130-d957fea3-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Fend Off Cyberattack with Episodic Memory (24Feb2023) /slideshow/fend-off-cyberattack-with-episodic-memory-24feb2023/256122774 fendoffcyberattackwithepisodicmemory24feb2023v5-230226072922-c85a489f
This is a slide with script presented at Conference On Cyber Security In Financial Institutions by Banking Association of Central and East Europe on 24th February 2023 - https://baceeconference.com/cyber-security-conference/ The issues mentioned on P19 are discussed here - "More Issues on Digital Identity" /HitoshiKokumai/more-issues-on-digital-identity-24feb2023 ]]>

This is a slide with script presented at Conference On Cyber Security In Financial Institutions by Banking Association of Central and East Europe on 24th February 2023 - https://baceeconference.com/cyber-security-conference/ The issues mentioned on P19 are discussed here - "More Issues on Digital Identity" /HitoshiKokumai/more-issues-on-digital-identity-24feb2023 ]]>
Sun, 26 Feb 2023 07:29:22 GMT /slideshow/fend-off-cyberattack-with-episodic-memory-24feb2023/256122774 HitoshiKokumai@slideshare.net(HitoshiKokumai) Fend Off Cyberattack with Episodic Memory (24Feb2023) HitoshiKokumai This is a slide with script presented at Conference On Cyber Security In Financial Institutions by Banking Association of Central and East Europe on 24th February 2023 - https://baceeconference.com/cyber-security-conference/ The issues mentioned on P19 are discussed here - "More Issues on Digital Identity" /HitoshiKokumai/more-issues-on-digital-identity-24feb2023 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fendoffcyberattackwithepisodicmemory24feb2023v5-230226072922-c85a489f-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is a slide with script presented at Conference On Cyber Security In Financial Institutions by Banking Association of Central and East Europe on 24th February 2023 - https://baceeconference.com/cyber-security-conference/ The issues mentioned on P19 are discussed here - &quot;More Issues on Digital Identity&quot; /HitoshiKokumai/more-issues-on-digital-identity-24feb2023
Fend Off Cyberattack with Episodic Memory (24Feb2023) from Hitoshi Kokumai
]]>
70 0 https://cdn.slidesharecdn.com/ss_thumbnails/fendoffcyberattackwithepisodicmemory24feb2023v5-230226072922-c85a489f-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
際際滷 Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022 /slideshow/slide-share-updated-fend-off-cybercrime-with-episodic-memory-29aug2022/252754982 slideshareupdated-fendoffcybercrimewithepisodicmemory29aug2022-220830041052-422f39ce
Digital Transformation would be a pipe dream if its not supported by a practicable means of identity authentication that is secure and yet stress-free, desirably giving us joy and fun Our company, Mnemonic Identity Solutions Limited (MIS), set up in August 2020 in United Kingdom for global operations, is a Start-Up as a corporation but its more than a Start-Up as a business entity. We set it up in order to globally expand what its predecessor named Mnemonic Security, Inc. started in Japan in late 2001. We have a 20 years long pre-history of technology development, product making and commercial implementations with some US$1 million sales. Our champion use case is Japanese Army deploying our product on field vehicles since 2013 and still using it. At MIS we are now going to help global citizens fend off cybercrime by their non-volatile episodic memory, with the values of democracy. Fend Off Cybercrime by Episodic Memory (90 seconds) https://youtu.be/T1nrAlmytWE MnemonicGateways (90 seconds) https://youtu.be/0nNIU4uYl94 High-Security Operation on PC for managers (4m28s) https://www.youtube.com/watch?v=UO_1fEp2jFo Power of Citizens Episodic Memory https://www.linkedin.com/pulse/power-citizens-episodic-memory-hitoshi-kokumai/ LOSS of Security Taken for GAIN of Security https://www.linkedin.com/pulse/loss-security-taken-gain-hitoshi-kokumai/ ]]>

Digital Transformation would be a pipe dream if its not supported by a practicable means of identity authentication that is secure and yet stress-free, desirably giving us joy and fun Our company, Mnemonic Identity Solutions Limited (MIS), set up in August 2020 in United Kingdom for global operations, is a Start-Up as a corporation but its more than a Start-Up as a business entity. We set it up in order to globally expand what its predecessor named Mnemonic Security, Inc. started in Japan in late 2001. We have a 20 years long pre-history of technology development, product making and commercial implementations with some US$1 million sales. Our champion use case is Japanese Army deploying our product on field vehicles since 2013 and still using it. At MIS we are now going to help global citizens fend off cybercrime by their non-volatile episodic memory, with the values of democracy. Fend Off Cybercrime by Episodic Memory (90 seconds) https://youtu.be/T1nrAlmytWE MnemonicGateways (90 seconds) https://youtu.be/0nNIU4uYl94 High-Security Operation on PC for managers (4m28s) https://www.youtube.com/watch?v=UO_1fEp2jFo Power of Citizens Episodic Memory https://www.linkedin.com/pulse/power-citizens-episodic-memory-hitoshi-kokumai/ LOSS of Security Taken for GAIN of Security https://www.linkedin.com/pulse/loss-security-taken-gain-hitoshi-kokumai/ ]]>
