. . . . . . . . . . "A software token (a.k.a. soft token) is a piece of a two-factor authentication security device that may be used to authorize the use of computer services. Software tokens are stored on a general-purpose electronic device such as a desktop computer, laptop, PDA, or mobile phone and can be duplicated. (Contrast hardware tokens, where the credentials are stored on a dedicated hardware device and therefore cannot be duplicated \u2014 absent physical invasion of the device) Because software tokens are something one does not physically possess, they are exposed to unique threats based on duplication of the underlying cryptographic material - for example, computer viruses and software attacks. Both hardware and software tokens are vulnerable to bot-based man-in-the-middle attacks, or to simple phishing attacks in which the one-time password provided by the token is solicited, and then supplied to the genuine website in a timely manner. Software tokens do have benefits: there is no physical token to carry, they do not contain batteries that will run out, and they are cheaper than hardware tokens."@en . . . . "Token de software"@es . . . . "Software token"@en . . . . "3011741"^^ . . "4504"^^ . . . . . "\u0631\u0645\u0632 \u0627\u0644\u0628\u0631\u0646\u0627\u0645\u062C (\u0628\u0627\u0644\u0625\u0646\u062C\u0644\u064A\u0632\u064A\u0629: Software token)\u200F (\u0627\u0644\u0645\u0639\u0631\u0648\u0641 \u0623\u064A\u0636\u064B\u0627 \u0628\u0627\u0633\u0645 \u0627\u0644\u0631\u0645\u0632 \u0627\u0644\u0645\u0645\u064A\u0632) \u0647\u0648 \u062C\u0632\u0621 \u0645\u0646 \u062C\u0647\u0627\u0632 \u0623\u0645\u0627\u0646 \u0644\u0644\u0645\u0635\u0627\u062F\u0642\u0629 \u0627\u0644\u062B\u0646\u0627\u0626\u064A\u0629 \u064A\u0645\u0643\u0646 \u0627\u0633\u062A\u062E\u062F\u0627\u0645\u0647 \u0644\u0644\u062A\u0631\u062E\u064A\u0635 \u0628\u0627\u0633\u062A\u062E\u062F\u0627\u0645 \u062E\u062F\u0645\u0627\u062A \u0627\u0644\u0643\u0645\u0628\u064A\u0648\u062A\u0631. \u064A\u062A\u0645 \u062A\u062E\u0632\u064A\u0646 \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0645\u0645\u064A\u0632\u0629 \u0644\u0644\u0628\u0631\u0627\u0645\u062C \u0639\u0644\u0649 \u062C\u0647\u0627\u0632 \u0625\u0644\u0643\u062A\u0631\u0648\u0646\u064A \u0644\u0644\u0623\u063A\u0631\u0627\u0636 \u0627\u0644\u0639\u0627\u0645\u0629 \u0645\u062B\u0644 \u0643\u0645\u0628\u064A\u0648\u062A\u0631 \u0633\u0637\u062D \u0627\u0644\u0645\u0643\u062A\u0628 \u0623\u0648 \u0627\u0644\u0643\u0645\u0628\u064A\u0648\u062A\u0631 \u0627\u0644\u0645\u062D\u0645\u0648\u0644 \u0623\u0648 \u0627\u0644\u0645\u0633\u0627\u0639\u062F \u0627\u0644\u0631\u0642\u0645\u064A \u0627\u0644\u0634\u062E\u0635\u064A \u0623\u0648 \u0627\u0644\u0647\u0627\u062A\u0641 \u0627\u0644\u0645\u062D\u0645\u0648\u0644 \u0648\u064A\u0645\u0643\u0646 \u0646\u0633\u062E\u0647\u0627. ( \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0645\u0645\u064A\u0632\u0629 \u0644\u0623\u062C\u0647\u0632\u0629 \u0627\u0644\u062A\u0628\u0627\u064A\u0646 \u060C \u062D\u064A\u062B \u064A\u062A\u0645 \u062A\u062E\u0632\u064A\u0646 \u0628\u064A\u0627\u0646\u0627\u062A \u0627\u0644\u0627\u0639\u062A\u0645\u0627\u062F \u0639\u0644\u0649 \u062C\u0647\u0627\u0632 \u0645\u062E\u0635\u0635 \u0648\u0628\u0627\u0644\u062A\u0627\u0644\u064A \u0644\u0627 \u064A\u0645\u0643\u0646 \u062A\u0643\u0631\u0627\u0631\u0647\u0627 (\u0641\u064A \u063A\u064A\u0627\u0628 \u0627\u0644\u063A\u0632\u0648 \u0627\u0644\u0645\u0627\u062F\u064A \u0644\u0644\u062C\u0647\u0627\u0632)"@ar . "\u0631\u0645\u0632 \u0627\u0644\u0628\u0631\u0646\u0627\u0645\u062C"@ar . . . . "Un token de software (tambi\u00E9n conocido como soft token) es un mecanismo de seguridad de autenticaci\u00F3n de dos factores que puede usarse para autorizar el uso o acceso de servicios inform\u00E1ticos. Los tokens de software son almacenados en un dispositivo electr\u00F3nico de uso general, como una computadora de escritorio, computadora port\u00E1til, PDA o tel\u00E9fono m\u00F3vil, y pueden duplicarse. (En contraste los tokens de hardware, donde las credenciales son almacenanadas en un dispositivo de hardware dedicado y por lo tanto, no pueden duplicarse (esto significa ausencia ausencia de invasi\u00F3n f\u00EDsica del dispositivo). Ya que los tokens de software, son algo que no se posee f\u00EDsicamente, est\u00E1n expuestos a amenazas \u00FAnicas basadas en la duplicaci\u00F3n del material criptogr\u00E1fico subyacente, por ejemplo, virus inform\u00E1ticos y ataques de software. Tanto tokens de hardware como los de software son vulnerables a ataques man-in-the-middle basados en bot, o a ataques simples de phishing en los que se solicita la contrase\u00F1a de un solo uso, proporcionada por el token, y luego se proporciona al sitio web genuino de manera oportuna. Los tokens de software tienen beneficios: no hay tokens f\u00EDsicos para transportar, no contienen bater\u00EDas que se agoten y son m\u00E1s baratos que los tokens de hardware. \u200B"@es . . . . "A software token (a.k.a. soft token) is a piece of a two-factor authentication security device that may be used to authorize the use of computer services. Software tokens are stored on a general-purpose electronic device such as a desktop computer, laptop, PDA, or mobile phone and can be duplicated. (Contrast hardware tokens, where the credentials are stored on a dedicated hardware device and therefore cannot be duplicated \u2014 absent physical invasion of the device)"@en . . . . . "Un token de software (tambi\u00E9n conocido como soft token) es un mecanismo de seguridad de autenticaci\u00F3n de dos factores que puede usarse para autorizar el uso o acceso de servicios inform\u00E1ticos. Los