Draft:X.1280
![]() | Review waiting, please be patient.
This may take 3 months or more, since drafts are reviewed in no specific order. There are 2,717 pending submissions waiting for review.
Where to get help
How to improve a draft
You can also browse Wikipedia:Featured articles and Wikipedia:Good articles to find examples of Wikipedia's best writing on topics similar to your proposed article. Improving your odds of a speedy review To improve your odds of a faster review, tag your draft with relevant WikiProject tags using the button below. This will let reviewers know a new draft has been submitted in their area of interest. For instance, if you wrote about a female astronomer, you would want to add the Biography, Astronomy, and Women scientists tags. Editor resources
Reviewer tools
|
![]() | This is a draft article. It is a work in progress open to editing by anyone. Please ensure core content policies are met before publishing it as a live Wikipedia article. Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL Last edited by Citation bot (talk | contribs) 46 hours ago. (Update)
This draft has been submitted and is currently awaiting review. |
Framework for out-of-band server authentication using mobile devices | |
Status | In force (Recommendation) |
---|---|
Year started | 2022 |
Latest version | 1.0 March 1, 2024 |
Organization | ITU-T |
Committee | ITU-T Study Group 17 |
Series | X |
Related standards | X.509, X.1254 |
Domain | Cybersecurity, Identity management, Authentication, biometric authentication |
Website | handle |
X.1280 is an International Telecommunication Union(ITU) standard for verifying a service provider before user information.
Unlike traditional authentication methods such as passwords, PINs, and One-time password(OTPs), which only verify the user's identity, this standard enables mutual authentication to verify both users and service providers. X.1280 uses an out-of-band mobile authenticator, typically a smartphone, and may incorporate biometric authentication for enhanced security. However, a key feature is that no additional hardware, such as dedicated security tokens, is required beyond a smartphone. It allows the use of a unified authenticator across various devices. To authenticate via X.1280, prior registration is required. When a service provider supports X.1280-based authentication, the mobile authenticator must first be registered and then used for authentication.
Purpose
[edit]The X.1280 standard is designed to:
- Enhance security by enabling mutual authentication between users and service providers, ensuring protection against verifier impersonation.
- Eliminate device dependency by using an out-of-band mobile authenticator, allowing seamless authentication across multiple devices.
Applications
[edit]X.1280 enables advanced authentication methods, including:
- User-centric authentication: Users verify the service provider before providing credentials, simplifying the authentication process and enhancing security.
- Mutual authentication: Both the user and the service provider verify each other, shifting from one-way to two-way authentication.
- Unified authentication: A single mobile authenticator supports authentication across diverse devices, such as computers, smartphones, automated teller machines (ATMs), and artificial intelligence (AI) speakers, eliminating the need for device-specific authenticators [1]
History
[edit]- June 29, 2022: Registered as TTAK.KO-12.0383 by the Telecommunication Technology Association (TTA) in South Korea. [2]
- 2022: Adopted by ITU-T as X.oob-sa. [3]
- March 1, 2024: Redesignated as X.1280 by ITU-T. [4]
Process of Authentication
[edit]X.1280 authentication involves a two-step process: registering a mobile authenticator and performing mutual authentication between the user and the service provider.
- Authenticator registration
- A user needs to install a mobile application to communicate with an authentication server.
- After that, the user needs to request registration from a client. It can be a PC or something else.
- Then, the client sends a registration request to the authentication server.
- The authentication server generates secure data. In process 8, when the mobile sends a request, the request must contain the secure data.
- The authentication server sends information that contains the secure data for verification.
- The client provides registration information to the user by an allowed method, such as Email, SMS, QR code, etc.
- The user inputs the data received from the client into the pre-installed mobile application.
- The application requests verification from the authentication server.
- If the request contains secure data, the authentication server registers mobile application information.
- The authentication server sends a verification key to the mobile application. The application stores the key.

- Authentication process
- A user who registered an authenticator(out-of-band authenticator) request logs in on a client.
- Authentication server receives verification request from the client.
- The authentication server generates secure data to verify the authenticator.
- The authentication server sends authentication information to the client.
- The client shows authentication information by text or sound, depending on the type of the client.
- The authentication server sends a dataset to the authenticator to generate authentication information.
- The authenticator generates authentication information. If the user attempts to log in on a fake client (e.g., a fraudulent web page), the authentication information displayed will differ from that generated by the out-of-band server authenticator.
- The authenticator provides authentication information by text or sound, depending on the setting of the mobile application.
- The user can approve or reject on the authenticator. When the user approves, additional Multifactor authentication steps (e.g., Knowledge : PIN, Possession: The mobile, Inherent : biometrics) may be required, depending on the verifier’s or mobile application policy.
- The authenticator generates user authentication information to send to the authentication server.
- The authenticator sends the user authentication information.
- The authentication server authenticates the user if the user's authentication information matches.
- The authentication server sends the user authentication result to the client.
- The client presents a post-login service if the result is positive.
