CN101253507A - Account false use detecting/suppressing device, data collecting device, and account false use detecting/suppressing program - Google Patents

Account false use detecting/suppressing device, data collecting device, and account false use detecting/suppressing program Download PDF

Info

Publication number
CN101253507A
CN101253507A CNA200680031999XA CN200680031999A CN101253507A CN 101253507 A CN101253507 A CN 101253507A CN A200680031999X A CNA200680031999X A CN A200680031999XA CN 200680031999 A CN200680031999 A CN 200680031999A CN 101253507 A CN101253507 A CN 101253507A
Authority
CN
China
Prior art keywords
account
mentioned
password
cost
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA200680031999XA
Other languages
Chinese (zh)
Other versions
CN101253507B (en
Inventor
保贺正造
河合诏之
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Daikin Industries Ltd
Original Assignee
Daikin Industries Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from JP2005248044A external-priority patent/JP4020133B2/en
Application filed by Daikin Industries Ltd filed Critical Daikin Industries Ltd
Priority claimed from PCT/JP2006/316499 external-priority patent/WO2007026580A1/en
Publication of CN101253507A publication Critical patent/CN101253507A/en
Application granted granted Critical
Publication of CN101253507B publication Critical patent/CN101253507B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)

Abstract

An account false use detecting/suppressing device for early detecting/suppressing false use of an account, a data collecting device, and an account false use detecting/suppressing program are provided. An account false use detecting device (6) comprises a use quantity association value information receiving section (11) and a detecting section (12). The use quantity association value information receiving section (11) receives use quantity association value information from a management device (3). The management device (3) manages predetermined accounts. The predetermined accounts are used when data is transmitted from data transmitters (2) through a public switched telephone network to a data collecting device (5). The use quantity association value information relates to a use quantity association value. The use quantity association value relates to the quantity of use of the public switched telephone network (4) using the account. The detecting section (12) compares the use quantity association value and a predetermined threshold to detect a false use of the account.

Description

Account is illegally used detection or restraining device, transacter and account illegally to use and is detected or the inhibition program
Technical field
The present invention relates to detect the authentication that is used to visit the public line net illegally uses pick-up unit, transacter and account illegally to use trace routine with the account of the illegal use of account.In addition, the present invention relates to account illegally uses restraining device and account illegally to use the inhibition program.
Background technology
In the past, people had proposed to be used to prevent the illegal the whole bag of tricks that uses of account, and wherein, above-mentioned account is used for the authentication carried out in order to utilize public line net such as internet.In the account management system of patent documentation 1 record, behind the examination userspersonal information, generate account ID, give the right to use of system resource.
Patent documentation 1: TOHKEMY 2002-245010 communique
But, under the information of account and password thereof is leaked situation to the third party who does not have access rights, the unauthorized access that may produce public line nets such as internet, and require huge cost of use to regular account holder.
In addition, also there are the following problems: illegally rewritten by the third party under the situation of password, regular account holder can't accept the service that the public line net provides.
Summary of the invention
Problem of the present invention is, provides a kind of account of illegal use that can the early detection account illegally to use pick-up unit, transacter and account illegally to use trace routine.
In addition, another problem of the present invention is, provides a kind of account that can suppress the illegal use of account illegally to use restraining device and account illegally to use the inhibition program.
The account of the 1st invention illegally uses pick-up unit to have use amount relating value message pick-up portion and test section.Use amount relating value message pick-up portion receives use amount relating value information from management devices.The predetermined account of management devices management.Predetermined account is being used when transacter sends data via the public line net from a plurality of data sending devices.Use amount relating value information is relevant with the use amount relating value.The use amount of the public line net that the use amount relating value produces with accessing to your account is associated.Test section compares use amount relating value and predetermined threshold, detects the illegal use of account.
At this, use the use amount relating value information that receives from the management devices of managing predetermined account, test section compares use amount relating value and predetermined threshold, detects the illegal use of account.Therefore, can be according to the illegal use of the variation early detection account of use amount relating value.
The account of the 2nd invention is illegally used pick-up unit, illegally uses in the pick-up unit in the account of the 1st invention, and threshold value is the relevant difference threshold of difference with the use amount relating value of each scheduled period.Test section compares the difference and the difference threshold of the use amount relating value of each scheduled period, detects the illegal use of account.
At this, can change the illegal use that comes the early detection account according to the difference of the use amount relating value of each scheduled period.
