SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
The problem: passwords could work
– but they need help
The safety of our cyber life
depends on identity assurance,
which relies on passwords
• Passwords are
– Hard to remember
– Hard to manage
– Easy to steal
– And yet, absolutely necessary
• Identity theft and security breaches are proliferating
• A critical problem requiring urgent practical solutions
A billion-dollar, growing market
• Identity processes costing over US$60bn worldwide
• US $10bn market growth in the next ten years
There are
several known
pictures in the
matrix
I can easily find all of
them right away
Only I can select all of
them correctly
Broader choices: images AND characters
Torturous login is history. Login is now comfortable, relaxing and healing.
SOLUTION: EXPANDED PASSWORD SYSTEM
BY MNEMONIC SECURITY
Easy to manage relations between accounts and corresponding passwords.
A FUN WAY TO ENHANCE YOUR PASSWORDS!
A fun first step
Get the images in your password matrix registered. It’s easy.
And soon: gamification
Huge Improvement
Password fatigue alleviated for all
Better security for password-managers and SSO services
Even better security for two/multi-factor authentications
Less vulnerable security for biometric products
Backward-Compatible
Nothing lost for users who wish to keep using character-based
passwords.
Client Software
for
Device Login
Applications Login
Image-to-Code Conversion
Server Software
for
Online-Access
2-Factor Scheme
Open ID Compatible
Data Encryption Software
with on-the-fly key generation
Single & Distributed Authority
Brand
expass (globally)
Mnemonic Guard
(over 10 years in Japan)
MNEMONIC SECURITY’S PRODUCTS
USE CASES IN EMERGENCIES
Disaster Recovery
Cards and tokens
possessed?
Biometrics
practicable?
Survivors must come back to social activities
most quickly as servicemen or residents.
In the Field
Strain
Confusion
Injury
Seizure
Practicable with both hands busy ?
In panic? With injuries?
Seizure of devices,
tokens, memos
Seizure of
body features
With eyeglasses-mounted displays
- defense and law enforcement
- firefighting and emergencies
- high-security public facilities
- field operations like construction
- heavy-demanding factory floors
Practicable even when both hands are busy
by voice command of onetime passwords
extracted from unforgettable images
Pre-registration desirable before facing
Earthquakes, Tsunamis, Eruptions,
Hurricanes, Floods, Landslides,
Fires, Explosions, Nuclear Accidents,
and also Large Gatherings
With protection gear on?
Even in severe panic, we can quickly
recognize unforgettable images
of episodic memories.
COMPETITOR OR OPPORTUNITY?
Biometrics?
Biometrics require passwords as a backup system means: Our opportunity.
Password-managers, single-sign-on service?
Passwords required as the master-password. Our opportunity.
Two/multi-factor authentications?
Passwords required as one of the factors. Our opportunity.
Pattern-on-grid, simple picture passwords, passphrases?
Deployable on our platform. Our sweet spot.
Competition expected from copycats.
We are first-to-market.
HOW WE POSITION OURSELVES
We DO NOT compete with biometrics, multi-factor schemes or password
managers – we ENHANCE them
We make password schemes better by leveraging the time-honored
tradition of seals and autographs
• Our competitive advantage:
being the pioneer in episodic image memory,
relevant intellectual property
10 years’ worth of development and deployment
PATH FOR GROWTH
Basic line-up of products developed with $1m sales
Available for the global market with translation
from Japanese into English and updating work
Market awareness is shifting as biometrics fails to fulfill its promise
= opportunity to relaunch business worldwide
Hitoshi Kokumai, Inventor of Expanded Password System
“expass” “Mnemonic Guard”
Advisory Board
• Laurent Liscia, CEO of OASIS Open
• Don Thibeau, Chairman of Open Identity Exchange and Executive Director of
OpenID Foundation
• Colonel (retired) Hiroshi Itoh, Founding Commander of Systems Defense Unit,
Signal Brigade, Japanese Ground Self-Defense Forces.
For more information:
Mail: kokumai@mneme.co.jp Skype: kokumaiskype
WHO ARE WE?
November 2, 2016
Isn’t biometrics solving the problem?
Inconceivable!
Something reliant on a password
Unable to displace the password
Most of the biometric products
Operated with passwords as a fallback means
Biometrics operated with a fallback password
Only provide the level of security
lower than a password-only authentication
due to “larger attack surfaces (*)”
* A phrase used by NIST with whom we are discussing on how to rectify the situation.
Appendix

Weitere ähnliche Inhalte

Andere mochten auch

Inclusion - reaching the unreached
Inclusion - reaching the unreachedInclusion - reaching the unreached
Inclusion - reaching the unreachedicdeslides
 
