SlideShare a Scribd company logo
1 of 14
Introduction for business people
of Expanded Password System
Security of the real/cyber-fused society hinges on “Assured
Identity”, which hinges on “Shared Secrets” in cyberspace.
The text password has been the shared secrets for many
decades. We now need a successor to the text password.
There exists a promising candidate, an Expanded
Password System (EPS) which accepts images as well as
characters and which generates a high-entropy password
from a hard-to-forget images and texts.  
20th April, 2015
Mnemonic Security, Inc., Japan/UK
2
What is EPS? 1/3
Only texts are accepted As it were, we have no choice but
to walk up a long steep staircase
  
Where we want to
continue to use
textual passwords
Where we want to
reduce the burden of
textual passwords
Where we want to
make use of
episodic image memory
3UVB9KUW
【 Text Mode 】 【 Graphics Mode 】 【 Original Picture Mode 】
Recall the remembered
password
Recognize the pictures
remembered in stories
Recognize the unforgettable
pictures of episodic memories
Free choices from, as it were, among staircases, escalators and lifts/elevators
Low memory ceiling Very high memory ceilingHigh memory ceiling
+ +
There are several known pictures.
I can easily find all of them right away.
Only I can select all of them correctly.
Practicable even in panic when images of episodic memory are registered
Incorporating the function of generating high-entropy online passwords from
hard-to-forget images and texts.
Security of real/cyber-fused society hinges on online identity assurance
Online identity assurance hinges on shared secrets, i.e. what we remember
Video: http://www.youtube.com/watch?v=Q8kGNeIS2Lc
What is EPS? 2/3
Technical details available at http://www.slideshare.net/HitoshiKokumai/expanded-password-system
4
What is EPS? 3/3
When unique matrices of images are allocated to different accounts
with the EPS, those unique matrices of images will be telling you what
images you could pick up as your passwords.
Being able to recall strong passwords is one thing. Being able to
recall the relations between accounts and the corresponding
passwords is another.
EPS frees us from the burden of managing the relations between
accounts and the corresponding passwords.
Account A Account B Account C Account D
Account E,
F, G, H, I, J,
K, L-----------
5
What problems is EPS expected to solve?
- White House cyber czar's goal: 'Kill the password dead'
http://www.federalnewsradio.com/241/3646015/White-House-cyber-czars-goal-Kill-the-password-dead
“He cited studies showing as much as 80 percent of cyber intrusions — "some ridiculously
high number," he said — are caused by exploiting weak or stolen passwords.”
- Cybercrime and espionage costs $445 billion annually
http://www.washingtonpost.com/world/national-security/report-cybercrime-and-espionage-costs-445-billion-annually/2014/06/09/8995291c-ecce-
11e3-9f5c-9075d5508f0a_story.html
“CSIS used several methods to arrive at a range of estimates, from $375 billion to as
much as $575 billion.”
- Passwords Still Pose Big Security Risks
http://www.paymentssource.com/news/passwords-still-pose-big-security-risks-3018257-1.html
“Many “advanced data stealing attacks” happen simply from poor password practices.”
- Soon Hackers May Topple Global Economy
http://i-hls.com/2014/05/report-soon-hackers-may-topple-global-economy/?utm_source=rss&utm_medium=rss&utm_campaign=report-soon-
hackers-may-topple-global-economy&utm_source=Meital&utm_medium=Meital&utm_campaign=RSS
“Within the next five to seven years, as much as $21 trillion in global economic-value
creation depends on robust cyber security”.
6
Why EPS?
Biometric products operated in cyber space require the password
called a backup/fallback password to be registered in case of false
rejection (footnoted on the next page).
Action patterns are too difficult to replay accurately and also require the
fallback password in case of false rejection.
Multi-factor authentications require the password as one of the factors..
ID federations (single-sign-on services and password management
tools) are operated with the password called “master-password”.
PIN and passphrases belong to the password.
As such we are unable to live without the password and yet it is obvious
that the conventional character password no longer suffices.
Here enter the EPS, a password system expanded to accept images on
top of characters, which is expected to play a very significant role.  
Password-dependent password-killer
- Widely spread nonsensical false sense of security -
Media seem busy spreading the hyped stories of “password-killing” biometric products. For biometrics to
displace the password for better security, however, it must stop depending on a fallback password
registered in case of false rejection.
Further details are available at http://www.slideshare.net/HitoshiKokumai/password-dependent-passwordkiller-46151802
FOOTNOTE
8
What are our competitions?
Setting aside the hyped stories of “password-dependent password-killer”
solutions that are causing nonsensical false sense of security, among the
broader password family are
1. Pattern-on-grid: The drawbacks of this method are (1) complicated patterns
could have a very high entropy but humans cannot remember multiple numbers
of such complicated patterns and (2) simple patterns like alphabets are easy to
remember but are fully known to criminals as well.
2. Simple pictorial password: Not all the pictures are good for passwords.
Pictures or outstanding features on pictures that we manage to remember
afresh are subject to the cognitive phenomenon called “interference of memory”
if not as badly as meaningless random characters. So it is still easy-to-break if
it is easy-to-remember and hard-to-remember if it is hard-to-break.
3. Facelock: Researchers at York University who specialize in cognitive
psychology came up with a competitive approach by using friends’ faces as the
