CHAPTER 7: CONCLUSION

Looking forward

As technology continues to evolve with more focus on the individual user, authentication security will only become more exciting and more important. I foresee a time in which the many wearable and mobile devices we possess will become a core aspect of authentication, with many methods used across two or three factor classes, providing for greater authentication intelligence.

It’s been said that Google uses over 50 different ‘signals’ of data to provide filtered search results to its users. In a similar manner, I believe that authentication signals will ultimately be the way that we will provide assurance to prove the digital identities we claim. The various forms of computing device that the average consumer ...

Get Two-Factor Authentication now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.