SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
Expanded Password System: What can we expect from a password system that accepts images in addition
to characters, particularly the images of episodic memory?
The answer is the ability to volitionally manage many more passwords by our own remembrance.
Assuming that you somehow remember 5 high-entropy character passwords, you will now be able to keep
using those 5 strong passwords and, on top of it, you will also be able to manage many more firmly
remembered passwords in the form of the episodic-memory pictorial passwords.
We can remember and recall only 5 text passwords on average, not due to our silliness or laziness, but due to
the cognitive phenomenon called "Interference of Memory". Memories of numbers and characters, which
contain very limited information, are subject to the severe interference of memory which causes terrible
confusions in what we remember, whereas the memories of images and pictures, particularly those of
episodic/autobiographic memories that contain a great deal of information with emotional feeling, are not.
This indicates that it would not be difficult for us to manage passwords well beyond 5 or 10 by our
remembrance.
The expanded password system that accepts images in addition to characters can be viewed as an enhanced
successor to characters-only password systems on its own when we make sure that confidentiality is not lost
in view of the attacks like shoulder surfing and social engineering. Such EPS can be easily practiced by the
IT-illiterate elderly at one end, the soldiers caught in panic on the battleground at the other and a number of
businesspeople who need to cope with dozens of accounts each requiring unique passwords in the middle.
Furthermore, the expanded password system (EPS) will enable us to see truly powerful multi-factor
authentications with a strong unique password being used as one of the factors for all different accounts,
whether indoor or outdoor. The EPS would also enable us to see the decentralized ID federations with a
strong unique password being used as the master-password for each of single-sign-on services and password
management tools. With the EPS used for fallback-passwords, biometric solutions could offer good
convenience without much sacrificing the confidentiality. The outcome will be the most highly assured
identity achieved through the most reliable “shared secrets”.
That the users can retain the textual passwords as before while they expand their password memory to
include the non-textual passwords without being impeded by the cognitive effect of “interference of memory”
means that it is extremely difficult to imagine such users who suffer disadvantage or inconvenience by
taking up the EPS
Humans are generally thousands times better at dealing with image memories than character memories -.
The former has the history of hundreds of millions of years while the latter’s history is less than a fraction of
it. However mathematically strong a high-entropy character password may appear, it is a pie in the sky if it
is impracticable. Now that CPUs are fast enough, bandwidths broad enough, memory storages cheap
enough and superb cameras built in most of the mobile devices, I wonder what merits we have for reliable
identity assurance in sticking to confining ourselves in the narrow corridor of character memories.

Contenu connexe

En vedette

De-Mystifying ROI Calculation for SharePoint
De-Mystifying ROI Calculation for SharePointDe-Mystifying ROI Calculation for SharePoint
De-Mystifying ROI Calculation for SharePointsarahhaase
 
Modelo Desarrollista
Modelo Desarrollista Modelo Desarrollista
Modelo Desarrollista andrea028
 
BUYMAにおけるRepro運用
BUYMAにおけるRepro運用BUYMAにおけるRepro運用
BUYMAにおけるRepro運用Takashi Matsumoto
 
Strategia a intuicja- niezwykłe pomysły na nowe media
Strategia a intuicja- niezwykłe pomysły na nowe media Strategia a intuicja- niezwykłe pomysły na nowe media
Strategia a intuicja- niezwykłe pomysły na nowe media Katarzyna Joanna Mörchen
 
Public-Affairs-Umfrage 2016 von MSL Germany
Public-Affairs-Umfrage 2016 von MSL Germany Public-Affairs-Umfrage 2016 von MSL Germany
Public-Affairs-Umfrage 2016 von MSL Germany MSL Germany
 
Integrating Healthcare Informatics, Imaging, and Systems Biology-A Personal E...
Integrating Healthcare Informatics, Imaging, and Systems Biology-A Personal E...Integrating Healthcare Informatics, Imaging, and Systems Biology-A Personal E...
Integrating Healthcare Informatics, Imaging, and Systems Biology-A Personal E...Larry Smarr
 
