ABSTRACT

Each of these methods has its advantages and limitations, and each may be the appropriate solution in a given set of circumstances. But each method by itself offers only a single security factor. Strong authentication1 demands a combination of authentication factors such as knowledge, tokens, or biometric authentication used to verify identity under security constraints.