RU  KZ 

Multifactor identification

Ask a question

Sigur allows the company to identify its employees using a number of identifiers and combine any identification methods, from regular cards to biometrics.

Why is it important?

When multifactor identification is enabled, an employee is required to present several identifiers in succession. This protects the system from fraud and guarantees that the requestor is the person they claim to be.

Related videos

Overview

Sigur controllers are compatible with any readers with a standard Wiegand interface, which means that you can use any identification methods in the ACS, including any combination of them.

In Sigur, multifactor identification can be implemented in a number of ways:

  • installation of several readers or scanners for different types of identifiers at one checkpoint / door
  • installation of one reader / scanner that supports multiple ID formats

When multifactor identification is used in Sigur, the following parameters can be configured:

  • direction of access (entry or exit)
  • specific doors / checkpoints or groups of them
  • specific employees or groups of them

All the access rules are implemented in Sigur locally, which means that even if the server is unavailable, this functionality will be fully operational.

Two-factor identification

In real-life applications, the most common type of authentication is two-factor identification, i.e. a combination of two identifiers such as a card + PIN code or a card + biometrics (fingerprint, iris, palm vein, facial recognition, etc.).

However, more comprehensive rules can be used where necessary that include more than two identifiers.

Biometrics as an additional credential

It is not uncommon to use biometrics as an additional credential to complement card IDs. It helps to prevent card sharing and improves significantly the speed and accuracy of biometric identification since it allows matching the biometric identifier with the biometric template assigned to this particular cardholder in the database.

For the users’ convenience, facial recognition can be used as a biometric identifier in this scenario since this method generally does not require any extra steps to be taken by the person being identified and is therefore more comfortable for the users.