Makerspaces in Libraries: Education, innovation and maker culture in the libr...
Makerspaces in Libraries: Education, innovation and maker culture in the libr...Makerspaces in Libraries: Education, innovation and maker culture in the libr...
Makerspaces in Libraries: Education, innovation and maker culture in the libr...Fers
 
CRM in Retail Industry (การบริหารความสัมพันธ์กับลูกค้า สำหรับธุรกิจค้าปลีก)
CRM in Retail Industry (การบริหารความสัมพันธ์กับลูกค้า สำหรับธุรกิจค้าปลีก)CRM in Retail Industry (การบริหารความสัมพันธ์กับลูกค้า สำหรับธุรกิจค้าปลีก)
CRM in Retail Industry (การบริหารความสัมพันธ์กับลูกค้า สำหรับธุรกิจค้าปลีก)Sundae Solutions Co., Ltd.
 
Working with an Engineering Team
Working with an Engineering TeamWorking with an Engineering Team
Working with an Engineering TeamSarah Maddox
 

En vedette (12)

De-Mystifying ROI Calculation for SharePoint
De-Mystifying ROI Calculation for SharePointDe-Mystifying ROI Calculation for SharePoint
De-Mystifying ROI Calculation for SharePoint
 
Lineamientos fencyt eureka-2016
Lineamientos fencyt eureka-2016Lineamientos fencyt eureka-2016
Lineamientos fencyt eureka-2016
 
Carrefour Data Innovation
Carrefour Data InnovationCarrefour Data Innovation
Carrefour Data Innovation
 
Modelo Desarrollista
Modelo Desarrollista Modelo Desarrollista
Modelo Desarrollista
 
Startups Getting Started
Startups Getting StartedStartups Getting Started
Startups Getting Started
 
BUYMAにおけるRepro運用
BUYMAにおけるRepro運用BUYMAにおけるRepro運用
BUYMAにおけるRepro運用
 
Strategia a intuicja- niezwykłe pomysły na nowe media
Strategia a intuicja- niezwykłe pomysły na nowe media Strategia a intuicja- niezwykłe pomysły na nowe media
Strategia a intuicja- niezwykłe pomysły na nowe media
 
Public-Affairs-Umfrage 2016 von MSL Germany
Public-Affairs-Umfrage 2016 von MSL Germany Public-Affairs-Umfrage 2016 von MSL Germany
Public-Affairs-Umfrage 2016 von MSL Germany
 
Integrating Healthcare Informatics, Imaging, and Systems Biology-A Personal E...
Integrating Healthcare Informatics, Imaging, and Systems Biology-A Personal E...Integrating Healthcare Informatics, Imaging, and Systems Biology-A Personal E...
Integrating Healthcare Informatics, Imaging, and Systems Biology-A Personal E...
 
Makerspaces in Libraries: Education, innovation and maker culture in the libr...
Makerspaces in Libraries: Education, innovation and maker culture in the libr...Makerspaces in Libraries: Education, innovation and maker culture in the libr...
Makerspaces in Libraries: Education, innovation and maker culture in the libr...
 
CRM in Retail Industry (การบริหารความสัมพันธ์กับลูกค้า สำหรับธุรกิจค้าปลีก)
CRM in Retail Industry (การบริหารความสัมพันธ์กับลูกค้า สำหรับธุรกิจค้าปลีก)CRM in Retail Industry (การบริหารความสัมพันธ์กับลูกค้า สำหรับธุรกิจค้าปลีก)
CRM in Retail Industry (การบริหารความสัมพันธ์กับลูกค้า สำหรับธุรกิจค้าปลีก)
 
Working with an Engineering Team
Working with an Engineering TeamWorking with an Engineering Team
Working with an Engineering Team
 

Plus de Hitoshi Kokumai

Image-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxImage-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxHitoshi Kokumai
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)Hitoshi Kokumai
 
Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Hitoshi Kokumai
 
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Hitoshi Kokumai
 
Fend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryFend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryHitoshi Kokumai
 
Bring healthy second life to legacy password system
Bring healthy second life to legacy password systemBring healthy second life to legacy password system
Bring healthy second life to legacy password systemHitoshi Kokumai
 
Intriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneIntriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneHitoshi Kokumai
 
Cyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsCyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsHitoshi Kokumai
 