Intelligent Growth: Finding & Testing Your Marketing Channels
Intelligent Growth: Finding & Testing Your Marketing ChannelsIntelligent Growth: Finding & Testing Your Marketing Channels
Intelligent Growth: Finding & Testing Your Marketing ChannelsHiten Shah
 
Data Modeling for Microservices with Cassandra and Spark
Data Modeling for Microservices with Cassandra and SparkData Modeling for Microservices with Cassandra and Spark
Data Modeling for Microservices with Cassandra and SparkJeffrey Carpenter
 
Planificación 2017
Planificación 2017Planificación 2017
Planificación 2017David Vargas
 
Gas Industry Outlook - Myanmar's Perspective
Gas Industry Outlook - Myanmar's PerspectiveGas Industry Outlook - Myanmar's Perspective
Gas Industry Outlook - Myanmar's PerspectiveDr. Oliver Massmann
 
jQueryの先に行こう!最先端のWeb開発トレンドを学ぶ
jQueryの先に行こう!最先端のWeb開発トレンドを学ぶjQueryの先に行こう!最先端のWeb開発トレンドを学ぶ
jQueryの先に行こう!最先端のWeb開発トレンドを学ぶShumpei Shiraishi
 
Como Apresentar Codigo em Slides - Javou #7 - 2016
Como Apresentar Codigo em Slides - Javou #7 - 2016Como Apresentar Codigo em Slides - Javou #7 - 2016
Como Apresentar Codigo em Slides - Javou #7 - 2016Rafael Ponte
 

Andere mochten auch (8)

Inclusion - reaching the unreached
Inclusion - reaching the unreachedInclusion - reaching the unreached
Inclusion - reaching the unreached
 
Intelligent Growth: Finding & Testing Your Marketing Channels
Intelligent Growth: Finding & Testing Your Marketing ChannelsIntelligent Growth: Finding & Testing Your Marketing Channels
Intelligent Growth: Finding & Testing Your Marketing Channels
 
Gamification 101 session 4
Gamification 101 session 4Gamification 101 session 4
Gamification 101 session 4
 
Data Modeling for Microservices with Cassandra and Spark
Data Modeling for Microservices with Cassandra and SparkData Modeling for Microservices with Cassandra and Spark
Data Modeling for Microservices with Cassandra and Spark
 
Planificación 2017
Planificación 2017Planificación 2017
Planificación 2017
 
Gas Industry Outlook - Myanmar's Perspective
Gas Industry Outlook - Myanmar's PerspectiveGas Industry Outlook - Myanmar's Perspective
Gas Industry Outlook - Myanmar's Perspective
 
jQueryの先に行こう!最先端のWeb開発トレンドを学ぶ
jQueryの先に行こう!最先端のWeb開発トレンドを学ぶjQueryの先に行こう!最先端のWeb開発トレンドを学ぶ
jQueryの先に行こう!最先端のWeb開発トレンドを学ぶ
 
Como Apresentar Codigo em Slides - Javou #7 - 2016
Como Apresentar Codigo em Slides - Javou #7 - 2016Como Apresentar Codigo em Slides - Javou #7 - 2016
Como Apresentar Codigo em Slides - Javou #7 - 2016
 

Mehr von Hitoshi Kokumai

Image-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxImage-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxHitoshi Kokumai
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)Hitoshi Kokumai
 
Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Hitoshi Kokumai
 
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Hitoshi Kokumai
 
Fend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryFend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryHitoshi Kokumai
 
Bring healthy second life to legacy password system
Bring healthy second life to legacy password systemBring healthy second life to legacy password system
Bring healthy second life to legacy password systemHitoshi Kokumai
 
Intriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneIntriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneHitoshi Kokumai
 
Cyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsCyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsHitoshi Kokumai
 
Updated: Presentation with Scripts at CIW2018
Updated:  Presentation with Scripts at CIW2018Updated:  Presentation with Scripts at CIW2018
Updated: Presentation with Scripts at CIW2018Hitoshi Kokumai
 
Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Hitoshi Kokumai
 
Updated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryUpdated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryHitoshi Kokumai
 
Deployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BDeployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BHitoshi Kokumai
 
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...Hitoshi Kokumai
 
Help unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHelp unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHitoshi Kokumai
 
Business Dimension of Expanded Password System
Business Dimension of Expanded Password SystemBusiness Dimension of Expanded Password System
Business Dimension of Expanded Password SystemHitoshi Kokumai
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceHitoshi Kokumai
 

Mehr von Hitoshi Kokumai (16)

Image-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxImage-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptx
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)
 
Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)
 
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
 
Fend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryFend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic Memory
 
Bring healthy second life to legacy password system
Bring healthy second life to legacy password systemBring healthy second life to legacy password system
Bring healthy second life to legacy password system
 
Intriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneIntriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to One
 
Cyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsCyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password Systems
 
