O'Reilly logo

Two-Factor Authentication by Mark Stanislav

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 7: CONCLUSION

Looking forward

As technology continues to evolve with more focus on the individual user, authentication security will only become more exciting and more important. I foresee a time in which the many wearable and mobile devices we possess will become a core aspect of authentication, with many methods used across two or three factor classes, providing for greater authentication intelligence.

It’s been said that Google uses over 50 different ‘signals’ of data to provide filtered search results to its users. In a similar manner, I believe that authentication signals will ultimately be the way that we will provide assurance to prove the digital identities we claim. The various forms of computing device that the average consumer ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required