Return to Article Details Requirement & Architecture of Two Way Authentication