UNAUTHORIZED ACCESS DETECTING SYSTEM AND UNAUTHORIZED ACCESS DETECTING METHOD
First Claim
Patent Images
1. An unauthorized access detecting system, comprising:
- a generating unit that generates authentication information to be leaked outside;
a detecting unit that detects unauthorized access to a content using the authentication information generated by the generating unit;
a monitoring unit that monitors falsification of the content when the unauthorized access has been detected by the detecting unit; and
a first detecting unit that detects, based on a result of the monitoring by the monitoring unit, falsification of the content.
1 Assignment
0 Petitions
Accused Products
Abstract
In an unauthorized access detecting system, authentication information to be leaked outside is generated, and unauthorized access to a content using the generated authentication information is detected. In the unauthorized access detecting system, if the unauthorized access has been detected, content falsification is monitored. If, as a result of the monitoring, content falsification has been detected, the unauthorized access detecting system extracts a character string, which has been newly added to the content.
22 Citations
18 Claims
-
1. An unauthorized access detecting system, comprising:
-
a generating unit that generates authentication information to be leaked outside; a detecting unit that detects unauthorized access to a content using the authentication information generated by the generating unit; a monitoring unit that monitors falsification of the content when the unauthorized access has been detected by the detecting unit; and a first detecting unit that detects, based on a result of the monitoring by the monitoring unit, falsification of the content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An unauthorized access detecting method executed by an unauthorized access detecting system, the unauthorized access detecting method including:
-
a generating step of generating authentication information to be leaked outside; a detecting step of detecting unauthorized access to a content using the authentication information generated by the generating step; a monitoring step of monitoring falsification of the content when the unauthorized access has been detected by the detecting step; and a first detecting step of detecting, based on a result of the monitoring by the monitoring step, falsification of the content. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification