Authentication Methods Overview
Patterns for Authentication
- Pattern Lock
- Devices equipped with touchscreens provide the option to use a pattern lock.
- It allows the user to draw a predefined pattern on a grid consisting of 3 columns and 3 rows of dots.
- A crucial concept in verifying identity through knowledge.
- PII is particularly useful when resetting accounts or recovering access.
Personal Identification Number (PIN)
- A PIN is a number used in conjunction with authentication devices, like smart cards.
- It should be known exclusively by the user.
- If a smart card is lost, the associated PIN should ensure it does not create a security risk.
Token-Based Authentication
- Token
- Can be physical or virtual items that contain authentication and/or authorization data.
- Commonly leveraged in multi-factor authentication systems.
Something You Have
- This aspect of authentication entails the account holder possessing something unique that no one else possesses.
- There are various ways to authenticate a user, including the provision of special hardware tokens to individuals.
- SecurID Token
- Formerly one of the most prominent tokens used for authentication.
- Generates a numeric code that corresponds with a code on the server, which is necessary for login.
- The code generated by the SecurID token changes every 60 seconds.
- It was very popular until smartphones became widespread.
- The advent of smartphone applications has simplified the process of authentication.
Something You Are
- Refers to characteristics that are unique and virtually unchangeable about the user.
- Utilizes a system that recognizes unique biological features of the individual, enhancing the identification process.