USB-tokens. What makes this a useful device?


2018-04-01 11:56:11




1Like 0Dislike


Now increasingly used tokens. But despite this, many people do not understand what this device. Next we will talk about what it's used for tokens that this type of application gives. It will be considered a USB device connected to PC.

Store information on the token

tokens what

I Want to immediately explain that this device is not a flash drive. Undoubtedly, it can store small amounts of information, but it is limited, for example 64 kilobytes. There are also tokens that contain a memory of several gigabytes. But the data in this memory are stored on the same technology as a regular memory card. For this reason, the function of data storage can be considered incidental or secondary. For what need tokens? What is the device doing?

The Initial purpose – unrecoverable storing some key information. Immediately noticeable that there is little to do with the memory card. Unrecoverable storage – when a token code will not get anywhere from the device. It can't be extracted, for example, in the computer memory. It is possible that this is happening, but in encrypted form. There is the option of exporting the key and plaintext, but even that is much safer than storing it on a flash drive. Why it's safer to store the key? The token requires knowledge of the PIN code to export a flash drive – not.

Besides, even if you save the key on a removable storage device and encrypt it, the attacker will be able to take countless attempts of deciphering. The authorization token after three failed attempts of entering the code blocks.


How to use PKG file

How to use PKG file

Many of us use the Windows operating system, not knowing the delights of the use of other, popular only in narrow circles of experienced programmers. However, even the "monster" has a chance to become an example to follow, as it happened with the ope...

Program for the communication type

Program for the communication type "Skype" for phone and computer

Skype – is software for communication with people anywhere in the world. Supports video calls, mobile, IP telephony and im. The first version appeared in 2003, and for 14 years, Skype has gained over 600 million registered users. But the growin...

How to root Android via PC?

How to root Android via PC?

The builders of portable devices that are running the system “Android”, try every means to achieve high reliability of their solutions. Of course, there are exceptions, in Chinese models sold at bargain prices, but overall this is so. One...

This suggests that even with the simplest security settings it is better to store the keys on the token.

Other options


Store the key – most importantly, what is tokens. What is the device in addition? Here other functions:

  1. Self-encrypting and decrypting.
  2. Generate the encryption key.
  3. Generating and verifying the digital signature.
  4. Hashing data.

A Token is a kind of black box in the time when the cryptographic operations are carried out. Thus, the data are input using the key converted and sent to the output. You can compare the token with a microcomputer: input and output of information is performed via USB, has its own processor, RAM and long term memory.

Comparison with the password

token code

For most has become a standard that passwords are used everywhere. This is a modern classic. The person wants to go in the social network or buy something – uses a password. Their main advantage is the simplicity of use. But at the same time there are aspects, which put some operations that are important from the standpoint of security, into question. It can be forgetfulness, the transmission of the password over an insecure channel, typing, predictability.

The Tokens are quite capable to solve absolutely all of those tasks for which use passwords. And to solve them more safely and efficiently.

Data Encryption

key token

Data is typically encrypted by a cryptographic key, which, in turn, is encrypted on the password. And security of this scheme depends only on the password, which is not in all cases is complex, can be typed on the keyboard or forgotten. When using a token there are two solutions:

  • The Key is on the token and it never leaves. This method is suitable only for small amounts of information, as the recovery speed with the help of the token is low. The offender will not be able to retrieve the key.
  • Key is on the token but is in the process of encryption gets in the computer memory. This method is used, for example, to encrypt and decrypt the volume completely. The key is to extract a possible but not very easy. Password steal is much easier.


It's safe to say that will be able to avoid various unpleasant situations when you use and prevalence of decisions based on the tokens. Stealing passwords will be deleted and the security level will increase in a global sense. It is for the security and use the tokens. What's the use gives? Only advantages and reliability. Even if you completely abandon passwords in favor token, the benefits are obvious. Because if you lose the key no they are not.

Comments (0)

This article has no comment, be the first!

Add comment

Related News

The font size is what?

The font size is what?

the font Size – size of the string, which is letter. It includes the height of the tallest character (string), external elements (lower or upper tick marks) and shoulders. The latter are designed to the letters located next ...

Browse popular prosyanikov for

Browse popular prosyanikov for "Android"

the Operating system "Android" has gained great popularity due to its simplicity and excellent developer support. However, the scheme of its distribution is such that each device maker needs to create its own version of the firmwa...

PC peripherals and their types

PC peripherals and their types

the Peripherals of the computer are non-core components of the computer system. Without them can still perform basic functions. So, if connected to the motherboard memory modules, CPU, video card, power supply are essential parts,...