Security Token

Definition - What does Security Token mean?

A security token is an electronic software access and identity verification device used in lieu of or with an authentication password. Security token technology is based on two-factor or multifactor authorization.

Security token is also known as Universal Serial Bus (USB) token, cryptographic token, hardware token, hard token, authentication token or key fob.

Techopedia explains Security Token

The core security token design feature is a built-in display screen requesting access via authentication code or personal identification number (PIN). Some security tokens store digital signatures, biometric data, fingerprints or cryptographic keys. Advanced security tokens include USB tokens, Bluetooth tokens, Global System for Mobile Communications (GSM) mobile phones and PC/smart cards.

The security token's small design allows transport via keychain, pocket or purse.

The three main security token types are as follows:

  • Connected token: Requires a physical connection to generate automated authentication data transfer. Requires special installed host input devices. Popular connected security tokens include USBs and smart cards.
  • Disconnected tokens: This token is the most common and categorized for two-factor authentication and usually requires a PIN before generating authentication data. Does not physically or logically connect to a host computer but displays manually entered authentication data via a built-in screen.
  • Contactless tokens: This rarely used token is not physically connected to the host computer and forms a logical host computer connection for authentication data transmission. Radio-frequency identification (RFID) tokens are based on contactless tokens and under development. Due to security concerns, RFID usage is limited.
Share this:

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.