The account of the 3rd invention is illegally used pick-up unit, illegally uses in the pick-up unit in the account of the 1st invention, also has use amount relating value prediction section.Use amount relating value prediction section is obtained the trend prediction value of use amount relating value according to the historical record of use amount relating value.Threshold value is the trend prediction value.Test section compares use amount relating value and trend prediction value, detects the illegal use of account.
At this, can the illegal use of early detection account by the comparison between use amount relating value and the trend prediction value.
The account of the 4th invention is illegally used pick-up unit, illegally uses in the pick-up unit in the account of the 1st invention, and the use amount relating value is the cost of use of public line net.
At this, because the use amount relating value is the cost of use of public line net, therefore, can be according to the illegal use of the variation early detection account of cost of use.
The account of the 5th invention is illegally used pick-up unit, illegally uses in the pick-up unit in the account of the 4th invention, also has cost of use supposition portion.Cost of use is inferred according to the collection of letters data volume of each scheduled period that transacter is collected mail by cost of use supposition portion.Threshold value is whole guess value.Whole guess value is the relevant guess value of integral body with the cost of use of being obtained by cost of use supposition portion.Test section compares cost of use and the whole guess value of each scheduled period, detects illegal use.
At this, can will infer whole guess value that cost of use obtain according to the collection of letters data volume of transacter as threshold value, the illegal use of early detection account by the comparison between cost of use and the whole guess value.
The account of the 6th invention is illegally used pick-up unit, illegally uses in the pick-up unit in the account of the 4th invention, also has cost of use difference supposition portion.The collection of letters data volume of each scheduled period that cost of use difference supposition portion collects mail according to transacter is inferred the difference of the cost of use of each scheduled period.Threshold value is the difference guess value.The difference guess value is the relevant guess value of difference with the cost of use of being obtained by cost of use difference supposition portion.Test section compares the difference and the difference guess value of the cost of use of each scheduled period, detects illegal use.
At this, can will infer difference guess value that the difference of cost of use obtains according to the collection of letters data volume of transacter, difference by cost of use and the comparison between the difference guess value and the illegal use of early detection account as threshold value.
The account of the 7th invention is illegally used pick-up unit, illegally uses in the pick-up unit in the account of the 4th invention, also has cost of use supposition portion and cost of use difference supposition portion.Cost of use is inferred according to the collection of letters data volume of each scheduled period that transacter is collected mail by cost of use supposition portion.The collection of letters data volume of each scheduled period that cost of use difference supposition portion collects mail according to transacter is inferred the difference of the cost of use of each scheduled period.Threshold value is the supposition expense ratio of difference guess value with respect to whole guess value.The difference guess value is the relevant guess value of difference with the cost of use of being obtained by cost of use difference supposition portion.Whole guess value is the relevant guess value of integral body with the cost of use of being obtained by cost of use supposition portion.Test section to the difference of the cost of use of each scheduled period with respect to the expense of the integral body of cost of use than and infer that the expense ratio compares, and detects illegal use.
At this, to liken to according to the i.e. supposition expense of ratio that the collection of letters data volume of transacter is inferred the difference guess value that the difference of cost of use obtains and inferred the whole guess value that the integral body of cost of use obtains and be threshold value, to the difference of cost of use with respect to the expense of the integral body of cost of use than and infer that the expense ratio compares.Thus, illegal use that can the early detection account.
The account of the 8th invention is illegally used pick-up unit, illegally uses in the pick-up unit in the account of the 4th invention, also has the cost of use prediction section.The historical record of the collection of letters data volume of each scheduled period that the cost of use prediction section is collected mail according to transacter is obtained the expense trend prediction value of cost of use.Threshold value is an expense trend prediction value.Test section compares cost of use and the expense trend prediction value of each scheduled period, detects the illegal use of account.
At this, cost of use that can be by each scheduled period and the comparison between the expense trend prediction value and the illegal use of early detection account.
The account of the 9th invention is illegally used pick-up unit, illegally uses in the pick-up unit in any one account of the 1st invention~the 8 invention, and data sending device is a device monitor.
At this, used device monitor as data sending device, therefore, the output data of device monitor is sent to transacter termly according to predetermined form.And the traffic volume of data is predetermined.Thus, can early detection illegally use.
The account of the 10th invention is illegally used pick-up unit, illegally uses in the pick-up unit in the account of the 1st invention, and threshold value is a transacter side use amount relating value.Transacter side use amount relating value accesses to your account with transacter and the use amount of the public line net that produces is associated.Test section compares management devices side use amount relating value and transacter side use amount relating value, detects the illegal use of account.Management devices side use amount relating value accesses to your account with management devices and the use amount of the public line net that produces is associated.
