More secure authentication methods have been readily available for many years, including tokens, smart cards, digital certificates and biometrics. While these methods vary in complexity, cost and strength, all share a common goal: letting a person demonstrate that he is who he claims to be through one or more factors.
First part