Methods of Authentication

This article calls the authentication factors we are familiar with the ownership factor, knowledge factor, and inherence factor. These names relate to something you have, something you know, and something you are, respectively.

System Fundamentals For Cyber Security/Authentication/Methods of Authentication

Inherence Factor

The inherence factor generally relates to the use of biometric data or some form of visual or audio recognition.

Examples include:

  • Fingerprint scanners
  • Retinal pattern
  • DNA sequence
  • Voice recognition
  • Facial recognition
The inherence factor generally relates to the use of biometric data or some form of visual or audio recognition. Examples include: Fingerprint scanners Retinal pattern DNA sequence Voice recognition Facial recognition