At this, can come the illegal use of early detection account according to the management devices side use amount relating value and the relative variation of transacter side use amount relating value.
The transacter of the 11st invention has use amount relating value message pick-up function and measuring ability.Use amount relating value message pick-up function is the function that receives use amount relating value information from management devices.The predetermined account of management devices management.Predetermined account is being used when transacter sends data via the public line net from a plurality of data sending devices.Use amount relating value information is relevant with the use amount relating value.The use amount of the public line net that the use amount relating value produces with accessing to your account is associated.Measuring ability is use amount relating value and predetermined threshold are compared and to detect the function of the illegal use of account.
At this, transacter has following function: use the use amount relating value information that receives from the management devices of managing predetermined account, use amount relating value and predetermined threshold are compared, detect the illegal use of account.Therefore, can be according to the illegal use of the variation early detection account of use amount relating value.
The account of the 12nd invention is illegally used trace routine to comprise use amount relating value message pick-up step and is detected step.Use amount relating value message pick-up step is the step that receives use amount relating value information from management devices.The predetermined account of management devices management.Predetermined account is being used when transacter sends data via the public line net from a plurality of data sending devices.Use amount relating value information is relevant with the use amount relating value.The use amount of the public line net that the use amount relating value produces with accessing to your account is associated.Detect step and be use amount relating value and predetermined threshold are compared and detect the step of the illegal use of account.
At this, account illegally uses trace routine to have following steps: use the use amount relating value information that receives from the management devices of managing predetermined account, use amount relating value and predetermined threshold are compared, detect the illegal use of account.Therefore, by carrying out this program by transacter, can be according to the illegal use of the variation early detection account of use amount relating value.
The account of the 13rd invention illegally uses restraining device to have account storage part, account selection portion, password setting information sending part, password rewriting portion and password change portion.The password of account storage portion stores the 1st account, the 2nd account and each account; The password of the 1st account, the 2nd account and each account is using when transacter sends data via the public line net from a plurality of data sending devices.The account selection portion is every the scheduled period selection that hockets from the 1st account and the 2nd account.Password setting information sending part is using the 1st account selected by the account selection portion or any one party in the 2nd account when data sending device conducts interviews, and the password setting information relevant with the opposing party's the setting situation of password in the 1st account or the 2nd account is sent to data sending device.The password of the opposing party in the 1st account or the 2nd account is rewritten at management devices by password rewriting portion whenever through the scheduled period time.Management devices is managed the password of the 1st account, the 2nd account and each account.Password change portion in the password in being stored in the account storage part, changes the password of the side in the 1st account and the 2nd account whenever through the scheduled period time.
At this, the account selection portion is every the scheduled period selection that hockets from the 1st account and the 2nd account, and password change portion in the password in being stored in the account storage part, changes the password of the side in the 1st account and the 2nd account whenever through the scheduled period time.Thus, can use 2 accounts, can suppress the illegal use of account every the scheduled period checker.
The account of the 14th invention illegally uses restraining device to have account storage part, password change portion, password setting information sending part and password rewriting portion.Account storage part and each data sending device are stored the password of a plurality of accounts and each account accordingly.The password of a plurality of accounts and each account is using when transacter sends data via the public line net from a plurality of data sending devices.Password change portion changes each password of a plurality of accounts every the scheduled period.When data sending device conducts interviews, password setting information sending part sends to data sending device with the password setting information relevant with the setting situation of password.Password is rewritten at management devices by password rewriting portion whenever through the scheduled period time.Management devices is managed the password of a plurality of accounts and each account.
At this, password change portion thus, can suppress the illegal use of account every the password of scheduled period change each account corresponding with each data sending device.
The account of the 15th invention is illegally used restraining device, illegally uses in the account of the 13rd invention or the 14th invention also to have management database in the restraining device.Management database is the database that is used for the transmission situation of administrator password set information.
At this, can utilize the transmission situation of management database administrator password set information.
The account of the 16th invention is illegally used restraining device, illegally uses in the restraining device state that the management data library storage is relevant with the transmission situation of password setting information in the account of the 15th invention.
At this, can manage the state relevant with the transmission situation of password setting information.
The account of the 17th invention is illegally used restraining device, illegally uses in the restraining device in the account of the 15th invention, and management database and account storage part become one.
At this, because management database and account storage part become one, therefore, can the unified management account and the transmission situation of password setting information.
