. "These devices are simple (but have some cost) to deploy to end-users, however they are more susceptible than some other types of hardware token to various hacker attacks such as man-in-the-middle approaches.Phone call - A common variant of OTP is to call the user every time they login using a phone number that has previously been registered with their account, or to send an SMS message to the phon" . . .