Tue, 30 Aug 2022 04:10:52 GMT /slideshow/slide-share-updated-fend-off-cybercrime-with-episodic-memory-29aug2022/252754982 HitoshiKokumai@slideshare.net(HitoshiKokumai) 際際滷 Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022 HitoshiKokumai Digital Transformation would be a pipe dream if its not supported by a practicable means of identity authentication that is secure and yet stress-free, desirably giving us joy and fun Our company, Mnemonic Identity Solutions Limited (MIS), set up in August 2020 in United Kingdom for global operations, is a Start-Up as a corporation but its more than a Start-Up as a business entity. We set it up in order to globally expand what its predecessor named Mnemonic Security, Inc. started in Japan in late 2001. We have a 20 years long pre-history of technology development, product making and commercial implementations with some US$1 million sales. Our champion use case is Japanese Army deploying our product on field vehicles since 2013 and still using it. At MIS we are now going to help global citizens fend off cybercrime by their non-volatile episodic memory, with the values of democracy. < Video Link > Fend Off Cybercrime by Episodic Memory (90 seconds) https://youtu.be/T1nrAlmytWE MnemonicGateways (90 seconds) https://youtu.be/0nNIU4uYl94 High-Security Operation on PC for managers (4m28s) https://www.youtube.com/watch?v=UO_1fEp2jFo < Document Link > Power of Citizens Episodic Memory https://www.linkedin.com/pulse/power-citizens-episodic-memory-hitoshi-kokumai/ LOSS of Security Taken for GAIN of Security https://www.linkedin.com/pulse/loss-security-taken-gain-hitoshi-kokumai/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/slideshareupdated-fendoffcybercrimewithepisodicmemory29aug2022-220830041052-422f39ce-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Digital Transformation would be a pipe dream if its not supported by a practicable means of identity authentication that is secure and yet stress-free, desirably giving us joy and fun Our company, Mnemonic Identity Solutions Limited (MIS), set up in August 2020 in United Kingdom for global operations, is a Start-Up as a corporation but its more than a Start-Up as a business entity. We set it up in order to globally expand what its predecessor named Mnemonic Security, Inc. started in Japan in late 2001. We have a 20 years long pre-history of technology development, product making and commercial implementations with some US$1 million sales. Our champion use case is Japanese Army deploying our product on field vehicles since 2013 and still using it. At MIS we are now going to help global citizens fend off cybercrime by their non-volatile episodic memory, with the values of democracy. Fend Off Cybercrime by Episodic Memory (90 seconds) https://youtu.be/T1nrAlmytWE MnemonicGateways (90 seconds) https://youtu.be/0nNIU4uYl94 High-Security Operation on PC for managers (4m28s) https://www.youtube.com/watch?v=UO_1fEp2jFo Power of Citizens Episodic Memory https://www.linkedin.com/pulse/power-citizens-episodic-memory-hitoshi-kokumai/ LOSS of Security Taken for GAIN of Security https://www.linkedin.com/pulse/loss-security-taken-gain-hitoshi-kokumai/
際際滷 Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022 from Hitoshi Kokumai
]]>
444 0 https://cdn.slidesharecdn.com/ss_thumbnails/slideshareupdated-fendoffcybercrimewithepisodicmemory29aug2022-220830041052-422f39ce-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Fend Off Cybercrime with Episodic Memory /slideshow/fend-off-cybercrime-with-episodic-memory-29july2022pdf/252357084 slideshare-fendoffcybercrimewithepisodicmemory29july2022-220729064823-314b2934
An updated version is available from 30/Aug/2022 at /HitoshiKokumai/slide-share-updated-fend-off-cybercrime-with-episodic-memory-29aug2022 .................................................. Digital Transformation would be a pipe dream if its not supported by a practicable means of identity authentication that is secure and yet stress-free, desirably giving us joy and fun - Video 90-second introductory video; Fend Off Cybercrime by Episodic Memory(4/Feb/2022) https://youtu.be/T1nrAlmytWE 90-second demonstration video: Mnemonic Gateways (10/Feb/2022) https://youtu.be/0nNIU4uYl94 - Blog collections Power of Citizens Episodic Memory https://www.linkedin.com/pulse/power-citizens-episodic-memory-hitoshi-kokumai/ LOSS of Security Taken for GAIN of Security https://www.linkedin.com/pulse/loss-security-taken-gain-hitoshi-kokumai/ Biometrics Unravelled | password-dependent password-killer https://www.linkedin.com/pulse/biometrics-unravelled-password-dependent-hitoshi-kokumai/ - Hitoshi Kokumai's profile https://www.linkedin.com/in/hitoshikokumai/ ]]>

An updated version is available from 30/Aug/2022 at /HitoshiKokumai/slide-share-updated-fend-off-cybercrime-with-episodic-memory-29aug2022 .................................................. Digital Transformation would be a pipe dream if its not supported by a practicable means of identity authentication that is secure and yet stress-free, desirably giving us joy and fun - Video 90-second introductory video; Fend Off Cybercrime by Episodic Memory(4/Feb/2022) https://youtu.be/T1nrAlmytWE 90-second demonstration video: Mnemonic Gateways (10/Feb/2022) https://youtu.be/0nNIU4uYl94 - Blog collections Power of Citizens Episodic Memory https://www.linkedin.com/pulse/power-citizens-episodic-memory-hitoshi-kokumai/ LOSS of Security Taken for GAIN of Security https://www.linkedin.com/pulse/loss-security-taken-gain-hitoshi-kokumai/ Biometrics Unravelled | password-dependent password-killer https://www.linkedin.com/pulse/biometrics-unravelled-password-dependent-hitoshi-kokumai/ - Hitoshi Kokumai's profile https://www.linkedin.com/in/hitoshikokumai/ ]]>
