(3 Models Available)



Can Easily Be Added To Your Current Password System For Secure Two-Factor Authentication or Use as a Stand Alone System

The Challenger family of dial-line security products is developed around a series of modular hardware components. It authenticates the calling party through a series of dynamically changing encrypted handshakes prior to allowing completion of the connection.

The hardware components connect between the analog side of the operative modems and the telephone lines. Matchbox sized User Keys are used to provide the callers identification to a "called unit", which challenges any inbound call. The User Keys are powered from the telephone lines and may be used for portable or permanent installations. Although, the Challenger family was primarily developed for dial modem connected networks, it can also be used to verify voice or FAX calls.

All of the products in the CHALLENGER FAMILY share the same DESIGN OBJECTIVES:

AVOIDANCE NOT CONFRONTATION. Challenger eliminates unauthorized calls before they can connect rather than challenging them after they connect. This also defeats "War Dialers", one of the common hacker prospecting tools that is used to identify and log modem answered calls from a list of dialed numbers.

HARDWARE, SOFTWARE, and PROTOCOL TRANSPARENT. Challenger can be used with any internal or external modem that connects any terminal, PC, workstation, server or mainframe computer to an analog dial telephone line.

TRANSPARENT TO THE USER. Challenger is completely transparent to the legitimate users. It does not require any cumbersome user codes or passwords or other sign-on exercises to be performed, nor does it require any additional time to authenticate the legitimate calls. The hardware does the work, not the user.

Challenger represents a unique approach to the traditional "challenge response" type dial-line authenticating security systems. Because it operates on the analog side of the modems, it is quicker, simpler, easier to use, hardware and software independent and best of all, it is about half the price of the traditional systems that offer similar functions. It is also less redundant and more complementary to the newer software security products when used with them.

The Challenger currently is offered in three models:

  1. CHALLENGER P2. Field programmable "matchbox" sized "Lock and Key" system. Any unit can operate as a Lock or a Key. Can be programmed locally & remotely from the MASTER SYSTEM LOCK. It is primarily oriented toward individuals or small groups that have the need to dial into a single secure central location that may have one or more phone lines. Great for maintenance port security too.
  2. CHALLENGER P2 Bi-LEVEL ACCESS SYSTEM (P2 BAS). Adding to the Challenger P2, is the ability to secure groups of modems where a Master Level of access is required. It allows the subject equipment to be securely accessed by its own group of users as well as by the manufacturer or third party maintenance firm through a "Master Key" that has access to all of the secure user groups.
  3. STANDARD CHALLENGER. This is a user programmable system with audit and utilization reporting capability. It is designed to secure modem pools from 1 to 64 modems at a single central location; although secure access to as many as three alternate systems can also be enabled. Access by any of the USER KEYs can be enabled or disabled from the control unit at the central sit