However nicely designed and implemented, devices, tokens, cards and phones are easily left behind, lost, stolen and abused. Then the remembered password would be the last resort.
And, in a world where we live without remembered passwords, say, where our identity is established without our...