!!! Overview The original [{$pagename}] (now called [{$pagename}] Standard), was an innovative token for [two-factor authentication|Multi-Factor Authentication]. !! [{$pagename}] Standard [{$pagename}] has a USB interface and presents itself as a USB keyboard when pulgged in, and thus does not require any special drivers to use. [{$pagename}] has a single capacitive button that outputs an [OTP] when pressed. Because the device functions as keyboard, the [OTP] can be automatically entered in any text field of a desktop or Web application, or even terminal window, requiring very little modification to exiting applications. The [OTP] is generated using a 128-bit key stored inside the device, either using [{$pagename}]'s [OTP] algorithm, or the [HOTP] algorithm. !! [{$pagename}] Neo The [{$pagename}] Neo retains the form factor of the original [{$pagename}], but adds an important new component: a [Secure Element] (SE), accessible both via USB and over [NFC]. The [Secure Element] offers a JavaCard 3.0/JCOP 2.4.2-compatible execution environment, an ISO14443A [NFC] interface, [MIFARE] Classic emulation and an [NDEF|NFC Data Exchange Format] applet for interaction with [{$pagename}] functionality. When plugged into a USB port, depending on its configuration, the [{$pagename}] Neo presents itself either as a keyboard (HID device), a standard [CCID] smart card reader, or both when in composite mode. As the [Secure Element] is fully compatible with JavaCard and [GlobalPlatform] standards, additional applets can be loaded with standard tools. Recent batches ship with pre-installed [Initiative for Open Authentication], [PGP] and [PIV] applets, and the code for both the [Initiative for Open Authentication] and [PGP] applets is available. [{$pagename}] provides a [Google Authenticator] compatible Android application, [{$pagename}] Authenticator that allows you to store the keys used to generate [OTPs] on the Neo. This ensures that neither attackers who have physical access to your Android device, nor applications with root access can extract your [OTP] keys. !! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }] ---- * [#1] - [Unlocking Android devices using an OTP via NFC|http://nelenkov.blogspot.com/2014/03/unlocking-android-using-otp.html|target='_blank'] - based on 2013-04-10