The account of the 18th invention is illegally used the inhibition program to have account and is selected step, password setting information forwarding step, password rewriting step and password change step.The 1st account and the 2nd account are being used when transacter sends data via the public line net from a plurality of data sending devices.Account selects step every the scheduled period selection that hockets from the 1st account and the 2nd account.The 1st account that password setting information forwarding step is selected in use or any one party in the 2nd account send to data sending device with the password setting information relevant with the opposing party's the setting situation of password in the 1st account or the 2nd account when data sending device conducts interviews.Password is rewritten step at management devices, rewrites the password of the opposing party in the 1st account or the 2nd account whenever through the scheduled period time.Management devices is managed the password of the 1st account, the 2nd account and each account.The password change step changes the password of the side in the 1st account and the 2nd account whenever through the scheduled period time.
At this, in account is selected step, every the scheduled period selection that from the 1st account and the 2nd account, hockets, and, in the password change step, whenever the time through the scheduled period, in the password in being stored in the account storage part, change the password of the side in the 1st account and the 2nd account.Therefore, transacter can use 2 accounts every the scheduled period checker, can suppress the illegal use of account.
According to the 1st invention, can be according to the illegal use of the variation early detection account of use amount relating value.
According to the 2nd invention, can be according to the illegal use of the variation early detection account of the difference of the use amount relating value of each scheduled period.
According to the 3rd invention, can the illegal use of early detection account by the comparison of use amount relating value and trend prediction value.
According to the 4th invention, can be according to the illegal use of the variation early detection account of cost of use.
According to the 5th invention, can the illegal use of early detection account by the comparison of cost of use and whole guess value.
According to the 6th invention, the difference that can be by cost of use and the comparison of difference guess value and the illegal use of early detection account.
According to the 7th invention, can by to the difference of cost of use with respect to the expense of the integral body of cost of use than and infer that the expense ratio compares the illegal use of early detection account.
According to the 8th invention, the cost of use that can be by each scheduled period and the comparison of expense trend prediction value and the illegal use of early detection account.
According to the 9th invention, can use the traffic volume of the output data of device monitor, early detection is illegally used.
According to the 10th invention, can be according to the illegal use of the relative variation early detection account between management devices side use amount relating value and the transacter side use amount relating value.
According to the 11st invention, can be according to the illegal use of the variation early detection account of use amount relating value.
According to the 12nd invention, can be according to the illegal use of the variation early detection account of use amount relating value.
According to the 13rd invention,, can suppress the illegal use of account by using 2 accounts every the scheduled period checker.
According to the 14th invention,, can suppress the illegal use of account by change the password of each account every the scheduled period.
According to the 15th invention, transmission situation that can the administrator password set information.
According to the 16th invention, can manage the state relevant with the transmission situation of password setting information.
According to the 17th invention, can the unified management account and the transmission situation of password setting information.
According to the 18th invention,, can suppress the illegal use of account by using 2 accounts every the scheduled period checker.
Description of drawings
Fig. 1 is built-in with the structural drawing that account of the present invention is illegally used the transacter of pick-up unit and comprised the equipment management system of above-mentioned transacter.
Fig. 2 is the structural drawing that the account of the 1st embodiment of the present invention is illegally used pick-up unit.
Fig. 3 is the cost of use of expression the 1st embodiment of the present invention and the curve map of difference thereof.
Fig. 4 is the structural drawing that the account of the 2nd embodiment of the present invention is illegally used pick-up unit.
Fig. 5 is the historical record of the cost of use in expression the 2nd embodiment of the present invention and the curve map of trend prediction value.
Fig. 6 is the structural drawing that the account of the 3rd embodiment of the present invention is illegally used pick-up unit.
Fig. 7 is the structural drawing that the account of the 4th embodiment of the present invention is illegally used pick-up unit.
Fig. 8 is the structural drawing that the account of the 5th embodiment of the present invention is illegally used pick-up unit.
Fig. 9 is the structural drawing that the account of the 6th embodiment of the present invention is illegally used pick-up unit.
Figure 10 is that the account that comprises of the 7th embodiment of the present invention is illegally used the structural drawing of the equipment management system of restraining device.
Figure 11 is the structural drawing of the account management database of Figure 10.
Figure 12 is the structural drawing of the download management database of Figure 10.
Figure 13 is the sequential chart that illegally uses the action of restraining device according to the account of time series presentation graphs 10.
Figure 14 is the transacter of expression Figure 10 and the process flow diagram that account is illegally used the order of the account adquisitiones in the restraining device.
Figure 15 is the process flow diagram that the account of expression Figure 10 is illegally used the sequence of movement of restraining device.
