This refers to three mutually reinforcing categories of authentication schemes: 1. Something you are (e.g. your retina, thumbprint, voice characteristics) 2. Something you have (e.g. a specific device, a fob) 3. Something you know (e.g. a password, a secret code)