Methods of Authentication
System Fundamentals For Cyber Security/Authentication/Methods of Authentication
Ownership Factor
Security Token
A security token may be a physical device that an authorized user is given to ease authentication. It acts as an electronic key to access something. Examples include:
- USB Devices
- Key Fob
- Smart Card
- RFID Tokens
Software Token
In contrast to hardware tokens, where credentials are stored on a dedicated device, software tokens are stored on general-purpose devices such as mobile phones.