In general, a token is an object that represents something else, such as another object (either physical or virtual), or an abstract concept as, for example, a gift is sometimes referred to as a token of the giver's esteem for the recipient. In computers, there are a number of types of tokens.

Next Steps

1) In a token ring network, the presence of a token (which is simply a particular bit setting) in a continually circulating transmission stream allows a device to change the bit setting (thus taking the token) and put a message in its place. The receiver of the message elsewhere in the token ring network removes the message and resets the bit setting (thus putting the token back) so that someone else in the ring of devices will be able to have a turn at using that message space.

2) A programming token is the basic component of source code . Character s are categorized as one of five classes of tokens that describe their functions (constants, identifiers, operators, reserved words, and separators) in accordance with the rules of the programming language.

3) A security token is a physical device, such as a special smart card , that together with something that a user knows, such as a PIN , will enable authorized access to a computer system or network.

This was last updated in September 2005
Posted by: Margaret Rouse

Related Terms

Definitions

  • security token (authentication token)

    - A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service. (SearchSecurity.com)

  • tokenization

    - Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential information about the data without compromising its security. (SearchSecurity.com)

  • two-factor authentication

    - Two-factor authentication is a security process in which the user provides two means of identification, one of which is typically a physical token, such as a card, and the other of which is typical... (SearchSecurity.com)

Glossaries

  • Security threats and countermeasures

    - Terms related to security threats, including definitions about anti-virus programs or firewalls and words and phrases about malware, viruses, Trojans and other security attacks.

  • Network security

    - Terms related to network security, including definitions about intrusion prevention and words and phrases about VPNs and firewalls.

  • Computing fundamentals

    - Terms related to computer fundamentals, including computer hardware definitions and words and phrases about software, operating systems, peripherals and troubleshooting.

Dig Deeper

Fast References

People Who Read This Also Read...

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.