What authentication methods are there?
In this post we are going to talk about the different types of authentication methods that exist and that applications and computer systems use to protect our accesses and ultimately our information.
There are 3 types of systems, below I will describe them one by one.
Authentication methods based on something known
Authentication methods based on something known are based on authenticating the user through something that they know, the best example is passwords.
Examples of systems based on something known:
- Password
- Pin
- Pattern
Authentication methods based on something possessed
Authentication methods based on something owned base their operation on some physical object owned by the person who wants to authenticate in a system.
The easiest example is the cards used to access a company or simply a bus card.
Examples of systems based on something owned:
- Mobile
- Smart card (SmartCard)
- Chip
- Wrench
- Certificate
- USB device
Authentication methods based on something physical
Methods based on something physical use physical characteristics of the person who wants to authenticate in the system.
The easiest example is the fingerprint or facial scanner.
Examples of systems based on something physical:
- Paw print
- Facial recognition
- Iris recognition
- Voice
- Writing
Better authentication system
The best authentication system is the one that provides greater security when verifying that a user is who they say they are. Therefore the safest system is not 1 of the three explained above but the combination of them. For example:
1- Possessed + physical combined system: Smart card + Fingerprint.
2- Physical + known combined system: Fingerprint + Pin.
The two-factor authentication methods use something that you know (The password) and also by sending a code to your phone they verify that it is you with something that only you have (Your mobile phone).
And so far today’s entry, if you have any questions you can contact me through the contact page or you can also leave us a comment.
On this website you can find an online password generator which I invite you to try, here is the link:
How should a strong password be?
Even if you think your passwords are unique and secure, I can assure you that there is someone else using it out there. You will be surprised to know which are the most used passwords and how they do not differ much from yours.
How to generate a strong password?
People generate passwords that are very similar to each other. That is why we recommend using an online password generator which will generate them without relying on any human information. At the end unique and secure passwords.