Draft:X.1280
X.1280 is an International Telecommunication Union(ITU) standard for verifying a service provider before user information.
Unlike traditional authentication methods such as passwords, PINs, and One-time password(OTPs), which only verify the user's identity, this standard enables mutual authentication to verify both users and service providers. X.1280 uses an out-of-band mobile authenticator, typically a smartphone, and may incorporate biometric authentication for enhanced security. However, a key feature is that no additional hardware, such as dedicated security tokens, is required beyond a smartphone. It allows the use of a unified authenticator across various devices. To authenticate via X.1280, prior registration is required. When a service provider supports X.1280-based authentication, the mobile authenticator must first be registered and then used for authentication.
Purpose
The X.1280 standard is designed to:
- Enhance security by enabling mutual authentication between users and service providers, ensuring protection against verifier impersonation.
- Eliminate device dependency by using an out-of-band mobile authenticator, allowing seamless authentication across multiple devices.
Applications
X.1280 enables advanced authentication methods, including:
- User-centric authentication: Users verify the service provider before providing credentials, simplifying the authentication process and enhancing security.
- Mutual authentication: Both the user and the service provider verify each other, shifting from one-way to two-way authentication.
- Unified authentication: A single mobile authenticator supports authentication across diverse devices, such as computers, smartphones, automated teller machines (ATMs), and artificial intelligence (AI) speakers, eliminating the need for device-specific authenticators [1]
History
- June 29, 2022: Registered as TTAK.KO-12.0383 by the Telecommunication Technology Association (TTA) in South Korea. [2]
- 2022: Adopted by ITU-T as X.oob-sa. [3]
- March 1, 2024: Redesignated as X.1280 by ITU-T. [4]
Process of Authentication
X.1280 authentication involves a two-step process: registering a mobile authenticator and performing mutual authentication between the user and the service provider.
- Authenticator registration
- A user needs to install a mobile application to communicate with an authentication server.
- After that, the user needs to request registration from a client. It can be a PC or something else.
- Then, the client sends a registration request to the authentication server.
- The authentication server generates secure data. In process 8, when the mobile sends a request, the request must contain the secure data.
- The authentication server sends information that contains the secure data for verification.
- The client provides registration information to the user by an allowed method, such as Email, SMS, QR code, etc.
- The user inputs the data received from the client into the pre-installed mobile application.
- The application requests verification from the authentication server.
- If the request contains secure data, the authentication server registers mobile application information.
- The authentication server sends a verification key to the mobile application. The application stores the key.

- Authentication process
- A user who registered an authenticator(out-of-band authenticator) request logs in on a client.
- Authentication server receives verification request from the client.
- The authentication server generates secure data to verify the authenticator.
- The authentication server sends authentication information to the client.
- The client shows authentication information by text or sound, depending on the type of the client.
- The authentication server sends a dataset to the authenticator to generate authentication information.
- The authenticator generates authentication information. If the user attempts to log in on a fake client (e.g., a fraudulent web page), the authentication information displayed will differ from that generated by the out-of-band server authenticator.
- The authenticator provides authentication information by text or sound, depending on the setting of the mobile application.
- The user can approve or reject on the authenticator. When the user approves, additional Multifactor authentication steps (e.g., Knowledge : PIN, Possession: The mobile, Inherent : biometrics) may be required, depending on the verifier’s or mobile application policy.
- The authenticator generates user authentication information to send to the authentication server.
- The authenticator sends the user authentication information.
- The authentication server authenticates the user if the user's authentication information matches.
- The authentication server sends the user authentication result to the client.
- The client presents a post-login service if the result is positive.