Fri, 29 Jul 2022 06:48:23 GMT /slideshow/fend-off-cybercrime-with-episodic-memory-29july2022pdf/252357084 HitoshiKokumai@slideshare.net(HitoshiKokumai) Fend Off Cybercrime with Episodic Memory HitoshiKokumai An updated version is available from 30/Aug/2022 at /HitoshiKokumai/slide-share-updated-fend-off-cybercrime-with-episodic-memory-29aug2022 .................................................. Digital Transformation would be a pipe dream if its not supported by a practicable means of identity authentication that is secure and yet stress-free, desirably giving us joy and fun <Reference URL> - Video 90-second introductory video; Fend Off Cybercrime by Episodic Memory(4/Feb/2022) https://youtu.be/T1nrAlmytWE 90-second demonstration video: Mnemonic Gateways (10/Feb/2022) https://youtu.be/0nNIU4uYl94 - Blog collections Power of Citizens Episodic Memory https://www.linkedin.com/pulse/power-citizens-episodic-memory-hitoshi-kokumai/ LOSS of Security Taken for GAIN of Security https://www.linkedin.com/pulse/loss-security-taken-gain-hitoshi-kokumai/ Biometrics Unravelled | password-dependent password-killer https://www.linkedin.com/pulse/biometrics-unravelled-password-dependent-hitoshi-kokumai/ - Hitoshi Kokumai's profile https://www.linkedin.com/in/hitoshikokumai/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/slideshare-fendoffcybercrimewithepisodicmemory29july2022-220729064823-314b2934-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> An updated version is available from 30/Aug/2022 at /HitoshiKokumai/slide-share-updated-fend-off-cybercrime-with-episodic-memory-29aug2022 .................................................. Digital Transformation would be a pipe dream if its not supported by a practicable means of identity authentication that is secure and yet stress-free, desirably giving us joy and fun - Video 90-second introductory video; Fend Off Cybercrime by Episodic Memory(4/Feb/2022) https://youtu.be/T1nrAlmytWE 90-second demonstration video: Mnemonic Gateways (10/Feb/2022) https://youtu.be/0nNIU4uYl94 - Blog collections Power of Citizens Episodic Memory https://www.linkedin.com/pulse/power-citizens-episodic-memory-hitoshi-kokumai/ LOSS of Security Taken for GAIN of Security https://www.linkedin.com/pulse/loss-security-taken-gain-hitoshi-kokumai/ Biometrics Unravelled | password-dependent password-killer https://www.linkedin.com/pulse/biometrics-unravelled-password-dependent-hitoshi-kokumai/ - Hitoshi Kokumai&#39;s profile https://www.linkedin.com/in/hitoshikokumai/
Fend Off Cybercrime with Episodic Memory from Hitoshi Kokumai
]]>
107 0 https://cdn.slidesharecdn.com/ss_thumbnails/slideshare-fendoffcybercrimewithepisodicmemory29july2022-220729064823-314b2934-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Bring healthy second life to legacy password system /slideshow/bring-healthy-second-life-to-legacy-password-system/250028211 bringhealthysecondlifetolegacypasswordsystem-210823023355
Passwords are said to be too vulnerable to theft and too hard to manage. Many people sound as if the password were an enemy of people. Some people even allege that removal of the password would improve the security of digital identity. Let us examine how valid such views are. More information at https://www.mnemonicidentitysolutions.com/ ]]>

Passwords are said to be too vulnerable to theft and too hard to manage. Many people sound as if the password were an enemy of people. Some people even allege that removal of the password would improve the security of digital identity. Let us examine how valid such views are. More information at https://www.mnemonicidentitysolutions.com/ ]]>
Mon, 23 Aug 2021 02:33:55 GMT /slideshow/bring-healthy-second-life-to-legacy-password-system/250028211 HitoshiKokumai@slideshare.net(HitoshiKokumai) Bring healthy second life to legacy password system HitoshiKokumai Passwords are said to be too vulnerable to theft and too hard to manage. Many people sound as if the password were an enemy of people. Some people even allege that removal of the password would improve the security of digital identity. Let us examine how valid such views are. More information at https://www.mnemonicidentitysolutions.com/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bringhealthysecondlifetolegacypasswordsystem-210823023355-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Passwords are said to be too vulnerable to theft and too hard to manage. Many people sound as if the password were an enemy of people. Some people even allege that removal of the password would improve the security of digital identity. Let us examine how valid such views are. More information at https://www.mnemonicidentitysolutions.com/
Bring healthy second life to legacy password system from Hitoshi Kokumai
]]>
143 1 https://cdn.slidesharecdn.com/ss_thumbnails/bringhealthysecondlifetolegacypasswordsystem-210823023355-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Intriguing Evlolution from One to Two and Back to One /slideshow/intriguing-evlolution-from-one-to-two-and-back-to-one/138790918 intriguingevlolution-190330055130
What happens when something insufficient is not enhanced but removed? Suppliers of security solutions should be more mindful of what they are doing.]]>

What happens when something insufficient is not enhanced but removed? Suppliers of security solutions should be more mindful of what they are doing.]]>
Sat, 30 Mar 2019 05:51:30 GMT /slideshow/intriguing-evlolution-from-one-to-two-and-back-to-one/138790918 HitoshiKokumai@slideshare.net(HitoshiKokumai) Intriguing Evlolution from One to Two and Back to One HitoshiKokumai What happens when something insufficient is not enhanced but removed? Suppliers of security solutions should be more mindful of what they are doing. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/intriguingevlolution-190330055130-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> What happens when something insufficient is not enhanced but removed? Suppliers of security solutions should be more mindful of what they are doing.
