Information terminal apparatus for information leak monitoring
First Claim
1. An information processing apparatus comprising:
- a non-transitory storage configured to store a first stored data, a second stored data, and a certain authentication information;
a computer processor, the processor configured to;
detect whether authentication information is inputted within a certain period of time;
determine whether the authentication information coincides with the certain authentication information;
process in a first mode having access to the first stored data when the authentication information is not detected within the certain period of time or when the authentication information detected within the certain period of time does not coincide with the certain authentication information, and to process in a second mode having access to the second stored data when the authentication information is detected within the certain period of time and coincides with the certain authentication information;
store in the storage information of a history of operation performed in the first mode; and
store in the storage a first information and a second information, the second information not being used in the second mode; and
a counter to count a number of events in which the authentication information is not detected within the certain period of time or the authentication information detected within the certain period of time does not correspond to the certain authentication information,the processor being further configured to delete or overwrite the second information when the counted frequency of events is greater than or equal to a given number of times.
1 Assignment
0 Petitions
Accused Products
Abstract
There is provided an information terminal apparatus including a detecting unit that detects whether authentication information has been input within a given period of time or not, a determining unit that determines whether the authentication information agrees with given authentication information or not, a processing unit that performs processing in a first mode if the authentication information is not detected by the detecting unit within the given period of time or if the authentication information is detected by the detecting unit within the given period of time but the determining unit determines that it does not agree with the given authentication information, and a log processing unit that memorizes/stores operation history information operated while the processing in the first mode is being performed.
25 Citations
8 Claims
-
1. An information processing apparatus comprising:
-
a non-transitory storage configured to store a first stored data, a second stored data, and a certain authentication information; a computer processor, the processor configured to; detect whether authentication information is inputted within a certain period of time; determine whether the authentication information coincides with the certain authentication information; process in a first mode having access to the first stored data when the authentication information is not detected within the certain period of time or when the authentication information detected within the certain period of time does not coincide with the certain authentication information, and to process in a second mode having access to the second stored data when the authentication information is detected within the certain period of time and coincides with the certain authentication information; store in the storage information of a history of operation performed in the first mode; and store in the storage a first information and a second information, the second information not being used in the second mode; and a counter to count a number of events in which the authentication information is not detected within the certain period of time or the authentication information detected within the certain period of time does not correspond to the certain authentication information, the processor being further configured to delete or overwrite the second information when the counted frequency of events is greater than or equal to a given number of times. - View Dependent Claims (2, 3, 4)
-
-
5. A method for information processing executed by a computer processor, the method comprising:
-
detecting, by the processor, whether authentication information is inputted within a certain period of time; determining whether the authentication information coincides with certain authentication information; processing in a first mode having access to first stored data when the authentication information is not detected by the detecting within the certain period of time or when the authentication information detected by the detecting within the e˜
certain period of time does not coincide with the certain authentication information;storing information of a history of operation performed in the first mode; processing in a second mode having access to second stored data when in the determining the authentication information coincides with the certain authentication information, the second stored data including the first stored data; storing a first information and a second information, the second information not being used in the second mode; counting a number of events in which the authentication information is not detected within the certain period of time or the authentication information detected within the certain period of time does not correspond to the certain authentication information; and deleting or overwriting the second information when the counted frequency of events is greater than or equal to a given number of times. - View Dependent Claims (6, 7)
-
-
8. A non-transitory computer readable medium having stored therein a program for causing a computer to execute a process, the process comprising:
-
detecting whether authentication information is inputted within a certain period of time; determining whether the authentication information coincides with certain authentication information; processing in a first mode having access to first stored data when the authentication information is not detected by the detecting within the certain period of time or when the authentication information detected by the detecting within the certain period of time does not correspond to the certain authentication information; processing in a second mode having access to the first stored data and second stored data when the authentication information coincides with the certain authentication information; storing information of a history of operation performed in the first mode; storing a first information and a second information, the second information not being used in the second mode; counting a number of events in which the authentication information is not detected within the certain period of time or the authentication information detected within the certain period of time does not correspond to the certain authentication information; and deleting or overwriting the second information when the counted frequency of events is greater than or equal to a given number of times.
-
Specification