Content deleted Content added
Undid revision 693456659 by 192.234.136.20 (talk) |
remove links to deleted articles. also remove mention of their topics, since notability is questionable |
||
Line 20:
The major drawback of authentication performed using something that the user possesses and one other factor is that the plastic token used (the USB stick, the bank card, the key or similar) must be carried around by the user at all times. And if this is stolen or lost, or if the user simply does not have it with him or her, access is impossible. There are also costs involved in procuring and subsequently replacing tokens of this kind. In addition, there are inherent conflicts and unavoidable [http://eprint.iacr.org/2014/135.pdf trade-offs] between usability and security.
Mobile phone two-factor authentication was developed to provide an alternative method that would avoid such issues. This approach uses mobile devices such as mobile phones and smartphones to serve as "something that the user possesses". If users want to authenticate themselves, they can use their personal access license (i.e. something that only the individual user knows) plus a one-time-valid, dynamic passcode consisting of digits. The code can be sent to their mobile device by [[SMS]] or via a special app
'''Advantages of mobile phone two-factor authentication:'''
|