Hitoshi Kokumai

4年前 · 5 分の読書時間 · ~10 ·

ブログ作成
>
ブログ Hitoshi
>
Update - History, Current Status and Future Scenarios of Expanded Password System

Update - History, Current Status and Future Scenarios of Expanded Password System

 

Secret Credenti

 
   
 

Memories

Episodic Memory


Updated from 30/May/2019 Version

References to the publication of our article by Taylor & Francis and the selection of our proposition as a finalist forFDATA Global Open Finance Summit & Awards 2019” are added in the chapter of ‘History of Expanded Password System’.

The list of related articles is also updated.

Predicament of Digital Identity

Passwords are so hard to manage that some people are urging the removal of passwords from digital identity altogether. What would happen, then, if the password is removed from our identity assurance?

Where the password was kicked out, security providers would be given only the physical token and the biometrics as authentication factors, whereas biometrics requires a fallback measure against false rejection. With the password removed, nothing but the token could be the fallback measure for the biometrics. Then system designer could have only the two choices as follows.

(1)    authentication by the token alone, with an option of adding another token. Its security effect is highlighted in this cartoon we published 14 years ago.

(2)   authentication by the biometrics deployed in ‘multi-entrance’ method with the token as a fallback measure, security of which is lower than (1) irrespective of however called it may be, with an option of adding another token, as quantitatively explained here.

What a barren desert it would be!

“Expanded Password System

Bans & Only I can select all of
BL] them correctly

Broader choices with both images and characters accepted

i

 

 

 

 

Easy 10 manage reletons between accounts and corresponding passwords.

&

Torturous login is hstory. Login is now comfortable, relaxing and heaing

SRO
250
8More significantly, the password-less (will/volition-less authentication) is not consistent with the value of democracy. It would be a 1984-like Dystopia if our identity is authenticated without our knowledge or against our will.


Then What Else?

‘Achieving higher-security by removing the password’ and ‘Killing the password by biometrics’ are both no more than the hyped myths. Then, what else can we look to as a valid solution to the predicament of digital identity?

The answer is expanding the password system to accept credentials based on our non-text memories as well as the text memories. We call this proposition ‘Expanded Password System’

dc06e91f.jpg

By accepting non-text memories, especially images associated with autobiographic/episodic memories, the Expanded Password System is able to offer a number of excellent features as follows.

- It is not only stress-free for users but fun to use.

- It turns a low-entropy password into high-entropy authentication data

- It eases the burden of managing the relationship between accounts and passwords

- It deters phishing attacks with this unique feature.

- It can be deployed under any type of circumstance, including combat and other panicky situations.

- It supports existing schemes, such as:

   - - Biometrics which require passwords as a fallback means

 - - Two/multi-factor authentications that require passwords as one of the factors

  - - ID Federations such as password managers and single-sign-on services that require passwords as the master-password

- Simple pictorial/emoji-passwords and patterns-on-grid can be deployed on this platform.

- It is relevant whenever text passwords and pin numbers are in use

- And, nothing would be lost for people who want to keep using text passwords

- Last but not least, it continues to rely on free will.

History of Expanded Password System

The concept of this Expanded Password System first came up in 2000. It was followed by the prototyping in 2001 and the commercial implementations from 2003. The history is outlined in this article - How Expanded Password System got this way -

Over the period of 2003 to 2008, the business actually successfully. We saw several commercial adoptions amounting to more than US$1 million, even though handling images was a much heavier task in those days when CPU was slow, the bandwidth narrow and the storage expensive.

It then ceased to grow as people were more and more carried away by the myths of biometrics and password-less authentication which the advocates alleged would kill the passwords altogether, with our proposition included, although we knew that biometrics have to depend on the password as a fallback measure and that a password-less auathentication, if literally implemented, would only bring tragically insecure cyberspace..

After struggling in vain to fight back for several years, we chose to get out of Japan where biometrics vendors were far more dominant than anywhere else, and started to look for bigger chances worldwide. Now, we have some good friends and supporters globally. The writer was invited to speak at KuppingerCole's Consumer Identity World 2018 in Seattle and Amsterdam. Expanded Password System is now acknowledged as Draft Proposal' for OASIS Open Projects.

In 2019 these developments were followed by two outstandingly positive events.

In September Taylor & Francis published our “Digital Identity and Our Remembrance” on its EDPACS (EDP Audit, Control and Security Newsletter) page. Below is the core logic of our discussions.

Assumption: The gains of cyber age would turn against us if connected computers were placed under bad guys’ control. Reliable digital identity is the key to keep off bad guys.

1. Secret credentials are absolutely necessary for digital identity in democratic societies.

2. The text password, which is a section of the secret credentials, is known to be too hard to manage.

3. We could look for something other than the text password as the valid secret credential.

What can be simpler and plainer than this transparent logic? Perhaps only except when being distracted and blinded by vested interests and sunk costs.

Two months thereafter, we were suddenly contacted by Financial Data and Technology Association (FDATA) and invited to present our proposition for “FDATA Global Open Finance Summit & Awards 2019”.

We submitted the proposition on 24/Oct and I was at the Edinburgh summit to receive the honor of being selected as one of the three finalists even though we are not a FDATA member nor related with the organization in any way. It was a dazzlingly rapid development.

Fintech people talk about Open Finance as an enabler of many good things. They talk about Digital Identity as an enabler of the Open Finance and many other good things. They will be talking more about what can really be an enabler of the Digital Identity and we will be making a significant contribution to it with our knowledge and expertise as expressed in our ‘Proposition on How to Build a Sustainable Digital Identity Platform shortlisted for the Summit and Awards 2019”.

