Adjunct processor for providing computer facility access protection via call transfer

作者: Salvador Barron , James Eugene Coffman

DOI:

关键词: Identification (information)AdjunctLoginComputer portComputer scienceCallbackCall originationComputer securityCall terminationPassword

摘要: This adjunct processor arrangement performs a centralized call screening function to provide computer port access security. Every origination in the telephone switching system from calling party protected is interdicted by and routed processor. The receives series of prompts identification information, such as login, password, voiceprint information. validates identity using this indicia initiates callback operation. disconnects connection, calls back then uses data transfer capability connect computer.

参考文章(14)
James W. Smith, Telephone line security apparatus ,(1982)
Louis Emanuel Thelemaque, Richard Duane Burtness, Call restriction arrangement ,(1977)
John H. Zink, Data call transfer ,(1983)
Gary R. Cook, Charles R. Bruce, James E. Beitel, Edward L. Sartore, Charles F. Mosier, Computer terminal security system ,(1982)
Stephen P. Gill, Method and apparatus for speech recognition and reproduction Journal of the Acoustical Society of America. ,vol. 84, pp. 801- 801 ,(1982) , 10.1121/1.396797
Charles W. Beardsley, Is your computer insecure? IEEE Spectrum. ,vol. 9, pp. 67- 78 ,(1972) , 10.1109/MSPEC.1972.5218476