Multi-factor authentication and their approaches

Authors

  • Saroj Singh Department: CSE, Applied College of Management & Engineering, Mitrol, Palwal (MDU)

Keywords:

authentication, entropy, inherence, possession, supplemental guidelines

Abstract

A multi-factor authentication is an approach to authentication which requires the presentation of two or more of the three authentication factors: a knowledge factor ("something the user knows"), a possession factor ("something the user has"), and an inherence factor ("something the user is"). Two-factor authentication seeks to decrease the probability that the requestor is presenting false evidence of its identity. In reality, there are more variables to consider when establishing the relative assurance of truthfulness in an identity assertion than simply how many "factors" are used. The U.S. Federal Financial Institutions Examination Council issued supplemental guidance on this subject in August 2006, in which they clarified, "By definition true multifactor authentication requires the use of solutions from two or more of the three categories of factors.

Downloads

Download data is not yet available.

References

Ting, D. M., Hussain, O., & LaRoche, G. (2015). U.S. Patent No. 9,118,656. Washington, DC: U.S. Patent and Trademark Office.

Ekstrom, R. B., Dermen, D., & Harman, H. H. (1976). Manual for kit of factor-referenced cognitive tests (Vol. 102). Princeton, NJ: Educational Testing Service.

Bhargav-Spantzel, A., Squicciarini, A. C., Modi, S., Young, M., Bertino, E., & Elliott, S. J. (2007). Privacy preserving multi-factor authentication with biometrics. Journal of Computer Security, 15(5), 529-560.

Singhal, T. C. (2012). U.S. Patent No. 8,090,945. Washington, DC: U.S. Patent and Trademark Office.

Owen, W. N., & Shoemaker, E. (2008). U.S. Patent No. 7,373,515. Washington, DC: U.S. Patent and Trademark Office.

Sabzevar, A. P., & Stavrou, A. (2008, November). Universal multi-factor authentication using graphical passwords. In Signal Image Technology and Internet Based Systems, 2008. SITIS'08. IEEE International Conference on (pp. 625-632). IEEE.

Published

2017-05-31

How to Cite

Singh, S. (2017). Multi-factor authentication and their approaches. International Research Journal of Management, IT and Social Sciences, 4(3), 68–81. Retrieved from https://sloap.org/journals/index.php/irjmis/article/view/468

Issue

Section

Peer Review Articles