Hitoshi Kokumai

2年前 · 1 分の読書時間 · visibility ~100 ·

chat 著者への問い合わせ

thumb_up 関連性 message コメント

Digital Identity and Democracy

Digital Identity and Democracy

When injured and panicked with empty hands in emergencies, how can we get authenticated securely and reliably?

It’s the obligation of democratic societies to provide citizens with the identity authentication measures that are practicable in disaster recovery and other emergencies.

Authenticating empty-handed and injured people cannot be done without involving 'Shared Secrets'. Authenticating empty-handed, injured and panicked people cannot be achieved without involving 'Panic-proof Shared Secrets'. Physical tokens and biometrics do not help.

Enabling people to register their unforgettable non-text memories as their passwords could help a lot, possibly the only practical answer.

Expanded Password System enables it. What is practicable in panicky situations is easily practicable in everyday life, although the reverse is not always true.

It could also be noted that Expanded Password System can be flexibly implemented in multiple ways and methods. When packaged as an 'image-to-text converter ’module, it can be incorporated into the ubiquitous legacy text password systems for achieving better balance of security and convenience, easily, quickly and economically.


< Related Articles >

History, Current Status and Future Scenarios of Expanded Password System    https://www.bebee.com/producer/@hitoshi-kokumai/history-current-status-and-future-scenarios-of-expanded-password-system

Slide – Identity Assurance in Emergencies      https://www.slideshare.net/HitoshiKokumai/identity-assurance-in-emergencies

Big Myths in Digital Identity    https://www.bebee.com/producer/@hitoshi-kokumai/big-myths-in-digital-identity


< Features of Expansion of Password System >

- It is not only stress-free for users but fun to use, as opposed to the dread and overhead that come today with creating, memorizing and storing passwords

- It turns a low-entropy password into high-entropy authentication data

- It eases the burden of managing the relationship between accounts and passwords

- It deters phishing attacks

- It can be deployed under any type of circumstance, including combat

- It supports existing schemes, such as:

- Biometrics which require passwords as a fallback means

- Two/multi-factor authentications that require passwords as one of the factors

- ID Federations such as password managers and single-sign-on services that require passwords as the master-password

- Simple pictorial/emoji-passwords and patterns-on-grid can be deployed on this platform.

- It is relevant whenever text passwords and pin numbers are in use

- And, nothing would be lost for people who want to keep using text passwords

- Last but not least, it continues to rely on free will.


thumb_up 関連性 message コメント
コメント

その他の記事 Hitoshi Kokumai

ブログを見る
1ヶ月前 · 2 分の読書時間

Questions Raised over Privacy, Racial Bias, and Accuracy

Today's topic is BBC's “Facebook to end use of fac ...

1ヶ月前 · 2 分の読書時間

Truly Big Threat

The quantum computer held in a bad guy’s hand is i ...

2ヶ月前 · 2 分の読書時間

Publishing by aiTech Trend

https://aitechtrend.com/quantum-computing-and-pass ...