What is Security Tokens

What is Security Tokens Knprunn

Encryption protects the contents of your messages and files. Hashing, digital signatures, and digital certificates authenticate the people and places that you’re doing business with. Security tokens authenticate YOU.

Security tokens are physical devices used to gain access to an electronically restricted resource. The token is used in addition to or in place of a password. ... Some tokens may store cryptographic keys, such as a digital signature, or biometric data, such as fingerprint details. Security tokens come in many different forms, including hardware tokens that contain chips, USB tokens that plug into USB ports, wireless Bluetooth tokens or programmable electronic key fobs, which activate devices remotely (for example, to gain access to a car or apartment building). Single sign-on services also use security tokens to seamlessly log users into third-party websites.

Security tokens are considered to be a more secure way to access a sensitive network system such as a bank account, as they add an extra layer of security. They may be used in place of or in addition to a password to prove the owner's identity.

The problem is that passwords can be easily cracked and stolen by hackers. Security tokens provide a much stronger two-factor authentication that includes both data (often a password) and a physical device.

Two-factor authentication is something that you already use all the time offline. When you use an ATM card to withdraw money from your bank account, you’re using two-factor authentication. The physical ATM card identifies you (factor one), as does the PIN number that you enter (factor two). While it’s important that you don’t misplace either, neither is really useful without the other. A criminal can play with your ATM card all day, but he’s not getting money from your bank unless he also knows your PIN number.

    Information
Security token A two-factor authentication method using a physical device as well as a secret code.


An ATM card is only one example of a security token. Other forms of security tokens are physical tokens (a small hardware device), smart cards, and biometric systems. With biometrics, the physical component is biological data like a fingerprint or retinal scan. As with any system, security tokens are not flawless.


Overview of Digital Signatures, Certificates, and Hashing

Why Should I Enable Two-Factor Authentication (2FA)

Did you find this tutorial helpful? Don’t forget to share your views with us.