CHALLENGER P3

CHALLENGER P3

Field programmable hardware security system for larger multi-location applications. A "quick fix" for maintenance ports or to secure entire enterprises.

$79.00

$79.00

Qty:


  • Quick, Defeats Bad Calls in ½ Second

  • No Additional User Sign-on Delays

  • Deceptively Easy To Use

  • No User Training Required

  • Transparent to the Hardware and Software

  • No AC Power or Batteries Required

  • Field Programmable (Switch Selection) for Adds or Changes

  • Any Unit can Act as a Lock and Key, Lock Only or Key Only

  • Configurations can vary by Location

  • Eliminate Outbound Calls (Switch selection)

  • Over 1 Billion Handshake Combinations that Change with each Call



Introduction
The Challenger P3 is a field programmable hardware authentication system for dial modem security. It operates on a LOCK and KEY principle similar to Locks and Keys in the home or office. Two nodes are required for a minimum system, but the P3s are geared toward larger multi-node systems. A P3 System can accommodate an unlimited number of nodes. The P3s are completely independent of the hardware and software. They can operate with PCs or MACs, Windows or Linux, with internal or external modems or even with fax machines or any analog equipment for that matter.

The P3 represents a very sophisticated authentication system that is deceptively simple to use. It offers unparalleled flexibility while maintaining a high degree of system integrity. There are over 1 billion handshake combinations that change with each call, resulting in an extremely high degree of authentication. No AC power or batteries are required. The units derive their power from the active TelCo lines.

The upgraded P3 has the same basic propriety time tested challenge/response technology used in the Challenger P2 with thousands of installations in a multitude of industries as well as the government. However, the P3s are basically oriented toward larger and more permanent types of installations. They incorporate additional configuration and programming options for expanded application requirements and they provide a more automated remote programming approach. Unlike the P2s, they do not require any additional manual intervention at the remote site when or if remote programming is necessary.

Operation
The small hardware boxes connect to the analog side of the operative modems with RJ-11s. Any call received by a modem with a Lock connected to it will be challenged for the presence of a proper Key at the calling end. If the Key is present, the call will be allowed to progress transparently with no additional delay or operator intervention. However, if there is no Key, or an invalid Key is detected, the call will be defeated within a ½ second and it will never be identified as a modem answered call by war dialers or other equipment.

Dip Switches Options
Any of the P3 auxiliary units can function as Locks, Keys or a combination of Locks and Keys. The following dip switch options are sure to provide an optimum configuration tailored to your application. In fact, the configurations can vary by locations.

Key Only - The P3 acts as a Key. Can call any "Locked location" or unprotected location. Inbound calls are received transparently.

Lock/Key - In this mode the P3 "Lock" Challenges the inbound calls for the presence of a proper Key. It also automatically becomes a Key on outbound calls. It can call other "Lock sites" or non-protected sites. (any to any, one to many or many to one).

Lock Only - The P3 acts as a Lock only (no auto transition to key), but can still call non-protected sites.

Lock Only XO - The P3 acts as a Lock only. Also prevents outbound calls.

Program Mode - Allows the P3 unit to be reprogrammed (Y/N), remotely or locally.

Programmer
The P3 Systems use a separate programmer to re-program the auxiliary P3s. Each programmer has a unique factory assigned "Base Code". The random extension of the "Base Code" is enabled via a dip switch on the programmer. Once the new "Full System Code" is locked in, the programmer can be used to reprogram any other P3 that is dip switch enabled and has the same "Base Code", including another programmer.

If additional P3 auxiliary units are added at a future date, they are shipped as "Virgins". The encrypted "Base Code" is also transferred as a part of the first programming operation. It cannot be changed thereafter. Hence it becomes part of your unique "base system".

One programmer is currently available. It is the P3-BP (Basic Programmer). It requires that the phone numbers be dialed manually, from either end, when or if remote reprogramming is necessary. Programming can also be accomplished locally "on the bench" by connecting to a phone line for power. An LED verifies the programming effort.

An automatic Programmer (P3-AP) is under development to help with the administration of your P3 network. It provides a more automated programming approach. It connects to the serial port of a PC and the supplied software will automatically dial your database of phone numbers and display the progress of the programming effort. It also has a "Direct Connect Port" so that connections to a phone line are not necessary when programming locally on the bench.

