Recent from talks
Nothing was collected or created yet.
Security token
View on WikipediaThis article's factual accuracy is disputed. Review the definitions of "Security Token" and "Security Token Generator". (November 2024) |

A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place of, a password.[1] Examples of security tokens include wireless key cards used to open locked doors, a banking token used as a digital authenticator for signing in to online banking, or signing transactions such as wire transfers.
Security tokens can be used to store information such as passwords, cryptographic keys used to generate digital signatures, or biometric data (such as fingerprints). Some designs incorporate tamper resistant packaging, while others may include small keypads to allow entry of a PIN or a simple button to start a generation routine with some display capability to show a generated key number. Connected tokens utilize a variety of interfaces including USB, near-field communication (NFC), radio-frequency identification (RFID), or Bluetooth. Some tokens have audio capabilities designed for those who are vision-impaired.
Password types
[edit]
All tokens contain some secret information used to prove identity. There are four different ways in which this information can be used:
- Static password token
- The device contains a password that is physically hidden (not visible to the possessor), but is transmitted for each authentication. This type is vulnerable to replay attacks.
- Synchronous dynamic password token
- A timer is used to rotate through various combinations produced by a cryptographic algorithm. The token and the authentication server must have synchronized clocks.
- Asynchronous password token
- A one-time password is generated without the use of a clock, either from a one-time pad or cryptographic algorithm.
- Challenge–response token
- Using public key cryptography, it is possible to prove possession of a private key without revealing that key. The authentication server encrypts a challenge (typically a random number, or at least data with some random parts) with a public key; the device proves it possesses a copy of the matching private key by providing the decrypted challenge.
Time-synchronized, one-time passwords change constantly at a set time interval; e.g., once per minute. To do this, some sort of synchronization must exist between the client's token and the authentication server. For disconnected tokens, this time-synchronization is done before the token is distributed to the client. Other token types do the synchronization when the token is inserted into an input device. The main problem with time-synchronized tokens is that they can, over time, become unsynchronized.[2] However, some such systems, such as RSA's SecurID, allow the user to re-synchronize the server with the token, sometimes by entering several consecutive passcodes. Most also cannot have replaceable batteries and only last up to 5 years before having to be replaced – so there is an additional cost.[3] Another type of one-time password uses a complex mathematical algorithm, such as a hash chain, to generate a series of one-time passwords from a secret shared key. Each password is unique, even when previous passwords are known. The open-source OATH algorithm is standardized;[citation needed] other algorithms are covered by US patents. Each password is observably unpredictable and independent of previous ones, whereby an adversary would be unable to guess what the next password may be, even with knowledge of all previous passwords.
Physical types
[edit]This section needs additional citations for verification. (March 2023) |
Tokens can contain chips with functions varying from very simple to very complex, including multiple authentication methods.
The simplest security tokens do not need any connection to a computer. The tokens have a physical display; the authenticating user simply enters the displayed number to log in. Other tokens connect to the computer using wireless techniques, such as Bluetooth. These tokens transfer a key sequence to the local client or to a nearby access point.[4]
Alternatively, another form of token that has been widely available for many years is a mobile device which communicates using an out-of-band channel (like voice, SMS, or USSD).
Still other tokens plug into the computer and may require a PIN. Depending on the type of the token, the computer OS will then either read the key from the token and perform a cryptographic operation on it, or ask the token's firmware to perform this operation.[citation needed]
A related application is the hardware dongle required by some computer programs to prove ownership of the software. The dongle is placed in an input device and the software accesses the I/O device in question to authorize the use of the software in question.
Commercial solutions are provided by a variety of vendors, each with their own proprietary (and often patented) implementation of variously used security features. Token designs meeting certain security standards are certified in the United States as compliant with FIPS 140, a federal security standard.[5] Tokens without any kind of certification are sometimes viewed as suspect, as they often do not meet accepted government or industry security standards, have not been put through rigorous testing, and likely cannot provide the same level of cryptographic security as token solutions which have had their designs independently audited by third-party agencies.[citation needed]
Disconnected tokens
[edit]
Disconnected tokens have neither a physical nor logical connection to the client computer. They typically do not require a special input device, and instead use a built-in screen to display the generated authentication data, which the user enters manually themselves via a keyboard or keypad. Disconnected tokens are the most common type of security token used (usually in combination with a password) in two-factor authentication for online identification.[6]
Connected tokens
[edit]Connected tokens are tokens that must be physically connected to the computer with which the user is authenticating. Tokens in this category automatically transmit the authentication information to the client computer once a physical connection is made, eliminating the need for the user to manually enter the authentication information. However, in order to use a connected token, the appropriate input device must be installed. The most common types of physical tokens are smart cards and USB tokens (also called security keys), which require a smart card reader and a USB port respectively. Increasingly, FIDO2 tokens, supported by the open specification group FIDO Alliance have become popular for consumers with mainstream browser support beginning in 2015 and supported by popular websites and social media sites.[citation needed]
Older PC card tokens are made to work primarily with laptops. Type II PC Cards are preferred as a token as they are half as thick as Type III.
The audio jack port is a relatively practical method to establish connection between mobile devices, such as iPhone, iPad and Android, and other accessories.[citation needed] The most well known device is called Square, a credit card reader for iOS and Android devices.
Some use a special purpose interface (e.g. the crypto ignition key deployed by the United States National Security Agency). Tokens can also be used as a photo ID card. Cell phones and PDAs can also serve as security tokens with proper programming.
Smart cards
[edit]Many connected tokens use smart card technology. Smart cards can be very cheap (around ten cents)[citation needed] and contain proven security mechanisms (as used by financial institutions, like cash cards). However, computational performance of smart cards is often rather limited because of extreme low power consumption and ultra-thin form-factor requirements.
Smart-card-based USB tokens which contain a smart card chip inside provide the functionality of both USB tokens and smart cards. They enable a broad range of security solutions and provide the abilities and security of a traditional smart card without requiring a unique input device. From the computer operating system's point of view such a token is a USB-connected smart card reader with one non-removable smart card present.[7]
Contactless tokens
[edit]Unlike connected tokens, contactless tokens form a logical connection to the client computer but do not require a physical connection. The absence of the need for physical contact makes them more convenient than both connected and disconnected tokens. As a result, contactless tokens are a popular choice for keyless entry systems and electronic payment solutions such as Mobil Speedpass, which uses RFID to transmit authentication info from a keychain token.[citation needed] However, there have been various security concerns raised about RFID tokens after researchers at Johns Hopkins University and RSA Laboratories discovered that RFID tags could be easily cracked and cloned.[8]
Another downside is that contactless tokens have relatively short battery lives; usually only 5–6 years, which is low compared to USB tokens which may last more than 10 years.[citation needed] Some tokens however do allow the batteries to be changed, thus reducing costs.
Bluetooth tokens
[edit]This section's tone or style may not reflect the encyclopedic tone used on Wikipedia. (September 2016) |
The Bluetooth Low Energy protocols provide long lasting battery lifecycle of wireless transmission.
- The transmission of inherent Bluetooth identity data is the lowest quality for supporting authentication.
- A bidirectional connection for transactional data interchange serves for the most sophisticated authentication procedures.
Although, the automatic transmission power control attempts for radial distance estimates. The escape is available apart from the standardised Bluetooth power control algorithm to provide a calibration on minimally required transmission power.[9]
Bluetooth tokens are often combined with a USB token, thus working in both a connected and a disconnected state. Bluetooth authentication works when closer than 32 feet (9.8 meters). When the Bluetooth link is not properly operable, the token may be inserted into a USB input device to function.
Another combination is with a smart card to store locally larger amounts of identity data and process information as well.[10] Another is a contactless BLE token that combines secure storage and tokenized release of fingerprint credentials.[11]
In the USB mode of operation sign-off requires care for the token while mechanically coupled to the USB plug. The advantage with the Bluetooth mode of operation is the option of combining sign-off with distance metrics. Respective products are in preparation, following the concepts of electronic leash.
