Home Resource Library Technical Articles Secure Access Control Through Challenge and Response Authentication