Multifactor Authentication

2. State-of-the-Art and Potential MFA Sources

2.1.2. Token Presence

The password could then be supplemented with a physical token­ – for example, a card, which is recommended as a second factor group­ – the ownership. From the hardware perspective, a user may present a smartcard, phone, wearable device, etc., which are more complicated to delegate. In this case, the system should be equipped with a radio interface allowing for two-way communication with the token. On the other hand, the most widely known software token is one-time software generated password. The main drawback of the above is the problem of uncontrollable duplication.