Arrangement for authenticating user and authorizing use of secured system

作者: Juha-Matti Linkkonen , Mika Honkanen , Mika Leivo

DOI:

关键词:

摘要: A method for real-time authentication or authorization of a user (1) secured system (3) is based on using two channels and an device (4) from which the can request (6) over information network connection (6, 9). One telephone (8), to connected. logging into other channel must make call by his her (2). The verifies that has been received number user's telephone, issues positive verification response system. Upon receiving response, provides requested service through channel.

参考文章(11)
Charles Arthur Witschorik, Andrew Frederick Bulfer, Method for controlled access to a secured system ,(1997)
Kay L. Mueller, Francis T. Lynch, Cynthia B. Collins, Secure dial access to computer systems ,(1989)
Norbert Niebert, Georg Ratayczak, A method for securing access to a remote system ,(1998)
John William Palmer, Roy Philip Weber, John Babu Medamana, Authenticated communications access service ,(1989)
José Luis Ruiz Sanchez, José Luis Mariz Rios, Gsm security for packet data networks ,(2000)
Philip Meagher, A processing method and apparatus ,(2001)