Intriguing Evlolution from One to Two and Back to One from Hitoshi Kokumai
]]>
192 2 https://cdn.slidesharecdn.com/ss_thumbnails/intriguingevlolution-190330055130-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Predicament by Text-Only Password Systems /slideshow/cyber-predicament-by-textonly-password-systems/127664585 cyberpredicamentbytext-onlypws-190110005804
The current password predicament is caused by the conventional password systems that do not allow people to use anything but numbers/characters. But we do not have to despair. There exists an incredibly simple solution to it, though little known to the public as yet.]]>

The current password predicament is caused by the conventional password systems that do not allow people to use anything but numbers/characters. But we do not have to despair. There exists an incredibly simple solution to it, though little known to the public as yet.]]>
Thu, 10 Jan 2019 00:58:04 GMT /slideshow/cyber-predicament-by-textonly-password-systems/127664585 HitoshiKokumai@slideshare.net(HitoshiKokumai) Cyber Predicament by Text-Only Password Systems HitoshiKokumai The current password predicament is caused by the conventional password systems that do not allow people to use anything but numbers/characters. But we do not have to despair. There exists an incredibly simple solution to it, though little known to the public as yet. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cyberpredicamentbytext-onlypws-190110005804-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The current password predicament is caused by the conventional password systems that do not allow people to use anything but numbers/characters. But we do not have to despair. There exists an incredibly simple solution to it, though little known to the public as yet.
Cyber Predicament by Text-Only Password Systems from Hitoshi Kokumai
]]>
152 2 https://cdn.slidesharecdn.com/ss_thumbnails/cyberpredicamentbytext-onlypws-190110005804-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Updated: Presentation with Scripts at CIW2018 /slideshow/updated-presentation-with-scripts-at-ciw2018-122968273/122968273 presentationwithnarrationscriptciw2018-181114060101
The volitional password is absolutely necessary where the democratic values matter (*1). whereas the conventional password is hated as everybody agrees. This observations lead us to conclude that we should agree that we have to find the sort of password system that is not hated. Logic tells that there can be no other choice. We came up with the way out. It is Expanded Password System that accepts images as well as texts/characters. This is the updated version of the slide used for the presentation on 30/Oct/2018 at KuppingerCole's Consumer Identity World Europe 2018 in Amsterdam (*2). P20 for "Deterrence to Targeted Phishing" has been added. *1 Where authentication of our identity happens without our knowledge or against our will, it is a 1984-like Dystopia. *2 https://www.kuppingercole.com/events/ciweu2018/agenda_overview 80-second video https://www.youtube.com/watch?v=ypOnKTTwRJg&feature=youtu.be 30-second video https://www.youtube.com/watch?v=7UAgtPtmUbk&feature=youtu.be ]]>

The volitional password is absolutely necessary where the democratic values matter (*1). whereas the conventional password is hated as everybody agrees. This observations lead us to conclude that we should agree that we have to find the sort of password system that is not hated. Logic tells that there can be no other choice. We came up with the way out. It is Expanded Password System that accepts images as well as texts/characters. This is the updated version of the slide used for the presentation on 30/Oct/2018 at KuppingerCole's Consumer Identity World Europe 2018 in Amsterdam (*2). P20 for "Deterrence to Targeted Phishing" has been added. *1 Where authentication of our identity happens without our knowledge or against our will, it is a 1984-like Dystopia. *2 https://www.kuppingercole.com/events/ciweu2018/agenda_overview 80-second video https://www.youtube.com/watch?v=ypOnKTTwRJg&feature=youtu.be 30-second video https://www.youtube.com/watch?v=7UAgtPtmUbk&feature=youtu.be ]]>
Wed, 14 Nov 2018 06:01:01 GMT /slideshow/updated-presentation-with-scripts-at-ciw2018-122968273/122968273 HitoshiKokumai@slideshare.net(HitoshiKokumai) Updated: Presentation with Scripts at CIW2018 HitoshiKokumai The volitional password is absolutely necessary where the democratic values matter (*1). whereas the conventional password is hated as everybody agrees. This observations lead us to conclude that we should agree that we have to find the sort of password system that is not hated. Logic tells that there can be no other choice. We came up with the way out. It is Expanded Password System that accepts images as well as texts/characters. This is the updated version of the slide used for the presentation on 30/Oct/2018 at KuppingerCole's Consumer Identity World Europe 2018 in Amsterdam (*2). P20 for "Deterrence to Targeted Phishing" has been added. *1 Where authentication of our identity happens without our knowledge or against our will, it is a 1984-like Dystopia. *2 https://www.kuppingercole.com/events/ciweu2018/agenda_overview <Link to Videos > 80-second video https://www.youtube.com/watch?v=ypOnKTTwRJg&feature=youtu.be 30-second video https://www.youtube.com/watch?v=7UAgtPtmUbk&feature=youtu.be <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentationwithnarrationscriptciw2018-181114060101-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The volitional password is absolutely necessary where the democratic values matter (*1). whereas the