SlideShare a Scribd company logo
1 of 3
Torturous LoginTorturous Login
vsvs
Comforting LoginComforting Login
Login by remembered passwords is oftenLogin by remembered passwords is often
torturous for many of us.torturous for many of us.
But it is not the fate of the password login.But it is not the fate of the password login.
6th January, 2016
Mnemonic Security, Inc., Japan/UK
why?why?
The login could be comfortable, relaxingThe login could be comfortable, relaxing
and healing if you register the imagesand healing if you register the images
reminiscent of pleasant remembrance asreminiscent of pleasant remembrance as
the password for the Expanded Passwordthe password for the Expanded Password
System that we advocate.System that we advocate.
When you access an account, you will watch the pictures of dogs
and cats that you had loved many years ago. When you access
another account, you will see the pictures of your old friends you
played with when you were a small child. With other accounts, you
will find the pictures taken over your life time of various things and
scenes reminiscent of your beloved ones.
andand
All of them could probably help make you feel comfortable, relaxed andAll of them could probably help make you feel comfortable, relaxed and
healed. Torturous login that we have had to suffer for many decadeshealed. Torturous login that we have had to suffer for many decades
will be history.will be history.
And this bonus comes on top of the better balance of security andAnd this bonus comes on top of the better balance of security and
convenience made possible by the Expanded Password System.convenience made possible by the Expanded Password System.
Account AAccount A Account BAccount B Account CAccount C Account DAccount D
Account E,Account E,
F, G, H, I, J,F, G, H, I, J,
K, L-----------K, L-----------
Thank youThank you

More Related Content

Viewers also liked

Green Pearl Events Multifamily Investment Summit Gary Kachadurian Presentation
Green Pearl Events Multifamily Investment Summit   Gary Kachadurian PresentationGreen Pearl Events Multifamily Investment Summit   Gary Kachadurian Presentation
Green Pearl Events Multifamily Investment Summit Gary Kachadurian PresentationRyan Slack
 
Права_споживачів_комунальних_послуг
Права_споживачів_комунальних_послугПрава_споживачів_комунальних_послуг
Права_споживачів_комунальних_послугVitalij Misjats
 
British Galleries 2002
British Galleries 2002British Galleries 2002
British Galleries 2002James Jensen
 
Mind-mapping for Developers
Mind-mapping for DevelopersMind-mapping for Developers
Mind-mapping for DevelopersRey Mayson
 
Respuesta de Piedad Córdoba a Vladdo
Respuesta de Piedad Córdoba a VladdoRespuesta de Piedad Córdoba a Vladdo
Respuesta de Piedad Córdoba a VladdoPoder Ciudadano
 
EMC World 2016 - cnaITL.04 Open Source has changed how you run Infrastructure
EMC World 2016 - cnaITL.04 Open Source has changed how you run InfrastructureEMC World 2016 - cnaITL.04 Open Source has changed how you run Infrastructure
EMC World 2016 - cnaITL.04 Open Source has changed how you run Infrastructure{code}
 
Средство индивидуального перемещения "СИП-С"
Средство индивидуального перемещения "СИП-С"Средство индивидуального перемещения "СИП-С"
Средство индивидуального перемещения "СИП-С"kulibin
 
Evans_Katherine_Chase Home for Children_2016 08 05
Evans_Katherine_Chase Home for Children_2016 08 05Evans_Katherine_Chase Home for Children_2016 08 05
Evans_Katherine_Chase Home for Children_2016 08 05Katherine Evans
 
Social Enterprise Comes to Life with Integration
Social Enterprise Comes to Life with IntegrationSocial Enterprise Comes to Life with Integration
Social Enterprise Comes to Life with IntegrationConfigero
 
Wuletawu Abera Ph.D. defense
Wuletawu Abera Ph.D. defenseWuletawu Abera Ph.D. defense
Wuletawu Abera Ph.D. defenseRiccardo Rigon
 
Evaluation question 1 - Jemima Chamberlin
Evaluation question 1 - Jemima ChamberlinEvaluation question 1 - Jemima Chamberlin
Evaluation question 1 - Jemima Chamberlinlongroadmedia14
 

Viewers also liked (12)

Lazy desk
Lazy deskLazy desk
Lazy desk
 
Green Pearl Events Multifamily Investment Summit Gary Kachadurian Presentation
Green Pearl Events Multifamily Investment Summit   Gary Kachadurian PresentationGreen Pearl Events Multifamily Investment Summit   Gary Kachadurian Presentation
Green Pearl Events Multifamily Investment Summit Gary Kachadurian Presentation
 
Права_споживачів_комунальних_послуг
Права_споживачів_комунальних_послугПрава_споживачів_комунальних_послуг
Права_споживачів_комунальних_послуг
 
British Galleries 2002
British Galleries 2002British Galleries 2002
British Galleries 2002
 
Mind-mapping for Developers
Mind-mapping for DevelopersMind-mapping for Developers
Mind-mapping for Developers
 
Respuesta de Piedad Córdoba a Vladdo
Respuesta de Piedad Córdoba a VladdoRespuesta de Piedad Córdoba a Vladdo
Respuesta de Piedad Córdoba a Vladdo
 
