亚洲成在人线av丨毛片免费视频丨日本护士╳╳╳hd少妇丨亚洲欧美综合区丁香五月小说丨伊人久久大香线蕉av最新

Feed
How does an Access Control System Operate?
6 years ago415 Clicks
When a credential (card, fob, fingerprint, etc.) is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel / processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked. If there is a match between the credential and the access control list, the control panel operates a relay that in turn unlocks the door. The control panel also ignores a door open signal to prevent an alarm. Often the reader provides feedback, such as a flashing red LED for an access denied and a flashing green LED for an access granted.
The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room but Bob does not. Alice either gives Bob her credential or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input.
There are three types (factors) of authenticating information:
something the user knows, e.g. a password, pass-phrase or PIN
something the user has, such as smart card
something the user is, such as fingerprint, verified by biometric measurement
Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, where another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios. For example, a user may have their password, but have forgotten their smart card. In such a scenario, if the user is known to designated cohorts, the cohorts may provide their smart card and password in combination with the extant factor of the user in question and thus provide two factors for the user with missing credential, and three factors overall to allow access.
Professional electric locks manufacturers-YLI ElecAll rights reserved,Email:yli@yli.cn
Login
Register
主站蜘蛛池模板: 高清精品一区二区三区| 国产97色在线 | 日韩| 大香伊蕉在人线国产av| 久久久久久九九99精品 | 在线亚洲人成电影网站色www| 北条麻妃一二三区| 免费特级毛片| 无码无套少妇毛多18p| 国产一国产aa毛片| 免费av免费看| 欧美va亚洲va在线观看| 国产r级在线| 国内精品在线观看视频| 中文字幕丰满伦子无码| 扒开双腿被两个男人玩弄视频| 欧美激情精品久久久久久| 久久综合伊人77777麻豆| 少妇二级淫片免费放| 国产在线国偷精品免费看| 国产毛片儿| 精品水蜜桃久久久久久久| 国产在线观看www污污污| 扒开双腿吃奶呻吟做受视频| 亚洲欧美日韩精品专区| 久久久国产精品消防器材| 精品免费一区二区三区在| 少妇和邻居做不戴套视频| 中文字幕亚洲一区二区va在线| 色综合88| 老熟妇高潮一区二区三区| av免费不卡| 中文字幕丝袜第1页| 九色国产精品入口| 国产午夜福利在线播放| 欧美一级片在线| av区无码字幕中文色| 色播激情| 免费观看全黄做爰的视频|