NFC tokens
[edit]Near-field communication (NFC) tokens combined with a Bluetooth token may operate in several modes, thus working in both a connected and a disconnected state. NFC authentication works when closer than 1 foot (0.3 meters).[citation needed] The NFC protocol bridges short distances to the reader while the Bluetooth connection serves for data provision with the token to enable authentication. Also when the Bluetooth link is not connected, the token may serve the locally stored authentication information in coarse positioning to the NFC reader and relieves from exact positioning to a connector.[citation needed]
Single sign-on software tokens
[edit]Some types of single sign-on (SSO) solutions, like enterprise single sign-on, use the token to store software that allows for seamless authentication and password filling. As the passwords are stored on the token, users need not remember their passwords and therefore can select more secure passwords, or have more secure passwords assigned. Usually most tokens store a cryptographic hash of the password so that if the token is compromised, the password is still protected.[12]
Programmable tokens
[edit]Programmable tokens are marketed as "drop-in" replacement of mobile applications such as Google Authenticator (miniOTP[13]). They can be used as mobile app replacement, as well as in parallel as a backup.
Vulnerabilities
[edit]Loss and theft
[edit]The simplest vulnerability with any password container is theft or loss of the device. The chances of this happening, or happening unaware, can be reduced with physical security measures such as locks, electronic leash, or body sensor and alarm. Stolen tokens can be made useless by using two factor authentication. Commonly, in order to authenticate, a personal identification number (PIN) must be entered along with the information provided by the token the same time as the output of the token.
Attacking
[edit]Any system which allows users to authenticate via an untrusted network (such as the Internet) is vulnerable to man-in-the-middle attacks. In this type of attack, an attacker acts as the "go-between" of the user and the legitimate system, soliciting the token output from the legitimate user and then supplying it to the authentication system themselves. Since the token value is mathematically correct, the authentication succeeds and the fraudster is granted access. In 2006, Citibank was the victim of an attack when its hardware-token-equipped business users became the victims of a large Ukrainian-based man-in-the-middle phishing operation.[14][15]
Breach of codes
[edit]In 2012, the Prosecco research team at INRIA Paris-Rocquencourt developed an efficient method of extracting the secret key from several PKCS #11 cryptographic devices.[16][17] These findings were documented in INRIA Technical Report RR-7944, ID hal-00691958,[18] and published at CRYPTO 2012.[19]
Digital signature
[edit]Trusted as a regular hand-written signature, the digital signature must be made with a private key known only to the person authorized to make the signature. Tokens that allow secure on-board generation and storage of private keys enable secure digital signatures, and can also be used for user authentication, as the private key also serves as a proof of the user's identity.
For tokens to identify the user, all tokens must have some kind of number that is unique. Not all approaches fully qualify as digital signatures according to some national laws.[citation needed] Tokens with no on-board keyboard or another user interface cannot be used in some signing scenarios, such as confirming a bank transaction based on the bank account number that the funds are to be transferred to.
See also
[edit]References
[edit]- ^ Schink, Marc; Wagner, Alexander; Unterstein, Florian; Heyszl, Johann (2021-07-09). "Security and Trust in Open Source Security Tokens". IACR Transactions on Cryptographic Hardware and Embedded Systems: 176–201. doi:10.46586/tches.v2021.i3.176-201. ISSN 2569-2925. S2CID 235349083. Archived from the original on 2024-12-11. Retrieved 2022-10-16.
- ^ RD, Token2 (2019-01-07). "Time drift: a major downside of TOTP hardware tokens". Medium. Archived from the original on 2021-03-25. Retrieved 2020-11-21.
{{cite web}}: CS1 maint: numeric names: authors list (link) - ^ "Time Drift in TOTP Hardware Tokens Explained and Solved - Protectimus Solutions". Protectimus. 2019-06-03. Archived from the original on 2020-11-24. Retrieved 2020-11-21.
- ^ "2.3.3: Authentication Methods - Security Tokens". Engineering LibreTexts. 2021-01-15. Archived from the original on 2023-05-08. Retrieved 2023-05-08.
- ^ National Institute of Standards and Technology (April 2019). Security requirements for cryptographic modules (PDF) (Report). Gaithersburg, MD: National Institute of Standards and Technology. doi:10.6028/nist.fips.140-3. Archived (PDF) from the original on 2025-05-08. Retrieved 2024-08-22.
- ^ de Borde, Duncan (2007-06-28). "Two-factor authentication" (PDF). Siemens Insight Consulting. Archived from the original (PDF) on 2012-01-12. Retrieved 2009-01-14.
- ^ Specification for Integrated Circuit(s) Cards Interface Devices Archived 2005-12-29 at the Wayback Machine, usb.org
- ^ Biba, Erin (2005-02-14). "Does Your Car Key Pose a Security Risk?". PC World. Archived from the original on 2011-06-05. Retrieved 2009-01-14.
- ^ "Verfahren zum Steuern der Freigabe einer Einrichtung oder eines Dienstes, als Master ausgebildete Sendeempfangseinrichtung sowie System mit derartiger Einrichtung". dpma.de. Retrieved 16 April 2018.
- ^ "cgToken | certgate". www.certgate.com. Archived from the original on 2013-10-09.
- ^ "Biometric U2F OTP Token - HYPR". HYPR Corp. Archived from the original on 17 April 2018. Retrieved 16 April 2018.
- ^ "2.3.3: Authentication Methods - Security Tokens". Engineering LibreTexts. 2021-01-15. Archived from the original on 2024-09-20. Retrieved 2024-11-21.
- ^ "Programmable hardware tokens Token2 miniOTP". Archived from the original on 2018-11-09. Retrieved 2018-11-16.
- ^ Leyden, John (2006-07-13). "Phishers rip into two-factor authentication". The Register. Archived from the original on 2019-07-12. Retrieved 2018-09-25.
- ^ Krebs, Brian (July 10, 2006). "Citibank Phish Spoofs 2-Factor Authentication". The Washington Post. Archived from the original on July 3, 2011. Retrieved 2018-09-25.
- ^ Sengupta, Somini (2012-06-25). "Computer Scientists Break Security Token Key in Record Time". New York Times. Archived from the original on 2022-03-19. Retrieved 2012-06-25.
- ^ Owano, Nancy (2012-06-27). "Team Prosecco dismantles security tokens". Phys.org. Archived from the original on 2025-03-19. Retrieved 2014-03-29.
- ^ "Prosecco :: Publications". Archived from the original on 2013-12-05. Retrieved 2014-03-29.
- ^ "Accepted Papers CRYPTO 2012". Archived from the original on 2014-03-26. Retrieved 2014-03-29.
- General references
- US Personal Identity Verification (PIV) Archived 2010-12-26 at the Wayback Machine
External links
[edit]
Media related to Authentication devices at Wikimedia Commons- OATH Initiative for open authentication Archived 2019-04-24 at the Wayback Machine
Security token
View on GrokipediaIntroduction
Definition and Purpose
A security token is a physical or digital device or software component that generates or stores authentication credentials to verify a user's identity, commonly integrated into two-factor authentication (2FA) systems alongside a password or other knowledge-based factor.[3][2] As a core element of the "something you have" authentication factor, it requires the user to demonstrate physical or logical possession of the token during login, distinguishing it from solely knowledge-based methods.[4] The primary purpose of security tokens is to address vulnerabilities in single-factor password systems, such as phishing or credential theft, by introducing a possession-based verification layer that significantly reduces unauthorized access risks.[2][4] They are essential in securing sensitive applications, including online banking to protect financial transactions, corporate networks for internal resource access, and remote VPN connections for distributed workforces.[5][6] Key components of security tokens often include a unique identifier, embedded cryptographic keys, or algorithms for producing one-time passwords (OTPs), such as the HMAC-based One-Time Password (HOTP) algorithm, which uses a shared secret and counter for synchronization, or the Time-based One-Time Password (TOTP) algorithm, which incorporates a time step for periodic code generation. These elements ensure credentials are transient and resistant to interception, bolstering overall system integrity.[4] Security tokens represent an evolution within authentication practices, transitioning from reliance on single-factor methods to robust multi-factor authentication (MFA) frameworks that achieve higher assurance levels against diverse threats.[4] While they can manifest as hardware or software solutions, their design prioritizes seamless integration into MFA to verify identity in real-time digital interactions.[2]History and Evolution
