Hitoshi Kokumai

5年前 · 1 分の読書時間 · ~10 ·

ブログ作成
>
ブログ Hitoshi
>
Rapid Increase in Military Use of Expanded Password System

Rapid Increase in Military Use of Expanded Password System

Identity Assurance in Emergencies

 

 

 

Disaster Recovery

Card and tokens
possessed?

Biometrics
practicable?

Frenin ic. we can quickly
recognize unforgettable images of
epriodic memones

   

In the Field

Practicable with both
hands busy ?

In panic? With injuries?

With protection gear on?

As for the versatile practicability of Expanded Password System, we now can refer to the trouble-free military use in the most demanding environment, with the users having increased 10-fold over the 7-year period from 2013 to 2020 and predicted to increase further; Images of toys, dolls, dogs and cats, for example, that our children used to love for years would jump into our eye even when we are placed in heavy pressure and caught in severe panic.

What is practicable in the most demanding environment for the most demanding application can be easily practiced in everyday environments for everyday applications; the reverse is not true, though.

Such an authentication system that copes with the panicky situations can be operated for all the everyday applications, too, as a stand-alone authenticator, as a factor of multi-factor schemes and as the master password of ID federation schemes.

The panic-proof feature of Expanded Password System is also discussed here – “Availability-First Approach”

With respect to this subject, I would like to refer to the proposition that we submitted to Armed Forces Communications and Electronics Association (AFCEA).

AFCEA called for propositions for ‘2020 Solution Review Problem Sets’ which was intended to answer to U.S. Army Chief Information Officer who is seeking solutions to emerging or existing challenges.

We submitted an abstract of our proposition for Item #3 and were notified that our abstract is kept on-file as a backup and will be included in the compendium of the abstracts that is made available to CIO/G6 leadership. We are very pleased to see this positive development.

As mentioned in the abstract, our proposition is not a hypothesis, but is substantiated by the trouble-free military use in the field from 2013 till now with the number of users increasing 10-fold and set to continue to increase further.

AFCEA

Connecting people, ideas
and solutions globally






コメント
#2
Cool. If you are interested in a more robust algorithm, coupled with another that can guarantee randomness in the encryption keys used, I am happy to help. This is the last time I'm going to offer this as it seems that all my previous attempts (e.g. suggesting collaboration on Cybersecurity matters) didn't get the message through. Cheers!

Hitoshi Kokumai

5年前#2

#1
As for the military use case mentioned in my article, our software is protected by encryption as well as protecting encryption, but all that I know is that it is perhaps a proprietary algorithm that is not publicized.
If the military is willing to try out a piece of technology, it's more than ready for the public too! I wonder how much further this tech can be improved, perhaps coupled with an advanced encryption algorithm...

Hitoshi Kokumaiの記事

ブログを見る
4年前 · 3 分の読書時間

I today take up this The Register report - “Client-side content scanning as an unworkable, insecure ...

4年前 · 2 分の読書時間

Taken up today is this TechRepublic report on voice print as a new password - https://www.techrepubl ...

4年前 · 2 分の読書時間

Biometrics is 'probabilistic' by nature since it measures unpredictably variable body features of li ...

関連プロフェッショナル

これらの仕事に興味があるかもしれない