Now increasingly used tokens. But despite this, many people do not understand what this device. Next we will talk about what it's used for tokens that this type of application gives. It will be considered a USB device connected to PC.
I Want to immediately explain that this device is not a flash drive. Undoubtedly, it can store small amounts of information, but it is limited, for example 64 kilobytes. There are also tokens that contain a memory of several gigabytes. But the data in this memory are stored on the same technology as a regular memory card. For this reason, the function of data storage can be considered incidental or secondary. For what need tokens? What is the device doing?
The Initial purpose – unrecoverable storing some key information. Immediately noticeable that there is little to do with the memory card. Unrecoverable storage – when a token code will not get anywhere from the device. It can't be extracted, for example, in the computer memory. It is possible that this is happening, but in encrypted form. There is the option of exporting the key and plaintext, but even that is much safer than storing it on a flash drive. Why it's safer to store the key? The token requires knowledge of the PIN code to export a flash drive – not.
Besides, even if you save the key on a removable storage device and encrypt it, the attacker will be able to take countless attempts of deciphering. The authorization token after three failed attempts of entering the code blocks.
Recommended
How to get out of "Skype" on the "Android" and not only
How to get out of "Skype" "Android"? This question bothers many users. The thing is that the messenger is not so difficult. But there are features that are only for mobile versions. To log out of Skype in this case more difficult than it seems. But i...
Kingo ROOT: how to use the program to gain administrative rights on Android
The Gadgets on the platform Android regained the lion's share of the market. Developers are continually perfecting the OS, trying to fit the needs of the users, but from year to year admit palpable mistake: forbid the owner to "stuffing" of his gadge...
How to get from Stormwind to Tanaris: practical tips
World of Warcraft is an iconic MMORPG, uniting millions of players around the world. There are many locations and puzzles, secret trails and larger, but rather dangerous paths. Sooner or later, every player chose the side of the Alliance, we have to ...
This suggests that even with the simplest security settings it is better to store the keys on the token.
Store the key – most importantly, what is tokens. What is the device in addition? Here other functions:
A Token is a kind of black box in the time when the cryptographic operations are carried out. Thus, the data are input using the key converted and sent to the output. You can compare the token with a microcomputer: input and output of information is performed via USB, has its own processor, RAM and long term memory.
For most has become a standard that passwords are used everywhere. This is a modern classic. The person wants to go in the social network or buy something – uses a password. Their main advantage is the simplicity of use. But at the same time there are aspects, which put some operations that are important from the standpoint of security, into question. It can be forgetfulness, the transmission of the password over an insecure channel, typing, predictability.
The Tokens are quite capable to solve absolutely all of those tasks for which use passwords. And to solve them more safely and efficiently.
Data is typically encrypted by a cryptographic key, which, in turn, is encrypted on the password. And security of this scheme depends only on the password, which is not in all cases is complex, can be typed on the keyboard or forgotten. When using a token there are two solutions:
It's safe to say that will be able to avoid various unpleasant situations when you use and prevalence of decisions based on the tokens. Stealing passwords will be deleted and the security level will increase in a global sense. It is for the security and use the tokens. What's the use gives? Only advantages and reliability. Even if you completely abandon passwords in favor token, the benefits are obvious. Because if you lose the key no they are not.
Article in other languages:
AR: https://tostpost.com/ar/computers/825-usb.html
BE: https://tostpost.com/be/kamputary/1403-usb-tokeny-shto-takoe-karysnae-rob-c-geta-prylada.html
DE: https://tostpost.com/de/computer/1400-usb-token-was-ist-berhaupt-macht-das-ger-t.html
ES: https://tostpost.com/es/los-ordenadores/1405-tokens-usb-qu-es-til-hace-que-este-dispositivo.html
HI: https://tostpost.com/hi/computers/825-usb.html
JA: https://tostpost.com/ja/computers/824-usb.html
KK: https://tostpost.com/kk/komp-yuterler/1403-usb-tokeny-degen-m-z-ne-paydaly-zh-e-b-l-ryl-y.html
TR: https://tostpost.com/tr/bilgisayarlar/1409-usb-belirte-leri-ne-i-e-yarar-getirir.html
UK: https://tostpost.com/uk/komp-yuteri/1405-usb-tokeni-scho-take-korisne-robit-cey-pristr-y.html
Alin Trodden - author of the article, editor
"Hi, I'm Alin Trodden. I write texts, read books, and look for impressions. And I'm not bad at telling you about it. I am always happy to participate in interesting projects."
Related News
the font Size – size of the string, which is letter. It includes the height of the tallest character (string), external elements (lower or upper tick marks) and shoulders. The latter are designed to the letters located next ...
Browse popular prosyanikov for "Android"
the Operating system "Android" has gained great popularity due to its simplicity and excellent developer support. However, the scheme of its distribution is such that each device maker needs to create its own version of the firmwa...
PC peripherals and their types
the Peripherals of the computer are non-core components of the computer system. Without them can still perform basic functions. So, if connected to the motherboard memory modules, CPU, video card, power supply are essential parts,...
Today we talk about how to cheat surveys in the VC. This decision will help you to instantly know the opinion of the majority (not always objective), or to achieve leadership of one of the options.Turbolikerthis resource is easy t...
Today almost every family has a computer. But few people know what a monitor is, how it works and what is incorporated in the principle of its action?Monitor – this is a special device that serves to output images. There are...
a desktop computer in today's world is already an integral part of every person's life. By purchasing this unit, everyone tries to choose the model with maximum possibilities. But, anyway, there comes a time when the idea on how t...
Comments (0)
This article has no comment, be the first!