“the token model”
What’s that? Did you see the other post about the two-factor method?
2 factor generally runs through the token model. So what happens is you go through a login that probably doesn’t even use your password, or if it does that’s only half the login, and then you get a token. That token is only useful on that computer and for a limited amount of time. It’s very secure BUT the setup time to get it going is rough, and on the user side it’s not terribly intuitive, and often involves user having to install apps on their phone, then you get a bunch of extra headaches when you have to switch phones. But it’s the wave of the future because it greatly limits the use, storage and transmission of passwords.