×

Access monitoring method, information processing apparatus, and computer-readable medium storing access monitoring program

  • US 8,943,585 B2
  • Filed: 04/27/2012
  • Issued: 01/27/2015
  • Est. Priority Date: 06/02/2011
  • Status: Active Grant
First Claim
Patent Images

1. A computer-readable, non-transitory medium encoded with a computer program to be executed by a computer, the computer program causes the computer to perform a procedure comprising:

  • receiving, from a server, an email containing first link information to an address associated with authentication information when the server receives the authentication information, and permits service provision through an apparatus being a source of the authentication information when the server receives access to a destination indicated by the first link information;

    storing, in response to a manipulation that causes the computer to make access to a destination indicated by second link information, the second link information in a storage device of the computer;

    making a display device display an input screen based on screen data which is received in response to the access to the destination indicated by the second link information;

    transmitting the authentication information to an apparatus being a source of the screen data, when the authentication information is inputted into an input area arranged in the input screen;

    determining whether or not the first link information is identical, in a predetermined part, to the second link information recorded in the storage device, when the computer receives the email containing the first link information and detects a manipulation of the computer for requesting access to the destination indicated by the first link information; and

    detecting that the second link information indicates an illegal destination, when the determining has determined that the first link information is not identical, in the predetermined part, to the second link information recorded in the storage device, and thus forbidding access to any destinations indicated by link information which is identical, in the predetermined part, to the second link information,wherein, in detection of the manipulation of the computer for requesting access to the destination indicated by the second link information, the computer detects a manipulation for selecting an indication of the second link information contained in an email received by the computer before the computer receives the email containing the first link information.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×