Security tokens come in many different forms, including hardware tokens that contain chips , USB tokens that plug into USB ports, and wireless Bluetooth tokens or programmable electronic key fobs, which activate devices remotely (for example, to gain access to a car or apartment building).