{"id":15779,"date":"2023-11-28T15:20:04","date_gmt":"2023-11-28T15:20:04","guid":{"rendered":"https:\/\/businessyield.com\/tech\/?p=15779"},"modified":"2023-11-28T15:20:06","modified_gmt":"2023-11-28T15:20:06","slug":"totp","status":"publish","type":"post","link":"https:\/\/businessyield.com\/tech\/technology\/totp\/","title":{"rendered":"TOTP: What is a Time-Based One-Time Password?","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"\n<p>As a form of <a href=\"https:\/\/businessyield.com\/tech\/social-media\/two-factor-authentication-twitter\/\" target=\"_blank\" rel=\"noreferrer noopener\">two-factor authentication<\/a> (2FA), time-based one-time passwords (TOTPs) have gained popularity among cloud service providers. You can prevent unauthorized access to your accounts and sensitive data with the help of the TOTP authenticator application or app. <strong>\u00a0<\/strong>You will need a TOTP authenticator app or device to get started with TOTP.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-totp\"><span id=\"totp\">TOTP<\/span><\/h2>\n\n\n\n<p>The algorithm behind the Time-Based One-Time Password (TOTP) generates a new, one-time password every 30\u201360 seconds. <a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/mfa-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">Multi-factor authentication (MFA)<\/a> requires a user to verify their identity in multiple ways, including entering a one-time password (OTP) after entering a username and password.<\/p>\n\n\n\n<p>An authentication algorithm generates a temporary, one-time-use passcode known as TOTP. It is an additional safety measure for your online profiles, built on the foundation of two-factor or multi-factor authentication. This means that in addition to your usual login credentials, you will also need to enter a unique, temporary code.<\/p>\n\n\n\n<p>The secret numbers used in TOTPs vary between 4 and 6 digits in length and are reset every 30 to 60 seconds. TOTP, a standardized method for creating temporary passwords, was developed by the Internet Engineering Task Force (IETF) and is detailed in RFC 6238.<\/p>\n\n\n\n<p>When a user logs in with their usual credentials, they will also be asked to provide an additional form of authentication in the form of a valid TOTP. Passwords used with TOTP systems are always different. TOTPs are only good for a short time, unlike passwords that do not expire. Standard timeouts for TOTPs are 30, 60, 120, and 240 seconds.<\/p>\n\n\n\n<p>Typically, a hardware token or a mobile app generates this password, updating it roughly every 30 seconds. A TOTP is a temporary password that must be entered alongside the user\u2019s usual credentials during login to a site or service that requires it for authentication.<\/p>\n\n\n\n<p>Even if a hacker manages to get their login credentials, TOTPs are meant to stop bad actors from accessing a user\u2019s account. When a user uses a TOTP, a hacker needs access to both the user\u2019s login information and the TOTP device to generate a working one-time password. The likelihood of a hacker intercepting the TOTP is extremely low because it changes every 30 seconds.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-does-a-totp-work\"><span id=\"how-does-a-totp-work\">How does a TOTP Work?<\/span><\/h2>\n\n\n\n<p>A TOTP service provides an additional layer of authentication security by requiring users to enter a one-time numeric passcode before gaining access to their app. When authentication apps like Google Authenticator and Authy use digital credentials, they are often called \u201csoftware tokens,\u201d \u201csoft tokens,\u201d or \u201capp-based authentication.\u201d<\/p>\n\n\n\n<p>A top-secret algorithm generates each TOTP code. The algorithm takes into account the current time, making it individualized for each instance. As a result, the algorithm can generate a fresh, one-of-a-kind code every 30\u201360 seconds.<\/p>\n\n\n\n<p>To confirm a user\u2019s identity, two-factor authentication (2FA) is widely used. It uses a combination of the user\u2019s knowledge and possessions to verify their identity. If a user attempts to access their bank account using just their username and password, for instance, the service will first send them an SMS message or email containing a random code. The user receives the random code on a device they own, and they already know their login and password.<\/p>\n\n\n\n<p>To verify your identity after entering your username and password, you will be asked to enter a valid TOTP code into a separate login interface.\u00a0<\/p>\n\n\n\n<p>The TOTP may be delivered to your mobile device in some configurations, typically via SMS. In certain configurations, it might be sent to your mobile device via SMS. You can also get the codes by using a smartphone app called \u201cAuthenticator\u201d to scan a QR code. The most popular method is this one, and the codes typically run out in 30 or 60 seconds. Some TOTPs, though, have a 120- or 240-second duration.