Methods of Authentication

System Fundamentals For Cyber Security/Authentication/Methods of Authentication

Ownership Factor

Security Token

A security token may be a physical device that an authorized user is given to ease authentication. It acts as an electronic key to access something. Examples include:

  • USB Devices
  • Key Fob
  • Smart Card
  • RFID Tokens

Software Token

In contrast to hardware tokens, where credentials are stored on a dedicated device, software tokens are stored on general-purpose devices such as mobile phones.