This paper highlights just a few of the potential applications for Datakey CryptoAuthentication memory tokens. The functionality described in each use case can be combined or removed to fit a particular application. If you start by asking what features and functions are needed we can help you in developing use cases specific to your application.