Corporate War Dialer
The P3-AP programmer is more than just an automated programming system. It can be used as a corporate war dialer to scan the P3 locations, or any locations. It can be used to verify that that the lines and the modems are functioning correctly. It can also identify rouge modems or other devices connected to the line. This stand alone war dialer function alone, may be worth the price of admission.

Ordering
The minimum system is composed of one programmer and two P3 auxiliary units, the "Starter Set". They are all factory programmed with the same "Base Code" and cannot be changed. If additional P3s are ordered with the initial order, they will also be programmed the same. This allows them to be used right out of the box.

For more information on the Challengers, check out the Challenger Family Page. Also check out security comments and questions that were "Heard at the Booth".
DEMONSTRATION

Should you be interested in placing a test call to see (hear) how the CHALLENGER handles unauthorized callers, simply dial (770) 945-7479 between 6:00 PM and 8:00 AM EST.


-style-type: disc;">No AC Power or Batteries Required



  • Field Programmable (Change or Add)

  • Any Unit can Act as a Lock or Key

  • Over 1 Billion Handshake Combinations that Change with each Call


Introduction
The Challenger P2 is a field programmable hardware authentication system for dial modem security. It operates on a LOCK and KEY principle similar to Locks and Keys in the home or office. Two nodes are required for a minimum system, but a system can accommodate as many nodes as are necessary. The P2s are completely independent of the hardware and software. They can operate with PCs or MACs with internal or external modems or even with fax machines or any analog equipment for that matter.

Operation
The matchbox sized hardware boxes (Lock and Keys) connect to the analog side of the operative modems with RJ-11s. Any call received by a modem with a Lock connected to it will be challenged for the presence of a proper Key at the calling end. If the Key is present, the call will be allowed to progress transparently with no additional delay or operator intervention. However, if there is no Key, or an invalid Key is detected, the call will be defeated within a ½ second and it will never be identified as a modem answered call by war dialers or other equipment.

Any of the units can function as Keys or as a Lock/Key combination. The Locks automatically turn into Keys when used to dial out. There are over 1 billion handshake combinations that change with each call, resulting in an extremely high degree of authentication. No AC power or batteries are required. The units derive their power from the active TelCo lines.

Programmable
There is only one "MASTER LOCK" within each "Secure System". It may be used as a functional Lock or Key, but it also carries a unique "System Code" and is used to program other auxiliary units if added, with the SAME code. It can also be used to CHANGE the code in all of the units; if any of the auxiliary units are lost or not returned by terminated employees. This can be done locally or remotely.

In spite of its small size and ease of use, the P2 represents a very sophisticated authentication system that is deceptively simple to use. It offers unparalleled flexibility while maintaining a high degree of system integrity.

It can be used alone or as a hardware front end to established password systems for secure "two factor authentication" in stationary or mobile applications. It provides a great way to quickly secure maintenance, telecommuter or any dial access ports without requiring any additional costly user training. Often the savings in training costs can justify the cost of the product.

For more information on the Challengers, check out the Challenger Family Page. Also check out security comments and questions that were "Heard at the Booth".



DEMONSTRATION
Should you be interested in placing a test call to see (hear) how the CHALLENGER handles unauthorized callers, simply dial (770) 945-7479 between 6:00 PM and 8:00 AM EST.


CHALLENGER P3 STARTER SET
Includes 1 P3-BP Programmer & 2 Auxiliary P3s
Item No SECP3-S Price $225.00


CHALLENGER P3 AUXILIARY UNITS
Item No SECP3-A Price $ 82.50

Physical 3.75" W x 2.25" D x .75" H, .5 lbs.
Connectors (3) RJ-11 TelCo
LEDs (1) Verify Connection
Switches (1) 4-Bit Dip (Lock or Key)
Bell None
Cable (1) 15" RJ-11 Phone Cable
Adapter None
AC Power None


P3-BP BASIC PROGRAMMER (additional)
Item No SECP3-BP Price $ 79.00

Physical 1.5" W x 3" D x .75" H, .25 lbs.
Connectors (2) RJ-11 TelCo
LEDs (1) Verify Connection
Switches (1) 4-Bit Dip
Bell None
Cable (1) 15" RJ-11 Phone Cable
Adapter None
AC Power None