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-authenticator-totp\"><span id=\"authenticator-totp\">Authenticator TOTP<\/span><\/h2>\n\n\n\n<p>TOTP Authenticator is a simple and quick way to implement 2FA (two-factor authentication) on your accounts. The app utilizes state-of-the-art security measures while maintaining an intuitive interface. You will need to use this app\u2019s one-time tokens in conjunction with your password. This strengthens the security of your accounts, making them more resistant to intrusion. If your service requires two-factor authentication, you can easily turn it on by scanning the QR code and updating your account settings.<\/p>\n\n\n\n<p>TOTP Authenticator has flawless cross-platform sync between Android and iOS. You can easily move your data from one platform to another by exporting it. Token Authenticator (OTP) works with most services that use 6-digit codes for two-factor authentication. If you have problems with any of our services, please get in touch with the support team. TOTP Authenticator works perfectly on both Android and iOS.<\/p>\n\n\n\n<p>TOTP Authenticator is one of the safest and most flexible <a href=\"https:\/\/businessyield.com\/tech\/apps\/what-is-an-authenticator-app\/\" target=\"_blank\" rel=\"noreferrer noopener\">authenticator apps<\/a> you can get. The app has a modern look, works on multiple devices, and is safe to use. The app works without an internet connection and lets you change the look of widgets and icons.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-you-should-use-totp-authentication\"><span id=\"why-you-should-use-totp-authentication\">Why You Should Use TOTP Authentication<\/span><\/h2>\n\n\n\n<p>One of the safest and easiest ways to use multi-factor authentication is with TOTP. Using multi-factor authentication (MFA) in conjunction with a strong <a href=\"https:\/\/businessyield.com\/tech\/apple\/mac\/how-to-find-saved-passwords-on-mac\/\" target=\"_blank\" rel=\"noreferrer noopener\">password<\/a> is a good security practice for any account. Even if an attacker obtains your password and attempts to log in, multi-factor authentication will prevent them from doing so.<\/p>\n\n\n\n<p>Unfortunately, passwords are often stolen in cyberattacks such as data breaches. For this reason, an MFA is essential. If you do not use multi-factor authentication (MFA) on your accounts, hackers can easily break in using stolen credentials.<\/p>\n\n\n\n<p>TOTP is one of the safest MFA methods because both parties determine the codes independently. This eliminates the need for the parties to exchange the codes verbally. Since the algorithm is still unknown, the code cannot be intercepted. There is an extra degree of security because the code is updated so regularly.<\/p>\n\n\n\n<p>The use of one-time passwords (TOTPs) is helpful because it boosts security. Man-in-the-middle attacks are common, making it unsafe to authenticate with just a username and password. With 2FA\/MFA systems that rely on TOTP, on the other hand, hackers are less likely to be able to access your TOTP even if they manage to obtain your traditional password.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-benefits-of-totp-authentication\"><span id=\"benefits-of-totp-authentication\">Benefits of TOTP Authentication<\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-enhanced-security\"><span id=\"1-enhanced-security\">#1. Enhanced Security<\/span><\/h3>\n\n\n\n<p>One of its main advantages is the additional layer of security it provides. In contrast to static passwords, TOTPs are only good for a brief amount of time\u2014usually between 30 and 60 seconds. Because of this time limit, compromising the authentication process is extremely difficult for attackers. Any attempt to gain unauthorized entry will fail after the TOTP has expired, even if it was intercepted. The use of TOTP also drastically lessens the likelihood that stolen credentials will be used to access a user\u2019s account.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-user-identity-authentication\"><span id=\"2-user-identity-authentication\">#2. User\/Identity Authentication<\/span><\/h3>\n\n\n\n<p>To ensure stronger user and identity authentication, businesses can use TOTP. Mobile devices running TOTP applications, like Authy or OneLogin, are necessary for TOTP to function. When logging in, the user must provide both their regular password and the correct TOTP generated by the application. The use of a second piece of information to verify the user\u2019s identity increases confidence in the login process. It helps prevent unauthorized access and reduces the likelihood of password theft or reuse.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-improved-user-experience\"><span id=\"3-improved-user-experience\">#3. Improved User Experience<\/span><\/h3>\n\n\n\n<p>If you are looking for an easier alternative to standard two-factor authentication, look no further than TOTP. Users no longer need to lug around inconvenient and easily misplaced physical tokens like key fobs. Smartphone apps that generate TOTPs make it easy for users to generate the authentication codes using their phones. This streamlined approach makes users happier and makes the login process smoother.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-easy-implementation\"><span id=\"4-easy-implementation\">#4. Easy Implementation<\/span><\/h3>\n\n\n\n<p>Organizations can save time and money by adopting TOTP. Installing anything other than the TOTP application on users\u2019 mobile devices is not necessary in terms of hardware or software. OneLogin, Authy, and Microsoft Authenticator are just some of the reputable TOTP apps from which administrators can choose. Because of how simple it is to implement TOTP, the time and resources spent doing so are reduced.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-scalability\"><span id=\"5-scalability\">#5. Scalability<\/span><\/h3>\n\n\n\n<p>The ability to scale is another major benefit of TOTP. Whether a company has a handful of employees or thousands, TOTP can authenticate them all without breaking the bank. Because of its scalability, TOTP is appropriate for businesses of any size, allowing them to implement more stringent authentication measures without incurring excessive costs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-totp-authenticator-app\"><span id=\"totp-authenticator-app\">TOTP Authenticator App<\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-authy-nbsp\"><span id=\"1-authy\">#1. Authy\u00a0<\/span><\/h3>\n\n\n\n<p>The most reliable authentication app is Authy. It supports TOTP, which is a security protocol that the majority of well-known websites use, has encrypted backups, and can sync across multiple devices. It does not cost anything, syncs up all of your devices instantly, and functions independently of the internet. In addition to being intuitive, it also works with Android widgets and the <a href=\"https:\/\/businessyield.com\/tech\/how-to\/how-to-mute-apple-watch\/\" target=\"_blank\" rel=\"noreferrer noopener\">Apple Watch<\/a>. Authy is the best two-factor authentication app out there.<\/p>\n\n\n\n<p>Apps that use TOTP-based authenticators can be used with Authy 2FA tokens on any platform. Authy even keeps track of the services it supports, along with detailed instructions on how to activate two-factor authentication for each one. You can keep your account information safe in the cloud and synced across all of your devices with Authy\u2019s free encrypted backups. You can use Authy even when you do not have access to the internet; it will generate codes locally and then flush them after 30 seconds.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-google-authenticator\"><span id=\"2-google-authenticator\">#2. Google Authenticator<\/span><\/h3>\n\n\n\n<p>Google Authenticator is still an excellent choice for authentication. The app does not require an active internet connection to generate tokens locally. It is simple to connect accounts using a QR code, and almost all services that recognize TOTP-based apps also offer explicit support for Google Authenticator. Security-wise, it is a plus that it does not require a Google account, but on the flip side, you cannot back up your data or sync it across devices.<\/p>\n\n\n\n<p>Just like our other options, this one works with any service that employs TOTP and does not require an active internet connection. The app stores encrypted backups of your data on your device.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-lastpass-authenticator-nbsp\"><span id=\"3-lastpass-authenticator\">#3. LastPass Authenticator\u00a0<\/span><\/h3>\n\n\n\n<p>The fact that the same company that created LastPass, the best free password manager available, also developed LastPass Authenticator is one of the main reasons why it stands out. LastPass Authenticator is unique among 2FA apps in that it verifies Amazon, Evernote, Google, Dropbox, and Facebook via push notifications in addition to time-based one-time passwords (TOTPs).<\/p>\n\n\n\n<p>It can also back up to LastPass\u2019 servers. If you use LastPass as your password manager, you should also use the LastPass Authenticator app. LastPass Authenticator provides all the necessary features to enhance the security of your online accounts, although it lacks the features of Authy or Microsoft Authenticator.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-microsoft-authenticator\"><span id=\"4-microsoft-authenticator\">#4. Microsoft Authenticator<\/span><\/h3>\n\n\n\n<p>The Authenticator app from Microsoft is incredibly easy to use. You can use it with any service that employs TOTPs, and it will generate one-time passwords locally regardless of whether or not you have network access.<\/p>\n\n\n\n<p>The app allows you to sign in to Microsoft services like OneDrive and Office 365 without entering a password. Apps can be approved for logins using your phone\u2019s fingerprint scanner, a face scan, or any other means of device authentication. When using an Android device, you can back up to Microsoft\u2019s servers, and when using an iOS device, you can back up to iCloud.<\/p>\n\n\n\n<p>When compared to Google Authenticator, Microsoft\u2019s offering is more formidable. Just as easy to use and loaded with extra features. An alternative app, such as Authy or LastPass Authenticator, may be more practical for you if you do not use any Microsoft services or software.