hard-to-forget passwords, which is far less subject to “interference of memory”
and therefore users can manage many of them at a time, though it is not
sufficiently hard-to-break. We have now teamed up with them.
Remark: It is possible to deploy all the above on the EPS platform as the
variations.  
9
What can EPS achieve?
EPS can be viewed as an enhanced successor to text-only password systems on
its own.
Furthermore EPS enables us to see truly powerful multi-factor authentications with
a strong unique password being used as one of the factors for all different
accounts, whether indoor or outdoor.
With EPS used for fallback passwords in case of false rejection, biometric solutions
will offer good convenience without much sacrificing the confidentiality.
We would also be able to see truly reliable decentralized ID federations with a
strong unique password being used as the master-password for each of single-
sign-on services and password management tools.
The outcome will be the most highly assured identity achieved through the most
reliable “shared secrets”, which is indispensable for the coming age of
Electronic Healthcare, Pandemic-resistant Teleworking, ICT-assisted Disaster
Prevention, Rescue & Recovery, Hands-Free Operation of Wearable Computing,
Hands-Free Payment & Empty-Handed Shopping, Humanoid Robots, Internet of
Things and, needless to say, Cyber Defence & Law Enforcement along with the
basic need of real/cyber-fused social life.
10
What market potential does EPS have?
With billions of people suffering the same big headache, the problem to be
addressed by our solution is huge, Substantial revenues will be expected for
the business of providing the most practicable solution.
Global sales forecasts are difficult to figure out at this stage. The number of
some US$1 million over the past non-turbulent 10 years that we experienced in
Japan probably does not make a good clue to the figures for the globally
turbulent future.
The vacuum for comprehensive and practicable solutions will probably be just
vast that will come up in front of us when the hyped misleading stories of
"password-killer" solutions have evaporated. The sales in 3 - 5 years' time
could be in the order of $10m or $100m or $1bn.
How quickly we can reach $100m sales will largely hinge on how quickly the
false sense of security about the "password-dependent password-killer"
biometric products gets killed dead. For people who take it for granted that the
password problem will eventually be solved by the dazzling “password-killer”
solutions would find it difficult to agree with us that our products will have a
sizeable share on the market for the solutions to the password problem.
11
What EPS products are available?
a. Server software for online-access    
b. Server software for onetime password generation
c. Server software for single sign on with OpenID protocol
d. Client software for Windows PC logon    
e. Client software for smart devices logon
f. Client software for “image”-to-”text password” conversion      
g. Library for general purpose
h. Client CryptoMnemo software with data encryption function
i. Client Authority-distributed CryptoMnemo for prevention of insiders’ crime
j. Server-Client extension for (i).
* Some four million dollars, half of which from the Japanese government, have been invested into
the research and development of the above product lineup.
** All the above products were developed in Japanese for Japanese customers. With the
algorithm fully completed, all of them can be put on the global market straight away when re-
written in English.
12
What sectors should be first taken up?
Among such new frontiers as Electronic Healthcare, Pandemic-resistant
Teleworking, ICT-assisted Disaster Prevention, Rescue & Recovery,
Hands-Free Operation of Wearable Computing, Hands-Free Payment &
Empty-Handed Shopping, Humanoid Robots, Internet of Things, Cyber
Defence & Law Enforcement along with the basic need of real/cyber-fused
social life,
the sectors that should be looked at first are
1. Where secure identity assurance is needed for elderly people for
whom character passwords are too difficult.
2. Where people have to get their identity proven securely even when
they are caught in panic
3. Where people have to safely manage many numbers of accounts
each of which requires a unique strong password.
13
Who are we?
Hitoshi Kokumai, Inventor of Mnemonic Guard, pioneer of
Expanded Password System, and Founder of Mnemonic
Security, Inc.
He used to work for a UK company whose original name was
Nairn International Limited, a part of Unilever in 1984, as a
contract business development coordinator. Over the 22
years of service until 2006 he contributed to UK’s export of
some 100 million Pounds through 60 trips between UK and
Japan. He was graduated from Economics Faculty of Kyoto
University in 1971.
Ryuhei Masuno, Co-Founder of Mnemonic Security, Inc.
Before joining Hitoshi Kokumai for this business, he used to be
a member of the board of Asahipen, a paints and home
products manufacturer listed at Osaka Stock Exchange where
he was responsible for accounting and general corporate
management. He was graduated from the Law Faculty of Kyoto
University in 1972.
14
In Conclusion
We are in the middle of the decades-long game of having the finalist
candidates chosen for the legitimate successors not just to the decades-old
character passwords but to the centuries or millennia-old seals and
signatures, which will make the basic foundation for the real/cyber-fused
society that may well last for more than generations or even centuries for the
whole global population. Please join us and support us for this nice exciting
enterprise.
For any further information, please feel free to contact
Hitoshi Kokumai at
Mail: kokumai@mneme.co.jp
Skype: kokumaiskype
Tel: 81 – 90 – 5460 – 7350 (when staying in Japan)
44 – 7738 – 905032 (when staying in UK)

