Computer security system for a time shared computer accessed over telephone lines
First Claim
1. A computer security system for preventing unauthorized access to a central computer, said central computer being remotely accessed through conventional telephone lines and through a conventional telephone switching system, said telephone switching system, characterized by automatic generation within said telephone switching system of unique identifying information corresponding to a remote caller accessing said central computer through said telephone switching system, said computer security system comprising:
- an offsite security computer coupled to said telephone switching system for automatically receiving said identifying information relating to said remote caller, said offsite security computer includes a comparator for comparing said unique identifying information obtained from said telephone switching system corresponding to said remote caller with corresponding file information identifying all authorized users of said central computer system; and
file means for storing said file information corresponding to authorized users of said central computer, said file means coupled to said offsite security computer and for providing said file information to said comparator within said offsite security computer for comparison with said unique identifying information generated by said telephone switching system, wherein said offsite security computer generates and transmits to said central computer an acknowledgment signal if said identifying information and file information are exactly identical, and generates and transmits to said central computer a negative acknowledgment signal when said identifying information and file information are not exactly identical, whereby said remote caller to said central computer cannot gain access to said central computer unless calling from a specified location which specified location is uniquely identified by user nonalterable information.
2 Assignments
0 Petitions
Accused Products
Abstract
A time-shared central computer can be protected from access from unauthorized users by utilizing automatic tracing equipment included within telephone switching systems, in combination with an independently organized offsite security computer system. The user, seeking to access the central computer through a telephone system, automatically causes his telephone number to be generated within the telephone system and sent to the offsite security computer. Meanwhile, the user provides the time-shared, central computer with a password which is used to address a memory which includes file information on all authorized users. The file information which includes the telephone number of all authorized users, is made available in the offsite security computer for comparison with the telephone number corresponding to the calling user as provided by the telephone switching system. A match indicates that a user, in possession of preauthorized password, is calling from appropriate telephone station. In this case, access is permitted, otherwise access to the central computer will be denied. By using a user nonalterable telephone number, generated in the telephone switching system, falsification of an authorized users identify is prevented. In addition, tampering with the security procedure is prevented by organizing the offsite security computer in such a manner that the user has no access to the system program of the offsite security computer either directly or through the central computer.
-
Citations
26 Claims
-
1. A computer security system for preventing unauthorized access to a central computer, said central computer being remotely accessed through conventional telephone lines and through a conventional telephone switching system, said telephone switching system, characterized by automatic generation within said telephone switching system of unique identifying information corresponding to a remote caller accessing said central computer through said telephone switching system, said computer security system comprising:
-
an offsite security computer coupled to said telephone switching system for automatically receiving said identifying information relating to said remote caller, said offsite security computer includes a comparator for comparing said unique identifying information obtained from said telephone switching system corresponding to said remote caller with corresponding file information identifying all authorized users of said central computer system; and file means for storing said file information corresponding to authorized users of said central computer, said file means coupled to said offsite security computer and for providing said file information to said comparator within said offsite security computer for comparison with said unique identifying information generated by said telephone switching system, wherein said offsite security computer generates and transmits to said central computer an acknowledgment signal if said identifying information and file information are exactly identical, and generates and transmits to said central computer a negative acknowledgment signal when said identifying information and file information are not exactly identical, whereby said remote caller to said central computer cannot gain access to said central computer unless calling from a specified location which specified location is uniquely identified by user nonalterable information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer security system comprising:
-
a plurality of remote user sites; a telephone switching system particularly characterized by including means for generating uniquely identifying information corresponding to each one of said plurality of remote user sites when a call is placed through said corresponding remote user site through said telephone switching system; and a central computer system coupled to said telephone switching system for communication with said remote user sites; and an offsite security computer coupled to said means for generating said uniquely identifying information within said telephone switching system, said offsite security computer coupled to said central computer system, said offsite security computer including a comparator for comparing said unique identifying information generated by said telephone switching system with selected file information to generate and communicate to said central computer system a signal indictive of whether an exact match between said unique identifying information and said file information has been achieved, said central computer system permitting access only when offsite security computer indicates an exact match, whereby access to said central computer from said plurality of remote user sites through said telephone switching system is permitted only when said unique identfying information generated in said telephone switching system matches a preauthorized file information record. - View Dependent Claims (11, 12, 13)