conventional password is hated as everybody agrees. This observations lead us to conclude that we should agree that we have to find the sort of password system that is not hated. Logic tells that there can be no other choice. We came up with the way out. It is Expanded Password System that accepts images as well as texts/characters. This is the updated version of the slide used for the presentation on 30/Oct/2018 at KuppingerCole&#39;s Consumer Identity World Europe 2018 in Amsterdam (*2). P20 for &quot;Deterrence to Targeted Phishing&quot; has been added. *1 Where authentication of our identity happens without our knowledge or against our will, it is a 1984-like Dystopia. *2 https://www.kuppingercole.com/events/ciweu2018/agenda_overview 80-second video https://www.youtube.com/watch?v=ypOnKTTwRJg&amp;feature=youtu.be 30-second video https://www.youtube.com/watch?v=7UAgtPtmUbk&amp;feature=youtu.be
Updated: Presentation with Scripts at CIW2018 from Hitoshi Kokumai
]]>
498 5 https://cdn.slidesharecdn.com/ss_thumbnails/presentationwithnarrationscriptciw2018-181114060101-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Presentation with Scripts at CIWEU2018 /slideshow/presentation-with-scripts-at-ciweu2018/121765058 presentationinamsterdamwithscript-181104032046
The volitional password is absolutely necessary鐚where the democratic values matter *1). whereas the conventional password is hated (as everybody agrees). This observations lead us to conclude that we should agree that we have to find the sort of password system that is not hated. Logic tells that there can be no other choice. We came up with the way out. It is Expanded Password System that accepts images as well as texts/characters. This slide was used for the presentation on 30/Oct/2018 at KuppingerCole's Consumer Identity World Europe 2018 in Amsterdam *2 *1 Where authentication of our identity happens without our knowledge or against our will, it is a 1984-like Dystopia. *2 https://www.kuppingercole.com/events/ciweu2018/agenda_overview 80-second video https://www.youtube.com/watch?v=ypOnKTTwRJg&feature=youtu.be 30-second video https://www.youtube.com/watch?v=7UAgtPtmUbk&feature=youtu.be]]>

The volitional password is absolutely necessary鐚where the democratic values matter *1). whereas the conventional password is hated (as everybody agrees). This observations lead us to conclude that we should agree that we have to find the sort of password system that is not hated. Logic tells that there can be no other choice. We came up with the way out. It is Expanded Password System that accepts images as well as texts/characters. This slide was used for the presentation on 30/Oct/2018 at KuppingerCole's Consumer Identity World Europe 2018 in Amsterdam *2 *1 Where authentication of our identity happens without our knowledge or against our will, it is a 1984-like Dystopia. *2 https://www.kuppingercole.com/events/ciweu2018/agenda_overview 80-second video https://www.youtube.com/watch?v=ypOnKTTwRJg&feature=youtu.be 30-second video https://www.youtube.com/watch?v=7UAgtPtmUbk&feature=youtu.be]]>
Sun, 04 Nov 2018 03:20:46 GMT /slideshow/presentation-with-scripts-at-ciweu2018/121765058 HitoshiKokumai@slideshare.net(HitoshiKokumai) Presentation with Scripts at CIWEU2018 HitoshiKokumai The volitional password is absolutely necessary鐚where the democratic values matter *1). whereas the conventional password is hated (as everybody agrees). This observations lead us to conclude that we should agree that we have to find the sort of password system that is not hated. Logic tells that there can be no other choice. We came up with the way out. It is Expanded Password System that accepts images as well as texts/characters. This slide was used for the presentation on 30/Oct/2018 at KuppingerCole's Consumer Identity World Europe 2018 in Amsterdam *2 *1 Where authentication of our identity happens without our knowledge or against our will, it is a 1984-like Dystopia. *2 https://www.kuppingercole.com/events/ciweu2018/agenda_overview <Link to Videos > 80-second video https://www.youtube.com/watch?v=ypOnKTTwRJg&feature=youtu.be 30-second video https://www.youtube.com/watch?v=7UAgtPtmUbk&feature=youtu.be <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentationinamsterdamwithscript-181104032046-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The volitional password is absolutely necessary鐚where the democratic values matter *1). whereas the conventional password is hated (as everybody agrees). This observations lead us to conclude that we should agree that we have to find the sort of password system that is not hated. Logic tells that there can be no other choice. We came up with the way out. It is Expanded Password System that accepts images as well as texts/characters. This slide was used for the presentation on 30/Oct/2018 at KuppingerCole&#39;s Consumer Identity World Europe 2018 in Amsterdam *2 *1 Where authentication of our identity happens without our knowledge or against our will, it is a 1984-like Dystopia. *2 https://www.kuppingercole.com/events/ciweu2018/agenda_overview 80-second video https://www.youtube.com/watch?v=ypOnKTTwRJg&amp;feature=youtu.be 30-second video https://www.youtube.com/watch?v=7UAgtPtmUbk&amp;feature=youtu.be
Presentation with Scripts at CIWEU2018 from Hitoshi Kokumai
]]>
226 2 https://cdn.slidesharecdn.com/ss_thumbnails/presentationinamsterdamwithscript-181104032046-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Updated: Identity Assurance by Our Own Volition and Memory /HitoshiKokumai/updated-identity-assurance-by-our-own-volition-and-memory ciweurope2018slideshare-181104025227
