Design a design pattern for a two-factor authentication component for web-based
ID: 3697714 • Letter: D
Question
Design a design pattern for a two-factor authentication component for web-based systems. Define the design pattern using the elements below of the design pattern description as define by the Gang of Four’s Design Patterns. Two-factor authentication is a technology patented in 1984 that provides identification of users by means of the combination of two different components. These components may be something that the user knows, something that the user possesses or something that is inseparable from the user. A good example from everyday life is the withdrawing of money from a cash machine. Only the correct combination of a bank card (something that the user possesses) and a PIN (personal identification number, i.e. something that the user knows) allows the transaction to be carried out (from https://en.wikipedia.org/wiki/Two-factor_authentication).
Make sure you include:
*Pattern Name
*Intent
*Motivation
*Applicability
*Structure
*Participants
*Collaborations
*Known Uses
*Related Patterns
Please provide answers... I really need it.. Thanks
Explanation / Answer
Two factor authentication:
The use of two-factor authentication to prove one's identity is based on the premise that an unauthorized actor is unlikely to be able to supply both factors required for access. If, in an authentication attempt, at least one of the components is missing or supplied incorrectly, the user's identity is not established with sufficient certainty and access to the asset (e.g., a building, or data) being protected by two-factor authentication then remains blocked. The authentication factors of a two-factor authentication scheme may include:
If you've used your bank's ATM, you've used two-factor authentication: you insert your ATM card (something you have) and enter your passcode (something you know). Most Web services supporting two-factor authentication send a unique access code to your phone, but banks and other financial services may require a hardware token that either displays a code you enter or that you insert via USB, smart card or other port.
Here are the steps required to activate two-factor authentication on some of the most popular Web services.
Pattern Name (Scope, Purpose):
The pattern's name conveys the essence of the pattern succinctly. A good name is vital, because it will become part of your design vocabulary
Applicability:
pAn abstraction has two aspects, one dependent on the other. When changing one object requires changing others, and you don’t know how many objects need changed
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.