X
Get all access to the world's best video surveillance information.
Logo 8fbbe83a6ce128d4940dbb3787cc2aeaf3d9938b15d0b711b17d116501531882
2016 book promo

Multi-Factor Authentication Primer

Author: Brian Rhodes, Published on Feb 04, 2013

Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting them to certain individuals. The technique of 'multi-factor authentication' is applied when the end-user is concerned about who actually can use access control credentials. In this note, we examine the concept and detail the ways many access control designers choose to use it.

Multi-Factor Authentication Defined

Log in to read this IPVM research.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

** ****** *****, *** ******* ***** **** **** **** *** ********** **** ** ********* ** ***** ** **** ******. *******, *** *********** **** ** '*******' ** * *** **** **** ******** **** *****. **** ***** **** *** '*****-******' *******, **** **** *** ********** **** ** ************** ********, *** ****** ** ****** ** **** **** *** **** ** ***** ****.

** * ***** **** ***** ****** ******** ********* *****, *********** *****, ** * ****** **** ** ***** ** ** '***********', *** ** **** *********** ***** ** ******* *** *****, *** **** ********* ********** ****** *** ********** *** *** **** ** ******* ** *** ****. *** ***** ***** ***** ** ******* ** * ******* '***** ******' ****** ******:


*** ********** ************** '*******' ****** ** *** ** *** **** ****, *** **** ** *******, ********, *** ********** ******* ***** ** ***********. ***** '****** ******' *** ******** ***** **:

  • ********* *** **** ***: * **********/********** ******* **************** ** *** ****. ********* ** ****** ******* *****, *****, ** ***. **** ******** * ********** ***, ********** **, ** ********.
  • ********* *** **** *****: ********* * **** ** ******** **** ******* ** *** ****. ********* * *** ******, *** **** ******* '******** *********' ** '**** * ****** ******** *****' *************.
  • ********* *** **** **: ********* ******** **** *** **** ** **** ** *******. ********* ************ ** **** ******, *** ***** ******** ******** ********* **** ***********, **********, ******/**** *****, *** **** ****.
  • ******* ******* ******** *** ****: ***** ******* **********, ******* ***** ********** *** *** ******* *** *** ****. **** ***** ** * ****** *****, ** **** * ************ **** ****** ****** ***** ** ***********.

Different *****

*** ****** ****** ** ******* ******* **** ********* ** ** ***-****'* ******** ********. ***** ****** ********* ***** *** ******** *** ** **** *********** *** ******* *** *******, ***** ****-******** ************* *** ******* ***** ** ****. ** ****** *** ******* ***** ***** *****:

*** ******: **** ***** * *********** ** '********* *** **** ***' *** '********* ** *****', **** ** ****** ******* ****** **** *** ************ *** ******. **** ** *** **** ***** *** ****, ** ************ ****** ****** *** ** ** **** ****** ****** **** **** **** * ****, ***** ** ***** **** ** *** ****.

******* *********** ********** ****** *** **** *********, ** ** **** ****** ** *** *********** ** ***** ************* ******* **** ** '********* *** **** **' ** *** ****** **************.

***** ******: **** ******** ******** ** **** ****** ***** ** **********, ***** ******* *** ********. **** ***** **** ** * *********** ** **********, *** *****, *** ****** ******* ***********, *** ****** ************* **** ****** ** ********* *** ****** **** ****** '****** ******' **************.


** * ****** ** **** **** *** **** ** *** **** ***** ** **************, ** ** **** ** ******** **************, ********, *** ******** ********** *** *** ********* *** ********** ***-*****.

**** ******: *** ******* ***** ** ************** ** ***** **** ** ******** *** ***** ********* *********, ***** ****** *********** *** **** ** *********** **** *** ***** *******. ******* **** ******* ***** *** **** **** *** ** *** **** ***** *********, ** ********* ** *** ******** ****** *** ******** **** ** **** **** *** ******** ******** ** *********.


Multi-Factor ************

**** ***** ****** '****** ******' ************** ** **** ******, *** ******** ******* *** ******** ******** ** ******* ************* ******* ** ****** *******. **** ***** ******** ********:

  • ATM ********: Not only are debit cards required to be swiped, but PIN numbers are required every time a cash transaction takes place at one of these machines.
  • ******: ********** **** ****** *****, *****, ** *** ***** ******* ***** ********* ** ********* '********* *** ****' *** ********* '********* *** ****' ** ******* ****** **********.