More Related Content

What's hot

Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...IJERA Editor
 
Replace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemReplace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemWarren Smith
 
Target@ Data Breach2edit
Target@ Data Breach2editTarget@ Data Breach2edit
Target@ Data Breach2editKehinde Adelusi
 
Fingerpay
FingerpayFingerpay
FingerpayAnand B
 
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...IRJET Journal
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...IndianAppDevelopers
 

What's hot (8)

Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
 
Replace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemReplace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card System
 
Target@ Data Breach2edit
Target@ Data Breach2editTarget@ Data Breach2edit
Target@ Data Breach2edit
 
Fingerpay
FingerpayFingerpay
Fingerpay
 
Iciea08
Iciea08Iciea08
Iciea08
 
My DocSafe white paper 1
My DocSafe white paper 1My DocSafe white paper 1
My DocSafe white paper 1
 
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 

Viewers also liked

Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceHitoshi Kokumai
 
SharePoint Saturday Barcelona 2016
SharePoint Saturday Barcelona 2016SharePoint Saturday Barcelona 2016
SharePoint Saturday Barcelona 2016Rick Van Rousselt
 
Homoparentalidade: que familias que experiencias?
Homoparentalidade: que familias que experiencias?Homoparentalidade: que familias que experiencias?
Homoparentalidade: que familias que experiencias?Pedro Alexandre Costa
 
Parentalidade edicao
Parentalidade edicaoParentalidade edicao
Parentalidade edicaoSilvia Dias
 
Filhos Por AdoçãO Congresso Psicossocial JuríDico
Filhos Por AdoçãO   Congresso Psicossocial JuríDicoFilhos Por AdoçãO   Congresso Psicossocial JuríDico
Filhos Por AdoçãO Congresso Psicossocial JuríDicoFAdotivos
 
A protecção social dos trabalhadores, Isabel Viseu
A protecção social dos trabalhadores, Isabel ViseuA protecção social dos trabalhadores, Isabel Viseu
A protecção social dos trabalhadores, Isabel Viseucomunidades@ina
 
