Knowledge-based approaches use something you know to make a personal identification, such as a password or a personal identification number (PIN), which might be weak form of protection. For identification, they rely on a “what she/he knows”.
Completely Digital eSIM Onboarding Journey and Identity Management for Mobile Network Carriers