Bruce’s Shorts | 4.9 - Authentication

What is two-factor authentication (2FA) and why is your identity at risk if you don’t use it? In a continuing series of short films, Bruce Devlin takes a light-hearted look at aspects of internet security.

Authentication is used to establish the identity of a user attempting to access a web site. But what if It were a robot trying to hack into the site? A challenge-response test like CAPTCHA can be used to determine if the user is a human. Emails can also be used to authenticate addresses. However, these methods are not infallible.

This is where 2FA comes in. Typically an identification token is sent via SMS or email to give a second level of authentication.

You might also like...

Standards: Part 13 - Exploring MPEG4-Part 10 - H.264/AVC

The H.264/AVC codec has been very successful. Here we dig deeper into how profiles and levels work to facilitate deployment of delivery systems and receiving client-player designs.

The Meaning Of Metadata

Metadata is increasingly used to automate media management, from creation and acquisition to increasingly granular delivery channels and everything in-between. There’s nothing much new about metadata—it predated digital media by decades—but it is poised to become pivotal in …

Designing IP Broadcast Systems: Remote Control

Why mixing video and audio UDP/IP streams alongside time sensitive TCP/IP flows can cause many challenges for remote control applications such as a camera OCP, as the switches may be configured to prioritize the UDP feeds, or vice…

Future Technologies: Autoscaling Infrastructures

We continue our series considering technologies of the near future and how they might transform how we think about broadcast, with a discussion of the concepts, possibilities and constraints of autoscaling IP based infrastructures.

Standards: Part 12 - ST2110 Part 10 - System Level Timing & Control

How ST 2110 Part 10 describes transport, timing, error-protection and service descriptions relating to the individual essence streams delivered over the IP network using SDP, RTP, FEC & PTP.