Soft token MFA device vs. hard token: key differences