W3C Web Content Accessibility Guidelines (WCAG) 2.0 ...

On the other hand, if the user happens to lose the device, the finder of that device won’t be able to use it unless he or she also knows the user’s password. The most common multi-factor methods include hardware tokens like RSA SecurID, certificates, smartcards, and increasingly phone-based authentication methods, which leverage the user ... ................
................