2. Design a design pattern for a two-factor authentication component for web-bas
ID: 3697485 • Letter: 2
Question
2. Design a design pattern for a two-factor authentication component for web-based systems. Define the design pattern using the elements below of the design pattern description as define by the Gang of Four’s Design Patterns. Two-factor authentication is a technology patented in 1984 that provides identification of users by means of the combination of two different components. These components may be something that the user knows, something that the user possesses or something that is inseparable from the user. A good example from everyday life is the withdrawing of money from a cash machine. Only the correct combination of a bank card (something that the user possesses) and a PIN (personal identification number, i.e. something that the user knows) allows the transaction to be carried out (from https://en.wikipedia.org/wiki/Two-factor_authentication).
Make sure you include:
*Pattern Name
*Intent
*Motivation
*Applicability
*Structure
*Participants
*Collaborations
*Known Uses
*Related Patterns
Explanation / Answer
Two factor authentication design pattern
Authentication is a necessary component to any system that requires a level of identification control and auding function. While authentication systems are very commonmhow they are implemented is anything but common or simple. As a result one of the easiest ways to compramise a system is to attack the authentication component this can be as simple as lying abouty identification to some one over the phone as complex as taking a finger print to bipass a bio-metric scanner or as common as guessing a password.
Design pattern:
This design pattern provides an overview of user identity authentication processes and capabilities that
VA will implement. It supports the Enterprise Technology Strategic Plan vision for the expanded use of
shared services that support
goals of increasing security, decreasing total cost of ownership (TCO)
and increasing information re-use/agility
By using the above above elements we can explain with the description of two factor authentication:
Pattern Name and Classication:
A descriptive and unique name that helps inidentifying and referring to the pattern
.Intent:
A description of the goal behind the pattern and the reason for using it.
Motivation (Forces):
A scenario consisting of a problem and a context in which thispattern can be used.
Applicability:
Situations in which this pattern is usable; the context for the pattern.
Structure:
A graphical representation of the pattern. Class diagrams and Interactiondiagrams may be used for this purpose.
Participants:
A listing of the classes and objects used in the pattern and their roles inthe design.
Collaboration:
A description of how classes and objects used in the pattern interactwith each other.•
Consequences:
A description of the results, side eects, and trade os caused by usingthe pattern.
Implementation:
A description of an implementation of the pattern; the solution partof the pattern.
Sample Code:
An illustration of how the pattern can be used in a programming lan-guage.
Known Uses:
Examples of real usages of the pattern.
Related Patterns:
Other patterns that have some relationship with the pattern; dis-cussion of the dierences between the pattern and similar patterns.
A micro-architecture is a set of program constituents (e.g., classes, methods...)and their relationships. Developers use the design pattern by introducing in their designsthis prototypical micro-architecture, which means that micro-architectures in their designswill have structure and organization similar to the chosen design .
Let us explain with one example with a program to explain about the design pattern authentication including password and username
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.