Figure 16 is that the account that comprises of the 8th embodiment of the present invention is illegally used the structural drawing of the equipment management system of restraining device.
Figure 17 is the structural drawing of the account management database of Figure 16.
Figure 18 is the structural drawing of the download management database of Figure 16.
Figure 19 is the sequential chart that illegally uses the action of restraining device according to the account of time series presentation graphs 16.
Figure 20 is the process flow diagram that the account of expression Figure 16 is illegally used the sequence of movement of restraining device.
The account that Figure 21 is included in the 9th embodiment of the present invention illegally uses the account in the restraining device illegally to use the structural drawing of pick-up unit.
Figure 22 is that expression uses the account of Figure 21 illegally to use the account of pick-up unit illegally to use the process flow diagram of the order of detection.
Figure 23 represents newly to have appended the process flow diagram that the 10th embodiment of the present invention is the order of the accounts information establishing method behind the device monitor.
Label declaration
1 equipment management system; 2 device monitors; 3 internet management devices; 4 internets; 5 transacters; 6 accounts are illegally used pick-up unit; 11 use amount relating value message pick-up portions; 12 test sections; 13 use amount relating value prediction section; 14 cost of use supposition portions; 15 cost of use difference supposition portions; 16 cost of use prediction section; 46,56,66,76,86 accounts are illegally used pick-up unit; 101 equipment management systems; 102 device monitors; 103 internet management devices; 104 internets; 105 transacters; 106,126 account management databases; 107,127 download management databases; 108,128 accounts are illegally used restraining device; 109 account selection portions; 110,130 password setting information sending parts; 111,131 password rewriting portions; 112,132 password change portions.
Embodiment
[the 1st embodiment]
The one-piece construction of<equipment management system 1 〉
Fig. 1 represents to be used to utilize the equipment management system 1 of management object equipment such as a plurality of device monitor 2 telemonitoring air conditioners.Equipment management system 1 has internet management device 3, transacter 5 and a plurality of device monitor 2.
A plurality of device monitors 2 are to monitor operational situation relevant with management object equipment such as air conditioner and fault state etc., and with these monitoring datas via the local controller that sends to transacter 5 as the internet 4 of public line net (LC, Local Controller).The monitoring data that sends reports to transacter 5 once (daily paper report) every day at least as daily paper.In addition, the output data of device monitor 2 is sent to transacter 5 termly according to predetermined form.And the traffic volume of data is predetermined.
Internet management device 3 is by the formations such as computing machine of ISP (ISP).The predetermined account that internet management device 3 management is used when the transacter 5 transmitting monitoring data via internet 4 from a plurality of device monitors 2.A plurality of device monitors 2 can use total account access transacter 5.
Transacter 5 is collected the monitoring data that sends from a plurality of device monitors 2 and is managed.In addition, in transacter 5, be built-in with account described later and illegally use pick-up unit 6.
<account is illegally used the structure of pick-up unit 6 〉
As shown in Figure 2, account illegally uses pick-up unit 6 to have use amount relating value message pick-up portion 11 and test section 12.
Use amount relating value message pick-up portion 11 receives use amount relating value information from internet management device 3.The use amount relating value information that receives from internet management device 3 is the information relevant with the use amount relating value, and wherein, above-mentioned use amount relating value accesses to your account with internet management device 3 and the use amount of the internet 4 that produces is associated.The use amount relating value is the cost of use of internet 4.
12 pairs of internet management devices 3 of test section access to your account and the use amount relating value (cost of use of internet 4) and the predetermined threshold that produce compare, and detect the illegal use of account.
In addition, in the 1st embodiment, predetermined threshold is the relevant difference threshold of difference with the use amount relating value of each scheduled period (for example 1 day).Test section 12 compares by difference and the difference threshold to the use amount relating value of each scheduled period, detects the illegal use of account.Thus, can change, come the illegal use of early detection account according to the difference of the use amount relating value of each scheduled period.
Particularly, shown in the curve map of Fig. 3, the difference threshold δ th of the cost of use of the internet 4 that test section 12 produces internet management device 3 is as threshold value, value of delta 1, δ 2, δ 3 to each cost of use of 1 day ... compare with difference threshold δ th, during greater than difference threshold, judge the illegal use that has account in the difference of cost of use.
When illegally using pick-up unit 6 to detect the illegal use of account by account, from the personal computer that transacter 5 is held to internet management device 3 and account holder, send expression and exist the content of the illegal use of account to get final product with the information relevant with the situation of illegal use etc.
