!!! Overview
The original [{$pagename}] (now called [{$pagename}] Standard), was an innovative token for [two-factor authentication|Multi-Factor Authentication]. 

!! [{$pagename}] Standard
[{$pagename}] has a USB interface and presents itself as a USB keyboard when pulgged in, and thus does not require any special drivers to use. 

[{$pagename}] has a single capacitive button that outputs an [OTP] when pressed. Because the device functions as keyboard, the [OTP] can be automatically entered in any text field of a desktop or Web application, or even terminal window, requiring very little modification to exiting applications. The [OTP] is generated using a 128-bit key stored inside the device, either using [{$pagename}]'s [OTP] algorithm, or the [HOTP] algorithm.

!! [{$pagename}] Neo
The [{$pagename}] Neo retains the form factor of the original [{$pagename}], but adds an important new component: a [Secure Element] (SE), accessible both via USB and over [NFC].

The [Secure Element] offers a JavaCard 3.0/JCOP 2.4.2-compatible execution environment, an ISO14443A [NFC] interface, [MIFARE] Classic emulation and an [NDEF|NFC Data Exchange Format] applet for interaction with [{$pagename}] functionality. 

When plugged into a USB port, depending on its configuration, the [{$pagename}] Neo presents itself either as a keyboard (HID device), a standard [CCID] smart card reader, or both when in composite mode. As the [Secure Element] is fully compatible with JavaCard and [GlobalPlatform] standards, additional applets can be loaded with standard tools. 

Recent batches ship with pre-installed  [Initiative for Open Authentication], [PGP] and [PIV] applets, and the code for both the [Initiative for Open Authentication] and [PGP] applets is available. [{$pagename}] provides a [Google Authenticator] compatible Android application, [{$pagename}] Authenticator that allows you to store the keys used to generate [OTPs] on the Neo. This ensures that neither attackers who have physical access to your Android device, nor applications with root access can extract your [OTP] keys. 

!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Unlocking Android devices using an OTP via NFC|http://nelenkov.blogspot.com/2014/03/unlocking-android-using-otp.html|target='_blank'] - based on 2013-04-10