X
Get all access to the world's best video surveillance information.
Logo
680-70-2015-free-banner

Multi-Factor Authentication Primer

Author: Brian Rhodes, Published on Feb 04, 2013

Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting them to certain individuals. The technique of 'multi-factor authentication' is applied when the end-user is concerned about who actually can use access control credentials. In this note, we examine the concept and detail the ways many access control designers choose to use it.

Multi-Factor Authentication Defined


The complete update is available only to PRO Members.

Want to read the rest of Multi-Factor Authentication Primer and get immediate access?




Other Updates on Access Control

Vacation Rental Access Control: The 'ResortLock' on Feb 20, 2015
Controlling access to your vacation home or rental property is the vision of ResortLock. Through ...

Worst Access Products - 100 Integrators Sound Off on Feb 18, 2015
100 integrators told us which access product lines gave them the biggest problems in the last yea...

Most Needed Improvement: Access Control Software on Feb 16, 2015
100 integrators answered IPVM's question: "Which aspect/element of access control system technol...

Practical Solutions To Piggybacking and Tailgating on Feb 12, 2015
Piggybacking and tailgating are two of access control's biggest threats. In this note, we share s...

Charlie Hebdo Forced Entrance and Access Control Measures on Feb 09, 2015
Electronic Access Control usually reassures people they are safe, but a recent tragedy in France ...

Lockitron Admits Failure on Jan 29, 2015
They were Silicon Valley's chosen one. The company who was going to disrupt access control, back...

New Long Range Wireless Access Solution (Allegion) on Jan 26, 2015
Delivering access control to parking lot gates or elevators usually means spending tens of thousa...

Foolproof Strike Installation Guide on Jan 20, 2015
Follow this guide and you will install a strike correctly everytime. As we detail in this post, i...

Selecting Access Control Readers on Jan 14, 2015
Given the variety of types available, specifying access control readers can be a daunting process...

Access Control Management Software Guide on Jan 06, 2015
In access control, the locks, readers and credentials may be what most see but its the management...


Most Recent Industry Updates

Secret Service Video Surveillance Scandal on Mar 27, 2015
The US Secret Service has taken a beating over the last few years. Hookers, public drunkenness a...

Axis Introduces... An IP Horn? on Mar 27, 2015
Axis invented the IP camera. Now they claim to have the "first open standard, network loudspeak...

How to Blow $200,000 On A Booth on Mar 26, 2015
The industry has more than doubled in size in the past 10 years yet trade shows are struggling to...

Axis Zipstream Claims Average 50% Savings on Mar 25, 2015
Axis claims that its new Zipstream compression technology can "lower bandwidth and storage requir...

First Security Sales Course Launched on Mar 24, 2015
This is the first and only security sales course, customized for the needs and challenges specifi...

Favorite Network Switches for Surveillance 2015 on Mar 24, 2015
5 manufacturers stood out as integrator favorites for network switches from more than 140 votes /...

Fired: All But One Exacq Rep Firm Now Out on Mar 23, 2015
And then there was one. After firing multiple rep firms in January, Tyco has fired 3 more rep fi...

Sony Security Restructures / Cuts on Mar 23, 2015
Sony Security's challenges continue. Last year, Sony terminated their US GM, now they have cut e...

Milestone Hires Fired Exacq Rep Firm on Mar 20, 2015
The battle between Exacq and Milestone in the US is heating up. Less than 2 months ago, Exacq fi...

Top CRMs Used in Security Sales on Mar 19, 2015
One of the biggest pains of sales people is using their CRM (customer relationship management) so...