X
Get all access to the world's best video surveillance information.
Logo
680-70-2015-free-banner

Multi-Factor Authentication Primer

Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting them to certain individuals. The technique of 'multi-factor authentication' is applied when the end-user is concerned about who actually can use access control credentials. In this note, we examine the concept and detail the ways many access control designers choose to use it.

Multi-Factor Authentication Defined


The complete update is available only to PRO Members.

Want to read the rest of Multi-Factor Authentication Primer and get immediate access?




Other Updates on Access Control

Vacation Rental Access Control: The 'ResortLock' on Feb 20, 2015
Controlling access to your vacation home or rental property is the vision of ResortLock. Through ...

Worst Access Products - 100 Integrators Sound Off on Feb 18, 2015
100 integrators told us which access product lines gave them the biggest problems in the last yea...

Most Needed Improvement: Access Control Software on Feb 16, 2015
100 integrators answered IPVM's question: "Which aspect/element of access control system technol...

Practical Solutions To Piggybacking and Tailgating on Feb 12, 2015
Piggybacking and tailgating are two of access control's biggest threats. In this note, we share s...

Charlie Hebdo Forced Entrance and Access Control Measures on Feb 09, 2015
Electronic Access Control usually reassures people they are safe, but a recent tragedy in France ...

Lockitron Admits Failure on Jan 29, 2015
They were Silicon Valley's chosen one. The company who was going to disrupt access control, back...

New Long Range Wireless Access Solution (Allegion) on Jan 26, 2015
Delivering access control to parking lot gates or elevators usually means spending tens of thousa...

Foolproof Strike Installation Guide on Jan 20, 2015
Follow this guide and you will install a strike correctly everytime. As we detail in this post, i...

Selecting Access Control Readers on Jan 14, 2015
Given the variety of types available, specifying access control readers can be a daunting process...

Access Control Management Software Guide on Jan 06, 2015
In access control, the locks, readers and credentials may be what most see but its the management...


Most Recent Industry Updates

Avigilon to Buy $42 Million Building on Mar 02, 2015
Avigilon's spending spree continues. After using nearly $100 million in cash buying OV's patents...

Panasonic Unveils 'Dropcam Killer' on Mar 02, 2015
Many have tried, but no manufacturer has yet toppled Dropcam as the most well-known consumer IP c...

IP Camera Course Spring 2015 Opened on Feb 27, 2015
This is the only independent IP camera course, based on in-depth product and technology testing. ...

Milestone Admits IPO Plan Lie on Feb 27, 2015
Now wholly owned by Canon, Milestone's CEO admitted that they lied about not planning an IPO in 2...

Extend and Save Up to 25% on Feb 25, 2015
IPVM has added a new feature that allows members to save up to 25% by extending their membership ...

Avigilon Real Time Exposure And Gain on Feb 24, 2015
Knowing how exposure and gain impact image quality, bandwidth, and camera performance can useful ...

Axis Fixes VBR / CBR Setting on Feb 23, 2015
Bit rate control is an important element in transmitting surveillance video. The three most commo...

Bandwidth Guide for Video Networks on Feb 23, 2015
Bandwidth is the most fundamental element of computer networking for video surveillance systems. ...

Vacation Rental Access Control: The 'ResortLock' on Feb 20, 2015
Controlling access to your vacation home or rental property is the vision of ResortLock. Through ...