Updated: Presentation with Scripts at CIW2018
Updated:  Presentation with Scripts at CIW2018Updated:  Presentation with Scripts at CIW2018
Updated: Presentation with Scripts at CIW2018Hitoshi Kokumai
 
Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Hitoshi Kokumai
 
Updated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryUpdated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryHitoshi Kokumai
 
Deployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BDeployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BHitoshi Kokumai
 
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...Hitoshi Kokumai
 
Help unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHelp unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHitoshi Kokumai
 
Business Dimension of Expanded Password System
Business Dimension of Expanded Password SystemBusiness Dimension of Expanded Password System
Business Dimension of Expanded Password SystemHitoshi Kokumai
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceHitoshi Kokumai
 

Plus de Hitoshi Kokumai (16)

Image-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxImage-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptx
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)
 
Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)
 
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
 
Fend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryFend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic Memory
 
Bring healthy second life to legacy password system
Bring healthy second life to legacy password systemBring healthy second life to legacy password system
Bring healthy second life to legacy password system
 
Intriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneIntriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to One
 
Cyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsCyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password Systems
 
Updated: Presentation with Scripts at CIW2018
Updated:  Presentation with Scripts at CIW2018Updated:  Presentation with Scripts at CIW2018
Updated: Presentation with Scripts at CIW2018
 
Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018
 
Updated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryUpdated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and Memory
 
Deployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BDeployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63B
 
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
 
Help unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHelp unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guideline
 
Business Dimension of Expanded Password System
Business Dimension of Expanded Password SystemBusiness Dimension of Expanded Password System
Business Dimension of Expanded Password System
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity Assurance
 

Dernier

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Dernier (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

What can we expect from expanded password system

  • 1. Expanded Password System: What can we expect from a password system that accepts images in addition to characters, particularly the images of episodic memory? The answer is the ability to volitionally manage many more passwords by our own remembrance. Assuming that you somehow remember 5 high-entropy character passwords, you will now be able to keep using those 5 strong passwords and, on top of it, you will also be able to manage many more firmly remembered passwords in the form of the episodic-memory pictorial passwords. We can remember and recall only 5 text passwords on average, not due to our silliness or laziness, but due to the cognitive phenomenon called "Interference of Memory". Memories of numbers and characters, which contain very limited information, are subject to the severe interference of memory which causes terrible confusions in what we remember, whereas the memories of images and pictures, particularly those of episodic/autobiographic memories that contain a great deal of information with emotional feeling, are not. This indicates that it would not be difficult for us to manage passwords well beyond 5 or 10 by our remembrance. The expanded password system that accepts images in addition to characters can be viewed as an enhanced successor to characters-only password systems on its own when we make sure that confidentiality is not lost in view of the attacks like shoulder surfing and social engineering. Such EPS can be easily practiced by the IT-illiterate elderly at one end, the soldiers caught in panic on the battleground at the other and a number of businesspeople who need to cope with dozens of accounts each requiring unique passwords in the middle. Furthermore, the expanded password system (EPS) will enable us to see truly powerful multi-factor authentications with a strong unique password being used as one of the factors for all different accounts, whether indoor or outdoor. The EPS would also enable us to see the decentralized ID federations with a strong unique password being used as the master-password for each of single-sign-on services and password management tools. With the EPS used for fallback-passwords, biometric solutions could offer good convenience without much sacrificing the confidentiality. The outcome will be the most highly assured identity achieved through the most reliable “shared secrets”. That the users can retain the textual passwords as before while they expand their password memory to include the non-textual passwords without being impeded by the cognitive effect of “interference of memory” means that it is extremely difficult to imagine such users who suffer disadvantage or inconvenience by taking up the EPS Humans are generally thousands times better at dealing with image memories than character memories -. The former has the history of hundreds of millions of years while the latter’s history is less than a fraction of it. However mathematically strong a high-entropy character password may appear, it is a pie in the sky if it is impracticable. Now that CPUs are fast enough, bandwidths broad enough, memory storages cheap enough and superb cameras built in most of the mobile devices, I wonder what merits we have for reliable identity assurance in sticking to confining ourselves in the narrow corridor of character memories.