作者: Michael R. Horton
DOI:
关键词:
摘要: A system using mobile devices and a network provides access authentication, authorization accounting to computing resources two-person rule solution approach. central control server coordinates rule-based process in which requesting user one or more authorizing users are engaged real-time communications facilitate approved sensitive resource. The technique utilizes cellular interfaces location service technologies, while also providing traditional security measures of voice visual verification identities.