{"id":93599,"date":"2024-11-11T11:36:21","date_gmt":"2024-11-11T03:36:21","guid":{"rendered":"https:\/\/version-2.com\/?p=93599"},"modified":"2024-11-20T16:51:00","modified_gmt":"2024-11-20T08:51:00","slug":"whats-a-hardware-security-key-and-when-do-you-use-it","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/11\/whats-a-hardware-security-key-and-when-do-you-use-it\/","title":{"rendered":"What\u2019s a hardware security key\u2014and when do you use it?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"93599\" class=\"elementor elementor-93599\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2493f1c elementor-widget elementor-widget-text-editor\" data-id=\"2493f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/1d91f38c51\/hardware-security-key.png\/m\/1080x0\/filters:quality(60):format(avif)\" width=\"1080\" height=\"607\" \/><\/p><div class=\"richtext\"><h2 id=\"what-is-a-hardware-security-key-exactly\" class=\"heading-xl\">What is a hardware security key, exactly?<\/h2><p class=\"body-md\">In basic terms, hardware security keys are small physical devices that boost your online security by adding an extra layer of authentication. They work with two-factor (<a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/blog\/two-factor-authentication\/\" data-ga-slug=\"Link to \/blog\/two-factor-authentication\/\" data-link-full-refresh=\"true\">2FA<\/a>) and multi-factor authentication systems, requiring you to physically insert them into your device or tap the key to confirm that it\u2019s really you trying to log in. By making you perform a security step in the real world, these keys significantly reduce the likelihood of unauthorized access by outsiders.<\/p><h2 id=\"how-do-hardware-security-keys-work\" class=\"heading-xl\">How do hardware security keys work?<\/h2><p class=\"body-md\">Hardware security keys work by using cryptographic protocols to verify your identity. Here\u2019s how it usually goes: you head over to the login page for your online account, enter your username and password, and then the system asks you for the hardware security key.<\/p><p class=\"body-md\">At this point, you either insert the key (usually into a USB port) or tap it if it\u2019s already connected. This action generates a unique code or signature that confirms your identity. That\u2019s it!<\/p><p class=\"body-md\">Because of this process, even if someone has your password and tries to use it, they won\u2019t be able to access your account without that physical key.<\/p><h2 id=\"pros-and-cons-of-hardware-security-keys\" class=\"heading-xl\">Pros and cons of hardware security keys<\/h2><p class=\"body-md\">Like many cybersecurity solutions out there, hardware security keys come with their share of benefits and drawbacks. Let\u2019s dive into the pros and cons and see which side weighs more in the balance.<\/p><h3 id=\"the-benefits\" class=\"heading-lg\">The benefits<\/h3><ul class=\"leading-normal List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\"><b>They are resistant to phishing:<\/b> Hardware security keys are handy little gadgets that you plug into your device or interact with directly, making them super tough for hackers to bypass. So, even if someone manages to steal your password, they still won\u2019t be able to get in without that physical hardware key.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\"><b>They are quite convenient:<\/b> Unlike some other two-factor and multi-factor authentication methods, hardware security keys are really user-friendly and don\u2019t require a lot of time or effort to access your account. Just think about it: with time-based one-time passwords (TOTP), for example, you have to open an authenticator app, read the code, and then copy and paste it or write it down on the login screen. It\u2019s secure, but it involves a lot of steps. With a hardware security key, you just plug it in or push one button, et voil\u00e0\u2014you\u2019re in! This is still secure but way more convenient.<\/p><\/li><\/ul><h3 id=\"the-drawbacks\" class=\"heading-lg\">The drawbacks<\/h3><ul class=\"leading-normal List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\"><b>They\u2019re not supported by all operating systems and websites:<\/b> Right now, only a handful of apps and services accept hardware security keys as an authentication method. So, while you can easily use them to log in to your Google, Microsoft, Okta, or Amazon accounts, there are still plenty of places where you\u2019ll need to use other methods.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\"><b>They do come with a price tag:<\/b> While other authentication methods like TOTP codes, passwords, passkeys, and biometrics are free, hardware security keys will cost you. A single key can set you back anywhere from $20 to $80, and even the most expensive ones don\u2019t work with every system or application out there.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\"><b>They can get lost:<\/b> Since hardware security keys are physical objects\u2014just like your house keys\u2014it\u2019s easy to misplace them. And if you lose one, you might end up locked out of your account until you find it again or can use another method to authenticate yourself (but only if that\u2019s an option, of course).