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-is-totp-the-same-as-2fa\"><span id=\"is-totp-the-same-as-2fa\">Is TOTP the Same as 2FA?<\/span><\/h2>\n\n\n\n<p>To authenticate users, authenticator apps like Google Authenticator generate unique codes that expire after a certain amount of time has passed. The app is device-specific, unlike SMS One-Time Passcodes, which are susceptible to issues like SIM swapping. Most often, two-factor authentication (2FA) systems use TOTPs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-is-google-authenticator-a-totp\"><span id=\"is-google-authenticator-a-totp\">Is Google Authenticator a TOTP?<\/span><\/h2>\n\n\n\n<p>One software-based authenticator that Google offers is called Google Authenticator. Implementing multi-factor authentication services, it uses time-based OTPs and HMAC-based OTPs to authenticate users of software applications.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-the-difference-between-otp-and-totp\"><span id=\"what-is-the-difference-between-otp-and-totp\">What is the Difference between OTP and TOTP?<\/span><\/h2>\n\n\n\n<p>In contrast to TOTP, which resets at regular intervals based on a timestep, Hotp resets after each use.\u00a0<\/p>\n\n\n\n<p>The \u201cH\u201d in HOTP refers to the HMAC algorithm, which stands for Hash-based Message Authentication Code. The generated code won\u2019t lose its validity until you make a conscious effort to generate a new one, at which point the authentication server will validate it.<\/p>\n\n\n\n<p>TOTP: If you have not logged in with your password within that time frame, you will need to request a new one before you can access your account again.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-does-otp-mean-in-texting-nbsp\"><span id=\"what-does-otp-mean-in-texting\">What does OTP mean in Texting?\u00a0<\/span><\/h2>\n\n\n\n<p>A common acronym used in online chats is \u201cOTP,\u201d which stands for \u201con the phone.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-do-i-set-up-totp-authentication\"><span id=\"how-do-i-set-up-totp-authentication\">How do I Set up TOTP Authentication?<\/span><\/h2>\n\n\n\n<p>Launch TOTP Authenticator, then use the app\u2019s built-in QR code scanner by pressing the + button. The user\u2019s profile will now appear on the app\u2019s main screen. Every code has a 30-second expiration period, after which a new one is generated. In the field displayed on the screen, type the passcode that the app generated.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-is-microsoft-authenticator-a-totp\"><span id=\"is-microsoft-authenticator-a-totp\">Is Microsoft Authenticator a TOTP?<\/span><\/h2>\n\n\n\n<p>Any service that uses two-factor authentication and adheres to the time-based one-time password (TOTP) standards is compatible with Authenticator.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion-nbsp\"><span id=\"conclusion\">Conclusion\u00a0<\/span><\/h2>\n\n\n\n<p>One easy way to secure your accounts is with time-based, one-time passwords. Hackers can quickly obtain your password and username and take control of your account. TOTP-based 2FA\/MFA systems, on the other hand, provide increased security because TOTPs have a finite lifespan of only a few seconds. It is worthwhile to implement TOTP.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-related-articles\"><span id=\"related-articles\">Related Articles<\/span><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/how-does-beyond-identity-work\/\" target=\"_blank\" rel=\"noreferrer noopener\">How Does Beyond Identity Work? All You Need to Know<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/apps\/what-is-an-authenticator-app\/\" target=\"_blank\" rel=\"noreferrer noopener\">What is an Authenticator App: How it Works &amp; Best Practices<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/mfa-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">MFA AUTHENTICATION: Definition, Types &amp; How to Set Up<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/social-media\/two-factor-authentication-twitter\/\" target=\"_blank\" rel=\"noreferrer noopener\">TWO FACTOR AUTHENTICATION TWITTER: How to Use?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/social-media\/twitter-two-factor-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">HOW TO USE TWO FACTOR AUTHENTICATION: Explained!<\/a><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-references-nbsp\"><span id=\"references\">References\u00a0<\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/www.cloudwards.net\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Cloudwards<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.hpyr.com\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">HPYR<\/a><\/li>\n<\/ul>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"excerpt":{"rendered":"As a form of two-factor authentication (2FA), time-based one-time passwords (TOTPs) have gained popularity among cloud service providers.