Difference between revisions of "Two-factor authentication"

From Clinfowiki
Jump to: navigation, search
Line 1: Line 1:
 
Two factor authentication(T-FA) or (2FA):a security process in which the user provides two means of identification in conjunction, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code.   
 
Two factor authentication(T-FA) or (2FA):a security process in which the user provides two means of identification in conjunction, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code.   
Using two factors as opposed to one factor generally delivers a higher level of authentication assurance. Two-factor authentication typically is a signing-on process where a person proves his or her identity with two of three methods: "something you know"  (such as a password or PIN), "something you have" (ex.:  smartcard or token), or "something you are" (ex.: fingerprint or voiceprint analysis).
+
Using two factors as opposed to one factor generally delivers a higher level of authentication assurance. Two-factor authentication typically is a signing-on process where a person proves his or her identity with two of three methods: "something you know"  (such as a password or PIN), "something you have" (ex.:  smartcard or token), or "something you are" (ex.: fingerprint or voiceprint analysis).(1)
 +
 
 +
 
 +
[http://en.wikipedia.org/wiki/Two_factor_authentication]

Revision as of 01:55, 23 November 2009

Two factor authentication(T-FA) or (2FA):a security process in which the user provides two means of identification in conjunction, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code. Using two factors as opposed to one factor generally delivers a higher level of authentication assurance. Two-factor authentication typically is a signing-on process where a person proves his or her identity with two of three methods: "something you know" (such as a password or PIN), "something you have" (ex.: smartcard or token), or "something you are" (ex.: fingerprint or voiceprint analysis).(1)


[1]