Hitoshi Kokumai
Identity Assurance It is not easy to define the ‘sufficient condition’ for describing a set of processes used to establish that a natural person is real, unique, and identifiable; criminals keep coming up with hitherto unknown weapons to compromise the
Read MoreEnhance Security of Digital Identity Introduction The subject of this article is a fragile digital identity built with a weak password, which makes a grave choke point of the cyber age. The word ‘password’ is poly-semantic and context-dependent. Sometimes it’s
Read MoreCaveats about ‘Password’ Continued from Part 1… Sometimes the word ‘Password’ is narrowly interpreted as ‘remembered text password’ and sometimes it’s taken broadly as ‘whatever we remember for authentication’. We are of the view that it would be desirable to
Read MoreFour Puzzling Issues of Identity Authentication – Takeaways from Consumer Identity World USA 2018 – Introduction The so-called password-less authentication, if implemented literally, would lead us to a world where we are deprived of the chances and means to get
Read MoreIdentity Assurance We believe that the reliable identity assurance (See part 1) must be built on three prerequisite principles as follows. Volition of the User – with Self-Determination, Identity authentication with no confirmation of the user’s volition would lead to
Read MoreIn an earlier article we discussed what technology can displace the password. The proposition of Expanded Password System (EPS) that we advocate is now acknowledged as a ‘Draft Proposal’ for OASIS Open Projects that OASIS has recently launched as a
Read MoreThe Future Password Many people shout that the password is dead or should be killed dead. The password could be killed, however, only when there is an alternative to the password. Let us think about what technology can displace the password. Some
Read More