&hellip;\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"author":269,"featured_media":16093,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[35],"tags":[],"class_list":{"0":"post-15779","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TOTP: What is a Time-Based One-Time Password? - Business Yield Technology<\/title>\n<meta name=\"description\" content=\"You can prevent unauthorized access to the accounts and sensitive data on your device with the help of the TOTP authenticator application or app.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/businessyield.com\/tech\/technology\/totp\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TOTP: What is a Time-Based One-Time Password? - Business Yield Technology\" \/>\n<meta property=\"og:description\" content=\"You can prevent unauthorized access to the accounts and sensitive data on your device with the help of the TOTP authenticator application or app.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/businessyield.com\/tech\/technology\/totp\/\" \/>\n<meta property=\"og:site_name\" content=\"Business Yield Technology\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-28T15:20:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-28T15:20:06+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/TOTP-Authenticator-Application-APP-Device.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"MaryJane\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"MaryJane\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/totp\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/totp\\\/\"},\"author\":{\"name\":\"MaryJane\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/#\\\/schema\\\/person\\\/e0bff6dddf2769f6c23fa4c50483a627\"},\"headline\":\"TOTP: What is a Time-Based One-Time Password?\",\"datePublished\":\"2023-11-28T15:20:04+00:00\",\"dateModified\":\"2023-11-28T15:20:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/totp\\\/\"},\"wordCount\":2307,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/totp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/businessyield.com\\\/tech\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/TOTP-Authenticator-Application-APP-Device.jpg?fit=500%2C250&ssl=1\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/totp\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/totp\\\/\",\"url\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/totp\\\/\",\"name\":\"TOTP: What is a Time-Based One-Time Password? - Business Yield Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/totp\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/totp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/businessyield.com\\\/tech\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/TOTP-Authenticator-Application-APP-Device.jpg?fit=500%2C250&ssl=1\",\"datePublished\":\"2023-11-28T15:20:04+00:00\",\"dateModified\":\"2023-11-28T15:20:06+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/#\\\/schema\\\/person\\\/e0bff6dddf2769f6c23fa4c50483a627\"},\"description\":\"You can prevent unauthorized access to the accounts and sensitive data on your device with the help of the TOTP authenticator application or app.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/totp\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/totp\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/totp\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/businessyield.com\\\/tech\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/TOTP-Authenticator-Application-APP-Device.jpg?fit=500%2C250&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/businessyield.com\\\/tech\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/TOTP-Authenticator-Application-APP-Device.jpg?fit=500%2C250&ssl=1\",\"width\":500,\"height\":250,\"caption\":\"Image by storyset on Freepik\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/technology\\\/totp\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TOTP: What is a Time-Based One-Time Password?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/#website\",\"url\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/\",\"name\":\"Business Yield Technology\",\"description\":\"Best Tech Reviews, Apps, Phones, &amp; Gaming\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/#\\\/schema\\\/person\\\/e0bff6dddf2769f6c23fa4c50483a627\",\"name\":\"MaryJane\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f032e251c13cea720551b22f4893760b92bc934d563486fe9375b36c78883d36?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f032e251c13cea720551b22f4893760b92bc934d563486fe9375b36c78883d36?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f032e251c13cea720551b22f4893760b92bc934d563486fe9375b36c78883d36?s=96&d=mm&r=g\",\"caption\":\"MaryJane\"},\"url\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/author\\\/mary\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TOTP: What is a Time-Based One-Time Password? - Business Yield Technology","description":"You can prevent unauthorized access to the accounts and sensitive data on your device with the help of the TOTP authenticator application or app.