Register Computers
Allow to register computers, allowed to access.
 heise online - 29.05.09 - Ide...
http://www.heise.de/newsticker/Identity-Management-OpenID-mit-openid4java--/meldung/139607
Access Log
(Re)Starting Log
An access log needs to start at some time. It can also get lost on the client or the server.
Register Computers
Allow to register computers, allowed to access.
Random Access ID
A random access ID could be securly transmitted between the client and the server. An external listener would have more difficulties to record the access log.
Log Not Matching
There is an access log available, on the client and the server, but they don't match.
Copied Client ID
Depending on the way the client computer gets identified, the ID could be copied (copies of the GUID, copies of a virtual machine,...)
Explicit Control
The user can check his access logs at any time.
Lock Access
The access can be locked manually by the user or automatically, when the access logs of the client and the server don't match.
Log Not Matching
There is an access log available, on the client and the server, but they don't match.

Use a hash of the access log as an additional kind of password. The access log (Computer/Access Time/Access ID) is known to the client and the server. Intruders would need to listen and record the communication from the beginning.

/livcos.org/data/map/brainstorm/AccessSecurity