摘要 |
<p>The computer (1) to be protected is connected to the remote terminal (7) via an electronic switch (4), modems (2, 6) and a telecommunications network (3), e.g. the public telephone network. When the remote terminal attempts to gain access to the computer, its first signal contains a code which is compared with authorisation codes by a separate microprocessor (5). If the code is authorised, the microprocessor opens the switch (4) and the transaction can be started. The microprocessor (5) can also change the codes at intervals by sending new data to the remote terminal. @(10pp Dwg.No.1/2)@.</p> |