Advertisement

Two-Factor Authentication

  • Badrinarayanan Lakshmiraghavan

Summary

A system identifies a user through a user identifier, commonly abbreviated to user ID. The process by which a system confirms that a user really is who the user claims to be is called authentication. We saw in Chapter 5 that there are three types of credentials through which a user can be authenticated: knowledge factor (what a user knows), ownership factor (what a user owns), and inherence factor (what a user is).

Keywords

Mobile Phone Knowledge Factor Client Application Authentication Code Ownership Factor 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Badrinarayanan Lakshmiraghavan 2013

Authors and Affiliations

  • Badrinarayanan Lakshmiraghavan

There are no affiliations available

Personalised recommendations