Control method, control program, and control system
First Claim
1. A computer-implemented control method, comprising:
- identifying an abnormal level according to abnormal level reference data stored in advance in an abnormal level reference data storage, from context relating to abnormalities, which has been collected in advance and stored in a context storage; and
converting the identified abnormal level to an authentication strength level according to a predetermined authentication strength level setting rule, and causing an authentication server to carry out an authentication processing corresponding to said authentication strength level.
1 Assignment
0 Petitions
Accused Products
Abstract
This invention is to appropriately cope with abnormal states. A control method according to the present invention includes: identifying an abnormal level according to abnormal level reference data stored in advance in an abnormal level reference data storage, from context relating to abnormalities, which has been collected in advance and stored in a context storage; and converting the identified abnormal level to an authentication strength level according to a predetermined authentication strength level setting rule, and causing an authentication server to carry out an authentication processing according to the authentication strength level. By carrying out such a processing, it becomes possible to cause the authentication server to carry out an authentication having an authentication strength level corresponding to an abnormal state.
-
Citations
24 Claims
-
1. A computer-implemented control method, comprising:
-
identifying an abnormal level according to abnormal level reference data stored in advance in an abnormal level reference data storage, from context relating to abnormalities, which has been collected in advance and stored in a context storage; and
converting the identified abnormal level to an authentication strength level according to a predetermined authentication strength level setting rule, and causing an authentication server to carry out an authentication processing corresponding to said authentication strength level. - View Dependent Claims (2, 5, 6, 7, 8, 9, 11, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
3. A computer-implemented control method, comprising:
-
identify an abnormal level according to abnormal level reference data stored in advance in an abnormal level reference data storage, from context relating to abnormalities, which has been collected in advance and stored in a context storage; and
converting the identified abnormal level to a connection priority including reject of a connection setup request according to a predetermined connection control rule, and setting said connection priority to an equipment. - View Dependent Claims (4, 10, 12)
-
-
21. A program embodied on a medium, for causing a computer to carry out a control processing, comprising:
-
identifying an abnormal level according to abnormal level reference data stored in advance in an abnormal level reference data storage, from context relating to abnormalities, which has been collected in advance and stored in a context storage; and
converting the identified abnormal level to an authentication strength level according to a predetermined authentication strength level setting rule, and causing an authentication server to carry out an authentication processing corresponding to said authentication strength level.
-
-
22. A program embodied on a medium, for causing a computer to carry out a control processing, comprising:
-
identify an abnormal level according to abnormal level reference data stored in advance in an abnormal level reference data storage, from context relating to abnormalities, which has been collected in advance and stored in a context storage; and
converting the identified abnormal level to a connection priority including reject of a connection setup request according to a predetermined connection control rule, and setting said connection priority to an equipment.
-
-
23. A control apparatus, comprising:
-
a unit that identifies an abnormal level according to abnormal level reference data stored in advance in an abnormal level reference data storage, from context relating to abnormalities, which has been collected in advance and stored in a context storage; and
a converter that converts the identified abnormal level to an authentication strength level according to a predetermined authentication strength level setting rule, and causes an authentication server to carry out an authentication processing corresponding to said authentication strength level.
-
-
24. A control apparatus, comprising:
-
a unit that identifies an abnormal level according to abnormal level reference data stored in advance in an abnormal level reference data storage, from context relating to abnormalities, which has been collected in advance and stored in a context storage; and
a converter that converts the identified abnormal level to a connection priority including reject of a connection setup request according to a predetermined connection control rule, and sets said connection priority to an equipment.
-
Specification