The volitional password is absolutely necessary鐚where the democratic values matter *1). whereas the conventional password is hated (as everybody agrees). This observations lead us to conclude that we should agree that we have to find the sort of password system that is not hated. Logic tells that there can be no other choice. We came up with the way out. It is Expanded Password System that accepts images as well as texts/characters. This is the slide I used for the presentation on 30/Oct/2018 at KuppingerCole's Consumer Identity World Europe 2018 in Amsterdam *2 *1 Where authentication of our identity happens without our knowledge or against our will, it is a 1984-like Dystopia. *2 https://www.kuppingercole.com/events/ciweu2018/agenda_overview 80-second video https://www.youtube.com/watch?v=ypOnKTTwRJg&feature=youtu.be 30-second video https://www.youtube.com/watch?v=7UAgtPtmUbk&feature=youtu.be]]>

The volitional password is absolutely necessary鐚where the democratic values matter *1). whereas the conventional password is hated (as everybody agrees). This observations lead us to conclude that we should agree that we have to find the sort of password system that is not hated. Logic tells that there can be no other choice. We came up with the way out. It is Expanded Password System that accepts images as well as texts/characters. This is the slide I used for the presentation on 30/Oct/2018 at KuppingerCole's Consumer Identity World Europe 2018 in Amsterdam *2 *1 Where authentication of our identity happens without our knowledge or against our will, it is a 1984-like Dystopia. *2 https://www.kuppingercole.com/events/ciweu2018/agenda_overview 80-second video https://www.youtube.com/watch?v=ypOnKTTwRJg&feature=youtu.be 30-second video https://www.youtube.com/watch?v=7UAgtPtmUbk&feature=youtu.be]]>
Sun, 04 Nov 2018 02:52:27 GMT /HitoshiKokumai/updated-identity-assurance-by-our-own-volition-and-memory HitoshiKokumai@slideshare.net(HitoshiKokumai) Updated: Identity Assurance by Our Own Volition and Memory HitoshiKokumai The volitional password is absolutely necessary鐚where the democratic values matter *1). whereas the conventional password is hated (as everybody agrees). This observations lead us to conclude that we should agree that we have to find the sort of password system that is not hated. Logic tells that there can be no other choice. We came up with the way out. It is Expanded Password System that accepts images as well as texts/characters. This is the slide I used for the presentation on 30/Oct/2018 at KuppingerCole's Consumer Identity World Europe 2018 in Amsterdam *2 *1 Where authentication of our identity happens without our knowledge or against our will, it is a 1984-like Dystopia. *2 https://www.kuppingercole.com/events/ciweu2018/agenda_overview <Link to Videos > 80-second video https://www.youtube.com/watch?v=ypOnKTTwRJg&feature=youtu.be 30-second video https://www.youtube.com/watch?v=7UAgtPtmUbk&feature=youtu.be <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ciweurope2018slideshare-181104025227-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The volitional password is absolutely necessary鐚where the democratic values matter *1). whereas the conventional password is hated (as everybody agrees). This observations lead us to conclude that we should agree that we have to find the sort of password system that is not hated. Logic tells that there can be no other choice. We came up with the way out. It is Expanded Password System that accepts images as well as texts/characters. This is the slide I used for the presentation on 30/Oct/2018 at KuppingerCole&#39;s Consumer Identity World Europe 2018 in Amsterdam *2 *1 Where authentication of our identity happens without our knowledge or against our will, it is a 1984-like Dystopia. *2 https://www.kuppingercole.com/events/ciweu2018/agenda_overview 80-second video https://www.youtube.com/watch?v=ypOnKTTwRJg&amp;feature=youtu.be 30-second video https://www.youtube.com/watch?v=7UAgtPtmUbk&amp;feature=youtu.be
Updated: Identity Assurance by Our Own Volition and Memory from Hitoshi Kokumai
]]>
209 4 https://cdn.slidesharecdn.com/ss_thumbnails/ciweurope2018slideshare-181104025227-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Deployment of Biometrics & Password - NIST63B /slideshow/deployment-of-biometrics-password-nist63b/80568566 deploymentofbiometricsandpasswordnist80063b-171008015558
When 'a physical authenticator PLUS password' is less complicated, less costly and more secure than 'a physical authenticator PLUS ', I wonder where there is a merit of involving the problem-ridden biometrics. ]]>

When 'a physical authenticator PLUS password' is less complicated, less costly and more secure than 'a physical authenticator PLUS ', I wonder where there is a merit of involving the problem-ridden biometrics. ]]>
Sun, 08 Oct 2017 01:55:58 GMT /slideshow/deployment-of-biometrics-password-nist63b/80568566 HitoshiKokumai@slideshare.net(HitoshiKokumai) Deployment of Biometrics & Password - NIST63B HitoshiKokumai When 'a physical authenticator PLUS password' is less complicated, less costly and more secure than 'a physical authenticator PLUS <password OR biometrics>', I wonder where there is a merit of involving the problem-ridden biometrics. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/deploymentofbiometricsandpasswordnist80063b-171008015558-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> When &#39;a physical authenticator PLUS password&#39; is less complicated, less costly and more secure than &#39;a physical authenticator PLUS &#39;, I wonder where there is a merit of involving the problem-ridden biometrics.
