On-Demand Password is a tokenless approach to providing two-factor authentication (2FA) without the requirement for users to carry a physical one-time password (OTP). A random password is sent to the user via a specified communication channel such as SMS text message, email or voice call.

MORE INFO

One-time-passwords are generated by security token devices called OTP tokens. They are often categorised as hardware token or software tokens as below;

MOBILE ID AUTHENTICATOR
SAFE ID HARDWARE TOKENS
GRID ID CARDS

Push Authentication, also known as Out of Band Authentication (OOBA), is one of the most secure and easy to use forms of two-factor authentication (2FA). Push notifications can be sent over a number of communications channels, such as mobile push, sms push, call push.

MORE INFO

A security card is a card used for identification purposes that is typically the size of a credit card. There are various types of security cards, such as Grid cards, Smart cards, Proximity cards and Contactless cards. Each of these serve different purposes dependant on application.

MORE INFO

FIDO Authentication replaces password-only logins with a specialized USB, NFC or BLE device – a FIDO key enables users to securely access desktops, laptops, web and cloud applications with one single security device –  instantly and without driver software.

MORE INFO

DEVICE AUTHENTICATION

Electronic Visit Verification (EVV) is a method used to verify the presence of a person at a specific location and time. EVV is widely used throughout the healthcare industry to verify home healthcare visits in order to ensure that patients receive the documented care they need.

MORE INFO

Challenge-Response authentication is a group or family of protocols in which one party, typically the server, presents a challenge to another party, typically the client. The second party must respond with the appropriate answer to be authenticated.

MORE INFO

Biometric authentication refers to the identification of humans by their characteristics or traits such as:

KEYSTROKE RECOGNITION
FINGERPRINT RECOGNITION
FACE RECOGNITION
VOICE RECOGNITION