authentication 3-factor authentication identity verification security identity authentication usb tokens strong authentication microsoft .net authentication live logic bombs internet security man-in-the-middle attack 2-factor criminal background check 2 factor identity 2.0 encryption land attack