A Framework of Purpose and Consent for Data Security and Consumer Privacy
A Framework of Purpose and Consent for Data Security and Consumer PrivacyA Framework of Purpose and Consent for Data Security and Consumer Privacy
A Framework of Purpose and Consent for Data Security and Consumer PrivacyAurélie Pols
 
Storm on the Horizon: Data Governance & Security vs. Employee Privacy
Storm on the Horizon: Data Governance & Security vs. Employee PrivacyStorm on the Horizon: Data Governance & Security vs. Employee Privacy
Storm on the Horizon: Data Governance & Security vs. Employee PrivacyAurélie Pols
 
¿Directivos en su torre de marfil?
¿Directivos en su torre de marfil?¿Directivos en su torre de marfil?
¿Directivos en su torre de marfil?Santiago Garcia
 
Customers in the cloud pulse final
Customers in the cloud   pulse finalCustomers in the cloud   pulse final
Customers in the cloud pulse finalFLUZO
 
Biografía de manuel elkin patarroyo
Biografía de manuel elkin patarroyoBiografía de manuel elkin patarroyo
Biografía de manuel elkin patarroyoCamilo Alvarez Medina
 

Viewers also liked (18)

Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity Assurance
 
SharePoint Saturday Barcelona 2016
SharePoint Saturday Barcelona 2016SharePoint Saturday Barcelona 2016
SharePoint Saturday Barcelona 2016
 
Homoparentalidade: que familias que experiencias?
Homoparentalidade: que familias que experiencias?Homoparentalidade: que familias que experiencias?
Homoparentalidade: que familias que experiencias?
 
Portfolio
PortfolioPortfolio
Portfolio
 
Drorlandacruz
DrorlandacruzDrorlandacruz
Drorlandacruz
 
Parentalidade edicao
Parentalidade edicaoParentalidade edicao
Parentalidade edicao
 
Filhos Por AdoçãO Congresso Psicossocial JuríDico
Filhos Por AdoçãO   Congresso Psicossocial JuríDicoFilhos Por AdoçãO   Congresso Psicossocial JuríDico
Filhos Por AdoçãO Congresso Psicossocial JuríDico
 
A protecção social dos trabalhadores, Isabel Viseu
A protecção social dos trabalhadores, Isabel ViseuA protecção social dos trabalhadores, Isabel Viseu
A protecção social dos trabalhadores, Isabel Viseu
 
Novembro jardim
Novembro jardimNovembro jardim
Novembro jardim
 
Novembro creche
Novembro crecheNovembro creche
Novembro creche
 
A Framework of Purpose and Consent for Data Security and Consumer Privacy
A Framework of Purpose and Consent for Data Security and Consumer PrivacyA Framework of Purpose and Consent for Data Security and Consumer Privacy
A Framework of Purpose and Consent for Data Security and Consumer Privacy
 
Parentalidade
ParentalidadeParentalidade
Parentalidade
 
Storm on the Horizon: Data Governance & Security vs. Employee Privacy
Storm on the Horizon: Data Governance & Security vs. Employee PrivacyStorm on the Horizon: Data Governance & Security vs. Employee Privacy
Storm on the Horizon: Data Governance & Security vs. Employee Privacy
 
Dimensionamento bt
Dimensionamento btDimensionamento bt
Dimensionamento bt
 
Fevereiro creche
Fevereiro crecheFevereiro creche
Fevereiro creche
 
¿Directivos en su torre de marfil?
¿Directivos en su torre de marfil?¿Directivos en su torre de marfil?
¿Directivos en su torre de marfil?
 
