Illegal access preventing program, apparatus, and method
First Claim
1. A computer-readable medium having an illegal access preventing program stored therein for controlling a computer having an operation describing file storing an operation sequence corresponding to normal operations of a plurality of business applications to execute operations, comprising:
- implementing a container function as an execution base of the plurality of business applications;
providing an inspection log function in the container function to acquire operation logs of the business applications; and
implementing an application supervising function executing a process in accordance with a comparison resulting from comparing an operation sequence of the business applications in the container function with the operation sequence during the normal operations stored in the operation describing file with reference to the operation logs recorded in the inspection log function.
2 Assignments
0 Petitions
Accused Products
Abstract
An unauthorized or illegal access preventing system implementing security procedures to an application layer without having to rely on business applications of an application server having a web container. The illegal or unauthorized access supervising system includes an operation describing file storing operation sequence of a normal operation of a business application, a web container as the execution base of a plurality of business applications, an inspection log function provided to the web container to acquire an operation log of the business applications, and an application supervising function executing an operation in accordance with a comparison result by comparing, with reference to the log stored in the inspection log function, the operation sequence of the business applications of the web container with the operation sequence of the normal operation stored in the operation describing file.
-
Citations
20 Claims
-
1. A computer-readable medium having an illegal access preventing program stored therein for controlling a computer having an operation describing file storing an operation sequence corresponding to normal operations of a plurality of business applications to execute operations, comprising:
-
implementing a container function as an execution base of the plurality of business applications;
providing an inspection log function in the container function to acquire operation logs of the business applications; and
implementing an application supervising function executing a process in accordance with a comparison resulting from comparing an operation sequence of the business applications in the container function with the operation sequence during the normal operations stored in the operation describing file with reference to the operation logs recorded in the inspection log function. - View Dependent Claims (2, 3, 6, 7, 8, 11)
-
-
4. An illegal access preventing program for controlling a computer having a rule file storing an irregular operation sequence of input and output operations to execute operations, comprising:
-
implementing a container function as an execution base of a plurality of business applications;
providing an inspection log function acquiring logs of input to and output from the container function; and
implementing an input/output supervising function executing a process in accordance with a comparison resulting from comparing an input and output operation sequence of the container function with the irregular operation sequence stored in the rule file with reference to the logs of input and output stored in the inspection log function. - View Dependent Claims (5, 9, 10)
-
-
12. An apparatus for preventing an illegal access having an operation describing file storing an operation sequence corresponding to normal operations of a plurality of business applications to execute operations, comprising:
-
a container unit provided as an execution base of the plurality of business applications;
an inspection log unit provided to the container unit to acquire operation logs of the business applications; and
an application supervising unit executing a process in accordance with a comparison resulting from comparing an operation sequence of the business applications in the container function with the operation sequence during the normal operations stored in the operation describing file with reference to the operation logs recorded in the inspection log function.
-
-
13. A method of controlling access to an application server having a plurality of business applications, comprising:
-
storing operation sequences of normal operations of the business applications; and
enabling an access to the application server upon determining that an operation log of at least one of the business applications matches one of the stored operation sequences. - View Dependent Claims (14, 15)
-
-
16. A method of authorizing an access to an application server storing business applications and connected with a network, comprising:
-
determining whether an input field of an HTTP request corresponds to predetermined data in a rule file; and
authorizing an access to the application server when the input field of the HTTP request matches the predetermined data in the rule file. - View Dependent Claims (17)
-
-
18. A system for detecting an unauthorized access to an application server having multiple business applications, comprising:
-
a storage unit storing an operation describing file having respective operation sequences of normal operations of the multiple business applications; and
an application supervising unit determining whether an operation sequence in an operation log of any one of the business applications matches a respective operation sequence in the operation describing file to detect the unauthorized access. - View Dependent Claims (19)
-
-
20. An apparatus for detecting an unauthorized access to an application server having multiple business applications, comprising:
-
means for storing an operation describing file having respective operation sequences of normal operations of the multiple business applications; and
means for determining whether an operation sequence in an operation log of any one of the business applications matches a respective operation sequence in the operation describing file to detect the unauthorized access.
-
Specification