Method and apparatus for detecting unauthorized-access, and computer product
First Claim
Patent Images
1. An unauthorized-access detecting apparatus that detects unauthorized access to a server that provides a service via a network, comprising:
- a storing unit that stores a series of process requests as an unauthorized-access event string, the process requests made by an unauthorized user via an unauthorized client; and
a judging unit that compares a new process request with the unauthorized-access event string stored in the storing unit, and judges whether the new process request is the unauthorized access based on a result of comparison.
1 Assignment
0 Petitions
Accused Products
Abstract
An unauthorized-access detecting apparatus that detects unauthorized access to a server that provides a service via a network includes a storing unit that stores a series of process request, which is made by an unauthorized user via an unauthorized client, as an unauthorized-access event string; and a judging unit that compares a new process request with the unauthorized-access event string stored in the storing unit, and judges whether the process request is the unauthorized access based on a result of comparison.
-
Citations
21 Claims
-
1. An unauthorized-access detecting apparatus that detects unauthorized access to a server that provides a service via a network, comprising:
-
a storing unit that stores a series of process requests as an unauthorized-access event string, the process requests made by an unauthorized user via an unauthorized client; and
a judging unit that compares a new process request with the unauthorized-access event string stored in the storing unit, and judges whether the new process request is the unauthorized access based on a result of comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An unauthorized-access detecting method comprising:
-
storing a series of process requests as an unauthorized-access event string, the process requests made by an unauthorized user via an unauthorized client;
comparing a new process request with the unauthorized-access event string stored, and judging whether the new process request is the unauthorized access based on a result of comparison. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable recording medium that stores a computer program for detecting an unauthorized-access, the computer program makes the computer execute:
-
storing a series of process requests as an unauthorized-access event string, the process requests made by an unauthorized user via an unauthorized client;
comparing a new process request with the unauthorized-access event string stored, and judging whether the new process request is the unauthorized access based on a result of comparison. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification