{"id":12701,"date":"2022-11-19T15:47:37","date_gmt":"2022-11-19T15:47:37","guid":{"rendered":"https:\/\/mobusoft.com\/que-metodos-de-autenticacion-existen\/"},"modified":"2022-11-21T21:04:41","modified_gmt":"2022-11-21T21:04:41","slug":"what-authentication-methods-are-there","status":"publish","type":"post","link":"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/","title":{"rendered":"What authentication methods are there?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"12701\" class=\"elementor elementor-12701 elementor-12417\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c01680a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c01680a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c0dee54\" data-id=\"c0dee54\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-535828c elementor-widget elementor-widget-text-editor\" data-id=\"535828c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In this post we are going to talk about the different types of authentication methods that exist and that applications and computer systems use to protect our accesses and ultimately our information.<\/p><p>There are 3 types of systems, below I will describe them one by one.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-157d87b elementor-widget elementor-widget-heading\" data-id=\"157d87b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\">Authentication methods based on something known<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e15745 elementor-widget elementor-widget-text-editor\" data-id=\"2e15745\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Authentication methods based on something known are based on authenticating the user through something that they know, the best example is passwords.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bef48c8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bef48c8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3d80e6a\" data-id=\"3d80e6a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-474bb22 elementor-widget elementor-widget-image\" data-id=\"474bb22\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/mobusoft.com\/wp-content\/uploads\/2022\/11\/Login.svg\" class=\"attachment-large size-large wp-image-12581\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d6df831\" data-id=\"d6df831\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5af20bd elementor-widget elementor-widget-text-editor\" data-id=\"5af20bd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Examples of systems based on something known:<\/p><ol><li>Password<\/li><li>Pin<\/li><li>Pattern<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca23c53 elementor-widget elementor-widget-spacer\" data-id=\"ca23c53\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5472bd6 elementor-widget elementor-widget-heading\" data-id=\"5472bd6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\">Authentication methods based on something possessed<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8bc019d elementor-widget elementor-widget-text-editor\" data-id=\"8bc019d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Authentication methods based on something owned base their operation on some physical object owned by the person who wants to authenticate in a system.<\/p><p>The easiest example is the cards used to access a company or simply a bus card.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-15bc539 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"15bc539\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-72e0805\" data-id=\"72e0805\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9063ce7 elementor-widget elementor-widget-image\" data-id=\"9063ce7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/mobusoft.com\/wp-content\/uploads\/2022\/11\/Mobile_Payment.svg\" class=\"attachment-large size-large wp-image-12566\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-721ad63\" data-id=\"721ad63\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e894c9 elementor-widget elementor-widget-text-editor\" data-id=\"7e894c9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Examples of systems based on something owned:<\/p><ol><li>Mobile<\/li><li>Smart card (SmartCard)<\/li><li>Chip<\/li><li>Wrench<\/li><li>Certificate<\/li><li>USB device<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef30b0d elementor-widget elementor-widget-spacer\" data-id=\"ef30b0d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2306711 elementor-widget elementor-widget-heading\" data-id=\"2306711\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\">Authentication methods based on something physical<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f22bef elementor-widget elementor-widget-text-editor\" data-id=\"1f22bef\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Methods based on something physical use physical characteristics of the person who wants to authenticate in the system.<\/p><p>The easiest example is the fingerprint or facial scanner.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-437d710 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"437d710\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9b86d77\" data-id=\"9b86d77\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5546269 elementor-widget elementor-widget-image\" data-id=\"5546269\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/mobusoft.com\/wp-content\/uploads\/2022\/11\/fingerprint.svg\" class=\"attachment-large size-large wp-image-12572\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7b61cb8\" data-id=\"7b61cb8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a49cdb elementor-widget elementor-widget-text-editor\" data-id=\"7a49cdb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Examples of systems based on something physical:<\/p><ol><li>Paw print<\/li><li>Facial recognition<\/li><li>Iris recognition<\/li><li>Voice<\/li><li>Writing<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-b04aae9 elementor-widget elementor-widget-spacer\" data-id=\"b04aae9\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7157fa2 elementor-widget elementor-widget-heading\" data-id=\"7157fa2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\">Better authentication system<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d53c422 elementor-widget elementor-widget-text-editor\" data-id=\"d53c422\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The best authentication system is the one that provides greater security when verifying that a user is who they say they are. Therefore the safest system is not 1 of the three explained above but the combination of them. For example:<\/p><p>1- Possessed + physical combined system: Smart card + Fingerprint.