X
Get all access to the world's best video surveillance information.
Logo
680-70-2015-free-banner

Multi-Factor Authentication Primer

Author: Brian Rhodes, Published on Feb 04, 2013

Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting them to certain individuals. The technique of 'multi-factor authentication' is applied when the end-user is concerned about who actually can use access control credentials. In this note, we examine the concept and detail the ways many access control designers choose to use it.

Multi-Factor Authentication Defined


The complete article is available only to PRO Members.

Want to read the rest of Multi-Factor Authentication Primer and get immediate access?




Other Updates on Access Control

Genetec Ends SMC, Replaces with Cloud Link on Apr 23, 2015
Genetec is ending the main platform it uses to integrate most access control, the Synergis Master...

Vacation Rental Access Control: The 'ResortLock' on Feb 20, 2015
Controlling access to your vacation home or rental property is the vision of ResortLock. Through ...

Worst Access Products - 100 Integrators Sound Off on Feb 18, 2015
100 integrators told us which access product lines gave them the biggest problems in the last yea...

Most Needed Improvement: Access Control Software on Feb 16, 2015
100 integrators answered IPVM's question: "Which aspect/element of access control system technol...

Practical Solutions To Piggybacking and Tailgating on Feb 12, 2015
Piggybacking and tailgating are two of access control's biggest threats. In this note, we share s...

Charlie Hebdo Forced Entrance and Access Control Measures on Feb 09, 2015
Electronic Access Control usually reassures people they are safe, but a recent tragedy in France ...

Lockitron Admits Failure on Jan 29, 2015
They were Silicon Valley's chosen one. The company who was going to disrupt access control, back...

New Long Range Wireless Access Solution (Allegion) on Jan 26, 2015
Delivering access control to parking lot gates or elevators usually means spending tens of thousa...

Foolproof Strike Installation Guide on Jan 20, 2015
Follow this guide and you will install a strike correctly everytime. As we detail in this post, i...

Selecting Access Control Readers on Jan 14, 2015
Given the variety of types available, specifying access control readers can be a daunting process...


Most Recent Industry Updates

First Security Drone System Startup on Apr 27, 2015
Governments have used unmanned drones for years, but they have remained the stuff of science fict...

Resolution: 4K vs 2160p vs 8.3MP on Apr 24, 2015
4K, 2160p and 8.3MP all basically refer to the same 'thing', just different dimensions of it. Wh...

Genetec Ends SMC, Replaces with Cloud Link on Apr 23, 2015
Genetec is ending the main platform it uses to integrate most access control, the Synergis Master...

Top Reasons Sales Proposals Are Rejected on Apr 22, 2015
A survey of 100 security sales professionals named 3 top reasons sales proposals are rejected: ...

Google / Nest Dealer Program Unveiled At ISC West on Apr 21, 2015
A year after Dropcam's puzzling appearance at ISC West 2014, now-parent company Google/Nest is ba...

Panasonic Free VMS Licenses Program on Apr 21, 2015
Looks like Tyco is a trendsetter. Weeks after Tyco starting giving free Exacq licenses, Digital ...

Small Chinese Manufacturers at ISC West on Apr 20, 2015
There were ~100 small Chinese, Taiwanese and Korean vendors with tiny booths at ISC West 2015. I...

Product / Tech Roundup ISC West 2015 on Apr 20, 2015
IPVM visited dozens of booths at ISC West. Inside is a roundup of many, but not all, of our visit...

Axis Goes Out With a Whimper (Q1 2015 Financials) on Apr 20, 2015
Their worst financial results, perhaps ever. In weeks, independent Axis likely will be no more, ...

Worst ISC West Showing on Apr 20, 2015
Here are the top 4 candidates: Arecont IDIS Milestone ONVIF Let's break down the cases f...