Issac is seeking challenge response token type of solution.
Explanation:
Difficulty-response encryption is in computer security a group of protocols where one party raises a request ("Challenge") and then another group must send a valid answer ("Response"). User verification, the most basic example of a request-response protocol, is the task for the right user.
Authentication of the Challenge response requires a cryptographic protocol to indicate that the recipient does not know the password by themselves. The result is then computed with the use of a cryptographic hash function in conjunction with the password of the recipient.