Security tokens emerged in the 1980s as a response to vulnerabilities in static password systems, particularly password cracking attacks. The pioneering example was the RSA SecurID token, introduced in 1986 by RSA Security, which utilized challenge-response mechanisms to generate time-based one-time passwords (OTPs) for two-factor authentication.[7] These hardware devices provided a dynamic "something you have" factor, significantly enhancing enterprise network security by synchronizing a shared secret between the token and authentication server.[7] In the 1990s, security tokens expanded into broader enterprise and financial applications, with smart cards gaining prominence following the establishment of EMV standards for payment security. The EMV specifications, first published in 1996 and stabilized by 1998, integrated chip-based tokens into credit and debit cards to combat fraud in point-of-sale transactions through cryptographic authentication.[8][9] This era marked a shift toward standardized, interoperable hardware tokens, adopted widely in banking and corporate environments to replace magnetic stripe vulnerabilities.[9] The 2000s saw a pivotal transition to software-based tokens, driven by the proliferation of mobile devices and open standards for OTP generation. The Initiative for Open Authentication (OATH), founded in 2004, promoted interoperable strong authentication, leading to the publication of the HOTP algorithm in RFC 4226 (2005) for event-based OTPs and TOTP in RFC 6238 (2011) for time-based variants.[10] These standards enabled software tokens via mobile apps, reducing costs and improving accessibility compared to physical hardware, with widespread adoption in services like online banking and VPNs.[11] Entering the 2010s and 2020s, security tokens evolved to incorporate biometrics and phishing-resistant features amid escalating cyber threats, exemplified by the 2016 Yahoo data breach affecting over one billion accounts, which underscored the limitations of password-only systems and accelerated multi-factor authentication mandates.[12][11] The FIDO Alliance, established in 2012, developed standards like FIDO2 for passwordless authentication using public-key cryptography and biometric integration in hardware tokens such as YubiKeys.[13] Post-2020, focus shifted to quantum-resistant cryptography, with explorations into post-quantum algorithms like those standardized by NIST to future-proof tokens against quantum computing threats.[14]Types of Security Tokens
Security tokens can be categorized based on the underlying traditional securities they represent. The primary types include equity tokens, debt tokens, and asset-backed tokens, each leveraging blockchain for issuance, transfer, and compliance.[15]Equity Tokens
Equity tokens represent ownership interests in a company, similar to traditional stocks, but digitized on a blockchain. Holders may receive rights such as voting power, dividends, or profit shares, with ownership recorded on an immutable distributed ledger. This structure enhances transparency and enables fractional ownership, allowing smaller investors access to private equity markets. For example, equity tokens can be issued for shares in startups or established firms during security token offerings (STOs). Smart contracts automate dividend distributions and voting, ensuring regulatory compliance through built-in restrictions on transfers to accredited investors. As of 2024, platforms like Securitize have facilitated equity token issuances for real-world assets.[15][16] The general steps to acquire equity tokens, often referred to as tokenized stocks, are as follows: 1. Choose a compliant platform that supports security token trading. 2. Create an account and complete KYC verification. 3. Deposit funds via bank transfer, card, or cryptocurrency. 4. Search for the specific token (e.g., by name like "Alphabet tokenized stock"). 5. Place a market or limit buy order to receive the tokens in your wallet or on the platform.[17][18][19]Debt Tokens
Debt tokens digitize debt instruments, such as bonds, loans, or mortgages, granting holders rights to interest payments and principal repayment. These tokens function like traditional fixed-income securities but benefit from blockchain's efficiency in settlement and tracking. Pricing is influenced by credit risk, maturity, and yield, with smart contracts enforcing repayment schedules and default mechanisms. Examples include tokenized corporate bonds or real estate-backed mortgages, which improve liquidity for otherwise illiquid debt. In 2018, the issuer of the first SEC-registered security token, tZERO, explored debt token models to streamline lending. Debt tokens must adhere to securities regulations, including disclosure requirements.[15][20]Asset-Backed Tokens
Asset-backed tokens represent ownership or claims to physical or intangible assets, such as real estate, commodities, art, or intellectual property. These tokens fractionalize high-value assets, enabling broader investor participation and 24/7 trading. Blockchain ensures provenance and reduces fraud through tamper-proof records, while smart contracts handle automated distributions from asset-generated income (e.g., rental yields). Notable examples include tokenized real estate on platforms like RealT or gold-backed tokens on Paxos. As of 2025, the market for asset-backed security tokens has grown with regulatory clarity, though they remain subject to the Howey test for securities classification.[15][20]Physical Implementations
