Those preferring to offer DISA should consider adding safeguards such as a barrier code, which is another password, as well as ensuring that passwords or authorization codes
are as long as possible.
LPI's Synchronous Code Generation technology enables secure charging without expensive networks, and the Interactive Voice Recognition system delivers charging authorization codes
over the cellular network.
The Hydra PC implements a Host Authorization Code
mechanism, a unique SPYRUS technological breakthrough, so the Hydra PC will only function when used with computer platforms authorized by administrative policy.
The Medical Center's employees travel frequently between the 11 sites incurring authorization code
charges at all of the sites.
Finally, the user is sent an authorization code
via email, which they enter into the DoD TechMatch system to finalize the registration process.
Each call requires an individual authorization code
, and the service tracks IP addresses and telephone numbers to prevent abuse or unauthorized use of the system.
Nor does the merchant have to call to input an authorization code
Inside the package will be an authorization code
and a list of additional songs that can be downloaded from charitydownload.
The transaction request is evaluated against the pharmaceutical company's business rules and an authorization code
Call Detail Records have also been expanded to capture new information fields, specifically dialed digits (as dialed by the end-user), network translated address (dialed number following translation by the application server and network server), account code and authorization code
Dialogue's dynamic charting provides the customer with a visual representation of calls by authorization code
An Internal Auditron feature can be activated to require people to enter an authorization code
for walk-up copying.
Students can use any IP phone on campus, type in an authorization code
to make a call, and the cost will be deducted from their account.
The successful proposer will make available reports to the City detailing all transaction activity, including authorization codes
for each transaction.
That program uses security within the user app authentication process and registration rather than temporary authorization codes