Detection method of illegal access to computer system
First Claim
1. A detection method of an illegal access to a computer system, comprising the steps of:
- a) collating user identification information inputted from an input unit in one or more log-in operations with user authentication information registered in said computer system;
b) detecting the number of times that said identification information is not coincident with said authentication information in a series of log-in operations within a predetermined term;
c) obtaining final log-in information indicating whether said identification information is coincident with said authentication information or not in a final log-in operation; and
d) comparing said number of times in respect to the incoincidence and said final log-in information with a predetermined judgment standard to thereby detect the presence of the illegal access.
1 Assignment
0 Petitions
Accused Products
Abstract
A detection method of an illegal access to a computer system includes a step a) of collating user identification information inputted from an input unit in one or more log-in operations with user authentication information registered in the computer system, a step b) of detecting the number of times that the identification information is not coincident with the authentication information in a series of log-in operations within a predetermined term, a step c) of obtaining final log-in information indicating whether the identification information is coincident with the authentication information or not in a final log-in operation, and a step d) of comparing the number of times in respect to the incoincidence and the final log-in information with a predetermined judgment standard to thereby detect the presence of the illegal access.
117 Citations
16 Claims
-
1. A detection method of an illegal access to a computer system, comprising the steps of:
-
a) collating user identification information inputted from an input unit in one or more log-in operations with user authentication information registered in said computer system;
b) detecting the number of times that said identification information is not coincident with said authentication information in a series of log-in operations within a predetermined term;
c) obtaining final log-in information indicating whether said identification information is coincident with said authentication information or not in a final log-in operation; and
d) comparing said number of times in respect to the incoincidence and said final log-in information with a predetermined judgment standard to thereby detect the presence of the illegal access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product comprising:
-
a computer usable medium having computer readable program code means embodied in said computer usable medium for detecting an illegal access to a computer system, said computer readable program code means comprising;
means for collating user identification information inputted from an input unit in one or more log-in operations with user authentication information registered in said computer system;
means for detecting a number of times that said user identification information is not coincident with said user authentication information in a series of log-in operations within a predetermined time;
means for obtaining final log-in information indicating whether said identification information is coincident with said authentication information in a final log-in operation; and
means for comparing the number of times with respect to the incoincidence and said final log-in information with a predetermined judgment standard to thereby detect the presence of the illegal access. - View Dependent Claims (12, 13, 14, 15, 16)
-
Specification