A set group of users must give consent at the same time for data to be accessed or changed. For example, seven people hold keys that are used to secure the system at the heart of the web. When they come together, their keys create a master key, which allows them access.


  • It can be designed in a way for the whole group to be present in either physical location, or online
  • Hard to abuse because of the number of users involved


  • Requires a lot of coordination for it to work
  • Not suitable if an immediate response is needed