access control
Mechanism that determines who can legitimately use a network resource
passive token
Storage device (e.g., magnetic strip) that contains a secret code used in a two-factor authentication system
active token
Small, stand-alone electronic device that generates one-time passwords used in a two-factor authentication system