From: Role of authentication factors in Fin-tech mobile transaction security
Technology | C1 | C2 | C3 | C4 | C5 | C6 | C7 | C8 | Total |
---|---|---|---|---|---|---|---|---|---|
Biometric | 14 | 1 | 1 | 0 | 14 | 3 | 0 | 0 | 33 |
Password | 0 | 0 | 0 | 0 | 4 | 2 | 0 | 0 | 6 |
OTP | 4 | 0 | 0 | 0 | 7 | 1 | 0 | 0 | 12 |
Q.R. code | 1 | 0 | 1 | 0 | 3 | 7 | 0 | 0 | 12 |
MAC and IMEI | 1 | 0 | 0 | 0 | 4 | 2 | 0 | 0 | 7 |
A.I. and machine learning | 2 | 0 | 0 | 2 | 1 | 0 | 1 | 2 | 8 |
Blockchain and algorithm | 6 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
Other techniques | 5 | 0 | 0 | 1 | 0 | 1 | 1 | 0 | 8 |
Total | 92 |