tokens de software son almacenados en un dispositivo electr\u00F3nico de uso general, como una computadora de escritorio, computadora port\u00E1til, PDA o tel\u00E9fono m\u00F3vil, y pueden duplicarse. (En contraste los tokens de hardware, donde las credenciales son almacenanadas en un dispositivo de hardware dedicado y por lo tanto, no pueden duplicarse (esto significa ausencia ausencia de invasi\u00F3n f\u00EDsica del dispositivo)."@es . . . . . . . "1092140950"^^ . "\u0631\u0645\u0632 \u0627\u0644\u0628\u0631\u0646\u0627\u0645\u062C (\u0628\u0627\u0644\u0625\u0646\u062C\u0644\u064A\u0632\u064A\u0629: Software token)\u200F (\u0627\u0644\u0645\u0639\u0631\u0648\u0641 \u0623\u064A\u0636\u064B\u0627 \u0628\u0627\u0633\u0645 \u0627\u0644\u0631\u0645\u0632 \u0627\u0644\u0645\u0645\u064A\u0632) \u0647\u0648 \u062C\u0632\u0621 \u0645\u0646 \u062C\u0647\u0627\u0632 \u0623\u0645\u0627\u0646 \u0644\u0644\u0645\u0635\u0627\u062F\u0642\u0629 \u0627\u0644\u062B\u0646\u0627\u0626\u064A\u0629 \u064A\u0645\u0643\u0646 \u0627\u0633\u062A\u062E\u062F\u0627\u0645\u0647 \u0644\u0644\u062A\u0631\u062E\u064A\u0635 \u0628\u0627\u0633\u062A\u062E\u062F\u0627\u0645 \u062E\u062F\u0645\u0627\u062A \u0627\u0644\u0643\u0645\u0628\u064A\u0648\u062A\u0631. \u064A\u062A\u0645 \u062A\u062E\u0632\u064A\u0646 \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0645\u0645\u064A\u0632\u0629 \u0644\u0644\u0628\u0631\u0627\u0645\u062C \u0639\u0644\u0649 \u062C\u0647\u0627\u0632 \u0625\u0644\u0643\u062A\u0631\u0648\u0646\u064A \u0644\u0644\u0623\u063A\u0631\u0627\u0636 \u0627\u0644\u0639\u0627\u0645\u0629 \u0645\u062B\u0644 \u0643\u0645\u0628\u064A\u0648\u062A\u0631 \u0633\u0637\u062D \u0627\u0644\u0645\u0643\u062A\u0628 \u0623\u0648 \u0627\u0644\u0643\u0645\u0628\u064A\u0648\u062A\u0631 \u0627\u0644\u0645\u062D\u0645\u0648\u0644 \u0623\u0648 \u0627\u0644\u0645\u0633\u0627\u0639\u062F \u0627\u0644\u0631\u0642\u0645\u064A \u0627\u0644\u0634\u062E\u0635\u064A \u0623\u0648 \u0627\u0644\u0647\u0627\u062A\u0641 \u0627\u0644\u0645\u062D\u0645\u0648\u0644 \u0648\u064A\u0645\u0643\u0646 \u0646\u0633\u062E\u0647\u0627. ( \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0645\u0645\u064A\u0632\u0629 \u0644\u0623\u062C\u0647\u0632\u0629 \u0627\u0644\u062A\u0628\u0627\u064A\u0646 \u060C \u062D\u064A\u062B \u064A\u062A\u0645 \u062A\u062E\u0632\u064A\u0646 \u0628\u064A\u0627\u0646\u0627\u062A \u0627\u0644\u0627\u0639\u062A\u0645\u0627\u062F \u0639\u0644\u0649 \u062C\u0647\u0627\u0632 \u0645\u062E\u0635\u0635 \u0648\u0628\u0627\u0644\u062A\u0627\u0644\u064A \u0644\u0627 \u064A\u0645\u0643\u0646 \u062A\u0643\u0631\u0627\u0631\u0647\u0627 (\u0641\u064A \u063A\u064A\u0627\u0628 \u0627\u0644\u063A\u0632\u0648 \u0627\u0644\u0645\u0627\u062F\u064A \u0644\u0644\u062C\u0647\u0627\u0632) \u0646\u0638\u0631\u064B\u0627 \u0644\u0623\u0646 \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0645\u0645\u064A\u0632\u0629 \u0644\u0644\u0628\u0631\u0627\u0645\u062C \u0647\u064A \u0634\u064A\u0621 \u0644\u0627 \u064A\u0645\u062A\u0644\u0643\u0647 \u0627\u0644\u0641\u0631\u062F \u0641\u0639\u0644\u064A\u064B\u0627 \u060C \u0641\u0625\u0646\u0647\u0627 \u062A\u062A\u0639\u0631\u0636 \u0644\u062A\u0647\u062F\u064A\u062F\u0627\u062A \u0641\u0631\u064A\u062F\u0629 \u062A\u0633\u062A\u0646\u062F \u0625\u0644\u0649 \u062A\u0643\u0631\u0627\u0631 \u0645\u0627\u062F\u0629 \u0627\u0644\u062A\u0634\u0641\u064A\u0631 \u0627\u0644\u0623\u0633\u0627\u0633\u064A\u0629 - \u0639\u0644\u0649 \u0633\u0628\u064A\u0644 \u0627\u0644\u0645\u062B\u0627\u0644 \u060C \u0641\u064A\u0631\u0648\u0633\u0627\u062A \u0627\u0644\u0643\u0645\u0628\u064A\u0648\u062A\u0631 \u0648\u0647\u062C\u0645\u0627\u062A \u0627\u0644\u0628\u0631\u0627\u0645\u062C . \u0643\u0644 \u0645\u0646 \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0645\u0645\u064A\u0632\u0629 \u0644\u0644\u0623\u062C\u0647\u0632\u0629 \u0648\u0627\u0644\u0628\u0631\u0627\u0645\u062C \u0639\u0631\u0636\u0629 \u0644\u0647\u062C\u0645\u0627\u062A \u0641\u064A \u0627\u0644\u0648\u0633\u0637 \u0627\u0644\u0642\u0627\u0626\u0645\u0629 \u0639\u0644\u0649 \u0627\u0644\u0631\u0648\u0628\u0648\u062A\u0627\u062A \u060C \u0623\u0648 \u0644\u0647\u062C\u0645\u0627\u062A \u0627\u0644\u062A\u0635\u064A\u062F \u0627\u0644\u0627\u062D\u062A\u064A\u0627\u0644\u064A \u0627\u0644\u0628\u0633\u064A\u0637\u0629 \u0627\u0644\u062A\u064A \u064A\u062A\u0645 \u0641\u064A\u0647\u0627 \u0637\u0644\u0628 \u0643\u0644\u0645\u0629 \u0627\u0644\u0645\u0631\u0648\u0631 \u0644\u0645\u0631\u0629 \u0648\u0627\u062D\u062F\u0629 \u0627\u0644\u062A\u064A \u064A\u0648\u0641\u0631\u0647\u0627 \u0627\u0644\u0631\u0645\u0632 \u0627\u0644\u0645\u0645\u064A\u0632 \u060C \u062B\u0645 \u064A\u062A\u0645 \u062A\u0648\u0641\u064A\u0631\u0647\u0627 \u0644\u0645\u0648\u0642\u0639 \u0627\u0644\u0648\u064A\u0628 \u0627\u0644\u0623\u0635\u0644\u064A \u0641\u064A \u0627\u0644\u0648\u0642\u062A \u0627\u0644\u0645\u0646\u0627\u0633\u0628 . \u062A\u062A\u0645\u062A\u0639 \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0645\u0645\u064A\u0632\u0629 \u0644\u0644\u0628\u0631\u0627\u0645\u062C \u0628\u0641\u0648\u0627\u0626\u062F \u0645\u0646\u0647\u0627: \u0644\u0627 \u064A\u0648\u062C\u062F \u0631\u0645\u0632 \u0645\u0627\u062F\u064A \u0644\u062D\u0645\u0644\u0647\u0627 \u060C \u0648\u0644\u0627 \u062A\u062D\u062A\u0648\u064A \u0639\u0644\u0649 \u0628\u0637\u0627\u0631\u064A\u0627\u062A \u0633\u062A\u0646\u0641\u062F \u0637\u0627\u0642\u062A\u0647\u0627 \u0628\u0639\u062F \u0632\u0645\u0646 \u060C \u0648\u0647\u064A \u0623\u0631\u062E\u0635 \u0645\u0646 \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0645\u0645\u064A\u0632\u0629 \u0644\u0644\u0623\u062C\u0647\u0632\u0629."@ar .