IDENTITY ASSURANCE IN EMERGENCIES
Disaster Recovery
Cards and tokens
possessed?
Biometrics
practicable?
Survivors must come back to social activities
most quickly as servicemen or residents.
In the Field
Strain
Confusion
Injury
Seizure
Practicable with both hands busy ?
In panic? With injuries?
Seizure of devices,
tokens, memos
Seizure of
body features
With eyeglasses-mounted displays
- defense and law enforcement
- firefighting and emergencies
- high-security public facilities
- field operations like construction
- heavy-demanding factory floors
Practicable even when both hands are busy
by voice command of onetime passwords
extracted from unforgettable images
Pre-registration desirable before facing
Earthquakes, Tsunamis, Eruptions,
Hurricanes, Floods, Landslides,
Fires, Explosions, Nuclear Accidents,
and also Large Gatherings
With protection gear on?
Even in severe panic, we can quickly
recognize unforgettable images
of episodic memories.
< Flow of Identity Authentication >
- the user utters "connect" to the mic (which could be bone-
conduction for noisy situation or voiceless voice-code sensing for
silent situation)
- when connected, the user watches the matrix of images
displayed in front of their eye.
- the user reads out the onetime texts allocated to the pre-
registered images from among the image matrix presented
- when images of beloved ones had been registered, the user
could expect to make the login without failure in a very
impending or even panicky situation
* eavesdropping of the uttered texts is just futile because only
the user is able to watch the images and the onetime texts
allocated to them,
* the user should desirably be required to go through this
authentication process every 15 minutes or so in order to
prevent an adversary from taking it over while being logged in.
* this operation could be applied to a number of industrial
applications where environment could be turbulent or panicky.
WITH DISPLAY-ON-GLASSES
< Situation >
- the displays are connected to the command server via radio
communications
- both hands of the user are covered by the gloves or are
occupied by impending jobs, with eyes and faces protected by
safety gears
- the situation around the user is neither calm nor friendly - tense,
noisy, rapidly changing or life-threatening
- the information and data the user sends and receives to/from
the command server need the strongest possible security
protection, including the reliable identity authentication
- the identity authentication should preferably be practicable
while walking, running or fighting
• authentication by voice matching could be
somehow feasible only in calm and friendly
environment
There are several
unforgettable pictures
in the matrix
There are
several known
pictures in the
matrix
I can easily find all of
them right away
Only I can select all of
them correctly
Broader choices: images AND characters
Torturous login is history. Login is now comfortable, relaxing and healing.
EXPANDED PASSWORD SYSTEM
INTUITIVE SOLUTION BY MNEMONIC SECURITY
Easy to manage relations between accounts and corresponding passwords.

Identity Assurance in Emergencies

  • 1.
    IDENTITY ASSURANCE INEMERGENCIES Disaster Recovery Cards and tokens possessed? Biometrics practicable? Survivors must come back to social activities most quickly as servicemen or residents. In the Field Strain Confusion Injury Seizure Practicable with both hands busy ? In panic? With injuries? Seizure of devices, tokens, memos Seizure of body features With eyeglasses-mounted displays - defense and law enforcement - firefighting and emergencies - high-security public facilities - field operations like construction - heavy-demanding factory floors Practicable even when both hands are busy by voice command of onetime passwords extracted from unforgettable images Pre-registration desirable before facing Earthquakes, Tsunamis, Eruptions, Hurricanes, Floods, Landslides, Fires, Explosions, Nuclear Accidents, and also Large Gatherings With protection gear on? Even in severe panic, we can quickly recognize unforgettable images of episodic memories.
  • 2.
    < Flow ofIdentity Authentication > - the user utters "connect" to the mic (which could be bone- conduction for noisy situation or voiceless voice-code sensing for silent situation) - when connected, the user watches the matrix of images displayed in front of their eye. - the user reads out the onetime texts allocated to the pre- registered images from among the image matrix presented - when images of beloved ones had been registered, the user could expect to make the login without failure in a very impending or even panicky situation * eavesdropping of the uttered texts is just futile because only the user is able to watch the images and the onetime texts allocated to them, * the user should desirably be required to go through this authentication process every 15 minutes or so in order to prevent an adversary from taking it over while being logged in. * this operation could be applied to a number of industrial applications where environment could be turbulent or panicky. WITH DISPLAY-ON-GLASSES < Situation > - the displays are connected to the command server via radio communications - both hands of the user are covered by the gloves or are occupied by impending jobs, with eyes and faces protected by safety gears - the situation around the user is neither calm nor friendly - tense, noisy, rapidly changing or life-threatening - the information and data the user sends and receives to/from the command server need the strongest possible security protection, including the reliable identity authentication - the identity authentication should preferably be practicable while walking, running or fighting • authentication by voice matching could be somehow feasible only in calm and friendly environment There are several unforgettable pictures in the matrix
  • 3.
    There are several known picturesin the matrix I can easily find all of them right away Only I can select all of them correctly Broader choices: images AND characters Torturous login is history. Login is now comfortable, relaxing and healing. EXPANDED PASSWORD SYSTEM INTUITIVE SOLUTION BY MNEMONIC SECURITY Easy to manage relations between accounts and corresponding passwords.