Version 1
: Received: 14 November 2023 / Approved: 14 November 2023 / Online: 14 November 2023 (15:46:48 CET)
How to cite:
Moepi, G. L.; Mathonsi, T. E. Implementation of an Enhanced Multi-Factor Authentication Scheme with a Track and Trace Capability for Online Banking Platforms. Preprints2023, 2023110950. https://doi.org/10.20944/preprints202311.0950.v1
Moepi, G. L.; Mathonsi, T. E. Implementation of an Enhanced Multi-Factor Authentication Scheme with a Track and Trace Capability for Online Banking Platforms. Preprints 2023, 2023110950. https://doi.org/10.20944/preprints202311.0950.v1
Moepi, G. L.; Mathonsi, T. E. Implementation of an Enhanced Multi-Factor Authentication Scheme with a Track and Trace Capability for Online Banking Platforms. Preprints2023, 2023110950. https://doi.org/10.20944/preprints202311.0950.v1
APA Style
Moepi, G. L., & Mathonsi, T. E. (2023). Implementation of an Enhanced Multi-Factor Authentication Scheme with a Track and Trace Capability for Online Banking Platforms. Preprints. https://doi.org/10.20944/preprints202311.0950.v1
Chicago/Turabian Style
Moepi, G. L. and Topside Ehleketani Mathonsi. 2023 "Implementation of an Enhanced Multi-Factor Authentication Scheme with a Track and Trace Capability for Online Banking Platforms" Preprints. https://doi.org/10.20944/preprints202311.0950.v1
Abstract
One of the fastest growing customer service delivery platforms is online banking. However, the increasing number of attacks on online banking platforms is driving the banks to constantly review their security. This study developed an enhanced Multi-factor authentication scheme with a track and trace capability to reduce these threats. Five modalities of authentication were incorporated in the proposed scheme: The traditional username, password, personal identification number (PIN) and one-time PIN (OTP), augmented with fingerprints or facial scans, registered smart devices, and a time locked user's location. One of the scheme's most impressive accomplishments is its capacity to seamlessly detect undesired activities and send alerts in the form of secretly obtained photographs and location triangulation.
Computer Science and Mathematics, Security Systems
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.