The cost of use of actual internet 4 when using device monitor 2 averages out more for a long time in the quantity of device monitor 2.Therefore, difference threshold diminishes, and the ratio that flase drop is surveyed also diminishes.
The feature of<the 1 embodiment 〉
(1)
Illegally use in the pick-up unit 6 in the account of the 1st embodiment, the use amount relating value information that use receives from the internet management device 3 of managing predetermined account, 12 pairs of use amount relating values of test section and predetermined threshold compare, and detect the illegal use of account.Therefore, can be according to the illegal use of the variation early detection account of use amount relating value.
(2)
Illegally use in the pick-up unit 6 in the account of the 1st embodiment, test section 12 compares by difference and the difference threshold to the use amount relating value of each scheduled period, detects the illegal use of account.Thus, can be according to the variation of the difference of the use amount relating value of each scheduled period, the illegal use of early detection account.
(3)
Illegally use in the pick-up unit 6 in the account of the 1st embodiment, because the use amount relating value is the cost of use of internet 4, therefore can be according to the illegal use of the variation early detection account of cost of use.
(4)
In the 1st embodiment, used device monitor 2 as data sending device, therefore, the output data of device monitor 2 is sent to transacter 5 termly according to predetermined form.And the traffic volume of data is predetermined.Thus, can early detection illegally use.
The variation of<the 1 embodiment 〉
(A)
In the 1st embodiment, used the cost of use of internet 4 as the use amount relating value, but the invention is not restricted to this, so long as with the relevant value of use amount of public line nets such as internet 4, then can adopt various use amount relating values.
(B)
In addition, in the 1st embodiment, used internet 4 as the example of public line net, but the invention is not restricted to this.That is, the public line net among the present invention is to use the communication network of public line, is the generalized concept that comprises internet etc.Therefore, also can be suitable for account of the present invention for other public line nets beyond the internet 4 and illegally use pick-up unit.
(C)
In above-mentioned the 1st embodiment, in order to detect the illegal use of account, used the account that is built in the transacter 5 illegally to use pick-up unit 6, but the invention is not restricted to this, also can make transacter 5 itself possess the function that account illegally uses pick-up unit 6 to be had.In this case, transacter 5 has use amount relating value message pick-up function and measuring ability.Use amount relating value message pick-up function receives use amount relating value information from internet management device 3.Measuring ability compares use amount relating value and predetermined threshold, detects the illegal use of account.
In this case, transacter 5 has following function: use the use amount relating value information that receives from the internet management device 3 of managing predetermined account, use amount relating value and predetermined threshold are compared, detect the illegal use of account.Therefore, can come the illegal use of early detection account according to the variation of use amount relating value.
(D)
In above-mentioned the 1st embodiment, in order to detect the illegal use of account, used the account that is built in the transacter 5 illegally to use pick-up unit 6, but the invention is not restricted to this, also can carry out account by transacter 5 and illegally use trace routine, transacter 5 itself is carried out the function that account illegally uses pick-up unit 6 to be had thus.In this case, account is illegally used trace routine to comprise use amount relating value message pick-up step and is detected step.Use amount relating value message pick-up step receives use amount relating value information from internet management device 3.Detect step use amount relating value and predetermined threshold are compared, detect the illegal use of account.
In this case, account illegally uses trace routine to have following steps: use the use amount relating value information that receives from the internet management device 3 of managing predetermined account, use amount relating value and predetermined threshold are compared, detect the illegal use of account.Therefore, by carrying out this program, can come the illegal use of early detection account according to the variation of use amount relating value by transacter 5.
[the 2nd embodiment]
As shown in Figure 4, the account of the 2nd embodiment illegally uses pick-up unit 46 to have the use amount relating value message pick-up portion 11 and the test section 12 of the 1st embodiment, and, also have use amount relating value prediction section 13.Account illegally uses pick-up unit 46 illegally to use pick-up unit 6 identical with the account of the 1st embodiment, is built in the transacter 5 of equipment management system 1 of Fig. 1.
Use amount relating value prediction section 13 is obtained the trend prediction value of use amount relating value according to the historical record of use amount relating value.The trend prediction value is used as threshold value.
12 pairs of use amount relating values of test section and trend prediction value compare, and detect the illegal use of account.Thus, illegal use that can the early detection account.
