These include an embedded microprocessor, and potentially a keypad / display for human interaction.
Requires some elecrtonic interface to communicate with, may be either contact or contactless. They generally
provide authentication through one of three strategies, Static, Dynamic password generator, and Challenge-response.