Disconnected Hardware Tokens
Disconnected hardware tokens, in the context of security tokens, refer to air-gapped physical devices designed for offline generation and management of cryptographic keys used to secure blockchain-based security tokens. These self-contained wallets, often resembling small USB drives or key fobs with integrated screens, allow users to create private keys and sign transactions without any network connectivity, minimizing exposure to online threats. Users typically generate a seed phrase or recovery phrase displayed on the device, which is manually recorded for backup, and then use the device in an offline mode for key derivation alongside a PIN for added security.[21] The core mechanics rely on internal secure elements or chips to produce deterministic keys from a master seed, using standards like BIP-39 for mnemonic phrases and BIP-32 for hierarchical derivation. Time-based or event-based synchronization is not directly applicable, but devices ensure key isolation through tamper-resistant hardware. A prominent example is the Coldcard hardware wallet, introduced in 2017 by Coinkite, which emphasizes air-gapped operation via microSD card for transaction data transfer, displaying QR codes or text for verification on its LCD screen without USB data connection. These wallets support security tokens on blockchains like Ethereum or Polygon by generating compatible addresses for holding tokenized assets.[22] These tokens are suited for high-security storage of security tokens in environments where connectivity risks are high, such as for institutional investors managing large portfolios of tokenized real estate or equity. In practice, they enable secure offline signing of STO participation or dividend claims, ensuring private keys never leave the device. Technically, disconnected wallets feature compact designs, often powered by replaceable batteries lasting 2-5 years, with secure chips certified to standards like EAL5+ for resistance to physical attacks. Periodic firmware updates via offline methods maintain long-term security without compromising air-gapped status.[23]Connected Hardware Tokens
Connected hardware tokens are physical devices that require a direct wired connection, such as USB, to a host computer or mobile device to interact with blockchain networks for managing security tokens. These wallets store private keys in a secure chip and facilitate signing of transactions for buying, selling, or transferring security tokens while ensuring keys remain isolated from the host system. Examples include USB-based hardware wallets that emulate secure elements for cryptographic operations, supporting standards like CC EAL6+ for hardware security.[24] Prominent examples include the Trezor Model T, first introduced in 2018, which connects via USB and uses a touchscreen for confirmation, adhering to open-source principles for transparency. These devices utilize APIs like HID or WebUSB for integration with wallet software, allowing access to security tokens on various blockchains without exposing keys. Another example is the KeepKey wallet, supporting PKCS#11-like interfaces for advanced cryptographic tasks such as multi-signature setups common in security token custody.[25] In operation, connected hardware tokens receive unsigned transaction data from the host, compute signatures using stored private keys derived from the seed, and return only the signature, preventing key extraction. This supports standards like ERC-1400 for security tokens, enabling compliant transfers with automated KYC/AML checks. Mutual authentication between the wallet and software ensures secure sessions, enhancing protection for tokenized assets like debt instruments or fractional real estate shares. These tokens integrate with public key infrastructure (PKI) for certificate-based authentication in enterprise STO platforms, storing X.509 certificates for secure key exchanges.[26] A key subtype is the USB-connected hardware wallet, featuring a secure element chip in a compact form factor, widely adopted since the mid-2010s for cryptocurrency management. They support EMV-like chip security for transaction validation, preventing replay attacks in security token trades, and have evolved to include support for multiple blockchains hosting security tokens.[27]Contactless Hardware Tokens
