Multifactor Authentication

Authentication can be accomplished with one factor, two factors, or multiple factors. Which one is the weakest level of authentication and which is the most secure and why? When would a more secure system be required? Be able to explain these multifactor authentication methods: password protection, token presence, voice biometrics, facial recognition, ocular-based methodology, hand geometry, vein recognition, fingerprint scanner, thermal image recognition, and geographical location. What are some challenges of multiple factor authentication when using biometrics? There is a lot of interesting information covered in this article that you do not need to memorize, but that you should be aware of.

2. State-of-the-Art and Potential MFA Sources

2.1.2. Token Presence

The password could then be supplemented with a physical token­ – for example, a card, which is recommended as a second factor group­ – the ownership. From the hardware perspective, a user may present a smartcard, phone, wearable device, etc., which are more complicated to delegate. In this case, the system should be equipped with a radio interface allowing for two-way communication with the token. On the other hand, the most widely known software token is one-time software generated password. The main drawback of the above is the problem of uncontrollable duplication.