Access monitoring method, information processing apparatus, and computer-readable medium storing access monitoring program
First Claim
1. A computer-readable, non-transitory medium encoded with a computer program to be executed by a computer, the computer program causes the computer to perform a procedure comprising:
- receiving, from a server, an email containing first link information to an address associated with authentication information when the server receives the authentication information, and permits service provision through an apparatus being a source of the authentication information when the server receives access to a destination indicated by the first link information;
storing, in response to a manipulation that causes the computer to make access to a destination indicated by second link information, the second link information in a storage device of the computer;
making a display device display an input screen based on screen data which is received in response to the access to the destination indicated by the second link information;
transmitting the authentication information to an apparatus being a source of the screen data, when the authentication information is inputted into an input area arranged in the input screen;
determining whether or not the first link information is identical, in a predetermined part, to the second link information recorded in the storage device, when the computer receives the email containing the first link information and detects a manipulation of the computer for requesting access to the destination indicated by the first link information; and
detecting that the second link information indicates an illegal destination, when the determining has determined that the first link information is not identical, in the predetermined part, to the second link information recorded in the storage device, and thus forbidding access to any destinations indicated by link information which is identical, in the predetermined part, to the second link information,wherein, in detection of the manipulation of the computer for requesting access to the destination indicated by the second link information, the computer detects a manipulation for selecting an indication of the second link information contained in an email received by the computer before the computer receives the email containing the first link information.
2 Assignments
0 Petitions
Accused Products
Abstract
In an access monitoring method executed by a computer: information on a first link is recorded when a request for access through the first link is detected and authentication information is transmitted through the first link; and when an email containing information on a second link is received and a request for access through the second link is detected, a determination whether or not the information on the second link is identical, in a predetermined part, to the recorded information on the first link is made. In the case where yes is determined, access through a link is forbidden when the information on the link is identical, in the predetermined part, to the recorded information on the first link, and the recorded information on the first link is transmitted to a server which collects information on links.
-
Citations
9 Claims
-
1. A computer-readable, non-transitory medium encoded with a computer program to be executed by a computer, the computer program causes the computer to perform a procedure comprising:
-
receiving, from a server, an email containing first link information to an address associated with authentication information when the server receives the authentication information, and permits service provision through an apparatus being a source of the authentication information when the server receives access to a destination indicated by the first link information; storing, in response to a manipulation that causes the computer to make access to a destination indicated by second link information, the second link information in a storage device of the computer; making a display device display an input screen based on screen data which is received in response to the access to the destination indicated by the second link information; transmitting the authentication information to an apparatus being a source of the screen data, when the authentication information is inputted into an input area arranged in the input screen; determining whether or not the first link information is identical, in a predetermined part, to the second link information recorded in the storage device, when the computer receives the email containing the first link information and detects a manipulation of the computer for requesting access to the destination indicated by the first link information; and detecting that the second link information indicates an illegal destination, when the determining has determined that the first link information is not identical, in the predetermined part, to the second link information recorded in the storage device, and thus forbidding access to any destinations indicated by link information which is identical, in the predetermined part, to the second link information, wherein, in detection of the manipulation of the computer for requesting access to the destination indicated by the second link information, the computer detects a manipulation for selecting an indication of the second link information contained in an email received by the computer before the computer receives the email containing the first link information. - View Dependent Claims (2, 3)
-
-
4. An information processing apparatus comprising:
-
a memory; and one or more processors configured to perform a procedure including, receiving, from a server, an email containing first link information to an address associated with authentication information when the server receives the authentication information, and permits service provision through an apparatus being a source of the authentication information when the server receives access to a destination indicated by the first link information, storing, in response to a manipulation that causes the information processing apparatus to make access to a destination indicated by second link information, the second link information in the memory of the information processing apparatus, making a display device display an input screen based on screen data which is received in response to the access to the destination indicated by the second link information, transmitting the authentication information to an apparatus being a source of the screen data, when the authentication information is inputted into an input area arranged in the input screen, determining whether or not the first link information is identical, in a predetermined part, to the second link information recorded in the memory, when the information processing apparatus receives the email containing the first link information and detects a manipulation of the information processing apparatus for requesting access to the destination indicated by the first link information, and detecting that the second link information indicates an illegal destination, when the determining has determined that the first link information is not identical, in the predetermined part, to the second link information recorded in the memory, and thus forbidding access to any destinations indicated by link information which is identical, in the predetermined part, to the second link information, wherein in detection of the manipulation of the information processing apparatus for requesting access to the destination indicated by the second link information, the information processing apparatus detects a manipulation for selecting an indication of the second link information contained in an email received by the information processing apparatus before the information processing apparatus receives the email containing the first link information. - View Dependent Claims (5, 6)
-
-
7. An access monitoring method executed by a computer, the access monitoring method comprising:
-
receiving, from a server, an email containing first link information to an address associated with authentication information when the server receives the authentication information, and permits service provision through an apparatus being a source of the authentication information when the server receives access to a destination indicated by the first link information; storing, in response to a manipulation that causes the computer to make access to a destination indicated by second link information, the second link information in a memory of the computer; making a display device display an input screen based on screen data which is received in response to the access to the destination indicated by the second link information; transmitting the authentication information to an apparatus being a source of the screen data, when the authentication information is inputted into an input area arranged in the input screen; determining whether or not the first link information is identical, in a predetermined part, to the second link information recorded in the memory, when the computer receives the email containing the first link information and detects a manipulation of the computer for requesting access to the destination indicated by the first link information; detecting that the second link information indicates an illegal destination, when the determining has determined that the first link information is not identical, in the predetermined part, to the second link information recorded in the memory, and thus forbidding access to any destinations indicated by link information which is identical, in the predetermined part, to the second link information; and detecting a manipulation for selecting an indication of the second link information contained in an email received by the computer before the computer receives the email containing the first link information, in order to detect the manipulation of the computer for requesting access to the destination indicated by the second link information. - View Dependent Claims (8, 9)
-
Specification