Particularly, shown in the curve map of Fig. 5, use amount relating value prediction section 13 is f1~f4 according to each historical record of 1 day of the cost of use of the internet 4 of internet management device 3 generations, obtains the trend prediction value ft of the cost of use of next day.In test section 12, this trend prediction value ft is used as threshold value.The cost of use f5 and the trend prediction value ft of 12 pairs of the test sections internet 4 during by the actual internet usage 4 of internet management device 3 compare, and detect the illegal use of account.At this, test section 12 becomes when surpassing the value of predetermined permissible range apart from trend prediction value ft at cost of use f5, is judged to be account and is illegally used.
Same in this case, more for a long time, the historical record of the cost of use of actual internet when using device monitor 2 averages out in the quantity of device monitor 2.Therefore, the trend prediction value also with the historical record in past in the cost of use of every day roughly the same, so the ratio that flase drop is surveyed also diminishes.
The feature of<the 2 embodiment 〉
(1)
The account of the 2nd embodiment illegally uses pick-up unit 46 also to have use amount relating value prediction section 13.Use amount relating value prediction section 13 is obtained the trend prediction value of use amount relating value according to the historical record of use amount relating value.The trend prediction value is used as threshold value.Thus, 12 pairs of use amount relating values of test section and trend prediction value compare, thus illegal use that can the early detection account.
[the 3rd embodiment]
As shown in Figure 6, the account of the 3rd embodiment illegally uses pick-up unit 56 to have the use amount relating value message pick-up portion 11 and the test section 12 of the 1st embodiment, and, also have cost of use supposition portion 14.
Use amount relating value message pick-up portion 11 is from the relevant information of cost of use of the internet 4 that 3 receptions of internet management device and internet management device 3 produce, as use amount relating value information.
Under the common user mode of transacter 5, there is correlationship between collection of letters data volume and the cost of use.Therefore, the collection of letters data volume of each scheduled period that cost of use supposition portion 14 is collected mail according to transacter 5 (for example 1 day), utilization is inferred cost of use about the mapping (map) of the correlationship of collection of letters data volume and cost of use.By cost of use supposition portion 14 guess values relevant with the integral body of cost of use that obtain is that whole guess value is used as threshold value.
Test section 12 compares cost of use and the whole guess value of each scheduled period, detects illegal use.Test section 12 is judged to be account and is illegally used when cost of use becomes the whole guess value of distance and surpasses the value of predetermined permissible range.
The feature of<the 3 embodiment 〉
(1)
The account of the 3rd embodiment illegally uses pick-up unit 56 also to have cost of use supposition portion 14, therefore, can will infer whole guess value that cost of use obtain according to the collection of letters data volume of transacter 5 as threshold value, the illegal use of early detection account by the comparison between cost of use and the whole guess value.In addition, owing to be to infer cost of use according to collection of letters data volume, therefore, even the negligible amounts of device monitor 2, the ratio that flase drop is surveyed is also still very little.
(2)
Illegally use in the pick-up unit 56 in the account of the 3rd embodiment, threshold value is the whole guess value of the cost of use obtained according to the collection of letters data volume of transacter 5, in other words, is the use amount relating value of transacter 5 sides.The use amount relating value of transacter 5 sides accesses to your account with transacter 5 and the use amount of the internet 4 that produces is associated.That is, the use amount relating value (whole guess value) of the use amount relating value (cost of use) of 12 pairs of internet management device 3 sides of test section and transacter side compares, and detects the illegal use of account.The use amount relating value of internet management device 3 sides accesses to your account with internet management device 3 and the use amount of the internet 4 that produces is associated.
Therefore, can come the illegal use of early detection account according to the relative variation between the use amount relating value of the use amount relating value of internet management device 3 sides and transacter 5 sides.
[the 4th embodiment]
As shown in Figure 7, the account of the 4th embodiment illegally uses pick-up unit 66 to have the use amount relating value message pick-up portion 11 and the test section 12 of the 1st embodiment, and, also have cost of use difference supposition portion 15.
Use amount relating value message pick-up portion 11 is from the relevant information of cost of use of the internet 4 that 3 receptions of internet management device and internet management device 3 produce, as use amount relating value information.
The collection of letters data volume of each scheduled period (for example 1 day) that cost of use difference supposition portion 15 is collected mail according to transacter 5 is inferred the difference of the cost of use of each scheduled period.The difference guess value is used as threshold value.The difference guess value is by cost of use difference supposition portion 15 guess values relevant with the difference of cost of use that obtain.
Test section 12 compares the difference and the difference guess value of the cost of use of each scheduled period, detects illegally and uses.At this, test section 12 becomes when surpassing the value of predetermined permissible range apart from the difference guess value at cost of use, is judged to be account and is illegally used.
