Usage of several identity authentication factors for proving an identity document bases on the assumption that an unauthorized attacker would not provide the necessary factors for access.  If at least one of the presented components in an identity authentication initiative is wrong or deficient, and user’s identity is not adequately certain or the entity is not accessible the access can be blocked. It provides an opportunity for most of the present security systems to be more secure through its integration to those systems.

19-Çok Faktörlü Kimlik Doğrulama Sistemleri- 19-Çok Faktörlü Kimlik Doğrulama Sistemleri--