Deployment of Biometrics & Password - NIST63B from Hitoshi Kokumai
]]>
355 8 https://cdn.slidesharecdn.com/ss_thumbnails/deploymentofbiometricsandpasswordnist80063b-171008015558-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as against 'in series' /slideshow/clues-to-unravelling-conundrums-biometrics-deployed-in-parallel-as-against-in-series/80199220 cluestounravellingconundrums-170927030622
So long as the biometrics is backed up by a fallback password, irrespective of which are more accurate than the others, its security is lower than that of a password-only authentication. Then, we have to wonder why and how the biometrics has been touted as a security-enhancing tool for so long, with so many security professionals being silent about the fact. It appears that we may have got some clues to this conundrum.]]>

So long as the biometrics is backed up by a fallback password, irrespective of which are more accurate than the others, its security is lower than that of a password-only authentication. Then, we have to wonder why and how the biometrics has been touted as a security-enhancing tool for so long, with so many security professionals being silent about the fact. It appears that we may have got some clues to this conundrum.]]>
Wed, 27 Sep 2017 03:06:22 GMT /slideshow/clues-to-unravelling-conundrums-biometrics-deployed-in-parallel-as-against-in-series/80199220 HitoshiKokumai@slideshare.net(HitoshiKokumai) Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as against 'in series' HitoshiKokumai So long as the biometrics is backed up by a fallback password, irrespective of which are more accurate than the others, its security is lower than that of a password-only authentication. Then, we have to wonder why and how the biometrics has been touted as a security-enhancing tool for so long, with so many security professionals being silent about the fact. It appears that we may have got some clues to this conundrum. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cluestounravellingconundrums-170927030622-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> So long as the biometrics is backed up by a fallback password, irrespective of which are more accurate than the others, its security is lower than that of a password-only authentication. Then, we have to wonder why and how the biometrics has been touted as a security-enhancing tool for so long, with so many security professionals being silent about the fact. It appears that we may have got some clues to this conundrum.
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as against 'in series' from Hitoshi Kokumai
]]>
481 2 https://cdn.slidesharecdn.com/ss_thumbnails/cluestounravellingconundrums-170927030622-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Help unravel the conundrum over NIST authentication guideline /slideshow/help-unravel-the-conundrum-over-nist-authentication-guideline/65375963 helpunraveltheconundrumovernistauthenticationguideline-160826003124
It appears that NIST is of the view that a house with two entrances placed in parallel, not in tandem, is less vulnerable to burglars than a one-entrance house. We are unable to understand their logic behind such observations. We wonder if some of you can help unravel this conundrum. You might also be interested in these short videos:: - Biometrics in Cyber Space - "below-one" factor authentication https://youtu.be/wuhB5vxKYlg - Six Reasons to Believe Biometrics Don't Ruin Cyber Security https://youtu.be/lODTiO2k8ws ]]>

It appears that NIST is of the view that a house with two entrances placed in parallel, not in tandem, is less vulnerable to burglars than a one-entrance house. We are unable to understand their logic behind such observations. We wonder if some of you can help unravel this conundrum. You might also be interested in these short videos:: - Biometrics in Cyber Space - "below-one" factor authentication https://youtu.be/wuhB5vxKYlg - Six Reasons to Believe Biometrics Don't Ruin Cyber Security https://youtu.be/lODTiO2k8ws ]]>
Fri, 26 Aug 2016 00:31:24 GMT /slideshow/help-unravel-the-conundrum-over-nist-authentication-guideline/65375963 HitoshiKokumai@slideshare.net(HitoshiKokumai) Help unravel the conundrum over NIST authentication guideline HitoshiKokumai It appears that NIST is of the view that a house with two entrances placed in parallel, not in tandem, is less vulnerable to burglars than a one-entrance house. We are unable to understand their logic behind such observations. We wonder if some of you can help unravel this conundrum. You might also be interested in these short videos:: - Biometrics in Cyber Space - "below-one" factor authentication https://youtu.be/wuhB5vxKYlg - Six Reasons to Believe Biometrics Don't Ruin Cyber Security https://youtu.be/lODTiO2k8ws <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/helpunraveltheconundrumovernistauthenticationguideline-160826003124-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> It appears that NIST is of the view that a house with two entrances placed in parallel, not in tandem, is less vulnerable to burglars than a one-entrance house. We are unable to understand their logic behind such observations. We wonder if some of you can help unravel this conundrum. You might also be interested in these short videos:: - Biometrics in Cyber Space - &quot;below-one&quot; factor authentication https://youtu.be/wuhB5vxKYlg - Six Reasons to Believe Biometrics Don&#39;t Ruin Cyber Security https://youtu.be/lODTiO2k8ws
Help unravel the conundrum over NIST authentication guideline from Hitoshi Kokumai
]]>
1927 11 https://cdn.slidesharecdn.com/ss_thumbnails/helpunraveltheconundrumovernistauthenticationguideline-160826003124-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Business Dimension of Expanded Password System /slideshow/expanded-password-system-46647092/46647092 expandedpasswordsystembusinesspeople150404-150404193443-conversion-gate01
We are in the middle of the decades-long game of having the finalist candidates chosen for the legitimate successors not just to the decades-old character passwords but to the centuries or millennia-old seals and signatures, which will make the basic foundation for the real/cyber-fused society that may well last for more than generations or even centuries for the whole global population. With billions of people suffering the same big headache, the problem to be addressed by our solution is huge, Substantial revenues will be expected for the business of providing the most practicable solution. Please join us and support us for this nice exciting enterprise.]]>

