An authentication tool that secures logins. ASG uses an authentication protocol to confirm the validity of users and reduce the opportunity for unauthorized access. Successful authentication is accomplished when ASG-enabled devices communicate with compatible keys. The authentication transaction consists of a challenge (essentially a random number), followed by the receipt of a response entered by the user. Interception of the challenge or the response does not compromise the security of the system, as the relevance of the authentication token used to perform the challenge and response is limited to the current challenge and response exchange.