This document discusses user identification using two-factor authentication. It begins with an introduction on why security is needed and an overview of single-factor authentication using passwords. It then provides background on password protection and the failures of single-factor authentication. The main body of the document focuses on two-factor authentication, including what it is, one-time passwords, hardware and software tokens, and using mobile phones for two-factor authentication. It concludes by discussing disadvantages of two-factor authentication and advantages of multi-factor authentication.