Draft:X.1280
Submission declined on 21 May 2025 by ToadetteEdit (talk). This submission is not adequately supported by reliable sources. Reliable sources are required so that information can be verified. If you need help with referencing, please see Referencing for beginners and Citing sources.
Where to get help
How to improve a draft
You can also browse Wikipedia:Featured articles and Wikipedia:Good articles to find examples of Wikipedia's best writing on topics similar to your proposed article. Improving your odds of a speedy review To improve your odds of a faster review, tag your draft with relevant WikiProject tags using the button below. This will let reviewers know a new draft has been submitted in their area of interest. For instance, if you wrote about a female astronomer, you would want to add the Biography, Astronomy, and Women scientists tags. Editor resources
| ![]() |
Submission declined on 10 May 2025 by Caleb Stanford (talk). This submission appears to read more like an advertisement than an entry in an encyclopedia. Encyclopedia articles need to be written from a neutral point of view, and should refer to a range of independent, reliable, published sources, not just to materials produced by the creator of the subject being discussed. This is important so that the article can meet Wikipedia's verifiability policy and the notability of the subject can be established. If you still feel that this subject is worthy of inclusion in Wikipedia, please rewrite your submission to comply with these policies. Declined by Caleb Stanford 14 days ago. | ![]() |
Comment: This is an advertisement for a particular product standard, not an encyclopedic article that covers information about the project as covered in reliable, independent sources. Caleb Stanford (talk) 20:02, 10 May 2025 (UTC)
![]() | This is a draft article. It is a work in progress open to editing by anyone. Please ensure core content policies are met before publishing it as a live Wikipedia article. Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL Last edited by ToadetteEdit (talk | contribs) 3 days ago. (Update)
Finished drafting? or |
Framework for out-of-band server authentication using mobile devices | |
Status | In force (Recommendation) |
---|---|
Year started | 2022 |
Latest version | 1.0 March 1, 2024 |
Organization | ITU-T |
Committee | ITU-T Study Group 17 |
Series | X |
Related standards | X.509, X.1254 |
Domain | Cybersecurity, Identity management, Authentication, biometric authentication |
Website | handle |
X.1280 is an International Telecommunication Union(ITU) standard for verifying a service provider before user information.[1]
The title of x.1280 is out-of-band server authentication. This standard contains out-of-band authentication and mutual authentication. The out-of-band authentication makes it difficult for attackers to intercept because the attackers need to hijack two channels at the same time. [2] Mutual authentication can increase the security level compared to one-way authentication. One-way authentication only verifies the user's identity, but mutual authentication verifies the user and the service providers. In this way, mutual authentication can help stop some kinds of attacks.[3]
- On-path attacks
- Spoofing and impersonation
- Credential theft
X.1280 uses an out-of-band mobile authenticator, typically a smartphone, and may incorporate biometric authentication for applying MFA(Multi-factor authentication). However, a key feature is that no additional hardware, such as dedicated security tokens, is required beyond a smartphone. It allows the use of a unified authenticator across various devices. To authenticate via X.1280, prior registration is required. When a service provider supports X.1280-based authentication, the mobile authenticator must first be registered and then used for authentication.
Purpose
[edit]The X.1280 standard is designed to:
- Enhance security by enabling mutual authentication between users and service providers, ensuring protection against verifier impersonation.
- Eliminate device dependency by using an out-of-band mobile authenticator, allowing seamless authentication across multiple devices.
Applications
[edit]X.1280 enables advanced authentication methods, including:
- User-centric authentication: Users verify the service provider before providing credentials, simplifying the authentication process and enhancing security.
- Mutual authentication: Both the user and the service provider verify each other, shifting from one-way to two-way authentication.