Contactless hardware tokens are physical devices that enable secure management of security tokens through short-range wireless technologies like Near Field Communication (NFC) or Bluetooth Low Energy (BLE), allowing interaction without physical insertion. These wallets provide a tamper-resistant environment for private key storage and transaction signing, used for holding and trading blockchain security tokens in 2FA-enhanced or passwordless setups for exchanges and wallets. They prioritize convenience for mobile integration, supporting tap-to-sign or proximity-based approvals while maintaining high security.[28] Key subtypes include NFC-enabled cards, operating at 13.56 MHz per ISO/IEC 14443, with ranges under 10 cm, ideal for quick access to security token portfolios via smartphones. These passive devices draw power from the reader, offering battery-free operation. BLE tokens extend range to 10 meters, suitable for desktop or enterprise use, as in Ledger Nano X, which pairs with apps for seamless security token management. BLE requires batteries but supports low-power modes for extended life.[29][28] Prominent examples include the Tangem Wallet, launched in 2018, a NFC card supporting FIDO2 standards for phishing-resistant authentication to security token platforms like those on Ethereum. For BLE, the Ledger Nano X (2019) combines Bluetooth with USB, enabling passwordless access to wallets holding security tokens and integration with DeFi protocols for yield on tokenized assets. Operationally, they use secure pairing—NFC for direct induction, BLE with LTK encryption—to ensure authenticated sessions resistant to man-in-the-middle attacks. They facilitate tap-to-transact for STOs, as in mobile apps verifying proximity for secure transfers. Adoption grew post-2018 with smartphone NFC proliferation, aligning with FIDO standards for secure, convenient management of security tokens in consumer and institutional settings as of 2025.[30][31]Operational Mechanisms
Authentication Processes
Security tokens authenticate users by generating dynamic credentials or responses that verify identity without reusing static passwords. The primary processes involve one-time password (OTP) generation, challenge-response mechanisms, and integration into multi-factor authentication (MFA) frameworks. These methods ensure that authentication relies on something the user possesses—the token—combined with cryptographic operations to prevent replay attacks and unauthorized access.[32][33][34] One common authentication process uses OTP generation, where the token computes a short-lived code based on a shared secret key and a moving factor. The HMAC-based One-Time Password (HOTP) algorithm, defined in RFC 4226, generates OTPs using an event counter as the moving factor:Here, is the shared symmetric key, is the incrementing counter, HMAC-SHA-1 produces a hash, and Truncate extracts a 6- or 8-digit code from the result. This counter advances with each use, ensuring uniqueness.[32] For time-based variants, the Time-based One-Time Password (TOTP) algorithm, specified in RFC 6238, replaces the counter with a time step:
where is the current Unix time in seconds, and the 30-second interval limits the code's validity window. TOTP tokens, often implemented in software or hardware, synchronize with the server's clock to validate codes within a tolerance of a few steps.[33] In challenge-response authentication, the token receives a random challenge from the verifier and computes a response using a private key, proving possession without transmitting the key. This process underpins protocols like FIDO2, finalized by the FIDO Alliance in 2019, where the authenticator (e.g., a hardware token) signs the challenge with an asymmetric key pair, and the verifier checks the signature against the corresponding public key. FIDO2 supports both passwordless logins and second-factor use, with the client-to-authenticator protocol (CTAP) handling communication over USB, NFC, or Bluetooth.[34] Security tokens commonly serve as the second factor in MFA, enhancing primary credentials like usernames and passwords. The typical workflow requires the user to enter a personal identification number (PIN) or biometric to unlock the token, which then generates an OTP or response; the system validates this against its expected value using the shared key or public key infrastructure. This layered approach confirms both knowledge (PIN) and possession (token), reducing risks from compromised passwords alone.[32] To maintain reliability, synchronization methods align the token's state with the verifier's. For HOTP, the server permits a window of consecutive counters (e.g., ±10 events) to account for missed increments due to failed authentications, updating its counter to match upon success. TOTP synchronization relies on time alignment, with verifiers accepting codes from adjacent time steps (e.g., current, previous, and next 30-second intervals) to handle clock drift up to a few minutes. These mechanisms prevent desynchronization without manual intervention, though excessive drift may require re-provisioning the token.[32][33]