X
Get all access to the world's best video surveillance information.
Logo
680-70-2015-free-banner

Multi-Factor Authentication Primer

Author: Brian Rhodes, Published on Feb 04, 2013

Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting them to certain individuals. The technique of 'multi-factor authentication' is applied when the end-user is concerned about who actually can use access control credentials. In this note, we examine the concept and detail the ways many access control designers choose to use it.

Multi-Factor Authentication Defined

Log in to read this IPVM research.
Why do I need to log in?
IPVM does original testing and research that is funded by member's payment enabling up to offer the most independent, accurate and in-depth information in the industry.
[#<:xml::element:0x3f8eac48c5cc name="p" children="[#<Nokogiri::XML::Text:0x3f8eac4917d4" a stranger use your credentials one of the oldest problems facing access control is making as easy to keys but restricting them certain individuals. technique authentication applied when end-user concerned about who actually can credentials. in this note we examine concept and detail ways many designers choose it.>]>, #<:xml::element:0x3f8eac48c3ec name="p" children="[#<Nokogiri::XML::Element:0x3f8eac4913c4" authentication defined>]>]>]




Other Updates on Access Control

Low Tech Access Control: Restricted Keyways on May 20, 2015
Access control is sometimes as simple as good management of mechanical keys and locks. While the ...

The New $2 Billion Access Giant: dorma+kaba on May 01, 2015
The plan to merge two second-tier door hardware and access control companies may give birth to a ...

Genetec Ends SMC, Replaces with Cloud Link on Apr 23, 2015
Genetec is ending the main platform it uses to integrate most access control, the Synergis Master...

Vacation Rental Access Control: The 'ResortLock' on Feb 20, 2015
Controlling access to your vacation home or rental property is the vision of ResortLock. Through ...

Worst Access Products - 100 Integrators Sound Off on Feb 18, 2015
100 integrators told us which access product lines gave them the biggest problems in the last yea...

Most Needed Improvement: Access Control Software on Feb 16, 2015
100 integrators answered IPVM's question: "Which aspect/element of access control system technol...

Practical Solutions To Piggybacking and Tailgating on Feb 12, 2015
Piggybacking and tailgating are two of access control's biggest threats. In this note, we share s...

Charlie Hebdo Forced Entrance and Access Control Measures on Feb 09, 2015
Electronic Access Control usually reassures people they are safe, but a recent tragedy in France ...

Lockitron Admits Failure on Jan 29, 2015
They were Silicon Valley's chosen one. The company who was going to disrupt access control, back...

New Long Range Wireless Access Solution (Allegion) on Jan 26, 2015
Delivering access control to parking lot gates or elevators usually means spending tens of thousa...


Most Recent Industry Updates

Milestone Employees Defecting to Vicon on Jul 02, 2015
The hot company right now? Evidently Vicon. Vicon has been stugglling for years and in the midst...

Pros and Cons - Automating Firmware Updates on Jul 01, 2015
Firmware and software updates are one of the most tedious tasks in surveillance, so why not make ...

Samsung Techwin Now Hanwha, Overseas To 'Remain Intact' on Jun 30, 2015
Officially, Samsung Techwin is no more. As the Korea Times reported: "Samsung Techwin officiall...

Camera Edge Storage / Recording Tutorial on Jun 29, 2015
~70% of IP cameras allow storing video onboard, at the 'edge', typically through the use of SD ca...

PennyAlerts is Pretty Interesting on Jun 25, 2015
We have criticized Intransa / Viakoo pretty harshly. And they deserved it. Quietly going out of ...

IPVM Camera Tools Training Video Released on Jun 25, 2015
In this video below, you will learn: How to select the right resolution and angles for your ca...

The Engineers of Tomorrow Are Men, The Women Remain Props on Jun 23, 2015
Celebrated annually at IFSEC, it is called 'Engineers of Tomorrow' a competition for troubleshoot...

ASIS CEO To Exit on Jun 22, 2015
Amid declining exhibitor attendance and membership troubles, the richest man in security manageme...

The Bizarre Dahua North American Tour on Jun 18, 2015
Dahua is worth $7 billion USD, more than twice what Canon paid for Axis. And Dahua generated mor...