Modis Blog

Home/Modis Blog/

Modis Lock gets “Works With YubiKey” certification

We are proud to announce our technological partnership with Yubico, a global authentication leader. Through the Modis and Yubico collaboration, our vision of uniting physical and digital security in one easily operated product has come true - The Modis Lock. Works With YubiKey Out of all good things in the process of growing your business, recognition [...]

By |2018-11-09T22:58:45+01:0004/09/2018|Categories: Coding, Modis Lock|Tags: , , |

It’s time to bring two-factor authentication to physical security

YubiKeys were a great leap forward in making two-factor authentication convenient. Convenient enough to be deployed internally in companies such as Google and Facebook where information security is obviously extremely important. But are they convenient enough to become a truly ubiquitous standard embraced by businesses worldwide? I believe they can be. For that to happen, [...]

By |2018-05-22T21:16:25+02:0022/05/2018|Categories: Modis Lock, Security|

Say it with a CAN Bus and a Raspberry Pi

Introduction A minimal Modis Lock system consists of a Host Controller that houses a Raspberry Pi Compute Module 3 and a Reader unit with an ARM microcontroller.  The Host Controller is the ‘brain’ of digital access control and the reader unit receives remote inputs.  Even though the Host Controller has a powerful quad-core BCM2837 Broadcom [...]

By |2018-09-04T10:01:46+02:0031/08/2017|Categories: Coding, Education|Tags: , , |

How to interface a Microcontroller with a Raspberry Pi through UART

The main engine of the Modis Lock host module is a Raspberry Pi Compute Module 3.  The CM3 module also uses an ARM core microcontroller to facilitate reliable communication with its remote reader modules.     Setting up an interface between a Raspberry Pi and a remote peripheral is pretty straight forward with the [...]

By |2018-09-04T10:01:56+02:0023/07/2017|Categories: Coding, Education|Tags: , , , , , , |

Separation of Services for a Better Night Sleep

Whenever someone in the IT department is asked “how secure” their system is, it’s always just the right answer for the asking party. Reality is another answer, one that can’t be answered with exactness. Kind of like that time you asked your priest where heaven was and what the gates were made of. The answer [...]

By |2018-05-17T20:57:26+02:0021/07/2017|Categories: Security|
Go to Top