**** ** ***** ** ******** ******, *********** **** * ***** ****. **** ** ***** ** ******** ***********, ******** ******* *** ********.

Single ****** ***** **** ******

* ******** ** ********** ****** ******* ******* *** '****** ******' **************, *** **** ** ********** *** *** *********** ******** ** **** ***-*****. *** ****** ********** **** ** **** ** **** ** *** ******** ** *** ******, *** *** ****** ******** (**: *******, *****) ** ****** ******* **** ******.

*** *********** *** ******* *** **** ****** '****** ******' **********. ** ***** ************ ** *** ****** ** ******** **** *** *** *** **** ******. ***** ********* ******** ** ****-**** ********** ****** ***********, ********** **** ***** ******* ** ******** '***** *****' ** ******** *** **** ******** ** **********.

*** ***** *******, ***** ******** ******* ** ****** ******** ***** ** ********** ******. ******* ******* ********** ***** ****** *** **** *********, *** ****** ****** ************ ***** ** ******** *** ****** ********* ******* ******** *************, ****** ****** ******* *** ******** ****** ****.



Other Reports on Access Control

PoE Powered Access Control Guide on Jan 18, 2016
The popularity of Power over Ethernet applications has spilled over into Access Control. Taking a...

RS2 Access Control Company Profile on Jan 13, 2016
Inside we examine RS2 Technologies Access It! line for best customer fit, key features, pricing, ...

New Siri Powered Kwikset Lock on Jan 08, 2016
Your voice is your key with a new residential doorlock, Kwikset's Premis. Using your Apple phone,...

Honeywell NetAXS Access Control Profile on Jan 06, 2016
Honeywell is one of the biggest names in security, and one of their most popular offerings is web...

Avigilon Access Control Company Profile on Jan 04, 2016
Inside we examine Avigilon Access Control Manager (ACM)'s overall strengths, ideal customer marke...

Keyscan Access Control Company Profile on Dec 17, 2015
Access company Keyscan is part of one of the biggest access companies in the world, and they sell...

Milestone XProtect Access 2016 Release - New Features, Major Price Drop on Dec 15, 2015
With continued video surveillance price pressure, access is getting more attention, as shown in 2...

Paxton Access Control Company Profile on Dec 07, 2015
This note profiles access company Paxton, our 3rd installment in an ongoing series, following our...

Barricade Locks - Pros vs Cons on Dec 03, 2015
The most basic rule of access control is 'never lock people in', but is the problem of active sho...

DSX Access Control Company Profile on Dec 02, 2015
In this note, we profile access control provider DSX. This is the second installment of a series ...


Most Recent Industry Reports

Blink Totally Wireless Camera Tested on Feb 12, 2016
Wireless cameras almost always still need a wire for power. Given that, many argue to just used w...

Average Frame Rate Video Surveillance 2016 on Feb 11, 2016
What is the average frame rated used in video surveillance systems? Historically, 30fps has been...

Goodbye Dropcam, the $50 Home Security Camera Era Is Here on Feb 10, 2016
Remember those days not too long ago where a $200 home security camera with a $100 per year for s...

Hikvision H.264+ Tested on Feb 10, 2016
Is 'regular' H.264 soon to be a thing of the past? Last year, Axis started the 'smart' H.264 tre...

Camera Coverage Areas on Feb 10, 2016
How wide and far on an area can a camera cover? A fundamental metric in analyzing this is pixel...

US Capital Paying for Homes and Business to Get Security Cameras on Feb 09, 2016
Since 9/11, US cities have spent hundreds of millions collectively on city-wide video surveillanc...

Brivo Access Control Company Profile on Feb 09, 2016
This is our 9th in a series of access control company profiles. In this entry, we cover Brivo. P...

Axis Is In Denial About HD Analog on Feb 08, 2016
For more than a decade, Axis' #1 argument against analog has been no HD. This, of course, is no...

Surveillance Commissioning / Install Checklist on Feb 08, 2016
This 60+ point checklist helps end users, integrators and consultants verify that installation is...

Favorite Camera Manufacturers 2016 on Feb 08, 2016
The market has changed significantly since 2014, where our previous Favorite Camera Manufacturer ...