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/businessyield.com\/tech\/technology\/totp\/","og_locale":"en_US","og_type":"article","og_title":"TOTP: What is a Time-Based One-Time Password? - Business Yield Technology","og_description":"You can prevent unauthorized access to the accounts and sensitive data on your device with the help of the TOTP authenticator application or app.","og_url":"https:\/\/businessyield.com\/tech\/technology\/totp\/","og_site_name":"Business Yield Technology","article_published_time":"2023-11-28T15:20:04+00:00","article_modified_time":"2023-11-28T15:20:06+00:00","og_image":[{"width":500,"height":250,"url":"http:\/\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/TOTP-Authenticator-Application-APP-Device.jpg","type":"image\/jpeg"}],"author":"MaryJane","twitter_card":"summary_large_image","twitter_misc":{"Written by":"MaryJane","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/businessyield.com\/tech\/technology\/totp\/#article","isPartOf":{"@id":"https:\/\/businessyield.com\/tech\/technology\/totp\/"},"author":{"name":"MaryJane","@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/e0bff6dddf2769f6c23fa4c50483a627"},"headline":"TOTP: What is a Time-Based One-Time Password?","datePublished":"2023-11-28T15:20:04+00:00","dateModified":"2023-11-28T15:20:06+00:00","mainEntityOfPage":{"@id":"https:\/\/businessyield.com\/tech\/technology\/totp\/"},"wordCount":2307,"commentCount":0,"image":{"@id":"https:\/\/businessyield.com\/tech\/technology\/totp\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/TOTP-Authenticator-Application-APP-Device.jpg?fit=500%2C250&ssl=1","articleSection":["Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/businessyield.com\/tech\/technology\/totp\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/businessyield.com\/tech\/technology\/totp\/","url":"https:\/\/businessyield.com\/tech\/technology\/totp\/","name":"TOTP: What is a Time-Based One-Time Password? - Business Yield Technology","isPartOf":{"@id":"https:\/\/businessyield.com\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/businessyield.com\/tech\/technology\/totp\/#primaryimage"},"image":{"@id":"https:\/\/businessyield.com\/tech\/technology\/totp\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/TOTP-Authenticator-Application-APP-Device.jpg?fit=500%2C250&ssl=1","datePublished":"2023-11-28T15:20:04+00:00","dateModified":"2023-11-28T15:20:06+00:00","author":{"@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/e0bff6dddf2769f6c23fa4c50483a627"},"description":"You can prevent unauthorized access to the accounts and sensitive data on your device with the help of the TOTP authenticator application or app.","breadcrumb":{"@id":"https:\/\/businessyield.com\/tech\/technology\/totp\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/businessyield.com\/tech\/technology\/totp\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/businessyield.com\/tech\/technology\/totp\/#primaryimage","url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/TOTP-Authenticator-Application-APP-Device.jpg?fit=500%2C250&ssl=1","contentUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/TOTP-Authenticator-Application-APP-Device.jpg?fit=500%2C250&ssl=1","width":500,"height":250,"caption":"Image by storyset on Freepik"},{"@type":"BreadcrumbList","@id":"https:\/\/businessyield.com\/tech\/technology\/totp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/businessyield.com\/tech\/"},{"@type":"ListItem","position":2,"name":"TOTP: What is a Time-Based One-Time Password?"}]},{"@type":"WebSite","@id":"https:\/\/businessyield.com\/tech\/#website","url":"https:\/\/businessyield.com\/tech\/","name":"Business Yield Technology","description":"Best Tech Reviews, Apps, Phones, &amp; Gaming","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/businessyield.com\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/e0bff6dddf2769f6c23fa4c50483a627","name":"MaryJane","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f032e251c13cea720551b22f4893760b92bc934d563486fe9375b36c78883d36?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f032e251c13cea720551b22f4893760b92bc934d563486fe9375b36c78883d36?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f032e251c13cea720551b22f4893760b92bc934d563486fe9375b36c78883d36?s=96&d=mm&r=g","caption":"MaryJane"},"url":"https:\/\/businessyield.com\/tech\/author\/mary\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/TOTP-Authenticator-Application-APP-Device.jpg?fit=500%2C250&ssl=1","jetpack_sharing_enabled":true,"gt_translate_keys":[{"key":"link","format":"url"}],"_links":{"self":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/15779","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/users\/269"}],"replies":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/comments?post=15779"}],"version-history":[{"count":10,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/15779\/revisions"}],"predecessor-version":[{"id":16179,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/15779\/revisions\/16179"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/media\/16093"}],"wp:attachment":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/media?parent=15779"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/categories?post=15779"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/tags?post=15779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}