mobile authentication

Mobile authentication is the verification of a user’s identity through the use a mobile device and one or more authentication methods for secure access.

Mobile authentication may be used to authorize the mobile device itself or as a part of a multifactor authentication scheme for logging into secure locations and resources.

Password entry is clumsy on cell phones, especially when including capital letters, numbers and symbols.

Some alternative methods of mobile authentication include:

Some organizations have a need for extra security beyond ID and password for log in, but added devices and methods can make the procedures too cumbersome for employees. The ubiquity of smartphones can help ease the burden here, however. Most smartphones have a GPS device, enabling reasonable surety confirmation of the login location, a camera for potential facial recognition and iris scans, a microphone for voice recognition; some also have touch screens that can be used for fingerscanning.

Mobile devices that use more than one of these capabilities are functionally multifactor tokens. An example is the use of a smartphone software token app that taps into GPS location and scans a fingerprint, all within a device that the user was probably going to be carrying anyway. For administrators, the main benefit of a software implementation is that there are no extra physical devices to manage.

This was last updated in December 2014

Continue Reading About mobile authentication

Dig Deeper on Identity and access management

Enterprise Desktop
Cloud Computing