亚洲成在人线av丨毛片免费视频丨日本护士╳╳╳hd少妇丨亚洲欧美综合区丁香五月小说丨伊人久久大香线蕉av最新

Feed
How does an Access Control System Operate?
6 years ago143 Clicks
When a credential (card, fob, fingerprint, etc.) is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel / processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked. If there is a match between the credential and the access control list, the control panel operates a relay that in turn unlocks the door. The control panel also ignores a door open signal to prevent an alarm. Often the reader provides feedback, such as a flashing red LED for an access denied and a flashing green LED for an access granted.
The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room but Bob does not. Alice either gives Bob her credential or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input.
There are three types (factors) of authenticating information:
something the user knows, e.g. a password, pass-phrase or PIN
something the user has, such as smart card
something the user is, such as fingerprint, verified by biometric measurement
Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, where another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios. For example, a user may have their password, but have forgotten their smart card. In such a scenario, if the user is known to designated cohorts, the cohorts may provide their smart card and password in combination with the extant factor of the user in question and thus provide two factors for the user with missing credential, and three factors overall to allow access.
Professional electric locks manufacturers-YLI ElecAll rights reserved,Email:yli@yli.cn
Login
Register
主站蜘蛛池模板: 在线看的av| 18禁在线永久免费观看| 免费三级大片| 国内少妇偷人精品视频| 小12萝8禁在线喷水观看| 天天操婷婷| 女人脱了内裤趴开腿让男躁| 成a∨人片在线观看无码| 国产女人和拘做受视频免费| 欧美高清视频一区二区三区| 男女猛烈xx00免费视频试看| 亚洲爆乳少妇无码激情| 久久亚洲一区二区三区四区五区| 中文字幕亚洲乱码熟女一区二区| 欧美日韩综合一区二区三区| www.婷婷色| 国产区精品一区二区不卡中文| 色老汉视频| 亚洲欧美日韩在线不卡| 久久99er热精品免费播| yy111111少妇影院免费观看| 好吊色av| 久久久精品波多野结衣av| 特级黄色 一级播放| 蜜桃臀无码内射一区二区三区 | 久久久久欧美精品| 成年人免费看的视频| 国产成人精品亚洲一区| 久久久免费观看| 丰满熟妇乱又伦在线无码视频| 250pp亚洲情艺中心欧美| 精品一卡二卡三卡四卡| 在线精品亚洲一区二区小说| 亚洲中文字幕无码中文字| av手机天堂| 日韩欧美国产激情| 国产亚洲精品久久久久的角色| 天天摸夜夜添久久精品|