Token Types and Usage
There are four types of tokens:
- Static password.
- Synchronous dynamic password
- Asynchronous password
- Challenge response
This article currently focuses on synchronous dynamic password tokens.
The simplest security tokens do not need any connection to a computer. The client enters the number to a local keyboard as displayed on the token (second security factor), usually along with a PIN (first security factor), when asked to do so. Being disconnected from the authenticating server, however, renders such tokens vulnerable to man-in-the-middle attacks.
Virtual Token MFA is a newer token concept introduced by the security company Sestus in 2005. Virtual token MFA is fundamentally different from "soft" tokens in that soft tokens require the deployment of software to end users, while virtual token MFA does not.
Other tokens connect to the computer using wireless techniques, such as Bluetooth. These tokens transfer a key sequence to the local client or to a nearby access point.
Alternatively, another form of token that has been widely available for many years is a mobile device which communicates using an out-of-band channel (like voice, SMS, USSD). Like physically disconnected tokens, out-of-band delivered tokens are also vulnerable to man-in-the-middle attacks.
Still other tokens plug into the computer. For these one must:
- Connect the token to the computer using an appropriate input device.
- Enter the PIN if necessary.
Depending on the type of the token, the computer OS will then either
- read the key from token and perform cryptographic operation on it or
- ask the token's firmware to perform this operation
A related application is the hardware dongle required by some computer programs to prove ownership of the software. The dongle is placed in an input device and the software accesses the I/O device in question to authorize the use of the software in question.
Read more about this topic: Security Token
Famous quotes containing the words token, types and/or usage:
“It doesnt make any difference how much money a father earns, his name is always Dad-Can-I.... Like all other children, my five have one great talent: they are gifted beggars. Not one of them ever ran into the room, looked up at me, and said, Im really happy that youre my father, and as a tangible token of my appreciation, heres a dollar.”
—Bill Cosby (20th century)
“Our major universities are now stuck with an army of pedestrian, toadying careerists, Fifties types who wave around Sixties banners to conceal their record of ruthless, beaverlike tunneling to the top.”
—Camille Paglia (b. 1947)
“I am using it [the word perceive] here in such a way that to say of an object that it is perceived does not entail saying that it exists in any sense at all. And this is a perfectly correct and familiar usage of the word.”
—A.J. (Alfred Jules)