• Thumbnail for Security token
    A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place of...
    22 KB (2,611 words) - 16:06, 4 January 2025
  • Thumbnail for Tokenization (data security)
    Tokenization, when applied to data security, is the process of substituting a sensitive data element with a non-sensitive equivalent, referred to as a...
    38 KB (4,358 words) - 23:59, 25 May 2025
  • a secure token service is responsible for issuing, validating, renewing and cancelling security tokens. The tokens issued by security token services can...
    4 KB (434 words) - 05:50, 17 February 2025
  • A security token offering (STO) / tokenized IPO is a type of public offering in which tokenized digital securities, known as security tokens, are sold...
    18 KB (1,422 words) - 09:39, 18 June 2024
  • are packaged into one or more tokens that are then issued by an issuer (provider), commonly known as a security token service (STS). The name "claims-based...
    6 KB (831 words) - 10:13, 16 May 2024
  • In computer systems, an access token contains the security credentials for a login session and identifies the user, the user's groups, the user's privileges...
    6 KB (783 words) - 23:36, 8 February 2025
  • operation: Session token, a unique identifier of an interaction session Security token or hardware token, authentication token or cryptographic token, a physical...
    2 KB (376 words) - 06:31, 14 February 2025
  • Thumbnail for Hardware security module
    externally using a secure portable device like a smartcard or some other security token. HSMs are used for real time authorization and authentication in critical...
    14 KB (1,557 words) - 08:50, 19 May 2025
  • JSON Web Token (JWT, suggested pronunciation /dʒɒt/, same as the word "jot") is a proposed Internet standard for creating data with optional signature...
    20 KB (1,556 words) - 03:19, 26 May 2025
  • Thumbnail for Titan Security Key
    The Titan Security Key is a FIDO-compliant security token developed by Google which contains the Titan M cryptoprocessor which is also developed by Google...
    5 KB (446 words) - 01:47, 18 April 2025
  • Thumbnail for One-time password
    usually related to a piece of hardware called a security token (e.g., each user is given a personal token that generates a one-time password). It might...
    26 KB (3,542 words) - 07:02, 15 May 2025
  • RSA SecurID (redirect from Secure ID token)
    implementations of the same algorithm ("software tokens") appeared on the market, public code had been developed by the security community allowing a user to emulate...
    23 KB (2,341 words) - 08:58, 10 May 2025
  • enforced on messages and allows the communication of various security token formats, such as Security Assertion Markup Language (SAML), Kerberos, and X.509....
    11 KB (1,441 words) - 22:11, 28 November 2024
  • Thumbnail for Multi-factor authentication
    support beginning in 2015. A software token (a.k.a. soft token) is a type of two-factor authentication security device that may be used to authorize the...
    43 KB (4,763 words) - 00:23, 18 May 2025
  • Thumbnail for Passwordless authentication
    private key is kept on a user’s device (PC, smartphone or an external security token) and can be accessed only by providing a biometric signature or another...
    16 KB (1,670 words) - 03:25, 25 May 2025
  • access. Hardware-based security or assisted computer security offers an alternative to software-only computer security. Security tokens such as those using...
    13 KB (1,394 words) - 17:20, 25 May 2025
  • those offered by Google and Dropbox, also work by sending a user a security token that is included in the URL. An attacker who obtains such URLs may be...
    178 KB (17,517 words) - 09:45, 16 May 2025
  • comment on these shared pages. Discontinued OneCare A suite of computer security programs with antivirus program, backup utility, and a personal firewall...
    34 KB (1,845 words) - 17:01, 5 July 2024
  • Thumbnail for PayPal
    as Fieldlink. Later it was renamed Confinity, a company which developed security software for hand-held devices. When it had no success with that business...
    164 KB (14,271 words) - 11:00, 22 May 2025
  • of tokens after the vesting period. Utility tokens are used as proof to access a company's service or product. Unlike security tokens, utility tokens are...
    10 KB (1,210 words) - 22:44, 24 May 2025
  • A security domain is an application or a set of applications that collectively rely on a shared security token for processes such as authentication, authorization...
    1 KB (189 words) - 15:18, 19 December 2024
  • Keystroke logging (category Security breaches)
    without knowing their positions. Use of smart cards or other security tokens may improve security against replay attacks in the face of a successful keylogging...
    45 KB (5,266 words) - 09:54, 30 May 2025
  • ICO technology to represent regulated securities, referred to as Security Token Offerings (STOs), Digital Security Offerings (DSOs), and when listed on...
    32 KB (2,566 words) - 21:12, 25 May 2025
  • analysis) in language processing Tokenization in search engine indexing Tokenization (data security) in the field of data security Word segmentation A procedure...
    465 bytes (76 words) - 04:51, 22 April 2025
  • Thumbnail for Cryptocurrency
    Cryptocurrency (redirect from Crypto token)
    crypto world introduced innovations like Security Token Offering (STO), enabling new ways of fundraising. Tokenization, turning assets such as real estate...
    222 KB (20,134 words) - 22:34, 22 May 2025
  • Mitsui Trust Bank's issuance of the first credit-rated, asset-backed security token fund in Japan May 2021: Securitize platform used to facilitate $75 million...
    9 KB (690 words) - 02:58, 21 May 2025
  • Thumbnail for Software token
    A software token (a.k.a. soft token) is a piece of a two-factor authentication security device that may be used to authorize the use of computer services...
    5 KB (567 words) - 06:06, 22 December 2024
  • Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies...
    24 KB (2,640 words) - 11:48, 18 April 2025
  • store cryptographic keys and biometric data. The most popular type of security token (RSA's SecurID) displays a number that changes every minute. Users are...
    31 KB (4,033 words) - 11:39, 11 May 2025
  • Thumbnail for Online banking
    them by need using a security token. These token generated TANs depend on the time and a unique secret, stored in the security token (two-factor authentication...
    48 KB (5,322 words) - 16:18, 15 May 2025