Hitoshi Kokumai

1年前 · 1 分の読書時間 · visibility 0 ·

chat 著者への問い合わせ

thumb_up 関連性 message コメント

Rapid Increase in Military Use of Expanded Password System

Rapid Increase in Military Use of Expanded Password SystemIdentity Assurance in Emergencies<br />
<br />
 <br />
<br />
 <br />
<br />
 <br />
<br />
Disaster Recovery<br />
<br />
Card and tokens<br />
possessed?<br />
<br />
Biometrics<br />
practicable?<br />
<br />
Frenin ic. we can quickly<br />
recognize unforgettable images of<br />
epriodic memones<br />
<br />
   <br />
<br />
In the Field<br />
<br />
Practicable with both<br />
hands busy ?<br />
<br />
In panic? With injuries?<br />
<br />
With protection gear on?

As for the versatile practicability of Expanded Password System, we now can refer to the trouble-free military use in the most demanding environment, with the users having increased 10-fold over the 7-year period from 2013 to 2020 and predicted to increase further; Images of toys, dolls, dogs and cats, for example, that our children used to love for years would jump into our eye even when we are placed in heavy pressure and caught in severe panic.

What is practicable in the most demanding environment for the most demanding application can be easily practiced in everyday environments for everyday applications; the reverse is not true, though.

Such an authentication system that copes with the panicky situations can be operated for all the everyday applications, too, as a stand-alone authenticator, as a factor of multi-factor schemes and as the master password of ID federation schemes.

The panic-proof feature of Expanded Password System is also discussed here – “Availability-First Approach”

With respect to this subject, I would like to refer to the proposition that we submitted to Armed Forces Communications and Electronics Association (AFCEA).

AFCEA called for propositions for ‘2020 Solution Review Problem Sets’ which was intended to answer to U.S. Army Chief Information Officer who is seeking solutions to emerging or existing challenges.

We submitted an abstract of our proposition for Item #3 and were notified that our abstract is kept on-file as a backup and will be included in the compendium of the abstracts that is made available to CIO/G6 leadership. We are very pleased to see this positive development.

As mentioned in the abstract, our proposition is not a hypothesis, but is substantiated by the trouble-free military use in the field from 2013 till now with the number of users increasing 10-fold and set to continue to increase further.

AFCEA<br />
<br />
Connecting people, ideas<br />
and solutions globally






thumb_up 関連性 message コメント
コメント
Zacharias 🐝 Voulgaris

#2
Cool. If you are interested in a more robust algorithm, coupled with another that can guarantee randomness in the encryption keys used, I am happy to help. This is the last time I'm going to offer this as it seems that all my previous attempts (e.g. suggesting collaboration on Cybersecurity matters) didn't get the message through. Cheers!

Hitoshi Kokumai

Hitoshi Kokumai

1年前 #2

#1
As for the military use case mentioned in my article, our software is protected by encryption as well as protecting encryption, but all that I know is that it is perhaps a proprietary algorithm that is not publicized.

Zacharias 🐝 Voulgaris

If the military is willing to try out a piece of technology, it's more than ready for the public too! I wonder how much further this tech can be improved, perhaps coupled with an advanced encryption algorithm...

その他の記事 Hitoshi Kokumai

ブログを見る