Browse Prior Art Database

Secure Dial Access

IP.com Disclosure Number: IPCOM000039456D
Original Publication Date: 1987-Jun-01
Included in the Prior Art Database: 2005-Feb-01
Document File: 2 page(s) / 33K

Publishing Venue

IBM

Related People

Glennon, CW: AUTHOR [+3]

Abstract

A secure dial access system is provided by enabling an access code for dial terminals only during a Limited Time Access Window. An IBM Personal Computer (PC) with the Voice Communication Option installed is connected to a host computer. When a user dials in, the PC, along with a program on the host computer, will validate the users, and, using the Voice Option, read back a randomly generated access code. This code is then used for dial terminal access and is only active during the Limited Time Access Window. This window is controlled by the host system and set to a reasonable time needed by a user to make a dial connection. A PC is dedicated to answering incoming requests for access via a voice access card. This system operates as shown in the figure.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 75% of the total text.

Page 1 of 2

Secure Dial Access

A secure dial access system is provided by enabling an access code for dial terminals only during a Limited Time Access Window. An IBM Personal Computer (PC) with the Voice Communication Option installed is connected to a host computer. When a user dials in, the PC, along with a program on the host computer, will validate the users, and, using the Voice Option, read back a randomly generated access code. This code is then used for dial terminal access and is only active during the Limited Time Access Window. This window is controlled by the host system and set to a reasonable time needed by a user to make a dial connection. A PC is dedicated to answering incoming requests for access via a voice access card. This system operates as shown in the figure. The secure only access requires a user to have been assigned an "Access ID" and an "Access Code" for dial access. This data, along with the individual's system USERID, a status field, and a review date, are kept in a User Authorization table (UAUTH). If the user responds correctly after the phone is answered, an entry is built in a Temporary Authorization table (TAUTH). This entry contains the system USERID (from the UAUTH table), a randomly generated host access code, and an expiration time 'n' minutes (i.e., 10 minutes) beyond the time of entry creation. After receiving the host access code via voice from the PC, the user dials the host. Host system code verifies that the USERID is in the TAUTH...