SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
Passwords should not be killed dead, but should be expanded.
Some people shout that the password should be killed dead by deploying PIN or biometrics. However, the
idea of killing passwords dead is simply absurd. A cyber space where we have to live without remembered
passwords, i.e., where our identity is established without our volitional participation would be a world in
which we would be able to have a safe sleep only when we were alone in a firmly locked room. Is this what
we want?
Even more absurd is the idea of killing passwords by deploying PIN (numbers-only password). If we could
displace the password with the numbers-only password, we should be able to displace horses with ponies,
lorries with mini-lorries. We would need to find an exit fromAlice’s Wonderland.
As crazy is the idea of killing the password dead by deploying the biometrics that need to depend on a
password. Whether face, iris, fingerprint, typing, gesture, heartbeat or brainwave, biometric authentication
could be a candidate for displacing the password if/when (only if/when) it has completely stopped depending
on a password registered in case of false rejection while keeping the near-zero false acceptance. Threats
that can be thwarted by biometric products operated together with a fallback password against false
rejection can be thwarted more securely by the password alone.
We could be certain that biometrics would help for better security only when it is operated together with a
password by AND/Conjunction (we need to go through both of the two), not when operated with a password
by OR/Disjunction (we need only to go through either one of the two) as in the cases of Touch ID and many
other biometric products on the market that require a backup/fallback password. It only increases
convenience by bringing down security.
Two/multi-factor authentication schemes that need a password as one of the factors can by no means
displace passwords while ID federations (password-managers and single-sign-on services) create a single
point of failure which makes another big vulnerability if it is operated in an excessively centralized way.
Now that it is obvious that conventional character-based password alone can no longer suffice, we urgently
need a successor to it. What we advocate as the successor is an Expanded Password System that accepts
images as well as characters.
At the root of the password headache is the cognitive phenomena called “interference of memory”, by which
we cannot firmly remember and correctly recall more than 5 textual passwords on average. What worries
us is not the password, but the textual password. The textual memory being only a small part of what we
remember, we could think of making use of the larger part of our memory that is less subject to interference
of memory. More attention could be paid to the efforts of expanding the password system to include images,
particularly images of episodic/autobiographic memory, in addition to characters, so we can easily manage
dozens of unique passwords for dozens of accounts by our remembrance.
The Expanded Password System certainly would not solve all the password problems on its own, but it will
no doubt help to largely mitigate the problems with the smallest possible costs, contributing to safer life in
the real/cyber-fused society over many generations or centuries to come.
3rd September 2015/
Hitoshi Kokumai

Más contenido relacionado

Destacado

КРЕЧЕТ Беспилотные аэрофотосъёмочные системы
КРЕЧЕТ Беспилотные аэрофотосъёмочные системыКРЕЧЕТ Беспилотные аэрофотосъёмочные системы
КРЕЧЕТ Беспилотные аэрофотосъёмочные системыkulibin
 
June 2013 StartUp Health Insights Funding Report
June 2013 StartUp Health Insights Funding ReportJune 2013 StartUp Health Insights Funding Report
June 2013 StartUp Health Insights Funding ReportStartUp Health
 
Planificacion de pastorcitos
Planificacion de pastorcitosPlanificacion de pastorcitos
Planificacion de pastorcitosAntotoo
 
อาร์ม รูปโมลานิซ่า
อาร์ม  รูปโมลานิซ่าอาร์ม  รูปโมลานิซ่า
อาร์ม รูปโมลานิซ่าMos BirDy
 
Cp knowledge: 31 fbt presentation ankit
Cp knowledge: 31 fbt presentation ankitCp knowledge: 31 fbt presentation ankit
Cp knowledge: 31 fbt presentation ankitPavan Kumar Vijay
 
電器 & 傢俬
電器 & 傢俬電器 & 傢俬
電器 & 傢俬lingtabo
 
Natural Europe - BHL Europe Liaison meeting 2011
Natural Europe - BHL Europe Liaison meeting 2011Natural Europe - BHL Europe Liaison meeting 2011
Natural Europe - BHL Europe Liaison meeting 2011Nikos Manouselis
 
The Europeana group: integrating the projects Project overviews
The Europeana group: integrating the projects Project overviewsThe Europeana group: integrating the projects Project overviews
The Europeana group: integrating the projects Project overviewsEuropeana
 
