ABSTRACT
In the synchronous mode, the access control software
requests the password without calculating and presenting a
challenge to the user. The user turns on the password
generator, enters a PIN, reads the response from the dis-
play, and keys that value into the keyboard of the terminal
or workstation. The computer knows the expected response
through a combination of three factors: It knows the algo-
rithm the token uses to calculate the response, it knows the
unique key assigned to that token that will be used in
calculating the response, and it knows the method used
by the token to maintain dynamic password synchroniza-
tion with the access control system. Maintaining password
synchronization is a key factor in synchronous tokens.
Asynchronous tokens essentially are resynchronized each
time they are used, because the access control system
issues a new challenge on each use. Synchronous tokens
essentially issue their own challenge, and the access con-
trol system must be able to determine what that challenge
is. The three common methods to do this are time synchro-
nous, involving the use of time and other factors (using the
clocks in the token and in the access control system and
allowing for clock drift); event synchronous, involving use
of a value developed from one-timemodification of the last
entry; and algorithmic synchronous, involving reverse
engineering of the response to determine if the specific
token could have generated that response. As in the asyn-
chronous mode, if the two responses match then the user is
granted access.