Hitoshi Kokumai

Kokumai

Identity Assurance – Sufficient and Necessary Conditions

May 12, 2020

Identity Assurance It is not easy to define the ‘sufficient condition’ for describing a set of processes used to establish that a natural person is real, unique, and identifiable; criminals keep coming up with hitherto unknown weapons to compromise the

Read More
Kokumai

How to Enhance Security of Digital Identity

October 7, 2019

Enhance Security of Digital Identity Introduction The subject of this article is a fragile digital identity built with a weak password, which makes a grave choke point of the cyber age. The word ‘password’ is poly-semantic and context-dependent. Sometimes it’s

Read More
Kokumai

History, Current Status and Future Scenarios of Expanded Password System

June 5, 2019

Future Scenarios of Expanded Password System Passwords are so hard to manage that some people are urging the removal of passwords from digital identity altogether. What would happen, then, if the password is removed from our identity assurance? Where the password

Read More
Kokumai

Four Puzzling Issues of Identity Authentication – Part 2

October 30, 2018

Caveats about ‘Password’ Continued from Part 1… Sometimes the word ‘Password’ is narrowly interpreted as ‘remembered text password’ and sometimes it’s taken broadly as ‘whatever we remember for authentication’. We are of the view that it would be desirable to

Read More
Kokumai

Four Puzzling Issues of Identity Authentication

October 24, 2018

Four Puzzling Issues of Identity Authentication – Takeaways from Consumer Identity World USA 2018 – Introduction The so-called password-less authentication, if implemented literally, would lead us to a world where we are deprived of the chances and means to get

Read More
Kokumai

Part 2 – Identity Assurance by Our Own Volition and Memory

August 7, 2018

Identity Assurance We believe that the reliable identity assurance (See part 1) must be built on three prerequisite principles as follows. Volition of the User – with Self-Determination, Identity authentication with no confirmation of the user’s volition would lead to

Read More
Kokumai

Part 1 – Identity Assurance by Our Own Volition and Memory

July 30, 2018

In an earlier article we discussed what technology can displace the password. The proposition of Expanded Password System (EPS) that we advocate is now acknowledged as a ‘Draft Proposal’ for OASIS Open Projects that OASIS has recently launched as a

Read More
Kokumai

The ID Federation: What Technology Can Displace The Password?

March 25, 2016

The Future Password Many people shout that the password is dead or should be killed dead. The password could be killed, however, only when there is an alternative to the password. Let us think about what technology can displace the password. Some

Read More
Dana Gardner
Just as cloud computing initially seeped into organizations under the cloak of shadow IT, application programming interface (API) adoption has often followed an organic, inexact, and unaudited path. IT leaders know they’re benefiting from APIs -- ...
Space
The Space Race Is Heating Up For years the Space Race was the domain of countries and the national space programs. Namely Russia and America with China and India joining the game more recently. The ...
Gary Bernstein
How IoT Cloud Services Stack Up Against DIY The ever-increasing mass adoption of IoT devices is leading to a consistent rise in the data generated through these devices. Large corporations are cashing on this opportunity ...
Using AWS AppConfig Feature Flags
AWS recently launched AWS AppConfig Feature Flags. Feature flagging is a powerful tool that allows engineers to safely push out new features to customers, but doing so in a measured and usually gradual way. In this blog ...
Wealth Management Software Solutions - ServiceNow
Financial wealth management services (Updated: 06/29/2022) Many want to live in abundance, but very few people have what it takes to harness true wealth. True wealth is harnessed through the effective management of resources. Despite ...