Customers in the cloud pulse final
Customers in the cloud   pulse finalCustomers in the cloud   pulse final
Customers in the cloud pulse final
 
Biografía de manuel elkin patarroyo
Biografía de manuel elkin patarroyoBiografía de manuel elkin patarroyo
Biografía de manuel elkin patarroyo
 

Similar to Business Dimension of Expanded Password System

More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)Hitoshi Kokumai
 
Cyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsCyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsHitoshi Kokumai
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityPixel Crayons
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
 
Bring healthy second life to legacy password system
Bring healthy second life to legacy password systemBring healthy second life to legacy password system
Bring healthy second life to legacy password systemHitoshi Kokumai
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET Journal
 
Introduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSecIntroduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSecYashSomalkar
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...ADEIJ Journal
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about securityAlison Gianotto
 
Cognitive Computing
Cognitive ComputingCognitive Computing
Cognitive ComputingPietro Leo
 
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPasswords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPriyanka Aash
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper ExampleKayla Perry
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A DiscussionKaushik Patra
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 

Similar to Business Dimension of Expanded Password System (19)

More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)
 
Cyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsCyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password Systems
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
Bring healthy second life to legacy password system
Bring healthy second life to legacy password systemBring healthy second life to legacy password system
Bring healthy second life to legacy password system
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
 
E banking security
E banking securityE banking security
E banking security
 
Introduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSecIntroduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSec
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Cognitive Computing
Cognitive ComputingCognitive Computing
Cognitive Computing
 
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPasswords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 

More from Hitoshi Kokumai

Image-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxImage-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxHitoshi Kokumai
 
Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Hitoshi Kokumai
 
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Hitoshi Kokumai
 
Fend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryFend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryHitoshi Kokumai
 
Intriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneIntriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneHitoshi Kokumai
 
Updated: Presentation with Scripts at CIW2018
Updated:  Presentation with Scripts at CIW2018Updated:  Presentation with Scripts at CIW2018
Updated: Presentation with Scripts at CIW2018Hitoshi Kokumai
 
Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Hitoshi Kokumai
 
Updated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryUpdated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryHitoshi Kokumai
 
Deployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BDeployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BHitoshi Kokumai
 
Help unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHelp unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHitoshi Kokumai
 

More from Hitoshi Kokumai (10)

Image-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxImage-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptx
 
Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)
 
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
 
Fend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryFend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic Memory
 
Intriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneIntriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to One
 
Updated: Presentation with Scripts at CIW2018
Updated:  Presentation with Scripts at CIW2018Updated:  Presentation with Scripts at CIW2018
Updated: Presentation with Scripts at CIW2018
 
Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018
 
Updated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryUpdated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and Memory
 
Deployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BDeployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63B
 
Help unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHelp unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guideline
 

Recently uploaded

Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 

Recently uploaded (20)

Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 

Business Dimension of Expanded Password System

  • 1. Introduction for business people of Expanded Password System Security of the real/cyber-fused society hinges on “Assured Identity”, which hinges on “Shared Secrets” in cyberspace. The text password has been the shared secrets for many decades. We now need a successor to the text password. There exists a promising candidate, an Expanded Password System (EPS) which accepts images as well as characters and which generates a high-entropy password from a hard-to-forget images and texts.   20th April, 2015 Mnemonic Security, Inc., Japan/UK
  • 2. 2 What is EPS? 1/3 Only texts are accepted As it were, we have no choice but to walk up a long steep staircase    Where we want to continue to use textual passwords Where we want to reduce the burden of textual passwords Where we want to make use of episodic image memory 3UVB9KUW 【 Text Mode 】 【 Graphics Mode 】 【 Original Picture Mode 】 Recall the remembered password Recognize the pictures remembered in stories Recognize the unforgettable pictures of episodic memories Free choices from, as it were, among staircases, escalators and lifts/elevators Low memory ceiling Very high memory ceilingHigh memory ceiling + +
  • 3. There are several known pictures. I can easily find all of them right away. Only I can select all of them correctly. Practicable even in panic when images of episodic memory are registered Incorporating the function of generating high-entropy online passwords from hard-to-forget images and texts. Security of real/cyber-fused society hinges on online identity assurance Online identity assurance hinges on shared secrets, i.e. what we remember Video: http://www.youtube.com/watch?v=Q8kGNeIS2Lc What is EPS? 2/3 Technical details available at http://www.slideshare.net/HitoshiKokumai/expanded-password-system
  • 4. 4 What is EPS? 3/3 When unique matrices of images are allocated to different accounts with the EPS, those unique matrices of images will be telling you what images you could pick up as your passwords. Being able to recall strong passwords is one thing. Being able to recall the relations between accounts and the corresponding passwords is another. EPS frees us from the burden of managing the relations between accounts and the corresponding passwords. Account A Account B Account C Account D Account E, F, G, H, I, J, K, L-----------
  • 5. 5 What problems is EPS expected to solve? - White House cyber czar's goal: 'Kill the password dead' http://www.federalnewsradio.com/241/3646015/White-House-cyber-czars-goal-Kill-the-password-dead “He cited studies showing as much as 80 percent of cyber intrusions — "some ridiculously high number," he said — are caused by exploiting weak or stolen passwords.” - Cybercrime and espionage costs $445 billion annually http://www.washingtonpost.com/world/national-security/report-cybercrime-and-espionage-costs-445-billion-annually/2014/06/09/8995291c-ecce- 11e3-9f5c-9075d5508f0a_story.html “CSIS used several methods to arrive at a range of estimates, from $375 billion to as much as $575 billion.” - Passwords Still Pose Big Security Risks http://www.paymentssource.com/news/passwords-still-pose-big-security-risks-3018257-1.html “Many “advanced data stealing attacks” happen simply from poor password practices.” - Soon Hackers May Topple Global Economy http://i-hls.com/2014/05/report-soon-hackers-may-topple-global-economy/?utm_source=rss&utm_medium=rss&utm_campaign=report-soon- hackers-may-topple-global-economy&utm_source=Meital&utm_medium=Meital&utm_campaign=RSS “Within the next five to seven years, as much as $21 trillion in global economic-value creation depends on robust cyber security”.
  • 6. 6 Why EPS? Biometric products operated in cyber space require the password called a backup/fallback password to be registered in case of false rejection (footnoted on the next page). Action patterns are too difficult to replay accurately and also require the fallback password in case of false rejection. Multi-factor authentications require the password as one of the factors.. ID federations (single-sign-on services and password management tools) are operated with the password called “master-password”. PIN and passphrases belong to the password. As such we are unable to live without the password and yet it is obvious that the conventional character password no longer suffices. Here enter the EPS, a password system expanded to accept images on top of characters, which is expected to play a very significant role.  
  • 7. Password-dependent password-killer - Widely spread nonsensical false sense of security - Media seem busy spreading the hyped stories of “password-killing” biometric products. For biometrics to displace the password for better security, however, it must stop depending on a fallback password registered in case of false rejection. Further details are available at http://www.slideshare.net/HitoshiKokumai/password-dependent-passwordkiller-46151802 FOOTNOTE
  • 8. 8 What are our competitions? Setting aside the hyped stories of “password-dependent password-killer” solutions that are causing nonsensical false sense of security, among the broader password family are 1. Pattern-on-grid: The drawbacks of this method are (1) complicated patterns could have a very high entropy but humans cannot remember multiple numbers of such complicated patterns and (2) simple patterns like alphabets are easy to remember but are fully known to criminals as well. 2. Simple pictorial password: Not all the pictures are good for passwords. Pictures or outstanding features on pictures that we manage to remember afresh are subject to the cognitive phenomenon called “interference of memory” if not as badly as meaningless random characters. So it is still easy-to-break if it is easy-to-remember and hard-to-remember if it is hard-to-break. 3. Facelock: Researchers at York University who specialize in cognitive psychology came up with a competitive approach by using friends’ faces as the hard-to-forget passwords, which is far less subject to “interference of memory” and therefore users can manage many of them at a time, though it is not sufficiently hard-to-break. We have now teamed up with them. Remark: It is possible to deploy all the above on the EPS platform as the variations.  
