X
Get all access to the world's best video surveillance information.
Logo
Free-book-promo-680-70

Multi-Factor Authentication Primer

Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting them to certain individuals. The technique of 'multi-factor authentication' is applied when the end-user is concerned about who actually can use access control credentials. In this note, we examine the concept and detail the ways many access control designers choose to use it.

Multi-Factor Authentication Defined


The complete update is available only to PRO Members.

Want to read the rest of Multi-Factor Authentication Primer and get immediate access?




Other Updates on Access Control

Testing Bioscrypt's V-Flex Fingerprint Reader on Jul 25, 2014
With fingerprint readers available for as little as $100, why would you pay more? Consider Morpho...

Access Control Markups / Profits Revealed on Jul 23, 2014
How much profits do integrators typically make on access control projects? Is access one of the l...

Top 5 Access Control Problems on Jul 21, 2014
Here's what integrators say are their 5 top problems with electronic access control: High cost...

Favorite Access Control Credentials on Jul 11, 2014
When it comes to the most popular way to unlock a door, which access credential type holds the fa...

Maglocks - Who Uses And Hates Them on Jul 10, 2014
Many integrators hate maglocks. However, they are a common sight on many controlled openings. But...

New Hosted Access Provider: Feenics on Jul 08, 2014
There is a new entrant in the hosted access market, Feenics. Not only are they aiming for the cl...

Lifespan of Electronic Access Control Systems on Jul 01, 2014
Just how long do end users hang on to access systems before they look to change? The answer may s...

Average Access Control Job Size on Jun 30, 2014
Unique IPVM statistics reveal what is the average access control job size, how size varies across...

How To Use Maglocks With Battery Power Legally on Jun 02, 2014
When the power goes off, maglocks leave your doors unlocked... right? Unless backup power is use...

Milestone Access Control 2014 Released on May 28, 2014
Milestone has announced an update to its first venture into integrated access interface. When we ...


Most Recent Industry Updates

Testing Bioscrypt's V-Flex Fingerprint Reader on Jul 25, 2014
With fingerprint readers available for as little as $100, why would you pay more? Consider Morpho...

VSaaS Startup Pivots to Camera API Provider on Jul 24, 2014
This is a fascinating case study of how a VSaaS startup recognized the flaws in that market and a...

Pelco IP Camera Price Cuts on Jul 24, 2014
Starting July 1, 2014, Pelco has made significant price cuts across their mid to high end IP came...

Access Control Markups / Profits Revealed on Jul 23, 2014
How much profits do integrators typically make on access control projects? Is access one of the l...

Startup: The Pepper-Spraying Camera on Jul 22, 2014
Personal safety is a growing concern for many, but a complete solution means carrying several dev...

Top 5 Access Control Problems on Jul 21, 2014
Here's what integrators say are their 5 top problems with electronic access control: High cost...

VMS Webinar Series - Milestone, Avigilon, NUUO, OnSSI, Network Optix on Jul 21, 2014
Over the next month, each Monday at 11am EDT / 15:00 GMT, IPVM will be hosting a webinar on a dif...

Milestone Sues Hawk on Jul 18, 2014
Last year, an inventor / troll said they were going to sue end users for violating a patent they ...

Surveillance Camera Imager Tutorial on Jul 17, 2014
Imagers - CCD, CMOS, 1/2", 1/4", big pixels, small pixels, etc. In this tutorial, we explain the...

Conduit for Surveillance Explained on Jul 16, 2014
Cameras frequently need conduit to protect wires and cables connecting them to the headend / reco...