UNAUTHORIZED ACCESS DETECTING SYSTEM AND UNAUTHORIZED ACCESS DETECTING METHOD
First Claim
Patent Images
1. An unauthorized access detecting system, comprising:
- a generating unit that generates authentication information to be leaked outside;
an operating unit that sets the authentication information generated by the generating unit on a host and causes a program to be analyzed to operate on the host;
a detecting unit that detects access to a content using the authentication information; and
an identifying unit that identifies, if access using the authentication information is detected by the detecting unit, the access as unauthorized access.
1 Assignment
0 Petitions
Accused Products
Abstract
In an unauthorized access detecting system, authentication information to be leaked outside is generated. In the unauthorized access detecting system, the generated authentication information is set on an analyzing host, and a program to be analyzed is operated on the analyzing host. In the unauthorized access detecting system, access to a content using the authentication information is detected, and if the access using the authentication information is detected, the access is identified as unauthorized access.
-
Citations
16 Claims
-
1. An unauthorized access detecting system, comprising:
-
a generating unit that generates authentication information to be leaked outside; an operating unit that sets the authentication information generated by the generating unit on a host and causes a program to be analyzed to operate on the host; a detecting unit that detects access to a content using the authentication information; and an identifying unit that identifies, if access using the authentication information is detected by the detecting unit, the access as unauthorized access. - View Dependent Claims (2, 3, 4)
-
-
5. An unauthorized access detecting system, comprising:
-
a generating unit that generates authentication information; an operating unit that sets the authentication information generated by the generating unit on a host and causes a program to be analyzed to operate on the host; a detecting unit that detects unauthorized access to a content using the authentication information; and an identifying unit that identifies, as a program that leaks out information, a program that operates on the host set with the authentication information if unauthorized access using the authentication information has been detected by the detecting unit. - View Dependent Claims (6, 7, 8)
-
-
9. An unauthorized access detecting method executed by an unauthorized access detecting system, the unauthorized access detecting method including:
-
a generating step of generating authentication information to be leaked outside; an operating step of setting the authentication information generated by the generating step on a host and causing a program to be analyzed to operate on the host; a detecting step of detecting access to a content using the authentication information; and an identifying step of identifying, if access using the authentication information is detected by the detecting step, the access as unauthorized access. - View Dependent Claims (10, 11, 12)
-
-
13. An unauthorized access detecting method executed by an unauthorized access detecting system, the unauthorized access detecting method including:
-
a generating step of generating authentication information; an operating step of setting the authentication information generated by the generating step on a host and causing a program to be analyzed to operate on the host; a detecting step of detecting unauthorized access to a content using the authentication information; and an identifying step of identifying, if unauthorized access using the authentication information is detected by the detecting step, a program that operates on the host set with the authentication information, as a program that leaks out information. - View Dependent Claims (14, 15, 16)
-
Specification