Site Options:

Kadix

Keylogging Ontology

Two-Factor Authentication

Two-Factor Authentication verifies that you are who you say you are, when logging into a website, network, or cloud service. Having the correct login information is not enough. It can be stolen. Two-Factor Authentication requires the use of two of the three authentication factors identified in the Standards and Regulations for access to U.S. Federal Government systems:

Knowledge Factor
Something only the user knows (e.g., password, PIN, pattern).
Possession Factor
Something only the user has (e.g., ATM card, smart card, smart phone).
Identity Factor
Something only the user is (e.g., biometric characteristic such as a fingerprint).

True Two-Factor Authentication requires the use of solutions from two or more of the three categories of factors listed above. It is the most common form of Multi-Factor Authentication.

Related Information:
Keylogging Ontology
Problem & Solution
MobileTrust: FAQs

Related Concepts:
Authentication
Out-Of-Band Authentication (OOBA)