top of page

Multi-Factor Authentication

Multi-Factor Authentication (MFA) is the process whereby multiple technologies are used to authenticate the user's identity. In contrast, single factor authentication (or simply “authentication”) uses a single technology to prove the user’s authenticity. With Multi-factor authentication, users must combine verification technologies from at least two different groups or authentication factors.


Authentication Factors


Something you know.
This is usually a password, PIN, passphrase or questions and their corresponding answers. In order to satisfy this technology, the user must enter information that the backend can then match against that which has been previously setup or stored.


Something you have
Before the advent of smartphones, users would carry around tokens or smartcards. These devices would generate a one-time passcode (OTP) that could then be typed or entered into the backend system. Today, most users leverage their smartphone with authenticator app as the device that generates these codes or allows them to respond back to a server with a one-time passcode behind the scenes.


Something you are.
This is anything from fingerprints, retina scans, facial recognition, voice recognition, or a user’s behavior (such as how hard or fast they type or swipe on a screen) that can be used to identify a unique user.


To achieve multi-factor authentication, at least two different technologies from at least two different technology groups must be used for authentication process. As a result, using a PIN coupled with a password would not be considered multi-factor authentication, while using a PIN with facial recognition as a second factor would be. It is also acceptable to use more than two forms of authentication. However, most users increasingly want frictionless authentication (the ability to be verified without the need to perform verification)


Pentium serves its customers through ready-made mobile authentication applications or by building customized mobile authentication apps that meet the look and feel and functionalities requirements of our customers based on award winning and leading authentication technologies.

bottom of page