<\/p><p>2- Physical + known combined system: Fingerprint + Pin.<\/p><p>The two-factor authentication methods use something that you know (The password) and also by sending a code to your phone they verify that it is you with something that only you have (Your mobile phone).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bdd9d4f elementor-widget elementor-widget-text-editor\" data-id=\"bdd9d4f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>And so far today&#8217;s entry, if you have any questions you can contact me through the contact page or you can also leave us a comment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f0cfb7 elementor-widget elementor-widget-text-editor\" data-id=\"1f0cfb7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>On this website you can find an online password generator which I invite you to try, here is the link:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d508c1b elementor-align-center elementor-widget elementor-widget-ld_button\" data-id=\"d508c1b\" data-element_type=\"widget\" data-widget_type=\"ld_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<a\n\t\t\t\thref=\"http:\/\/mobusoft.com\/generador-de-contrasenas#app\"class=\"elementor-button btn btn-solid btn-hover-txt-liquid-x-alt btn-icon-shaped btn-has-label\"\t\t\t>\n\t\t\t\t\t\t\t\t\t<span data-text=\"ONLINE PASSWORD GENERATOR\" class=\"btn-txt\" data-transition-delay=\"true\" data-delay-options=\"{&quot;elements&quot;: &quot;.lqd-chars&quot;, &quot;delayType&quot;: &quot;animation&quot;, &quot;startDelay&quot;: 0, &quot;delayBetween&quot;: 32.5, &quot;reverse&quot;: true}\" data-split-text=\"true\" data-split-options=\"{&quot;type&quot;: &quot;chars, words&quot;}\">\n\t\t\t\t\t\tONLINE PASSWORD GENERATOR\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-496562e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"496562e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-921e8ce\" data-id=\"921e8ce\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bdf3d2a elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"bdf3d2a\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-767e12f\" data-id=\"767e12f\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c53368 elementor-widget elementor-widget-image\" data-id=\"1c53368\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/mobusoft.com\/wp-content\/uploads\/2022\/11\/Security.svg\" class=\"attachment-full size-full wp-image-12381\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f1fab4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4f1fab4\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b810c7a elementor-widget elementor-widget-heading\" data-id=\"b810c7a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-large\">How should a strong password be?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-299b47f elementor-widget elementor-widget-text-editor\" data-id=\"299b47f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Even if you think your <strong>passwords<\/strong> are unique and secure, I can assure you that there is someone else using it out there. You will be surprised to know which are the <strong>most used passwords<\/strong> and how they do not differ much from yours.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff5ab5f elementor-widget elementor-widget-button\" data-id=\"ff5ab5f\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/mobusoft.com\/en\/how-should-a-secure-password-be\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d4d2863\" data-id=\"d4d2863\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d3b6e7c elementor-widget elementor-widget-image\" data-id=\"d3b6e7c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/mobusoft.com\/wp-content\/uploads\/2022\/11\/Authentication_Password-1.svg\" class=\"attachment-full size-full wp-image-12372\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cdcae16 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"cdcae16\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b20ce46 elementor-widget elementor-widget-heading\" data-id=\"b20ce46\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-large\">How to generate a strong password?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8749df elementor-widget elementor-widget-text-editor\" data-id=\"a8749df\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>People generate passwords that are very similar to each other. That is why we recommend using an <strong>online password generator <\/strong>which will generate them without relying on any human information. At the end <strong>unique and secure passwords<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-301b55b elementor-widget elementor-widget-button\" data-id=\"301b55b\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/mobusoft.com\/en\/how-to-generate-a-secure-password\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In this post we are going to talk about the different types of authentication methods that exist and that applications and computer systems use to protect our accesses and ultimately our information. There are 3 types of systems, below I will describe them one by one. Authentication methods based on something known Authentication methods based [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12384,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_joinchat":[],"footnotes":""},"categories":[115],"tags":[],"class_list":["post-12701","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad-informatica-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What authentication methods are there? - MobuSoft.