Illegal communication detector, illegal communication detector control method, and storage medium storing program for illegal communication detector control
First Claim
1. An illegal communication detector that is mounted in a communication path between specific devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the illegal communication detector comprising:
- a recorder that records at least part of information transmitted from the specific devices to the protection-targeted device;
a detector that regards one of the specific devices as a device of interest and detects, when at least part of the recorded information transmitted from the device of interest complies with a predetermined illegal communication standard rule, that the contents of communication are derived from an illegal communication.
2 Assignments
0 Petitions
Accused Products
Abstract
An illegal communication detector that is mounted in a communication path between external devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the illegal communication detector including: a recording unit that records at least part of information transmitted from the external devices to the protection-targeted device; a determination unit that regards one of the external devices as a device of interest; and a communication control unit that detects, if the determination means conclude that at least part of the recorded information complies with the predetermined illegal communication standard rule, that the contents of communication are derived from an illegal communication, and performing a predetermined process concerning the communication with the device of interest.
121 Citations
19 Claims
-
1. An illegal communication detector that is mounted in a communication path between specific devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the illegal communication detector comprising:
-
a recorder that records at least part of information transmitted from the specific devices to the protection-targeted device;
a detector that regards one of the specific devices as a device of interest and detects, when at least part of the recorded information transmitted from the device of interest complies with a predetermined illegal communication standard rule, that the contents of communication are derived from an illegal communication. - View Dependent Claims (2, 3, 4, 14)
-
-
5. An illegal communication detector that is mounted in a communication path between specific devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the illegal communication detector comprising:
-
a recorder that records at least part of information transmitted from the specific devices to the protection-targeted device;
a memory that stores information about conditions for the communication from each of the specific devices;
a detector that regards one of the specific devices as a device of interest and detects, when at least part of the recorded information transmitted from the device of interest complies with the information about the conditions for the communication, that the contents of communication are derived from an illegal communication. - View Dependent Claims (6, 7, 8)
-
-
9. An illegal communication detector that is mounted in a communication path between specific devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the illegal communication detector comprising:
-
a recorder that records at least part of information transmitted from the specific devices to the protection-targeted device;
a detector that regards one of the specific devices as a device of interest and detects, when at least part of the recorded information transmitted from the device of interest complies with a predetermined illegal communication standard rule, that the contents of communication are derived from an illegal communication a communication controller that performs a predetermined process concerning the communication with the device of interest. - View Dependent Claims (10, 11, 12, 13)
-
-
15. An illegal communication detector that is included in a system providing communication between a first network and a second network to monitor contents of communications delivered from a device in the first network to a protection-targeted device that is in the second network, the illegal communication detector comprising:
-
a recorder that records at least part of information transmitted from the specific devices to the protection-targeted device;
a detector that regards one of the specific devices as a device of interest and detects, when at least part of the recorded information transmitted from the device of interest complies with a predetermined illegal communication standard rule, that the contents of communication are derived from an illegal communication.
-
-
16. A method for controlling an illegal communication detector that is mounted in a communication path between external devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the method comprising:
-
recording at least part of information transmitted from the external devices to the protection-targeted device;
regarding one of the specific devices as a device of interest;
detecting, when at least part of the recorded information transmitted from the device of interest complies with a predetermined illegal communication standard rule, that the contents of communication are derived from an illegal communication.
-
-
17. A method for controlling an illegal communication detector that is mounted in a communication path between external devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the method comprising:
-
recording at least part of information transmitted from the specific devices to the protection-targeted device;
regarding one of the specific devices as a device of interest;
detecting, when at least part of the recorded information transmitted from the device of interest complies with the information about the conditions for the communication from each of the specific devices, that the contents of communication are derived from an illegal communication.
-
-
18. A method for controlling an illegal communication detector that is mounted in a communication path between external devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the method comprising:
-
recording at least part of information transmitted from the specific devices to the protection-targeted device;
regarding one of the specific devices as a device of interest;
detecting, when at least part of the recorded information transmitted from the device of interest complies with a predetermined illegal communication standard rule, that the contents of communication are derived from an illegal communication performing a predetermined process concerning the communication with the device of interest.
-
-
19. A storage medium readable by a computer, the storage medium storing a program of instructions executable by the computer, which causes an illegal communication detector mounted in a communication path between external devices and a protection-targeted device for monitoring contents of communications delivered to the protection-targeted device to perform a function, the function comprising:
-
recording at least part of information transmitted from the external devices to the protection-targeted device;
regarding one of the specific devices as a device of interest;
detecting, when at least part of the recorded information transmitted from the device of interest complies with a predetermined illegal communication standard rule, that the contents of communication are derived from an illegal communication.
-
Specification