requires a key, badge, or token card,
some device or "thing" that provides you with access. Security is predicated on the
concept that only authorized individuals or entities will have access to the specific
device. The drawback to this scheme is that the "thing" can be lost or stolen.