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What authentication methods are there? - MobuSoft.com\" \/>\n<meta property=\"og:description\" content=\"In this post we are going to talk about the different types of authentication methods that exist and that applications and computer systems use to protect our accesses and ultimately our information. There are 3 types of systems, below I will describe them one by one. Authentication methods based on something known Authentication methods based [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/\" \/>\n<meta property=\"og:site_name\" content=\"MobuSoft.com\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-19T15:47:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-21T21:04:41+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/\",\"url\":\"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/\",\"name\":\"What authentication methods are there? - MobuSoft.com\",\"isPartOf\":{\"@id\":\"https:\/\/mobusoft.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mobusoft.com\/wp-content\/uploads\/2022\/11\/Two_Factor_Authentication-1.svg\",\"datePublished\":\"2022-11-19T15:47:37+00:00\",\"dateModified\":\"2022-11-21T21:04:41+00:00\",\"author\":{\"@id\":\"https:\/\/mobusoft.com\/#\/schema\/person\/4b5a20ae7a7001fd4d529a048f423549\"},\"breadcrumb\":{\"@id\":\"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/#primaryimage\",\"url\":\"https:\/\/mobusoft.com\/wp-content\/uploads\/2022\/11\/Two_Factor_Authentication-1.svg\",\"contentUrl\":\"https:\/\/mobusoft.com\/wp-content\/uploads\/2022\/11\/Two_Factor_Authentication-1.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/mobusoft.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What authentication methods are there?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mobusoft.com\/#website\",\"url\":\"https:\/\/mobusoft.com\/\",\"name\":\"MobuSoft.com\",\"description\":\"Consultor\u00eda Inform\u00e1tica\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mobusoft.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/mobusoft.com\/#\/schema\/person\/4b5a20ae7a7001fd4d529a048f423549\",\"name\":\"admin\",\"url\":\"https:\/\/mobusoft.com\/en\/author\/joaquim\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What authentication methods are there? - MobuSoft.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/","og_locale":"en_US","og_type":"article","og_title":"What authentication methods are there? - MobuSoft.com","og_description":"In this post we are going to talk about the different types of authentication methods that exist and that applications and computer systems use to protect our accesses and ultimately our information. There are 3 types of systems, below I will describe them one by one. Authentication methods based on something known Authentication methods based [&hellip;]","og_url":"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/","og_site_name":"MobuSoft.com","article_published_time":"2022-11-19T15:47:37+00:00","article_modified_time":"2022-11-21T21:04:41+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/","url":"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/","name":"What authentication methods are there? - MobuSoft.com","isPartOf":{"@id":"https:\/\/mobusoft.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/#primaryimage"},"image":{"@id":"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/#primaryimage"},"thumbnailUrl":"https:\/\/mobusoft.com\/wp-content\/uploads\/2022\/11\/Two_Factor_Authentication-1.svg","datePublished":"2022-11-19T15:47:37+00:00","dateModified":"2022-11-21T21:04:41+00:00","author":{"@id":"https:\/\/mobusoft.com\/#\/schema\/person\/4b5a20ae7a7001fd4d529a048f423549"},"breadcrumb":{"@id":"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/#primaryimage","url":"https:\/\/mobusoft.com\/wp-content\/uploads\/2022\/11\/Two_Factor_Authentication-1.svg","contentUrl":"https:\/\/mobusoft.com\/wp-content\/uploads\/2022\/11\/Two_Factor_Authentication-1.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/mobusoft.com\/en\/"},{"@type":"ListItem","position":2,"name":"What authentication methods are there?"}]},{"@type":"WebSite","@id":"https:\/\/mobusoft.com\/#website","url":"https:\/\/mobusoft.com\/","name":"MobuSoft.com","description":"Consultor\u00eda Inform\u00e1tica","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mobusoft.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/mobusoft.com\/#\/schema\/person\/4b5a20ae7a7001fd4d529a048f423549","name":"admin","url":"https:\/\/mobusoft.com\/en\/author\/joaquim\/"}]}},"_links":{"self":[{"href":"https:\/\/mobusoft.com\/en\/wp-json\/wp\/v2\/posts\/12701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mobusoft.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mobusoft.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mobusoft.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mobusoft.com\/en\/wp-json\/wp\/v2\/comments?post=12701"}],"version-history":[{"count":0,"href":"https:\/\/mobusoft.com\/en\/wp-json\/wp\/v2\/posts\/12701\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mobusoft.com\/en\/wp-json\/wp\/v2\/media\/12384"}],"wp:attachment":[{"href":"https:\/\/mobusoft.com\/en\/wp-json\/wp\/v2\/media?parent=12701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mobusoft.com\/en\/wp-json\/wp\/v2\/categories?post=12701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mobusoft.com\/en\/wp-json\/wp\/v2\/tags?post=12701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}