Current Status of Business Development

As indicated above, we had come up with not just prototypes but also several commercial products developed for the Japanese clients such as follows:

Client Software for

- Device Login (commercial implementation)

- Applications Login (prototype)

- Image-to-Code Conversion (p)

Server Software for

- Online-Access (c.i.)

- 2-Factor Scheme (c.i.)

- Open ID Compatible (p)

Applied Products: Data Encryption with on-the-fly key generation

- Single & Distributed Authority (c.i.)

None of them, however, are well suited for the services and sales on the global markets, since the programs were all written by Japanese engineers for the Japanese clients with no consideration about the operation, support and maintenance outside Japan. 

This also means, however, that we will be able to come up with the products for the global market just easily and quickly with a relatively small budget because algorithms are already here and all that we need to do is to re-write the software in English with the updated cryptography.

For a brief glimpse of what Expanded Password System can offer, watch these brief videos.

Basic Operation - on Smartphone (1m41s)

High-Security Operation - local on PC (4m28s)

Capture and registration of pictures - mapping to long PIN Codes (1m26s)

The readers might also be interested in this comprehensive FAQ -

Future Scenarios

In view of the global nature of our enterprise, we are planning to set up the headquarters in an English-speaking country where we have easy access to the sufficient business and technological resources.

Identity/Security-related businesses who are interested to share the benefits of Expanded Password System could choose one or some of the scenarios as quoted below.

1.  Become one of the co-founders of a new business entity that we are going to set up as the global headquarters.

2.  Secure a highly privileged status by joining our team at OASIS Open Projects as a voting sponsorship member.

3.  Secure some advantageous position by taking part in the active discussions at the OASIS Projects as a non-voting member.

4.  Consider other scenarios depending on their aspiration and budget.

* All would depend on their judgement on

- how large or small the enterprise of the now-unknown Expanded Password System could grow and how long or short it could survive and sustain,

- as compared with the now-popular propositions such as ‘password-less authentication’, ‘biometrics as a password-killer’ and ‘physical tokens as a password-killer’,

- as a legitimate successor to the traditional seals, autographs and text-passwords, bearing it in mind that this digital identity enterprise to serve the whole global population could keep a value for social good until humans abandon the digital identity altogether.

< Related Articles >

Text Password System to Stay As-Is with Expanded Password System

Advanced Persistent Threats in Digital Identity

Technology Obsession and Liberal Arts

Negative Security Effect of Biometrics Deployed in Cyberspace

Removal of Passwords and Its Security Effect

#identity #authentication #password #security #fintech #finance #banking #biometrics #ethic #privacy #democracy

コメント

Hitoshi Kokumaiの記事

ブログを見る
2年前 · 3 分の読書時間

Today's topic is “Microsoft Exchange Autodiscover protocol found leaking hundreds of thousands of cr ...

2年前 · 2 分の読書時間

Today's topic is this report - “How blockchain technology can create secure digital identities” · h ...

2年前 · 3 分の読書時間

I take up this new report today - “Researchers Defeated Advanced Facial Recognition Tech Using Makeu ...

この職種に興味がある方はこちら

  • 日本ステリ/大阪公立大学医学部附属病院

    手術室清掃業務スタッフ

    次の場所にあります: beBee S2 JP - 23時間前


    日本ステリ/大阪公立大学医学部附属病院 大阪市阿倍野区, 日本

    仕事内容 · 【手術室清掃】 · 手術室の清掃、準備など、手術が円滑に出来るようにサポートす · るお仕事 · ※1つずつ丁寧にお教えするので、初心者の方でも安心です · 未経験・無資格でも大丈夫 · 「医療の知識が全くない」そんな方でも大丈夫。みんな些細な · きっかけで応募して、イチから仕事を覚えていきます。 · チーム制なので、わからないことはすぐ先輩に聞いてくださいね · 。未経験の方が安心してスタートできる環境を用意してお待ちし · ています · 主婦(夫)フリーター活躍中 · 日本ステリでは主婦(夫)さん・フリーターさんが多数活躍して · い ...

  • Chiron(シロン)

    アイリスト / アイブロウリスト

    次の場所にあります: beBee S2 JP - 2日前


    Chiron(シロン) 八王子市, 日本 アルバイト

    更新日: · 【業務内容】アイリストとしてのサロンワーク全般 · 【雇用形態】 アルバイト · 【勤務地】JR八王子駅(北口)/京王八王子駅から徒歩3分のトータルビューティーサロン · 【給与】時給 1,113円~ · 【試用期間中給与】変動なし · 【PR】スタイリストとして働きながらセラピストとして働きたいなど、あなたの学びたい気持ちを応援します · 働き方も柔軟に対応いたしますので、出勤日数や時短勤務などお気軽にご相談ください◎ · 【休日】年末年始(カレンダーにより変動あり) · 【店長歴:2~3年】 · 【店長からのコメント】当店は、働きなが ...

  • 公開範囲1.等を含む求人情報を公開する

    歯科受付

    次の場所にあります: Talent JP C2 - 6日前


    公開範囲1.等を含む求人情報を公開する Aomori, 日本 フルタイム

    仕事内容 · ・受付窓口業務 · ・治療器具の準備、片付け、洗浄、滅菌作業 · ・医療事務業務 · ・院内清掃・消毒 · ※治療のアシスタントは必要ありません。 雇用形態 正社員以外 正社員以外の名称 【産休・育休代替】 正社員登用の有無 なし 派遣・請負等 就業形態 派遣・請負ではない 雇用期間 雇用期間の定めあり(4ヶ月以上) 1年 契約更新の可能性 なし 就業場所 〒 青森県青森市大字大野字前田67-31 · 渡辺歯科クリニック 受動喫煙対策 あり(屋内禁煙) マイカー通勤 ...