EMC World 2016 - cnaITL.04 Open Source has changed how you run Infrastructure
EMC World 2016 - cnaITL.04 Open Source has changed how you run InfrastructureEMC World 2016 - cnaITL.04 Open Source has changed how you run Infrastructure
EMC World 2016 - cnaITL.04 Open Source has changed how you run Infrastructure
 
Средство индивидуального перемещения "СИП-С"
Средство индивидуального перемещения "СИП-С"Средство индивидуального перемещения "СИП-С"
Средство индивидуального перемещения "СИП-С"
 
Evans_Katherine_Chase Home for Children_2016 08 05
Evans_Katherine_Chase Home for Children_2016 08 05Evans_Katherine_Chase Home for Children_2016 08 05
Evans_Katherine_Chase Home for Children_2016 08 05
 
Social Enterprise Comes to Life with Integration
Social Enterprise Comes to Life with IntegrationSocial Enterprise Comes to Life with Integration
Social Enterprise Comes to Life with Integration
 
Wuletawu Abera Ph.D. defense
Wuletawu Abera Ph.D. defenseWuletawu Abera Ph.D. defense
Wuletawu Abera Ph.D. defense
 
Evaluation question 1 - Jemima Chamberlin
Evaluation question 1 - Jemima ChamberlinEvaluation question 1 - Jemima Chamberlin
Evaluation question 1 - Jemima Chamberlin
 

More from Hitoshi Kokumai

Image-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxImage-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxHitoshi Kokumai
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)Hitoshi Kokumai
 
Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Hitoshi Kokumai
 
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Hitoshi Kokumai
 
Fend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryFend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryHitoshi Kokumai
 
Bring healthy second life to legacy password system
Bring healthy second life to legacy password systemBring healthy second life to legacy password system
Bring healthy second life to legacy password systemHitoshi Kokumai
 
Intriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneIntriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneHitoshi Kokumai
 
Cyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsCyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsHitoshi Kokumai
 
Updated: Presentation with Scripts at CIW2018
Updated:  Presentation with Scripts at CIW2018Updated:  Presentation with Scripts at CIW2018
Updated: Presentation with Scripts at CIW2018Hitoshi Kokumai
 
Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Hitoshi Kokumai
 
Updated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryUpdated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryHitoshi Kokumai
 
Deployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BDeployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BHitoshi Kokumai
 
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...Hitoshi Kokumai
 
Help unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHelp unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHitoshi Kokumai
 
Business Dimension of Expanded Password System
Business Dimension of Expanded Password SystemBusiness Dimension of Expanded Password System
Business Dimension of Expanded Password SystemHitoshi Kokumai
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceHitoshi Kokumai
 

More from Hitoshi Kokumai (16)

Image-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxImage-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptx
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)
 
Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)
 
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
 
Fend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryFend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic Memory
 
Bring healthy second life to legacy password system
Bring healthy second life to legacy password systemBring healthy second life to legacy password system
Bring healthy second life to legacy password system
 
Intriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneIntriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to One
 
Cyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsCyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password Systems
 
Updated: Presentation with Scripts at CIW2018
Updated:  Presentation with Scripts at CIW2018Updated:  Presentation with Scripts at CIW2018
Updated: Presentation with Scripts at CIW2018
 
Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018
 
Updated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryUpdated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and Memory
 
Deployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BDeployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63B
 
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
 
Help unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHelp unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guideline
 
Business Dimension of Expanded Password System
Business Dimension of Expanded Password SystemBusiness Dimension of Expanded Password System
Business Dimension of Expanded Password System
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity Assurance
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Torturous Login or Comforting Login?

  • 1. Torturous LoginTorturous Login vsvs Comforting LoginComforting Login Login by remembered passwords is oftenLogin by remembered passwords is often torturous for many of us.torturous for many of us. But it is not the fate of the password login.But it is not the fate of the password login. 6th January, 2016 Mnemonic Security, Inc., Japan/UK
  • 2. why?why? The login could be comfortable, relaxingThe login could be comfortable, relaxing and healing if you register the imagesand healing if you register the images reminiscent of pleasant remembrance asreminiscent of pleasant remembrance as the password for the Expanded Passwordthe password for the Expanded Password System that we advocate.System that we advocate. When you access an account, you will watch the pictures of dogs and cats that you had loved many years ago. When you access another account, you will see the pictures of your old friends you played with when you were a small child. With other accounts, you will find the pictures taken over your life time of various things and scenes reminiscent of your beloved ones.
  • 3. andand All of them could probably help make you feel comfortable, relaxed andAll of them could probably help make you feel comfortable, relaxed and healed. Torturous login that we have had to suffer for many decadeshealed. Torturous login that we have had to suffer for many decades will be history.will be history. And this bonus comes on top of the better balance of security andAnd this bonus comes on top of the better balance of security and convenience made possible by the Expanded Password System.convenience made possible by the Expanded Password System. Account AAccount A Account BAccount B Account CAccount C Account DAccount D Account E,Account E, F, G, H, I, J,F, G, H, I, J, K, L-----------K, L----------- Thank youThank you