Updated: Presentation with Scripts at CIW2018
Updated:  Presentation with Scripts at CIW2018Updated:  Presentation with Scripts at CIW2018
Updated: Presentation with Scripts at CIW2018
 
Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018
 
Updated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryUpdated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and Memory
 
Deployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BDeployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63B
 
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
 
Help unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHelp unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guideline
 
Business Dimension of Expanded Password System
Business Dimension of Expanded Password SystemBusiness Dimension of Expanded Password System
Business Dimension of Expanded Password System
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity Assurance
 

Kürzlich hochgeladen

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

Password Fatigue and Expanded Password System

  • 1. The problem: passwords could work – but they need help The safety of our cyber life depends on identity assurance, which relies on passwords • Passwords are – Hard to remember – Hard to manage – Easy to steal – And yet, absolutely necessary • Identity theft and security breaches are proliferating • A critical problem requiring urgent practical solutions
  • 2. A billion-dollar, growing market • Identity processes costing over US$60bn worldwide • US $10bn market growth in the next ten years
  • 3. There are several known pictures in the matrix I can easily find all of them right away Only I can select all of them correctly Broader choices: images AND characters Torturous login is history. Login is now comfortable, relaxing and healing. SOLUTION: EXPANDED PASSWORD SYSTEM BY MNEMONIC SECURITY Easy to manage relations between accounts and corresponding passwords.
  • 4. A FUN WAY TO ENHANCE YOUR PASSWORDS! A fun first step Get the images in your password matrix registered. It’s easy. And soon: gamification Huge Improvement Password fatigue alleviated for all Better security for password-managers and SSO services Even better security for two/multi-factor authentications Less vulnerable security for biometric products Backward-Compatible Nothing lost for users who wish to keep using character-based passwords.
  • 5. Client Software for Device Login Applications Login Image-to-Code Conversion Server Software for Online-Access 2-Factor Scheme Open ID Compatible Data Encryption Software with on-the-fly key generation Single & Distributed Authority Brand expass (globally) Mnemonic Guard (over 10 years in Japan) MNEMONIC SECURITY’S PRODUCTS
  • 6. USE CASES IN EMERGENCIES Disaster Recovery Cards and tokens possessed? Biometrics practicable? Survivors must come back to social activities most quickly as servicemen or residents. In the Field Strain Confusion Injury Seizure Practicable with both hands busy ? In panic? With injuries? Seizure of devices, tokens, memos Seizure of body features With eyeglasses-mounted displays - defense and law enforcement - firefighting and emergencies - high-security public facilities - field operations like construction - heavy-demanding factory floors Practicable even when both hands are busy by voice command of onetime passwords extracted from unforgettable images Pre-registration desirable before facing Earthquakes, Tsunamis, Eruptions, Hurricanes, Floods, Landslides, Fires, Explosions, Nuclear Accidents, and also Large Gatherings With protection gear on? Even in severe panic, we can quickly recognize unforgettable images of episodic memories.
  • 7. COMPETITOR OR OPPORTUNITY? Biometrics? Biometrics require passwords as a backup system means: Our opportunity. Password-managers, single-sign-on service? Passwords required as the master-password. Our opportunity. Two/multi-factor authentications? Passwords required as one of the factors. Our opportunity. Pattern-on-grid, simple picture passwords, passphrases? Deployable on our platform. Our sweet spot. Competition expected from copycats. We are first-to-market.
  • 8. HOW WE POSITION OURSELVES We DO NOT compete with biometrics, multi-factor schemes or password managers – we ENHANCE them We make password schemes better by leveraging the time-honored tradition of seals and autographs • Our competitive advantage: being the pioneer in episodic image memory, relevant intellectual property 10 years’ worth of development and deployment
  • 9. PATH FOR GROWTH Basic line-up of products developed with $1m sales Available for the global market with translation from Japanese into English and updating work Market awareness is shifting as biometrics fails to fulfill its promise = opportunity to relaunch business worldwide
  • 10. Hitoshi Kokumai, Inventor of Expanded Password System “expass” “Mnemonic Guard” Advisory Board • Laurent Liscia, CEO of OASIS Open • Don Thibeau, Chairman of Open Identity Exchange and Executive Director of OpenID Foundation • Colonel (retired) Hiroshi Itoh, Founding Commander of Systems Defense Unit, Signal Brigade, Japanese Ground Self-Defense Forces. For more information: Mail: kokumai@mneme.co.jp Skype: kokumaiskype WHO ARE WE? November 2, 2016
  • 11. Isn’t biometrics solving the problem? Inconceivable! Something reliant on a password Unable to displace the password Most of the biometric products Operated with passwords as a fallback means Biometrics operated with a fallback password Only provide the level of security lower than a password-only authentication due to “larger attack surfaces (*)” * A phrase used by NIST with whom we are discussing on how to rectify the situation. Appendix