Knowledge-based authentication: Difference between revisions

Content deleted Content added
m Copyediting and added links
See also: 'what you know' is usually one of the factors in MFA
 
(5 intermediate revisions by 5 users not shown)
Line 1:
{{Short description|Method of user authentication that requires knowledge of private information}}
'''Knowledge-based authentication''', commonly referred to as '''KBA''', is a method of [[authentication]] which seeks to prove the identity of someone accessing a service such as a financial institution or website. As the name suggests, KBA requires the knowledge of [[Personal data|private information]] from the individual to prove that the person providing the identity information is the owner of the identity. There are two types of KBA: ''static KBA'', which is based on a pre-agreed set of shared secrets, and ''dynamic KBA'', which is based on questions generated from a wider base of personal information.<ref>K. Skračić, P. Pale and B. Jeren, "[https://ieeexplore.ieee.org/abstract/document/6596424/citations#citations Knowledge based authentication requirements]," ''2013 36th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)'', Opatija, Croatia, 2013, pp. 1116-1120.</ref>
 
Line 16 ⟶ 17:
 
== See also ==
* [[Cognitive password]]
* [[Identity verification service]]
* [[Multi-factor authentication]]
* [[Out of wallet]]
 
== References ==
{{reflist}}
# Varghese, Thomas. "Addressing Red Flags Compliance". SC Magazine, Jan. 28, 2009. http://www.scmagazineus.com/addressing-red-flags-compliance/article/126529/. Retrieved 2009-09-15.
 
[[Category:Computer network security]]