Methods of Authentication

This article calls the authentication factors we are familiar with the ownership factor, knowledge factor, and inherence factor. These names relate to something you have, something you know, and something you are, respectively.

System Fundamentals For Cyber Security/Authentication/Methods of Authentication

Ownership Factor

Security Token

A security token may be a physical device that an authorized user is given to ease authentication. It acts as an electronic key to access something. Examples include:

  • USB Devices
  • Key Fob
  • Smart Card
  • RFID Tokens

Software Token

In contrast to hardware tokens, where credentials are stored on a dedicated device, software tokens are stored on general-purpose devices such as mobile phones.