Difference between revisions of "Two-factor authentication"

From Clinfowiki
Jump to: navigation, search
m
Line 1: Line 1:
Two factor authentication(T-FA) or (2FA):a security process in which the user provides two means of identification in conjunction, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code.   
+
Two factor authentication (T-FA) or (2FA):a security process in which the user provides two means of identification in conjunction, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code.   
 
Using two factors as opposed to one factor generally delivers a higher level of authentication assurance. Two-factor authentication typically is a signing-on process where a person proves his or her identity with two of three methods: "something you know"  (ex.: password or PIN), "something you have" (ex.: smartcard or token), or "something you are" (ex.: fingerprint or voiceprint analysis).(1)
 
Using two factors as opposed to one factor generally delivers a higher level of authentication assurance. Two-factor authentication typically is a signing-on process where a person proves his or her identity with two of three methods: "something you know"  (ex.: password or PIN), "something you have" (ex.: smartcard or token), or "something you are" (ex.: fingerprint or voiceprint analysis).(1)
  
  
 
[http://en.wikipedia.org/wiki/Two_factor_authentication]
 
[http://en.wikipedia.org/wiki/Two_factor_authentication]

Revision as of 01:59, 23 November 2009

Two factor authentication (T-FA) or (2FA):a security process in which the user provides two means of identification in conjunction, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code. Using two factors as opposed to one factor generally delivers a higher level of authentication assurance. Two-factor authentication typically is a signing-on process where a person proves his or her identity with two of three methods: "something you know" (ex.: password or PIN), "something you have" (ex.: smartcard or token), or "something you are" (ex.: fingerprint or voiceprint analysis).(1)


[1]