. "As one can assume that any facility which incorporates a password or authorizing group of symbols was designed for access by authorized persons only, and each call-attempt by a hacker or other unauthorized person or computer to gain access to the target system blocks one port of entry for authorized users, it is desirable to develop a means of eliminating the potential for such activity." . . . .