CUSO-News---Payments-Report

close

Categories

More Tags

Subscribe to Email Updates

Popular Stories

Pay-by-Bank: Anticipating the Next Wave of Innovations
Understanding Enumeration Attacks and How to Prevent Them
What It Means to Have a World Class NPS
FedNow: Changing the Game for Real-Time Payments
Combatting AI-Powered Fraud wtih AI-Powered Fraud Prevention
Written by Karl Kaluza
on September 12, 2023

Authentication platforms are constantly improving, and new ones surface periodically. Such improvements would not be needed if it weren't for the continued improvements by fraudsters. We'll take a look at three of the newest authentication schemes that are currently in use.

Token-based authentication allows users to verify themselves once and remain authenticated. This method works by authenticating the app at the time of verification. The app might be a desktop/mobile web browser or a mobile app. If the user switches to a different browser, verification will need to take place for that browser. 

Users may not need to use a password at all with token-based authentication. The verification process can send a code to a user's mobile phone or email. This creates a handshake to the app being used at the time. Under this authentication scheme, there is generally no forgot password scenario. 

Multi-factor authentication (MFA) is an enhanced version of two-factor authentication (2FA). Whereas 2FA is usually a password and another factor, such as a mobile phone, MFA uses those same factors plus more. MFA might add another app, such as Google Authenticator or other mobile authentication apps. MFA is more work for the user but also more secure. MFA schemes currently provide some of the highest and most reliable protection.

Biometric authentication is becoming more common. Biometric authentication is often used on mobile phones since it is easy to scan fingerprints, faces, and irises. However, the latter is not common. However, biometric authentication extends to laptops as well. Apple Macbooks have used fingerprint scans to unlock for some time now. These same scans are being used to unlock various MacOS apps as well. 

Like token-based authentication, biometric authentication is very efficient since users only need to set it up once. From then on, scanning a finger or face is just a matter of a second or two. Of the two, token-based authentication is the most convenient for users since it does not require them to take time out for a scan.

 

Let Us Know What You Thought about this Post.

Put your Comment Below.

You may also like: