{"id":14923,"date":"2023-11-29T10:19:14","date_gmt":"2023-11-29T10:19:14","guid":{"rendered":"https:\/\/businessyield.com\/tech\/?p=14923"},"modified":"2023-11-29T10:19:29","modified_gmt":"2023-11-29T10:19:29","slug":"one-time-password","status":"publish","type":"post","link":"https:\/\/businessyield.com\/tech\/technology\/one-time-password\/","title":{"rendered":"ONE TIME PASSWORD: Everything You Need To Know","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"\n<p>Wouldn\u2019t it be great if there were a foolproof way to verify that you\u2019re talking to the right person in a business setting where fraud is all too common? Our need for identity and data protection verification solutions grows as we live more and more online.\u00a0One-time passwords (OTPs) are a practical way to safeguard users worldwide. A one-time password, or one that expires after a certain amount of time, is more secure than a permanent one. Most of the time, OTPs are sent through SMS, apps, or email, and they work against common online threats. Read further to get to know more about one time password; the generators and authentication. Enjoy the ride!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-a-one-time-password\"><span id=\"what-is-a-one-time-password\">What Is a One Time Password?<\/span><\/h2>\n\n\n\n<p>For maximum safety and protection against hacking attempts, many websites and services now require users to enter a unique \u201cone-time password\u201d (OTP) each time they log in. It\u2019s an automatically generated string of letters or numbers that is delivered to the user\u2019s phone as an SMS, voice message, or push notification.<\/p>\n\n\n\n<p>When unique conditions arise, such as verifying the legitimacy of a transaction or authenticating a new account, the OTP has emerged as the global standard for permitting a login. One-time passwords, one-time authorization codes (OTACs), and dynamic passwords all refer to the same thing: a random six-digit number supplied to a client\u2019s phone via SMS text message and then entered by the consumer into a website or app to get access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-types-of-one-time-passwords\"><span id=\"types-of-one-time-passwords\">Types of One Time Passwords<\/span><\/h2>\n\n\n\n<p>The following are the types of One Time Passwords:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-hash-based-otp-hotp\"><span id=\"1-hash-based-otp-hotp\">#1. Hash-based OTP (HOTP)<\/span><\/h3>\n\n\n\n<p>This one-time password (OTP) method uses a hash technique to produce and send a code that changes in tandem with a counter that is updated each time the user logs in.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-time-based-otp-totp\"><span id=\"2-time-based-otp-totp\">#2. Time-based OTP (TOTP)<\/span><\/h3>\n\n\n\n<p>This particular kind of OTP is time-based since it gives a window of validity for the OTP code. Timesteps are typically between thirty and sixty seconds long. The user has to request a fresh OTP code if they don\u2019t enter it within the allotted timeframe.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-does-a-one-time-password-work\"><span id=\"how-does-a-one-time-password-work\">How Does a One-Time Password Work?<\/span><\/h2>\n\n\n\n<p>During a single login session or transaction, a one time password generates a special, time-limited code.<\/p>\n\n\n\n<p>This is how it usually operates:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-making-an-otp-request-nbsp\"><span id=\"1-making-an-otp-request\">#1. Making an OTP request\u00a0<\/span><\/h3>\n\n\n\n<p>The system asks a user to input their username or identification whenever they try to log in or carry out a sensitive operation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-generating-nbsp-the-otp-nbsp\"><span id=\"2-generating-the-otp\">#2. Generating\u00a0 the OTP\u00a0<\/span><\/h3>\n\n\n\n<p>The system then produces a one-time password (OTP) using a counter (HMAC-based OTP) or the passage of time (time-based OTP).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-mode-of-delivery\"><span id=\"3-mode-of-delivery\">#3. Mode of Delivery<\/span><\/h3>\n\n\n\n<p>The user receives the OTP via a pre-arranged channel, like an SMS, voice call, email, or mobile app.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-user-contribution\"><span id=\"4-user-contribution\">#4. User Contribution<\/span><\/h3>\n\n\n\n<p>After receiving the OTP, the user enters it into the application or login screen.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-validation-nbsp\"><span id=\"5-validation\">#5. Validation\u00a0<\/span><\/h3>\n\n\n\n<p>The system confirms the authenticity of the entered OTP and determines whether it corresponds with the one generated for that particular session.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-6-quick-use\"><span id=\"6-quick-use\">#6. Quick Use<\/span><\/h3>\n\n\n\n<p>A predetermined time interval or successful usage of the OTP renders the code invalid, preventing its repetition.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-7-enhanced-security\"><span id=\"7-enhanced-security\">#7. Enhanced Security<\/span><\/h3>\n\n\n\n<p>The system adds an extra layer of protection by requiring the dynamic OTP in addition to the standard password or PIN. This lowers the risk of password-related attacks and protects against unauthorized access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-does-a-user-get-a-one-time-password\"><span id=\"how-does-a-user-get-a-one-time-password\">How Does a User Get a One Time Password?<\/span><\/h2>\n\n\n\n<p>Obtaining an OTP code is a simple process for the end user, making the process safe but simple. This is a typical situation:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A client tries to use their phone to access their online banking account.<\/li>\n\n\n\n<li>They cannot use their device with the bank. They offer to send a verification code by email, text message, phone call, or push notification in order to safeguard the user\u2019s information.<\/li>\n\n\n\n<li>The customer receives an OTP key in a matter of seconds after choosing their preferred delivery method.<\/li>\n\n\n\n<li>The user continues with their login, providing their ID and password in addition to the key. They are free to use every feature available for internet banking.<\/li>\n<\/ul>\n\n\n\n<p>To produce and deliver that one-time passcode to the customer\u2019s screen, a variety of magical processes took place behind the scenes.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-one-time-password-generators\"><span id=\"one-time-password-generators\">One Time Password Generators<\/span><\/h2>\n\n\n\n<p>There are various ways to generate OTPs, and each has unique security features and methods. The following are some One Time Password generators:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-time-based-otp-totp\"><span id=\"1-time-based-otp-totp\">#1. Time-Based OTP (TOTP)<\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Using the time of day and a shared secret key between the server and the user\u2019s device, TOTP provides authentication.<\/li>\n\n\n\n<li>Using a cryptographic procedure such as HMAC-SHA1, the secret key and the current time are hashed to create the OTP.<\/li>\n\n\n\n<li>Since TOTP is time-synchronized, both the user\u2019s device and the server need to have precisely set clocks.<\/li>\n\n\n\n<li>This is often used to make OTPs in mobile apps like Google Authenticator.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-hmac-based-otp-hotp\"><span id=\"2-hmac-based-otp-hotp\">#2. HMAC-Based OTP (HOTP)<\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>OTPs are created by HOTP using a counter and a secret key that is shared between users.<\/li>\n\n\n\n<li>The counter is increased, and a new OTP is produced each time an OTP is used.<\/li>\n\n\n\n<li>The counter value on the user\u2019s device and the server must be in sync with one another.<\/li>\n\n\n\n<li>Hardware tokens and authenticator apps frequently employ HOTP for authentication.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-random-generation\"><span id=\"3-random-generation\">#3. Random Generation<\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Using a secure cryptographic random number generator, some systems create OTPs randomly.<\/li>\n\n\n\n<li>Users can receive their OTP via text message, email, or another channel.<\/li>\n\n\n\n<li>Temporary use can be guaranteed by combining random generation with a time limit.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-challenge-response-otp\"><span id=\"4-challenge-response-otp\">#4. Challenge-Response OTP<\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The server in a challenge-response system delivers a challenge to the user\u2019s device in the form of a random number.<\/li>\n\n\n\n<li>The OTP is calculated by the user\u2019s device using the challenge and a secret key.<\/li>\n\n\n\n<li>The server receives the computed OTP back for validation.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-otp-by-sms\"><span id=\"5-otp-by-sms\">#5. OTP by SMS<\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Users can receive OTPs via SMS messages, third-party services, or a centralized SMS gateway.<\/li>\n\n\n\n<li>The user enters the OTP for authentication as soon as they receive it.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-6-otp-by-email\"><span id=\"6-otp-by-email\">#6. OTP by Email<\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Users can receive OTPs through email.<\/li>\n\n\n\n<li>To finish the authentication process, the user enters the OTP from the email.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-advantages-of-a-one-time-password\"><span id=\"the-advantages-of-a-one-time-password\">The Advantages of a One Time Password<\/span><\/h2>\n\n\n\n<p>The following are the advantages of a one time password:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-otps-have-a-high-degree-of-client-familiarity\"><span id=\"1-otps-have-a-high-degree-of-client-familiarity\">#1. OTPs Have a High Degree of Client Familiarity<\/span><\/h3>\n\n\n\n<p>One-time codes are widely used for a variety of purposes, such as changing a password or activating a bank card; thus, very few individuals require instruction on how to use them. The vast majority of people who require an OTP may easily obtain one because there are now more than twice as many cell phones as people.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-put-an-end-to-identity-thieves-activities\"><span id=\"2-put-an-end-to-identity-thieves-activities\">#2. Put an end to identity thieves\u2019 activities<\/span><\/h3>\n\n\n\n<p>When companies use one-time passwords (OTPs) for user authentication, it becomes much more difficult for hackers to get into the accounts of their clients or staff members and steal personal data.\u00a0<\/p>\n\n\n\n<p>When an unregistered device is used to access an account, verification messages might also be sent to the user\u2019s registered email address or mobile number. The account holder can quickly and simply flag any odd activity with a single click if necessary.\u00a0<\/p>\n\n\n\n<p>The user has total control, and their account is not locked at any hint of questionable conduct, which would be incredibly annoying if the action was valid every single time. Furthermore, these warnings help businesses gain customers\u2019 trust by informing them that they are actively monitoring and safeguarding their personal data!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-attacks-in-replay\"><span id=\"3-attacks-in-replay\">#3. Attacks in replay<\/span><\/h3>\n\n\n\n<p>The password and other authentication information for a user are stolen in a replay attack. The attacker would now gain access to that user\u2019s account if the password was static. However, if an OTP is used, the password that the hacker stole is rendered invalid because it was previously used once to get into the user\u2019s account and cannot be reused.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-multi-factor-authentication\"><span id=\"4-multi-factor-authentication\">#4. Multi-factor authentication<\/span><\/h3>\n\n\n\n<p>OTPs have the ability to add another level of security. Security can be strengthened and the chance of a breach decreased by generating One-Time Passwords (OTPs) for users to offer as an extra form of authentication.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-gives-your-it-support-a-break\"><span id=\"5-gives-your-it-support-a-break\">#5. Gives your IT support a break<\/span><\/h3>\n\n\n\n<p>Each of us has numerous usernames and passwords that we need to keep in mind. Not everyone has forgotten at least one. Keeping track of all that information, from the streaming service account to the subscriptions to online newspapers, is no easy feat.<\/p>\n\n\n\n<p>Humans tend to forget things. If there are no other ways to verify identities, customers will have to contact customer service or IT personnel to get back into their accounts, which takes time.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-6-superior-technology-guarantees-maximum-dependability\"><span id=\"6-superior-technology-guarantees-maximum-dependability\">#6. Superior Technology Guarantees Maximum Dependability<\/span><\/h3>\n\n\n\n<p>While there is a small chance that an SMS-sent One-Time Password (OTP) won\u2019t arrive within the allotted few minutes, the vast majority of OTPs arrive promptly. Even if the delivery fails extremely rarely, the consumer might request a new OTP.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-7-otps-fulfill-a-variety-of-situations\"><span id=\"7-otps-fulfill-a-variety-of-situations\">#7. OTPs Fulfill a Variety of Situations<\/span><\/h3>\n\n\n\n<p>There are several applications for OTPs. Although they are most prevalent in the financial industry, they are becoming more and more frequent on all kinds of websites and applications where it is necessary to verify a user\u2019s identity or access privileges. OTPs work on the same premise as the \u201cmultiple factors\u201d of TFA and SCA, which is to say that they increase the level of security already present in the process.<\/p>\n\n\n\n<p>If a customer\u2019s account has multi-factor authentication enabled, then even if a malicious actor has access to the user\u2019s email and password, they still wouldn\u2019t be able to log in without committing further crimes, such as stealing the customer\u2019s mobile device.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-challenges-and-security-concerns-of-one-time-password\"><span id=\"challenges-and-security-concerns-of-one-time-password\">Challenges and Security Concerns of One Time Password<\/span><\/h2>\n\n\n\n<p>Despite the benefits of one-time password authentication in terms of security, the technology is not without its drawbacks. The following are the challenges of One Time Password:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-problems-with-delivery\"><span id=\"1-problems-with-delivery\">#1. Problems with Delivery<\/span><\/h3>\n\n\n\n<p>Depending on the network or spam filters in place, OTPs sent by email or SMS may reach slowly or not at all. This may irritate users and make the authentication procedure more difficult.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-phishing-occurrences-nbsp\"><span id=\"2-phishing-occurrences\">#2. <a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/smishing-and-phishing-what-is-the-difference\/\">Phishing Occurrences\u00a0<\/a><\/span><\/h3>\n\n\n\n<p>Even though OTPs are immune to conventional phishing attacks, skilled hackers can nevertheless deceive users into entering OTPs by pretending to be authentic OTP prompts or using social engineering tactics.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-attacks-by-man-in-the-middle-mitm\"><span id=\"3-attacks-by-man-in-the-middle-mitm\">#3. <a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/mitm\/\">Attacks by \u201cMan-in-the-Middle\u201d (MitM)<\/a><\/span><\/h3>\n\n\n\n<p>Attackers may be able to intercept OTPs in some situations when they are being transmitted between the user\u2019s device and the server, particularly if the communication links are not secure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-attacks-using-replay\"><span id=\"4-attacks-using-replay\">#4. Attacks using Replay<\/span><\/h3>\n\n\n\n<p>An attacker may be able to obtain unauthorized access if they are able to intercept and reuse an OTP during its validity period.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-theft-or-loss-of-tokens\"><span id=\"5-theft-or-loss-of-tokens\">#5. Theft or Loss of Tokens<\/span><\/h3>\n\n\n\n<p>When it comes to hardware tokens, an attacker might be able to access the user\u2019s accounts using the OTPs in the event that the token is lost, stolen, or deactivated.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-6-reliance-on-mobile-technology\"><span id=\"6-reliance-on-mobile-technology\">#6. Reliance on Mobile Technology<\/span><\/h3>\n\n\n\n<p>Many users of mobile-based OTPs require their mobile devices to be with them for authentication, which isn\u2019t always practical or possible.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-7-issues-with-synchronization\"><span id=\"7-issues-with-synchronization\">#7. Issues with Synchronization<\/span><\/h3>\n\n\n\n<p>The clocks of the user\u2019s device and the server need to be in sync for time-based OTP (TOTP) systems. Authentication attempts may fail in the event of any disparity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-8-attacks-known-as-denial-of-service-dos-nbsp\"><span id=\"8-attacks-known-as-denial-of-service-dos\">#8. Attacks known as denial of service (DoS)\u00a0<\/span><\/h3>\n\n\n\n<p>Attackers might try to overload the authentication system with a large number of unsuccessful OTP attempts, which would disrupt service or exhaust resources.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-9-limited-capability-to-utilize-offline-nbsp\"><span id=\"9-limited-capability-to-utilize-offline\">#9. Limited Capability to Utilize Offline\u00a0<\/span><\/h3>\n\n\n\n<p>It might not be possible to use OTP authentication when users have spotty or nonexistent internet access.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-10-challenges-for-password-resets\"><span id=\"10-challenges-for-password-resets\">#10. Challenges for Password Resets<\/span><\/h3>\n\n\n\n<p>A user may have trouble accessing their account again if they rely just on OTP authentication and forget their password.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-11-adherence-to-regulations-nbsp\"><span id=\"11-adherence-to-regulations\">#11. Adherence to Regulations\u00a0<\/span><\/h3>\n\n\n\n<p>OTP security may also need to meet certain rules and compliance criteria, which vary depending on the business and region.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-come-a-one-time-password-is-secured\"><span id=\"how-come-a-one-time-password-is-secured\">How Come a One-Time Password Is Secured?<\/span><\/h2>\n\n\n\n<p>In reality, there is a surprising amount of technology involved in delivering an OTP to a customer\u2019s mobile device, despite their apparent simplicity. Despite not being encrypted while in transit, OTPs transmitted over SMS employ additional security measures to guarantee that only authorized users can access them.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-otps-adhere-to-tested-best-practices-nbsp\"><span id=\"otps-adhere-to-tested-best-practices\">OTPs Adhere to Tested Best Practices\u00a0<\/span><\/h2>\n\n\n\n<p>Strong Customer Authentication (SCA) and Two Factor Authentication (TFA), two popular login security models, take the stance that several factors, each insecure on its own, can work together to allow substantially stronger security. These procedures are common throughout the whole security sector and are not exclusive to OTP.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-multi-factor-authentication-s-factors\"><span id=\"multi-factor-authentications-factors\">Multi-Factor Authentication\u2019s Factors<\/span><\/h2>\n\n\n\n<p>\u00a0Essentially, these models integrate personal information (e.g., a smartphone) with personal knowledge (e.g., an email address) and\/or identity (e.g., a parent\u2019s place of birth) through challenge questions. When combined, a personal device, an OTP\u2014a semi-random access code\u2014and a brief window of time to enter it meet a number of use cases for safe login.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-distinguishes-a-2fa-from-an-otp\"><span id=\"what-distinguishes-a-2fa-from-an-otp\">What Distinguishes a 2FA From an OTP?<\/span><\/h2>\n\n\n\n<p>In addition to its use as a secondary or multi-factor authentication method, one-time passwords (OTPs) can function on their own as a standalone security mechanism by requiring a unique OTP for each login. As a result, these terms shouldn\u2019t be used interchangeably because OTP is merely one of several 2FA\/MFA implementations and can function independently as a security solution.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-is-a-static-password-less-secure-than-an-otp\"><span id=\"is-a-static-password-less-secure-than-an-otp\">Is a Static Password Less Secure Than an OTP?<\/span><\/h2>\n\n\n\n<p>Indeed. Static passwords gain an extra security layer from OTPs. In 81% of security breaches, passwords alone are a weak means of identity verification. Increasing the level of authentication on passwords guarantees increased security. Of course, becoming passwordless would allow you to do away with passwords completely.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-which-otp-is-most-frequently-used\"><span id=\"which-otp-is-most-frequently-used\">Which OTP Is Most Frequently Used?<\/span><\/h2>\n\n\n\n<p>The Time Based One Time Passwords (TOTP) method of Time Synchronized OTP generation is the most popular method for the generation of OTP described by The Initiative For Open Authentication (OATH). Time is the most important aspect in these OTP systems in order to create a one-of-a-kind password.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-is-it-possible-to-predict-the-otp\"><span id=\"is-it-possible-to-predict-the-otp\">Is it Possible to Predict the OTP?<\/span><\/h2>\n\n\n\n<p>But in contrast to conventional passwords, OTPs are not able to be predicted. Since every new string of characters generated by OTPs is random, it is unlikely to contain information that can be guessed with ease, such as a user\u2019s birthdate or pet name. Furthermore, it is not possible to predict the passcode for the future from previous examples.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-without-an-otp-can-someone-use-my-credit-card\"><span id=\"without-an-otp-can-someone-use-my-credit-card\">Without an OTP, Can Someone Use My Credit Card?<\/span><\/h2>\n\n\n\n<p>You can file a dispute with the bank over compromised card information and have the card blocked right away if you get an OTP on your phone and there are no outstanding payments. Consider it an additional security measure. You can be sure that nobody can use your card without an OTP, even if it gets lost or stolen.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-creating-encrypted-otp-codes\"><span id=\"creating-encrypted-otp-codes\">Creating Encrypted OTP Codes<\/span><\/h2>\n\n\n\n<p>\u00a0There is no list or long-term storage of the PIN that appears on a customer\u2019s phone. The method of generation is the same as that used to create the cryptographic keys that safeguard bank accounts: it is a \u201cone-way hash function\u201d that involves creating and multiplying big prime numbers. One important aspect of this approach is that, while these codes are quite simple to create, it is nearly impossible to \u201cbacktrack,\u201d or figure out how the code was created by examining the outcome.\u00a0<\/p>\n\n\n\n<p>As a result, the OTP that customers see is actually unexpected. A malicious actor may possess lists of millions of OTPs, but he couldn\u2019t use a \u201cpattern\u201d to forecast which OTP will be generated for a particular client in the future.\u00a0\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-otp-usability-is-time-limited\"><span id=\"otp-usability-is-time-limited\">OTP Usability Is Time-Limited<\/span><\/h2>\n\n\n\n<p>An OTP\u2019s limited shelf life\u2014rarely more than 30 minutes, and perhaps only a few minutes\u2014adds to its security posture. Stated differently, the scenario they address is highly time-sensitive. It\u2019s the client trying to log into his account while seated at his desk or the client verifying her payment is valid while in front of the sales counter.\u00a0\u00a0<\/p>\n\n\n\n<p>This is an additional benefit of SMS compared to other methods. Though instant messaging was not the primary purpose of SMS, most international mobile networks can send a text message from the sender to the recipient in a matter of seconds.\u00a0\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-otps-are-also-single-use-only\"><span id=\"otps-are-also-single-use-only\">OTPs Are Also Single-use Only<\/span><\/h2>\n\n\n\n<p>\u00a0one-time passwords can only be used once. They become invalid after a certain amount of time, and even during that window, the same OTP cannot be used to log in more than once; this is referred to as \u201cnon-replay.\u201d However, this time constraint renders the hacking of OTPs nearly useless, even if this were possible.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-an-otp-service-provider\"><span id=\"what-is-an-otp-service-provider\">What is an OTP Service Provider?<\/span><\/h2>\n\n\n\n<p>When businesses need to create safe authentication for their users, they often turn to a specialized company or service known as an OTP Service Provider.<\/p>\n\n\n\n<p>These suppliers guarantee a smooth and safe authentication procedure by providing the infrastructure, instruments, and knowledge needed to create and transmit OTPs to end users.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-identity-and-access-management\"><span id=\"what-is-identity-and-access-management\">What Is Identity and Access Management?<\/span><\/h2>\n\n\n\n<p>The concept of identity and access management (IAM) encompasses a set of security protocols and tools that guarantee appropriate entities can access resources at the appropriate moment.<\/p>\n\n\n\n<p>Building and upholding trusted digital identities is the foundation of identity and access management (IAM). Using IAM, businesses may verify the identities of individuals and groups and then provide them with authorized access to the appropriate systems. Additionally, adaptive risk-based authentication, which offers a step-up challenge when circumstances call for it, maintains trust over time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-send-one-time-passwords\"><span id=\"how-to-send-one-time-passwords\">How to Send One-Time Passwords?<\/span><\/h2>\n\n\n\n<p>Using OTPs does not require access to a mobile network. OTPs are provided as a service by companies like CM.com, which also offers a secure platform for sending OTPs via text message or other channels, receiving OTP requests, and confirming that the OTP was input correctly so the transaction might proceed.\u00a0<\/p>\n\n\n\n<p>Through the use of an API, the one-time password infrastructure is integrated with your website or application. A website uses protections such as verifying that the OTP entered is inside the time window to determine whether or not it is correct. The company uses an OTP service provider like CM.com rather than the software it developed internally when you receive an OTP to log into your bank account or complete a transaction.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-final-thoughts\"><span id=\"final-thoughts\">Final Thoughts<\/span><\/h2>\n\n\n\n<p>Getting to know everything about One Time Password is very important and I hope this article was helpful. Let\u2019s hear from you in the comment section below!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-related-articles\"><span id=\"related-articles\">Related Articles<\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/totp\/\">TOTP: What is a Time-Based One-Time Password?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/how-do-you-password-protect-an-excel-file\/\">How Do You Password Protect an Excel File: Explained!<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/terms\/what-is-a-password\/\">WHAT IS A PASSWORD: Definition & What It Is Used For<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-references\"><span id=\"references\">References<\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.sinch.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">sinch<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/licensespring.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">licensespring<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cm.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">cm<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.entrust.com\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">entrust<\/a><\/li>\n<\/ul>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"excerpt":{"rendered":"Wouldn\u2019t it be great if there were a foolproof way to verify that you\u2019re talking to the right&hellip;\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"author":250,"featured_media":16319,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[35],"tags":[],"class_list":{"0":"post-14923","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ONE TIME PASSWORD: Everything You Need To Know<\/title>\n<meta name=\"description\" content=\"During a single login session or transaction, a one time password generates a special, time-limited code. This is how it usually operates: #1. Making an OTP request\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/businessyield.com\/tech\/technology\/one-time-password\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ONE TIME PASSWORD: Everything You Need To Know\" \/>\n<meta property=\"og:description\" content=\"During a single login session or transaction, a one time password generates a special, time-limited code. This is how it usually operates: #1. Making an OTP request\" \/>\n<meta property=\"og:url\" content=\"https:\/\/businessyield.com\/tech\/technology\/one-time-password\/\" \/>\n<meta property=\"og:site_name\" content=\"Business Yield Technology\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-29T10:19:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-29T10:19:29+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/One-Time-Password.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Folake Adegbaju\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Folake Adegbaju\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/one-time-password\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/one-time-password\\\/\"},\"author\":{\"name\":\"Folake Adegbaju\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/#\\\/schema\\\/person\\\/d382d71b62343c442943617cd8afe3b1\"},\"headline\":\"ONE TIME PASSWORD: Everything You Need To Know\",\"datePublished\":\"2023-11-29T10:19:14+00:00\",\"dateModified\":\"2023-11-29T10:19:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/one-time-password\\\/\"},\"wordCount\":3067,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/one-time-password\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/businessyield.com\\\/tech\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/One-Time-Password.jpg?fit=500%2C250&ssl=1\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/one-time-password\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/one-time-password\\\/\",\"url\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/one-time-password\\\/\",\"name\":\"ONE TIME PASSWORD: Everything You Need To Know\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/one-time-password\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/one-time-password\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/businessyield.com\\\/tech\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/One-Time-Password.jpg?fit=500%2C250&ssl=1\",\"datePublished\":\"2023-11-29T10:19:14+00:00\",\"dateModified\":\"2023-11-29T10:19:29+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/#\\\/schema\\\/person\\\/d382d71b62343c442943617cd8afe3b1\"},\"description\":\"During a single login session or transaction, a one time password generates a special, time-limited code. This is how it usually operates: #1. Making an OTP request\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/one-time-password\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/one-time-password\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/one-time-password\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/businessyield.com\\\/tech\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/One-Time-Password.jpg?fit=500%2C250&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/businessyield.com\\\/tech\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/One-Time-Password.jpg?fit=500%2C250&ssl=1\",\"width\":500,\"height\":250,\"caption\":\"Image by rawpixel.com on Freepik\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/one-time-password\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ONE TIME PASSWORD: Everything You Need To Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/#website\",\"url\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/\",\"name\":\"Business Yield Technology\",\"description\":\"Best Tech Reviews, Apps, Phones, &amp; Gaming\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/#\\\/schema\\\/person\\\/d382d71b62343c442943617cd8afe3b1\",\"name\":\"Folake Adegbaju\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1995577059e01d5386796b1c2ccf4ced9c52e6a5416bbf5a6dc7e42264bb2d38?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1995577059e01d5386796b1c2ccf4ced9c52e6a5416bbf5a6dc7e42264bb2d38?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1995577059e01d5386796b1c2ccf4ced9c52e6a5416bbf5a6dc7e42264bb2d38?s=96&d=mm&r=g\",\"caption\":\"Folake Adegbaju\"},\"url\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/author\\\/adegbaju\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ONE TIME PASSWORD: Everything You Need To Know","description":"During a single login session or transaction, a one time password generates a special, time-limited code. This is how it usually operates: #1. Making an OTP request","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/businessyield.com\/tech\/technology\/one-time-password\/","og_locale":"en_US","og_type":"article","og_title":"ONE TIME PASSWORD: Everything You Need To Know","og_description":"During a single login session or transaction, a one time password generates a special, time-limited code. This is how it usually operates: #1. Making an OTP request","og_url":"https:\/\/businessyield.com\/tech\/technology\/one-time-password\/","og_site_name":"Business Yield Technology","article_published_time":"2023-11-29T10:19:14+00:00","article_modified_time":"2023-11-29T10:19:29+00:00","og_image":[{"width":500,"height":250,"url":"http:\/\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/One-Time-Password.jpg","type":"image\/jpeg"}],"author":"Folake Adegbaju","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Folake Adegbaju","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/businessyield.com\/tech\/technology\/one-time-password\/#article","isPartOf":{"@id":"https:\/\/businessyield.com\/tech\/technology\/one-time-password\/"},"author":{"name":"Folake Adegbaju","@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/d382d71b62343c442943617cd8afe3b1"},"headline":"ONE TIME PASSWORD: Everything You Need To Know","datePublished":"2023-11-29T10:19:14+00:00","dateModified":"2023-11-29T10:19:29+00:00","mainEntityOfPage":{"@id":"https:\/\/businessyield.com\/tech\/technology\/one-time-password\/"},"wordCount":3067,"commentCount":0,"image":{"@id":"https:\/\/businessyield.com\/tech\/technology\/one-time-password\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/One-Time-Password.jpg?fit=500%2C250&ssl=1","articleSection":["Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/businessyield.com\/tech\/technology\/one-time-password\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/businessyield.com\/tech\/technology\/one-time-password\/","url":"https:\/\/businessyield.com\/tech\/technology\/one-time-password\/","name":"ONE TIME PASSWORD: Everything You Need To Know","isPartOf":{"@id":"https:\/\/businessyield.com\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/businessyield.com\/tech\/technology\/one-time-password\/#primaryimage"},"image":{"@id":"https:\/\/businessyield.com\/tech\/technology\/one-time-password\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/One-Time-Password.jpg?fit=500%2C250&ssl=1","datePublished":"2023-11-29T10:19:14+00:00","dateModified":"2023-11-29T10:19:29+00:00","author":{"@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/d382d71b62343c442943617cd8afe3b1"},"description":"During a single login session or transaction, a one time password generates a special, time-limited code. This is how it usually operates: #1. Making an OTP request","breadcrumb":{"@id":"https:\/\/businessyield.com\/tech\/technology\/one-time-password\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/businessyield.com\/tech\/technology\/one-time-password\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/businessyield.com\/tech\/technology\/one-time-password\/#primaryimage","url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/One-Time-Password.jpg?fit=500%2C250&ssl=1","contentUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/One-Time-Password.jpg?fit=500%2C250&ssl=1","width":500,"height":250,"caption":"Image by rawpixel.com on Freepik"},{"@type":"BreadcrumbList","@id":"https:\/\/businessyield.com\/tech\/technology\/one-time-password\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/businessyield.com\/tech\/"},{"@type":"ListItem","position":2,"name":"ONE TIME PASSWORD: Everything You Need To Know"}]},{"@type":"WebSite","@id":"https:\/\/businessyield.com\/tech\/#website","url":"https:\/\/businessyield.com\/tech\/","name":"Business Yield Technology","description":"Best Tech Reviews, Apps, Phones, &amp; Gaming","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/businessyield.com\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/d382d71b62343c442943617cd8afe3b1","name":"Folake Adegbaju","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/1995577059e01d5386796b1c2ccf4ced9c52e6a5416bbf5a6dc7e42264bb2d38?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1995577059e01d5386796b1c2ccf4ced9c52e6a5416bbf5a6dc7e42264bb2d38?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1995577059e01d5386796b1c2ccf4ced9c52e6a5416bbf5a6dc7e42264bb2d38?s=96&d=mm&r=g","caption":"Folake Adegbaju"},"url":"https:\/\/businessyield.com\/tech\/author\/adegbaju\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/One-Time-Password.jpg?fit=500%2C250&ssl=1","jetpack_sharing_enabled":true,"gt_translate_keys":[{"key":"link","format":"url"}],"_links":{"self":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/users\/250"}],"replies":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/comments?post=14923"}],"version-history":[{"count":8,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14923\/revisions"}],"predecessor-version":[{"id":16339,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14923\/revisions\/16339"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/media\/16319"}],"wp:attachment":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/media?parent=14923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/categories?post=14923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/tags?post=14923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}