X
Get all access to the world's best video surveillance information.
Logo
Free-book-promo-680-70

Multi-Factor Authentication Primer

Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting them to certain individuals. The technique of 'multi-factor authentication' is applied when the end-user is concerned about who actually can use access control credentials. In this note, we examine the concept and detail the ways many access control designers choose to use it.

Multi-Factor Authentication Defined


The complete update is available only to PRO Members.

Want to read the rest of Multi-Factor Authentication Primer and get immediate access?




Other Updates on Access Control

New Product: Software House Mega Controller on Sep 18, 2014
Software House's new controller, iStar Ultra, doubles the number of doors typically supported, fr...

Access Control Server Guide on Sep 09, 2014
Electronic access control systems need to be managed. The 'server' though can range across: Pa...

WiFi & Wireless Access Lock Guide on Aug 25, 2014
When it comes to access control, any chance to save money on parts or install labor is attractive...

Hosted and Managed Access Control Statistics on Aug 19, 2014
'Cloud' access control - how many integrators are offering it? Why? And for those that do, are t...

Favorite Biometrics 2014 on Aug 18, 2014
This IPVM integrator survey reveals the favorite biometric of professional integrators, with stat...

Why Most Integrators Use the Same Techs for Video and Access on Aug 12, 2014
With so many differences between video surveillance and access control designs, how commonly do i...

Profitability: Access vs Video - Statistics on Aug 06, 2014
Where do integrators make more money? Access control or video surveillance? With both systems b...

Electric Strikes: Why They Are So Popular on Jul 31, 2014
Electric strikes are a mainstay part of access control, but how often do integrators use them? In...

Access Control: Here's Why Integrators Choose Multiple Lines on Jul 28, 2014
With so many access options in the market, how many platforms do integrators typically sell? More...

Testing Bioscrypt's V-Flex Fingerprint Reader on Jul 25, 2014
With fingerprint readers available for as little as $100, why would you pay more? Consider Morpho...


Most Recent Industry Updates

Milestone Launches DVRs on Sep 19, 2014
So much for innovation and the open platform, Milestone has entered the DVR business. In this no...

New Product: Software House Mega Controller on Sep 18, 2014
Software House's new controller, iStar Ultra, doubles the number of doors typically supported, fr...

World's First (And Only) Intrusion Detection Keypad Guide on Sep 18, 2014
Arming and disarming are the most fundamental tasks in intrusion systems. Keypads are the most co...

New HD Video Analytic Cameras (ioimage / DVTel) on Sep 17, 2014
DVTel is releasing their first HD video analytic cameras, nearly 5 years after acquiring ioimage....

New Audio Surveillance Device Eliminates 3 Cables (Louroe) on Sep 16, 2014
Adding audio to IP surveillance systems can be a pain, often requiring a completely separate set ...

3D Camera Design Training Class on Sep 16, 2014
Below is an 87 minute recorded training class video that shows you how to do 3D camera designs, i...

Manufacturers Sound Off on ONVIF on Sep 16, 2014
ONVIF has achieved massive adoption amidst significant criticism. The most vocal critics are typi...

Live From ASIS 2014 Call on Sep 15, 2014
On Monday September 29th at 8pm ET, after the first day of ASIS exhibits, IPVM will host a live w...

Startup: Video Door Lock on Sep 12, 2014
Smart Locks are hot today, garnering lots of money and mainstream interest. One startup, Goji, i...