Multifactor Authentication
2. State-of-the-Art and Potential MFA Sources
2.1.2. Token Presence
The password could then be supplemented with a physical token – for example, a card, which is recommended as a second factor group – the ownership. From the hardware perspective, a user may present a smartcard, phone, wearable device, etc., which are more complicated to delegate. In this case, the system should be equipped with a radio interface allowing for two-way communication with the token. On the other hand, the most widely known software token is one-time software generated password. The main drawback of the above is the problem of uncontrollable duplication.