General Products
Unisys Products
Helpful Links
Mail List
Ordering Info
Tech Tips
Wish List


Telephone Line Sharing
Dial Security
Dial Security Product Selection Guide
ReBooting & Remote AC Power Control
Remote Switching
RS-232 Products

CPS - Article
Dial Security and Remote ReBooting
Innovative Data and Telephony Products
Dial & LAN Security - Telephone Line Sharing - RS-232 - Remote Maintenance - ReBooting

Recently, we have introduced several new flavors of dial security and remote rebooting products. I thought this might be a good time to review them and clarify their functions and prices.

The popular Challenger product line is the basis of our dial security family of products. The same "challenge response" concept to authenticate the caller is shared throughout the product line.

Best liked features
One of the most touted features about the Challenger concept is that the products are the most user friendly, relative to other options.

They are completely transparent to the caller. Other more costly systems require several frustrating minutes to sign-on to an overly complicated control unit without appreciably increasing the level of authentication. Multiply that by the number of sign-ons and you could be looking at a substantial loss of productivity as well as more irritable employees or customers.

This initial frustration may also be compounded by the potential for dead batteries, loss of synchronization, forgotten passwords, transposition errors, etc., which are characteristics of other systems.

Another notable feature is that unauthorized calls are never recognized as modem answered calls by war dialers.

It's a pretty sinking feeling to see your unlisted modem numbers publicized with a hacker help message attached, but this is happening every day. The phone numbers are being picked up by war dialers or published by vindictive employees, ex-employees and competitors.

Even if the perpetrators are not successful in penetrating your system, a denial of service attack may still be mounted by simply busying the identified modems for extended periods. The Challenger defeats these types of calls in less than ½ second. Some models also log these events along with the caller's ID.

However, this may be a fortunate wakeup call if you become aware of it. The most devastating hacks are those that you are not aware of. Leaving open modems today is like playing Russian Roulette.

The general customer reaction over time is that the Challenger products are economical and a deceptively easy to use while providing a high degree of authentication.

CPS developed this unique concept about six years ago and with thousands of installations, no one has cracked the system or duplicated the concept. However, we have adapted it to fit the changing market conditions and customer requirements.

Challenger P2 BAS
P2 BAS Picture
Provides two levels of secure access

Challenger P2-BAS
The latest version, the Challenger P2 BAS (Bi-Level Access System) was primarily designed for remote dial maintenance applications where a "master level" of access (the vendor) may be required to securely access various customer systems. The customers, in turn, have secure access only to their machines.

The P2 BAS can also be used in any application where secure access is restricted to different groups while allowing "executive level" access to all of the groups.

Challenger P2 Application Diagram

Most of the Challenger hardware is now field programmable. If a KEY is lost or someone leaves without returning their KEY, it can either be defeated or the remaining KEYs can be reprogrammed to render the missing KEY useless.

The hardware is available in different models. The following chart provides a quick overview of the Challenger family of products.

Dial Security Products

Model Where to use Programming Price
19" "central site" rack mount unit; up to 64 modems + serial port for reports
To secure centralized modem banks. Usage logs and failed attempts. Front panel push buttons or through the serial port PC connection. 8 port 19" rack - $1195.00
Module for each line - $75.00
8 port expansion modules - $1095.00
User Keys - $79.00 to $55.00
Small match box sized Locks/Keys. Any unit can access any other unit in the system. Unlimited nodes.
Small networks
Dispersed Networks
Maintenance ports
With MASTER LOCK, which also acts as a programmer. SET (Master Lock & Key) - $150.00
Each additional unit - $79.00-$55.00
Same as P2, but with MASTER KEY access to any of the secure groups.
Maintenance ports or where "executive access" to any secure group is required. MASTER LOCK to program the groups.
Factory for MASTER KEY
SET (Master Lock and Key) - $175.00
Each additional unit - $99.00-$75.00
Master KEY - $99.00 each
Single line Lock that recognizes hardware KEY or Caller ID as authentication. Excellent reports. Can chain up to 8 units.
For mobile (KEY) or fixed location (CID) access. Or use for reports only (usage or failed attempts + Caller ID). With a PC connected to the serial port. Also used for reports. TLC - $295.00
KEYs (if used) - $79.00-$55.00
Touch-Tone password security unit. Answers the line and waits for the Touch-Tone password. Hides modems from war-dialers.
Small networks
"Pest" control
Maintenance ports
Touch-Tone remotely or locally. CHL TT - $135.00
MINI FIREWALL When a modem and NIC are in the same machine. NA - Disconnects the LAN when the modem is in use. MFW - $85.00

Check out the latest on our Secure Remote Rebooting Products.


Computer Peripheral Systems, Inc.
5096 Bristol Industrial Way, Suite B
Buford, GA 30518
8:30 AM - 5:30 PM EST
Technical Support
(770) 945-0643
8:30 AM - 5:30 PM EST
(770) 945-9342

© Copyright 1996-2003  Computer Peripheral Systems, Inc.
This file last modified September 9, 2003