We are glad to announce that the Modis Lock now supports the ChipNet Fido U2F Key, a FIDO certified U2F key designed for protecting your accounts.
We are happy to announce that Modis Lock now supports KEY-ID, the FIDO U2F key and USB push-button device for protecting online accounts.
We are proud to announce that the Modis Lock now supports the Feitian ePass FIDO-NFC key, a certified U2F authentication key.
We are proud to announce that the Modis Lock now supports the highly popular Google Titan Key. The device that makes your online accounts hacker-protected and two-factor authentication.
Stay ahead of the curve, and the competition by becoming an early adopter of the Modis Lock.
We are proud to announce our technological partnership with Yubico, a global authentication leader. Through the Modis and Yubico collaboration, our vision of uniting physical and digital security in one easily operated product has come true - The Modis Lock. Works With YubiKey Out of all good things in the process of growing your business, recognition [...]
YubiKeys were a great leap forward in making two-factor authentication convenient. Convenient enough to be deployed internally in companies such as Google and Facebook where information security is obviously extremely important. But are they convenient enough to become a truly ubiquitous standard embraced by businesses worldwide? I believe they can be. For that to happen, [...]
Introduction A minimal Modis Lock system consists of a Host Controller that houses a Raspberry Pi Compute Module 3 and a Reader unit with an ARM microcontroller. The Host Controller is the ‘brain’ of digital access control and the reader unit receives remote inputs. Even though the Host Controller has a powerful quad-core BCM2837 Broadcom [...]
The main engine of the Modis Lock host module is a Raspberry Pi Compute Module 3. The CM3 module also uses an ARM core microcontroller to facilitate reliable communication with its remote reader modules. Setting up an interface between a Raspberry Pi and a remote peripheral is pretty straight forward with the [...]
Whenever someone in the IT department is asked “how secure” their system is, it’s always just the right answer for the asking party. Reality is another answer, one that can’t be answered with exactness. Kind of like that time you asked your priest where heaven was and what the gates were made of. The answer [...]