Register Computers
Allow to register computers, allowed to access.
Access Log
Use a hash of the access log as an additional kind of password. The access log (Computer/Access Time/Access ID) is known to the client and the server. Intruders would need to listen and record the communication from the beginning.
heise online - 29.05.09 - Identity Mana...
/livcos.org/data/map/brainstorm/AccessSecurity