  • 9. 9 What can EPS achieve? EPS can be viewed as an enhanced successor to text-only password systems on its own. Furthermore EPS enables us to see truly powerful multi-factor authentications with a strong unique password being used as one of the factors for all different accounts, whether indoor or outdoor. With EPS used for fallback passwords in case of false rejection, biometric solutions will offer good convenience without much sacrificing the confidentiality. We would also be able to see truly reliable decentralized ID federations with a strong unique password being used as the master-password for each of single- sign-on services and password management tools. The outcome will be the most highly assured identity achieved through the most reliable “shared secrets”, which is indispensable for the coming age of Electronic Healthcare, Pandemic-resistant Teleworking, ICT-assisted Disaster Prevention, Rescue & Recovery, Hands-Free Operation of Wearable Computing, Hands-Free Payment & Empty-Handed Shopping, Humanoid Robots, Internet of Things and, needless to say, Cyber Defence & Law Enforcement along with the basic need of real/cyber-fused social life.
  • 10. 10 What market potential does EPS have? With billions of people suffering the same big headache, the problem to be addressed by our solution is huge, Substantial revenues will be expected for the business of providing the most practicable solution. Global sales forecasts are difficult to figure out at this stage. The number of some US$1 million over the past non-turbulent 10 years that we experienced in Japan probably does not make a good clue to the figures for the globally turbulent future. The vacuum for comprehensive and practicable solutions will probably be just vast that will come up in front of us when the hyped misleading stories of "password-killer" solutions have evaporated. The sales in 3 - 5 years' time could be in the order of $10m or $100m or $1bn. How quickly we can reach $100m sales will largely hinge on how quickly the false sense of security about the "password-dependent password-killer" biometric products gets killed dead. For people who take it for granted that the password problem will eventually be solved by the dazzling “password-killer” solutions would find it difficult to agree with us that our products will have a sizeable share on the market for the solutions to the password problem.
  • 11. 11 What EPS products are available? a. Server software for online-access     b. Server software for onetime password generation c. Server software for single sign on with OpenID protocol d. Client software for Windows PC logon     e. Client software for smart devices logon f. Client software for “image”-to-”text password” conversion       g. Library for general purpose h. Client CryptoMnemo software with data encryption function i. Client Authority-distributed CryptoMnemo for prevention of insiders’ crime j. Server-Client extension for (i). * Some four million dollars, half of which from the Japanese government, have been invested into the research and development of the above product lineup. ** All the above products were developed in Japanese for Japanese customers. With the algorithm fully completed, all of them can be put on the global market straight away when re- written in English.
  • 12. 12 What sectors should be first taken up? Among such new frontiers as Electronic Healthcare, Pandemic-resistant Teleworking, ICT-assisted Disaster Prevention, Rescue & Recovery, Hands-Free Operation of Wearable Computing, Hands-Free Payment & Empty-Handed Shopping, Humanoid Robots, Internet of Things, Cyber Defence & Law Enforcement along with the basic need of real/cyber-fused social life, the sectors that should be looked at first are 1. Where secure identity assurance is needed for elderly people for whom character passwords are too difficult. 2. Where people have to get their identity proven securely even when they are caught in panic 3. Where people have to safely manage many numbers of accounts each of which requires a unique strong password.
  • 13. 13 Who are we? Hitoshi Kokumai, Inventor of Mnemonic Guard, pioneer of Expanded Password System, and Founder of Mnemonic Security, Inc. He used to work for a UK company whose original name was Nairn International Limited, a part of Unilever in 1984, as a contract business development coordinator. Over the 22 years of service until 2006 he contributed to UK’s export of some 100 million Pounds through 60 trips between UK and Japan. He was graduated from Economics Faculty of Kyoto University in 1971. Ryuhei Masuno, Co-Founder of Mnemonic Security, Inc. Before joining Hitoshi Kokumai for this business, he used to be a member of the board of Asahipen, a paints and home products manufacturer listed at Osaka Stock Exchange where he was responsible for accounting and general corporate management. He was graduated from the Law Faculty of Kyoto University in 1972.
  • 14. 14 In Conclusion We are in the middle of the decades-long game of having the finalist candidates chosen for the legitimate successors not just to the decades-old character passwords but to the centuries or millennia-old seals and signatures, which will make the basic foundation for the real/cyber-fused society that may well last for more than generations or even centuries for the whole global population. Please join us and support us for this nice exciting enterprise. For any further information, please feel free to contact Hitoshi Kokumai at Mail: kokumai@mneme.co.jp Skype: kokumaiskype Tel: 81 – 90 – 5460 – 7350 (when staying in Japan) 44 – 7738 – 905032 (when staying in UK)