Remote Security Anchoring of Remote User Identification
Original Publication Date: 1988-May-01
Included in the Prior Art Database: 2005-Feb-15
A technique is described whereby access to computer services is provided additional security between remote secured processors and local host processors. The concept provides a method of remote security anchoring utilizing user identification protocols and remote protected processors. Access to computer services from remote locations is a common and valuable aspect of modem-connected computer systems. Such computer systems typically use a procedure to verify a user's identity and that the user is authorized to gain access to computer services. Remote- access terminal security software is typically provided with the required authorization procedures.