string of numbers. The token applies a cryptographic process, using the challenge and other information that is kept secret inside the token. As a result, it generates a `response`, which is displayed to the user to be sent back to the remote system.