<\/p><\/li><\/ul><h2 id=\"what-steps-should-i-take-if-i-misplace-my-hardware-security-key-or-if-its-stolen\" class=\"heading-xl\">What steps should I take if I misplace my hardware security key or if it&#8217;s stolen?<\/h2><p class=\"body-md\">If you misplace your hardware security key or it gets stolen, the first thing you should do is revoke the key\u2019s access to your account. To do this, log in using an alternative authentication method and go to your account settings to disable the hardware security key. After that, it\u2019s a good idea to replace the lost or stolen key and update your security settings to ensure you\u2019re using a different authentication method moving forward.<\/p><p class=\"body-md\">So, for instance, if you\u2019ve been using a USB security key as your go-to multi-factor authentication method for NordPass, simply log in with another MFA option, such as a backup code. Once you\u2019re in, just navigate to your Nord Account settings to adjust your MFA preferences or temporarily disable your hardware 2FA.<\/p><h2 id=\"use-both-a-password-manager-and-mfa-to-boost-online-security\" class=\"heading-xl\">Use both a password manager and MFA to boost online security<\/h2><p class=\"body-md\">Multi-factor authentication is a great way to keep your online accounts safe from unauthorized access. Each MFA method\u2014whether it\u2019s hardware security keys, TOTP codes, magic links, biometrics, or others\u2014adds an extra layer of security. But if you really want to boost your online safety, combining MFA with a solid password manager like <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/password-manager-it-teams\/\" data-ga-slug=\"Link to \/password-manager-it-teams\/\">NordPass<\/a> is the way to go. Why?<\/p><p class=\"body-md\">NordPass allows you to generate strong passwords on the spot and keeps them all safe in one encrypted vault. This means that the first authentication factor\u2014your passwords\u2014is well protected, significantly improving your overall online account security. But there\u2019s more!<\/p><p class=\"body-md\"><a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/blog\/nordpass-mfa-methods\/\" data-ga-slug=\"Link to \/blog\/nordpass-mfa-methods\/\">NordPass also supports various types of MFA<\/a>, including hardware security keys, so you can add even more layers of protection to your password vault. Additionally, you can use NordPass as your go-to authentication app for TOTP codes when logging in to other websites and applications.<\/p><p class=\"body-md\">All of this shows that, with NordPass, you get a comprehensive solution that covers a lot of security bases at once. So, if you want to make sure your accounts are locked down tight, give NordPass a try and see the difference it can make.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a2bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a2bcf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a037\" data-id=\"c73a037\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-821bef5 elementor-widget elementor-widget-spacer\" data-id=\"821bef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What is a hardware security key, exactly? In basic term [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1129,1273,61],"tags":[974,1131,1272],"class_list":["post-93599","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-nordpass","category-1273","category-press-release","tag-nord-security","tag-nordpass","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What\u2019s a hardware security key\u2014and when do you use it? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/what-is-hardware-security-key\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What\u2019s a hardware security key\u2014and when do you use it? - Version 2\" \/>\n<meta property=\"og:description\" content=\"What is a hardware security key, exactly? In basic term [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/what-is-hardware-security-key\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-11T03:36:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-20T08:51:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/1d91f38c51\/hardware-security-key.png\/m\/1080x0\/filters:quality(60):format(avif)\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-hardware-security-key\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2024\\\/11\\\/whats-a-hardware-security-key-and-when-do-you-use-it\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"What\u2019s a hardware security key\u2014and when do you use it?\",\"datePublished\":\"2024-11-11T03:36:21+00:00\",\"dateModified\":\"2024-11-20T08:51:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2024\\\/11\\\/whats-a-hardware-security-key-and-when-do-you-use-it\\\/\"},\"wordCount\":940,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-hardware-security-key\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/1d91f38c51\\\/hardware-security-key.