Authentication Methods Overview

Patterns for Authentication

  • Pattern Lock
    • Devices equipped with touchscreens provide the option to use a pattern lock.
    • It allows the user to draw a predefined pattern on a grid consisting of 3 columns and 3 rows of dots.

Personal Identification Information (PII)

  • A crucial concept in verifying identity through knowledge.
  • PII is particularly useful when resetting accounts or recovering access.

Personal Identification Number (PIN)

  • A PIN is a number used in conjunction with authentication devices, like smart cards.
  • It should be known exclusively by the user.
    • If a smart card is lost, the associated PIN should ensure it does not create a security risk.

Token-Based Authentication

  • Token
    • Can be physical or virtual items that contain authentication and/or authorization data.
    • Commonly leveraged in multi-factor authentication systems.

Something You Have

  • This aspect of authentication entails the account holder possessing something unique that no one else possesses.
  • There are various ways to authenticate a user, including the provision of special hardware tokens to individuals.
    • SecurID Token
    • Formerly one of the most prominent tokens used for authentication.
    • Generates a numeric code that corresponds with a code on the server, which is necessary for login.
    • The code generated by the SecurID token changes every 60 seconds.
    • It was very popular until smartphones became widespread.
    • The advent of smartphone applications has simplified the process of authentication.

Something You Are

  • Refers to characteristics that are unique and virtually unchangeable about the user.
  • Utilizes a system that recognizes unique biological features of the individual, enhancing the identification process.