Typically the methods employed are by pre-registration and using security tokens where the transaction risk is perceived to be high.
"Most security tokens also incorporate two-factor authentication methods to work effectively".
It is said to be possible to use it in conjunction with smart card readers, security tokens and the like.
Also helpful are security tokens, small devices that authorized users of computer programs or networks carry to assist in identity confirmation.
Cell phones and PDA's can also be used as security tokens with proper programming.
It provides a managed infrastructure which facilitates the exchange of security tokens across domains in a secure and trusted way.
How to attach security tokens to ascertain the sender's identity.
Some banks also offer additional safeguards, like picture passwords and security tokens, that make account log-in information more difficult for hackers to guess.
The simplest security tokens do not need any connection to a computer.
Cell phones and PDAs can also serve as security tokens with proper programming.