Sherborn: Scholz - BHL-Europe: Tools and Services for Legacy Taxonomic Litera...
Sherborn: Scholz - BHL-Europe: Tools and Services for Legacy Taxonomic Litera...Sherborn: Scholz - BHL-Europe: Tools and Services for Legacy Taxonomic Litera...
Sherborn: Scholz - BHL-Europe: Tools and Services for Legacy Taxonomic Litera...ICZN
 
NICC: 5 inbraken in laatste 5 jaar
NICC: 5 inbraken in laatste 5 jaarNICC: 5 inbraken in laatste 5 jaar
NICC: 5 inbraken in laatste 5 jaarThierry Debels
 
อาร์ม รูปโมลานิซ่า
อาร์ม  รูปโมลานิซ่าอาร์ม  รูปโมลานิซ่า
อาร์ม รูปโมลานิซ่าMos BirDy
 

Destacado (16)

КРЕЧЕТ Беспилотные аэрофотосъёмочные системы
КРЕЧЕТ Беспилотные аэрофотосъёмочные системыКРЕЧЕТ Беспилотные аэрофотосъёмочные системы
КРЕЧЕТ Беспилотные аэрофотосъёмочные системы
 
June 2013 StartUp Health Insights Funding Report
June 2013 StartUp Health Insights Funding ReportJune 2013 StartUp Health Insights Funding Report
June 2013 StartUp Health Insights Funding Report
 
Planificacion de pastorcitos
Planificacion de pastorcitosPlanificacion de pastorcitos
Planificacion de pastorcitos
 
อาร์ม รูปโมลานิซ่า
อาร์ม  รูปโมลานิซ่าอาร์ม  รูปโมลานิซ่า
อาร์ม รูปโมลานิซ่า
 
Cp knowledge: 31 fbt presentation ankit
Cp knowledge: 31 fbt presentation ankitCp knowledge: 31 fbt presentation ankit
Cp knowledge: 31 fbt presentation ankit
 
電器 & 傢俬
電器 & 傢俬電器 & 傢俬
電器 & 傢俬
 
Natural Europe - BHL Europe Liaison meeting 2011
Natural Europe - BHL Europe Liaison meeting 2011Natural Europe - BHL Europe Liaison meeting 2011
Natural Europe - BHL Europe Liaison meeting 2011
 
The Europeana group: integrating the projects Project overviews
The Europeana group: integrating the projects Project overviewsThe Europeana group: integrating the projects Project overviews
The Europeana group: integrating the projects Project overviews
 
Sherborn: Scholz - BHL-Europe: Tools and Services for Legacy Taxonomic Litera...
Sherborn: Scholz - BHL-Europe: Tools and Services for Legacy Taxonomic Litera...Sherborn: Scholz - BHL-Europe: Tools and Services for Legacy Taxonomic Litera...
Sherborn: Scholz - BHL-Europe: Tools and Services for Legacy Taxonomic Litera...
 
Coworklisboa 2014
Coworklisboa 2014Coworklisboa 2014
Coworklisboa 2014
 
NICC: 5 inbraken in laatste 5 jaar
NICC: 5 inbraken in laatste 5 jaarNICC: 5 inbraken in laatste 5 jaar
NICC: 5 inbraken in laatste 5 jaar
 
Understanding the Books.Quia Homework 2012
Understanding the Books.Quia Homework 2012Understanding the Books.Quia Homework 2012
Understanding the Books.Quia Homework 2012
 
社會回饋
社會回饋社會回饋
社會回饋
 
Mobile world Summit - 2014
Mobile world Summit - 2014Mobile world Summit - 2014
Mobile world Summit - 2014
 
อาร์ม รูปโมลานิซ่า
อาร์ม  รูปโมลานิซ่าอาร์ม  รูปโมลานิซ่า
อาร์ม รูปโมลานิซ่า
 
Pretotyping
PretotypingPretotyping
Pretotyping
 

Más de Hitoshi Kokumai

Image-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxImage-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxHitoshi Kokumai
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)Hitoshi Kokumai
 
Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Hitoshi Kokumai
 
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Hitoshi Kokumai
 
Fend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryFend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryHitoshi Kokumai
 
Bring healthy second life to legacy password system
Bring healthy second life to legacy password systemBring healthy second life to legacy password system
Bring healthy second life to legacy password systemHitoshi Kokumai
 
Intriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneIntriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneHitoshi Kokumai
 
Cyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsCyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsHitoshi Kokumai
 
Updated: Presentation with Scripts at CIW2018
Updated:  Presentation with Scripts at CIW2018Updated:  Presentation with Scripts at CIW2018
Updated: Presentation with Scripts at CIW2018Hitoshi Kokumai
 
Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Hitoshi Kokumai
 
Updated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryUpdated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryHitoshi Kokumai
 
Deployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BDeployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BHitoshi Kokumai
 
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...Hitoshi Kokumai
 
Help unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHelp unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHitoshi Kokumai
 
Business Dimension of Expanded Password System
Business Dimension of Expanded Password SystemBusiness Dimension of Expanded Password System
Business Dimension of Expanded Password SystemHitoshi Kokumai
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceHitoshi Kokumai
 

Más de Hitoshi Kokumai (16)

Image-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxImage-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptx
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)
 
Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)
 
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
 
Fend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryFend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic Memory
 
Bring healthy second life to legacy password system
Bring healthy second life to legacy password systemBring healthy second life to legacy password system
Bring healthy second life to legacy password system
 
Intriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneIntriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to One
 
Cyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsCyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password Systems
 
Updated: Presentation with Scripts at CIW2018
Updated:  Presentation with Scripts at CIW2018Updated:  Presentation with Scripts at CIW2018
Updated: Presentation with Scripts at CIW2018
 
Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018
 
Updated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryUpdated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and Memory
 
Deployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BDeployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63B
 
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
 
Help unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHelp unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guideline
 
Business Dimension of Expanded Password System
Business Dimension of Expanded Password SystemBusiness Dimension of Expanded Password System
Business Dimension of Expanded Password System
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity Assurance
 

Último

Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 

Último (20)

Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 

The password should not be killed dead, but should be expanded.

  • 1. Passwords should not be killed dead, but should be expanded. Some people shout that the password should be killed dead by deploying PIN or biometrics. However, the idea of killing passwords dead is simply absurd. A cyber space where we have to live without remembered passwords, i.e., where our identity is established without our volitional participation would be a world in which we would be able to have a safe sleep only when we were alone in a firmly locked room. Is this what we want? Even more absurd is the idea of killing passwords by deploying PIN (numbers-only password). If we could displace the password with the numbers-only password, we should be able to displace horses with ponies, lorries with mini-lorries. We would need to find an exit fromAlice’s Wonderland. As crazy is the idea of killing the password dead by deploying the biometrics that need to depend on a password. Whether face, iris, fingerprint, typing, gesture, heartbeat or brainwave, biometric authentication could be a candidate for displacing the password if/when (only if/when) it has completely stopped depending on a password registered in case of false rejection while keeping the near-zero false acceptance. Threats that can be thwarted by biometric products operated together with a fallback password against false rejection can be thwarted more securely by the password alone. We could be certain that biometrics would help for better security only when it is operated together with a password by AND/Conjunction (we need to go through both of the two), not when operated with a password by OR/Disjunction (we need only to go through either one of the two) as in the cases of Touch ID and many other biometric products on the market that require a backup/fallback password. It only increases convenience by bringing down security. Two/multi-factor authentication schemes that need a password as one of the factors can by no means displace passwords while ID federations (password-managers and single-sign-on services) create a single point of failure which makes another big vulnerability if it is operated in an excessively centralized way. Now that it is obvious that conventional character-based password alone can no longer suffice, we urgently need a successor to it. What we advocate as the successor is an Expanded Password System that accepts images as well as characters. At the root of the password headache is the cognitive phenomena called “interference of memory”, by which we cannot firmly remember and correctly recall more than 5 textual passwords on average. What worries us is not the password, but the textual password. The textual memory being only a small part of what we remember, we could think of making use of the larger part of our memory that is less subject to interference of memory. More attention could be paid to the efforts of expanding the password system to include images, particularly images of episodic/autobiographic memory, in addition to characters, so we can easily manage dozens of unique passwords for dozens of accounts by our remembrance. The Expanded Password System certainly would not solve all the password problems on its own, but it will no doubt help to largely mitigate the problems with the smallest possible costs, contributing to safer life in the real/cyber-fused society over many generations or centuries to come. 3rd September 2015/ Hitoshi Kokumai