We are in the middle of the decades-long game of having the finalist candidates chosen for the legitimate successors not just to the decades-old character passwords but to the centuries or millennia-old seals and signatures, which will make the basic foundation for the real/cyber-fused society that may well last for more than generations or even centuries for the whole global population. With billions of people suffering the same big headache, the problem to be addressed by our solution is huge, Substantial revenues will be expected for the business of providing the most practicable solution. Please join us and support us for this nice exciting enterprise.]]>
Sat, 04 Apr 2015 19:34:43 GMT /slideshow/expanded-password-system-46647092/46647092 HitoshiKokumai@slideshare.net(HitoshiKokumai) Business Dimension of Expanded Password System HitoshiKokumai We are in the middle of the decades-long game of having the finalist candidates chosen for the legitimate successors not just to the decades-old character passwords but to the centuries or millennia-old seals and signatures, which will make the basic foundation for the real/cyber-fused society that may well last for more than generations or even centuries for the whole global population. With billions of people suffering the same big headache, the problem to be addressed by our solution is huge, Substantial revenues will be expected for the business of providing the most practicable solution. Please join us and support us for this nice exciting enterprise. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/expandedpasswordsystembusinesspeople150404-150404193443-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> We are in the middle of the decades-long game of having the finalist candidates chosen for the legitimate successors not just to the decades-old character passwords but to the centuries or millennia-old seals and signatures, which will make the basic foundation for the real/cyber-fused society that may well last for more than generations or even centuries for the whole global population. With billions of people suffering the same big headache, the problem to be addressed by our solution is huge, Substantial revenues will be expected for the business of providing the most practicable solution. Please join us and support us for this nice exciting enterprise.
Business Dimension of Expanded Password System from Hitoshi Kokumai
]]>
774 3 https://cdn.slidesharecdn.com/ss_thumbnails/expandedpasswordsystembusinesspeople150404-150404193443-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Expanded password system - Reliable Identity Assurance /slideshow/expanded-password-system/45965874 expandedpasswordsystem150317-150317201827-conversion-gate01
Security of the real/cyber-fused society hinges on Assured Identity, which hinges on Shared Secrets in cyberspace. The text password has been the shared secrets for many decades. We now need a successor to the text password. There exists a promising candidate, an Expanded Password System which accepts images as well as characters and which generates a high-entropy password from a hard-to-forget password.]]>

Security of the real/cyber-fused society hinges on Assured Identity, which hinges on Shared Secrets in cyberspace. The text password has been the shared secrets for many decades. We now need a successor to the text password. There exists a promising candidate, an Expanded Password System which accepts images as well as characters and which generates a high-entropy password from a hard-to-forget password.]]>
Tue, 17 Mar 2015 20:18:27 GMT /slideshow/expanded-password-system/45965874 HitoshiKokumai@slideshare.net(HitoshiKokumai) Expanded password system - Reliable Identity Assurance HitoshiKokumai Security of the real/cyber-fused society hinges on Assured Identity, which hinges on Shared Secrets in cyberspace. The text password has been the shared secrets for many decades. We now need a successor to the text password. There exists a promising candidate, an Expanded Password System which accepts images as well as characters and which generates a high-entropy password from a hard-to-forget password. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/expandedpasswordsystem150317-150317201827-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Security of the real/cyber-fused society hinges on Assured Identity, which hinges on Shared Secrets in cyberspace. The text password has been the shared secrets for many decades. We now need a successor to the text password. There exists a promising candidate, an Expanded Password System which accepts images as well as characters and which generates a high-entropy password from a hard-to-forget password.
Expanded password system - Reliable Identity Assurance from Hitoshi Kokumai
]]>
792 2 https://cdn.slidesharecdn.com/ss_thumbnails/expandedpasswordsystem150317-150317201827-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-HitoshiKokumai-48x48.jpg?cb=1698388414 I am proposing to make use of autobiographic image memory for identity authentication so that we will manage dozens of remembered passwords anytime anywhere, using some of them for multi-factor solutions and/or ID federations where appropriate. CYBER SORCERY OR CYBER SECURITY ? Intimidate people into using more of the stronger passwords and we should be able to forget the issue of vulnerable passwords since humans can and will remember and recall any number of passwords when placed under a threatening pressure. This thinking, which has been haunting us for decades, is sorcery. On the other hand, coming up at the other extreme end is another sort of cyber sorcery. The password is ... http://www.mneme.co.jp/english/index.html https://cdn.slidesharecdn.com/ss_thumbnails/image-to-codeconverter31july2023-231027063417-1358e35e-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/imagetocode-converter-31july2023pptx/262784180 Image-to-Code Converte... https://cdn.slidesharecdn.com/ss_thumbnails/moreissuesondigitalidentity24feb2023-230226080130-d957fea3-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/more-issues-on-digital-identity-24feb2023/256124023 More Issues on Digital... https://cdn.slidesharecdn.com/ss_thumbnails/fendoffcyberattackwithepisodicmemory24feb2023v5-230226072922-c85a489f-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/fend-off-cyberattack-with-episodic-memory-24feb2023/256122774 Fend Off Cyberattack w...