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\",\"keywords\":[\"Nord Security\",\"NordPass\",\"2024\"],\"articleSection\":[\"Nord Security\",\"NordPass\",\"2024\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2024\\\/11\\\/whats-a-hardware-security-key-and-when-do-you-use-it\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-hardware-security-key\\\/\",\"name\":\"What\u2019s a hardware security key\u2014and when do you use it? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-hardware-security-key\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-hardware-security-key\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/1d91f38c51\\\/hardware-security-key.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\",\"datePublished\":\"2024-11-11T03:36:21+00:00\",\"dateModified\":\"2024-11-20T08:51:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-hardware-security-key\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-hardware-security-key\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-hardware-security-key\\\/#primaryimage\",\"url\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/1d91f38c51\\\/hardware-security-key.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\",\"contentUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/1d91f38c51\\\/hardware-security-key.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-hardware-security-key\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What\u2019s a hardware security key\u2014and when do you use it?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What\u2019s a hardware security key\u2014and when do you use it? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/what-is-hardware-security-key\/","og_locale":"zh_HK","og_type":"article","og_title":"What\u2019s a hardware security key\u2014and when do you use it? - Version 2","og_description":"What is a hardware security key, exactly? In basic term [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/what-is-hardware-security-key\/","og_site_name":"Version 2","article_published_time":"2024-11-11T03:36:21+00:00","article_modified_time":"2024-11-20T08:51:00+00:00","og_image":[{"url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/1d91f38c51\/hardware-security-key.png\/m\/1080x0\/filters:quality(60):format(avif)","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"5 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/what-is-hardware-security-key\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2024\/11\/whats-a-hardware-security-key-and-when-do-you-use-it\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"What\u2019s a hardware security key\u2014and when do you use it?","datePublished":"2024-11-11T03:36:21+00:00","dateModified":"2024-11-20T08:51:00+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2024\/11\/whats-a-hardware-security-key-and-when-do-you-use-it\/"},"wordCount":940,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/what-is-hardware-security-key\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/1d91f38c51\/hardware-security-key.png\/m\/1080x0\/filters:quality(60):format(avif)","keywords":["Nord Security","NordPass","2024"],"articleSection":["Nord Security","NordPass","2024","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2024\/11\/whats-a-hardware-security-key-and-when-do-you-use-it\/","url":"https:\/\/nordpass.com\/blog\/what-is-hardware-security-key\/","name":"What\u2019s a hardware security key\u2014and when do you use it? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/what-is-hardware-security-key\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/what-is-hardware-security-key\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/1d91f38c51\/hardware-security-key.png\/m\/1080x0\/filters:quality(60):format(avif)","datePublished":"2024-11-11T03:36:21+00:00","dateModified":"2024-11-20T08:51:00+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/what-is-hardware-security-key\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/what-is-hardware-security-key\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordpass.com\/blog\/what-is-hardware-security-key\/#primaryimage","url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/1d91f38c51\/hardware-security-key.png\/m\/1080x0\/filters:quality(60):format(avif)","contentUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/1d91f38c51\/hardware-security-key.png\/m\/1080x0\/filters:quality(60):format(avif)"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/what-is-hardware-security-key\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"What\u2019s a hardware security key\u2014and when do you use it?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-olF","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/93599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=93599"}],"version-history":[{"count":10,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/93599\/revisions"}],"predecessor-version":[{"id":97681,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/93599\/revisions\/97681"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=93599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=93599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=93599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}