Completion requirements
This article calls the authentication factors we are familiar with the ownership factor, knowledge factor, and inherence factor. These names relate to something you have, something you know, and something you are, respectively.
System Fundamentals For Cyber Security/Authentication/Methods of Authentication
Ownership Factor
Security Token
A security token may be a physical device that an authorized user is given to ease authentication. It acts as an electronic key to access something. Examples include:
- USB Devices
- Key Fob
- Smart Card
- RFID Tokens
Software Token
In contrast to hardware tokens, where credentials are stored on a dedicated device, software tokens are stored on general-purpose devices such as mobile phones.