Phone-to-Carry


Description

The user needs a mobile phone for authentication. This covers ordinary mobile phones (i.e. capable of phoning and writing SMS) as well as smartphones (i.e. using apps, additional sensors, receiving email, etc.).