- Unified authentication: A single mobile authenticator supports authentication across diverse devices, such as computers, smartphones, automated teller machines (ATMs), and artificial intelligence (AI) speakers, eliminating the need for device-specific authenticators.[4]
Advantages
[edit]X.1280 enables out-of-band authentication, a method using a separate communication channel for authentication,[2] requiring only a smartphone.[4] Mutual authentication, where both parties verify each other's identity,[3] helps reduce risks of fake site attacks, as demonstrated by EAP-NOOB [5] and Ejiyeh's UAV D2D protocols.[6] Out-of-band authentication enhances this security by using a separate channel, as seen in similar protocols.[5] IoT security standards increasingly incorporate out-of-band authentication for enhanced security.[7]
Limitations
[edit]X.1280 requires a smartphone, limiting access for users without one. Companies operating servers must develop a mobile app, increasing implementation costs. Network setup complexity may increase in firewall environments due to required configurations, as seen in out-of-band authentication systems. Two-step login may increase authentication time, potentially causing user inconvenience. Similar complexities are noted in IoT authentication standards.[4]
History
[edit]- June 29, 2022: Registered as TTAK.KO-12.0383 by the Telecommunication Technology Association (TTA) in South Korea.[8]
- 2022: Adopted by ITU-T as X.oob-sa.[7]
- March 1, 2024: Redesignated as X.1280 by ITU-T.[4]
Process of Authentication
[edit]X.1280 authentication involves a two-step process: registering a mobile authenticator and performing mutual authentication between the user and the service provider.
- Authenticator registration

- A user needs to install a mobile application to communicate with an authentication server.
- After that, the user needs to request registration from a client. It can be a PC or something else.
- Then, the client sends a registration request to the authentication server.
- The authentication server generates secure data. In process 8, when the mobile sends a request, the request must contain the secure data.
- The authentication server sends information that contains the secure data for verification.
- The client provides registration information to the user by an allowed method, such as Email, SMS, QR code, etc.
- The user inputs the data received from the client into the pre-installed mobile application.
- The application requests verification from the authentication server.
- If the request contains secure data, the authentication server registers mobile application information.
- The authentication server sends a verification key to the mobile application. The application stores the key.
- Authentication process

- A user who registered an authenticator(out-of-band authenticator) request logs in on a client.
- Authentication server receives verification request from the client.
- The authentication server generates secure data to verify the authenticator.
- The authentication server sends authentication information to the client.
- The client shows authentication information by text or sound, depending on the type of the client.
- The authentication server sends a dataset to the authenticator to generate authentication information.
- The authenticator generates authentication information. If the user attempts to log in on a fake client (e.g., a fraudulent web page), the authentication information displayed will differ from that generated by the out-of-band server authenticator.
- The authenticator provides authentication information by text or sound, depending on the setting of the mobile application.
- The user can approve or reject on the authenticator. When the user approves, additional Multifactor authentication steps (e.g., Knowledge : PIN, Possession: The mobile, Inherent : biometrics) may be required, depending on the verifier’s or mobile application policy.
- The authenticator generates user authentication information to send to the authentication server.
- The authenticator sends the user authentication information.
- The authentication server authenticates the user if the user's authentication information matches.
- The authentication server sends the user authentication result to the client.
- The client presents a post-login service if the result is positive.
References
[edit]- ^ "Free access for all to ITU-T standards". MIT Libraries. Retrieved 2025-05-16.
- ^ a b "Out-of-Band Authentication". Double Octopus. Retrieved 2025-05-16.
- ^ a b "What is mutual authentication?". Cloudflare. Retrieved 2025-05-16.
- ^ a b c d "ITU-T X.1280: Framework for out-of-band server authentication using mobile devices". ITU-T Recommendation Database. International Telecommunication Union. Retrieved 2025-05-16.
- ^ a b Aura, Tuomas; Sethi, Mohit; Peltonen, Aleksi (2021). "Nimble Out-of-Band Authentication for EAP (EAP-NOOB)". RFC. 9140. Retrieved 2025-05-16.
- ^ Ejiyeh, Atefeh Mohseni (2024). "Secure, Robust, and Energy-Efficient Authenticated Data Sharing in UAV-Assisted 6G Networks". arXiv:2402.11382 [cs.CR].
- ^ a b "Standardization Trends for IoT Security" (PDF). TTA Journal. 197 (4). Telecommunications Technology Association: 16–23. 2021. Retrieved 2025-05-16.
- ^ "Mutual authentication technology based on out-of-band(OOB) for IoT devices". Telecommunications Technology Association (TTA). Telecommunications Technology Association. Retrieved 2025-05-16.