X
Get all access to the world's best video surveillance information.
Logo
680-70-2015-free-banner

Multi-Factor Authentication Primer

Author: Brian Rhodes, Published on Feb 04, 2013

Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting them to certain individuals. The technique of 'multi-factor authentication' is applied when the end-user is concerned about who actually can use access control credentials. In this note, we examine the concept and detail the ways many access control designers choose to use it.

Multi-Factor Authentication Defined


The complete article is available only to PRO Members.

Want to read the rest of Multi-Factor Authentication Primer and get immediate access?




Other Updates on Access Control

Low Tech Access Control: Restricted Keyways on May 20, 2015
Access control is sometimes as simple as good management of mechanical keys and locks. While the ...

The New $2 Billion Access Giant: dorma+kaba on May 01, 2015
The plan to merge two second-tier door hardware and access control companies may give birth to a ...

Genetec Ends SMC, Replaces with Cloud Link on Apr 23, 2015
Genetec is ending the main platform it uses to integrate most access control, the Synergis Master...

Vacation Rental Access Control: The 'ResortLock' on Feb 20, 2015
Controlling access to your vacation home or rental property is the vision of ResortLock. Through ...

Worst Access Products - 100 Integrators Sound Off on Feb 18, 2015
100 integrators told us which access product lines gave them the biggest problems in the last yea...

Most Needed Improvement: Access Control Software on Feb 16, 2015
100 integrators answered IPVM's question: "Which aspect/element of access control system technol...

Practical Solutions To Piggybacking and Tailgating on Feb 12, 2015
Piggybacking and tailgating are two of access control's biggest threats. In this note, we share s...

Charlie Hebdo Forced Entrance and Access Control Measures on Feb 09, 2015
Electronic Access Control usually reassures people they are safe, but a recent tragedy in France ...

Lockitron Admits Failure on Jan 29, 2015
They were Silicon Valley's chosen one. The company who was going to disrupt access control, back...

New Long Range Wireless Access Solution (Allegion) on Jan 26, 2015
Delivering access control to parking lot gates or elevators usually means spending tens of thousa...


Most Recent Industry Updates

HID Troubles Behind CEO Ouster on May 28, 2015
Access control is typically 'boring'. But the biggest manufacturer in the industry shocked many ...

Camera Course Summer 2015 Opened on May 27, 2015
The next camera course, and the last one for 2015, starts July 14th. Until June 11th, save $50 (m...

Most Disrespected Big Integrators on May 27, 2015
We polled a mix of security end users and integrators on which big security integrator they disre...

Competing Against Surveillance Self-Install / DIY on May 26, 2015
End users sometimes look at integrator proposals, see ~$100 per hour pricing and think "Hey, we c...

Dahua Admits Failed Channel Strategy on May 26, 2015
One of the biggest challenges for expanding Chinese vendors is mastering sales, marketing and dis...

Facewatch Fundraise for UK Anti-Crime Platform on May 25, 2015
A foolish dream or the future of crime fighting? A UK businessman has spent millions of his own ...

ADI W Box Accelerates Race To the Bottom on May 22, 2015
ADI is aggressively ramping up promotion for its new white label brand "W Box Technologies", esse...

Warehouse Camera Selection Guide on May 20, 2015
Warehouses can contain many high-value items yet often do not have people inside them watching fo...

Axis End-to-End Solutions are Here! on May 20, 2015
Sorry partners... The new Canon subsidiary and Milestone sibling has changed their go-to-market ...

DVTel's $9 Million Fund Raising and Future on May 20, 2015
DVTel's CEO tells IPVM that they have completed a 'turnaound' and that they are ready for more ag...