While researching the topic of multi-step-authentication I found a useful model describing the way two/three step authentication works:
The model describes how two/three step authentication works. It demonstrates all three steps of gathering something you know - usually password - with something you are - usually fingerprint or eye scan - and something you have - usually your mobile phone via SMS or pre-installed software.
Such model provides more security for the authentication process and is becoming more popular every day (Febrache, 2016). Multi-step authentication eliminates a number of security holes by insuring that even if frauds get access to a password or physical token, they still will not be able to log in into the system.
References:
Mohammed, A.J., Yassin, A.A. (2019) Efficient and Flexible Multi-Factor Authentication Protocol Based on Fuzzy Extractor of Administrator’s Fingerprint and Smart Mobile Device, ResearchGate. Available from: https://www.researchgate.net/figure/Multi-factor-authentication_fig2_335709093 [Accessed November 23, 2021].
Febrache, D. (2016) ‘Passwords are broken – the future shape of biometrics’, Biometric Technology Today, 2016(3), pp. 5–7. Available from: https://www.sciencedirect.com/science/article/pii/S0969476516300492 (Accessed: 27 October 2021).
Comments
Post a Comment