Home
General Products
Unisys Products
Articles
Helpful Links
Mail List
Ordering Info
Search
Tech Tips
Warranty
Discounts
Wish List

 

Telephone Line Sharing
Dial Security
Dial Security Product Selection Guide
ReBooting & Remote AC Power Control
Remote Switching
RS-232 Products

CPS - Products

 

CHALLENGER P2 Bi-LEVEL ACCESS SYSTEM (P2 BAS)
Hardware Security System for Maintenance Modems
Or Any Secure Grouping Application that also Requires Secure MASTER LEVEL Access

 

P2 BAS Picture Use For:
  1. Stationary or Mobile Applications
  2. Securing Maintenance Ports
  3. Securing Enterprise Wide User Groups
  4. "Two Factor Authentication" when used with current Password Systems

APPLICATION DIAGRAM

P2 BAS Application Diagram


DESCRIPTION

  • Quick, Defeats Bad Calls in ½ Second
  • No Additional User Sign-On Delays
  • Deceptively Easy To Use
  • No User Training Required
  • Transparent to the Hardware and Software
  • No AC Power or Batteries Required
  • Field Programmable (Change or Add)
  • Any "Group Unit" can Act as a Lock or Key
  • Over 1 Billion Handshake Combinations that Change with each Call
Introduction
The Challenger P2 BAS (Bi-Level Access System) was primarily designed to provide absolute authentication type of security for remote dial-line maintenance applications. However, it may also be used in any application where secure groups of modems may also require a Master Level of access. It allows the subject equipment to be securely accessed by its own group of users as well as by the manufacturer or third party maintenance firm through a "Master Key" that has access to all of the secure user groups.

Operation
The entire system operates on a LOCK and KEY principle similar to Locks and Keys in the home or office. The matchbox sized hardware boxes (Locks and Keys) connect to the analog side of the operative modems with RJ-11s. They are completely independent of the hardware (internal/external modems or terminal equipment) and the associated software. No AC power or batteries are required. The units derive their power from the TelCo lines when they become active.

Any call received by a modem with a Lock connected will be challenged for the presence of a proper "Group Key" or "Master Key" at the calling end. If the Key is present, the call will be allowed to progress transparently with no additional delay or operator intervention. However, if there is no Key or a wrong Key is detected, the call will be defeated within a ½ second and it will never be identified as a modem answered call by war dialers or other equipment. This allows the subject modems to remain powered on and available without fearing that hackers, ex-employees, or wrong numbers may gain access to the system.

There are over 1 billion handshake combinations between the units that change with each call, resulting in an extremely high degree of authentication.

Programmable
Each of the P2 units in the group can function as a Lock or a Key. The Locks, automatically become Keys when used to dial to another member of their group. They are transparent when dialing the outside world. A Master Lock within each "Secure Group" can also be used to change the security code or program additional units within the group. However, the Master Key maintains access to any of the Locks in any group through another level of access that is factory programmed. Any of the "secure user groups" can have as many Locks or Keys as may be necessary and a "secure system" may have an unlimited number of unique user groups.

In spite of its small size and ease of use, the P2 BAS represents a very flexible and very effective authentication system that is deceptively simple to use. It can be used alone or as a hardware front end to established password systems providing "two factor authentication" in stationary or mobile applications. It is a great way to quickly secure dial access without requiring any additional costly user training. Often the savings in training cost can justify the cost of the product.

For more information on the Challengers, check out the Challenger Family Page. Also check out security comments and questions that were "Heard at the Booth".


DEMONSTRATION

Should you be interested in placing a test call to see (hear) how the CHALLENGER handles unauthorized callers, simply dial (770) 945-7479 between 6:00 PM and 8:00 AM EST.


SPECIFICATIONS

CHALLENGER P2 BAS SET (Master Lock & 1 Auxiliary Unit)
Item No SECP2BA-S   Price $175.00

MASTER LOCK
Physical    1.5" W x 3" D x .75" H, .25 lbs.
Connectors  (2) RJ-11 TelCo
LEDs        (1) Verify Connection
Switches    (1) 4-Bit Dip
Bell        None
Cable       (1) 15" RJ-11 Phone Cable
Adaptor     None
AC Power    None


CHALLENGER P2 BAS AUXILIARY UNIT
Item No SECP2BA-A   Price $ 99.00

Physical    1.5" W x 3" D x .75" H, .25 lbs.
Connectors  (2) RJ-11 TelCo
LEDs        (1) Verify Connection
Switches    (1) Slide (Lock or Key)
Bell        None
Cable       (1) 15" RJ-11 Phone Cable
Adaptor     None
AC Power    None


CHALLENGER P2 BAS MASTER KEY
Item No SECP2BA-K   Price $ 99.00

Physical    1.5" W x 3" D x .75" H, .25 lbs.
Connectors  (2) RJ-11 TelCo
LEDs        (1) Verify Connection
Switches    None
Bell        None
Cable       (1) 15" RJ-11 Phone Cable
Adaptor     None
AC Power    None

 

Computer Peripheral Systems, Inc.
5096 Bristol Industrial Way, Suite B
Buford, GA 30518
Sales
1-800-888-0051
8:30 AM - 5:30 PM EST
Technical Support
(770) 945-0643
8:30 AM - 5:30 PM EST
Fax
(770) 945-9342
E-Mail
sales@cpscom.com


© Copyright 1996-2003  Computer Peripheral Systems, Inc.
This file last modified August 25, 2003