-
-
14. A method for providing security for a central computer system remotely accessed through conventional telephone lines and a conventional telephone switching system, said telephone switching system characterized by automatic generation of unique identifying information corresponding to a remote caller accessing said central computer through said telephone switching system, said method comprising the steps:
-
generating said unique identifying information in said telephone switching system; communicating said unique identifying information to an offsite security computer coupled to said telephone switching system, said identifying information relating to said remote caller; selectively reading file information corresponding to authorized users of said central computer from a file means used for storing said file information, said means being coupled to said offsite security computer; providing said file information from said file means to the comparator included within said offsite security computer; comparing said file information and said unique identifying information within said comparator to determine whether or not said file information and said unique identifying information exactly match; generating an acknowledgment signal within an offsite security computer; and
,communicating an acknowledgment signal from said offsite security computer to said central computer to indicate whether or not access to said central computer from said remote caller is allowed, whereby said remote caller cannot alter said unique identifying information to gain access to said central computer. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer security system for preventing unauthorized access to a central computer, said central computer being remotely accessed through conventional telephone lines and through a conventional telephone switching system, said telephone switching system, characterized by automatic generation within said telephone switching system of unique identifying information corresponding to a remote caller accessing said central computer through said telephone switching system, said computer security system comprising:
-
a security computer coupled to said telephone switching system for automatically receiving said identifying information relating to said remote caller, wherein said security computer includes a comparator for comparing said unique identifying information obtained from said telephone switching system corresponding to said remote caller with corresponding file information identifying all authorized users of said central computer system; and file means for storing said file information corresponding to authorized users of said central computer, said file means coupled to said security computer and for providing said file information to said comparator within said security computer for comparison with said unique identifying information generated by said telephone switching system, wherein said security computer generates an acknowledgment signal if said identifying information and file information are exactly identical, and generates a negative acknowledgment signal when said identifying information and file information are not exactly identical, whereby said remote caller to said central computer cannot gain access to said central computer unless calling from a specified location, which specified location is uniquely identified by user nonalterable information. - View Dependent Claims (24)
-
-
25. A computer security system comprising:
-
a plurality of remote user sites; a telephone switching system particularly characterized by including means for generating unique identifying information corresponding to each one of said plurality of remote user sites when a call is placed from said corresponding remote user site through said telephone switching system; and a central computer system coupled to said telephone switching system for communicating with said remote user sites, central computer system coupled to said means for generating said unique identifying information within said telephone switching system, said central computer system including a comparator for for comparing said unique identifying information generated by said telephone switching system with selected file information to generate a signal indicative when an exact match between said unique identifying information and said file information has been achieved, said central computer system permitting access only when said unique identifying information generated in said telephone switching system matches a preauthorized file information record.
-
-
26. A method for providing security for a central computer system remotely accessed through conventional telephone lines and through a conventional telephone switching system, said telephone switching system characterized by automatic generation of unique identifying information corresponding to a remote caller accessing said central computer through said telephone switching system, said method comprising the steps:
-
generating said unique identifying information in said telephone switching system; communicating said unique identifying information to said central computer system coupled to said telephone switching system, said identifying information relating to said remote caller; selectively reading file information corresponding to authorized users of said central computer from a file means used for storing said file information, said file means being included in said central computer system; providing said file information from said file means to the comparator included within said central computer system; comparing said file information and said unique identifying information within said comparator to determine whether or not said file information and said unique identifying information exactly match; and generating an acknowledgement signal within said central computer system, to indicate whether or not access to said central computer from said remote caller is allowed, whereby said remote caller cannot alter said unique identifying information to gain access to said central computer
-
Specification