Table of Contents

 1     Scope          
 2     References
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Recommendation            
 4     Abbreviations and acronyms             
 5     Conventions             
 6     Overview of multi-factor authentication      
        6.1     Single-factor authentication    
        6.2     Two-factor authentication       
        6.3     Multi-factor authentication     
        6.4     Combination of multi-factor authentication     
        6.5     Authentication threats              
        6.6     Criteria for selecting a multi-factor authentication method       
        6.7     Features of multi-factor authentication mechanisms using a mobile device      
 7     Security requirements for multi-factor authentication           
        7.1     General            
        7.2     Mobile device
        7.3     Secure element            
        7.4     Service provider           
 8     Generic mechanisms            
        8.1     Entities             
        8.2     Operations     
        8.3     Authentication models              
        8.4     Protocols         
Appendix I – Typical scenario for two-factor authentication    
Appendix II – Instances of components of multi-factor authentication    
       II.1     Smart-card      
       II.2     Digital certificate           
       II.3     Biometrics       
Bibliography