The feature of<the 4 embodiment 〉
(1)
The account of the 4th embodiment illegally uses pick-up unit 66 also to have cost of use difference supposition portion 15, therefore, can will infer difference guess value that the difference of cost of use obtains according to the collection of letters data volume of transacter 5, difference by cost of use and the comparison between the difference guess value and the illegal use of early detection account as threshold value.
(2)
Illegally use in the pick-up unit 66 in the account of the 4th embodiment, threshold value is the difference guess value of obtaining according to the collection of letters data volume of transacter 5, in other words, is the use amount relating value of transacter 5 sides.The use amount relating value of transacter 5 sides accesses to your account with transacter 5 and the use amount of the internet 4 that produces is associated.That is, the use amount relating value (difference guess value) of the use amount relating value (cost of use) of 12 pairs of internet management device 3 sides of test section and transacter side compares, and detects the illegal use of account.The use amount relating value of internet management device 3 sides accesses to your account with internet management device 3 and the use amount of the internet 4 that produces is associated.
Therefore, can come the illegal use of early detection account according to the relative variation between the use amount relating value of the use amount relating value of internet management device 3 sides and transacter 5 sides.
[the 5th embodiment]
As shown in Figure 8, the account of the 5th embodiment illegally uses pick-up unit 76 to have the use amount relating value message pick-up portion 11 and the test section 12 of the 1st embodiment, and, also have cost of use supposition portion 14 and cost of use difference supposition portion 15.
Use amount relating value message pick-up portion 11 is from the relevant information of cost of use of the internet 4 that 3 receptions of internet management device and internet management device 3 produce, as use amount relating value information.
Cost of use supposition portion 14 is identical with the 3rd embodiment, and the collection of letters data volume of each scheduled period of being collected mail according to transacter 5 is inferred cost of use.
Cost of use difference supposition portion 15 is identical with the 4th embodiment, and the collection of letters data volume of each scheduled period of being collected mail according to transacter 5 is inferred the difference of the cost of use of each scheduled period.
In the 5th embodiment, the difference guess value is used as threshold value with respect to the supposition expense ratio of whole guess value.The difference guess value is by cost of use difference supposition portion 15 guess values relevant with the difference of cost of use that obtain.Whole guess value is by cost of use supposition portion 14 guess values relevant with the integral body of cost of use that obtain.
Test section 12 to the difference of the cost of use of each scheduled period (for example 1 day) with respect to the expense of cost of use integral body than and infer that the expense ratio compares, and detects illegal use.At this, test section 12, is judged to be account and is illegally used than becoming apart from the supposition expense when surpassing the value of predetermined permissible range in expense.
The feature of<the 5 embodiment 〉
(1)
The account of the 5th embodiment illegally uses pick-up unit 76 also to have cost of use supposition portion 14 and cost of use difference supposition portion 15, therefore, the supposition expense likened to be threshold value, to the difference of cost of use with respect to the expense of cost of use integral body than and infer that the expense ratio compares, wherein should the supposition expense than be according to the collection of letters data volume of transacter 5 infer difference guess value that the difference of cost of use obtains, the ratio of the whole guess value that obtains with the integral body of supposition cost of use.Thus, illegal use that can the early detection account.
(2)
Illegally use in the pick-up unit 76 in the account of the 5th embodiment, threshold value is the supposition expense ratio of obtaining according to the collection of letters data volume of transacter 5, in other words, is the use amount relating value of transacter 5 sides.The use amount relating value of transacter 5 sides accesses to your account with transacter 5 and the use amount of the internet 4 that produces is associated.Promptly, the use amount relating value (supposition expense ratio) of use amount relating value of 12 pairs of internet management device 3 sides of test section (difference of cost of use is with respect to the expense ratio of cost of use integral body) and transacter side compares, and detects the illegal use of account.The use amount relating value of internet management device 3 sides accesses to your account with internet management device 3 and the use amount of the internet 4 that produces is associated.
Therefore, can come the illegal use of early detection account according to the relative variation between the use amount relating value of the use amount relating value of internet management device 3 sides and transacter 5 sides.
[the 6th embodiment]
As shown in Figure 9, the account of the 6th embodiment illegally uses pick-up unit 86 to have the use amount relating value message pick-up portion 11 and the test section 12 of the 1st embodiment, and, also have cost of use prediction section 16.
Use amount relating value message pick-up portion 11 is from the relevant information of cost of use of the internet 4 that 3 receptions of internet management device and internet management device 3 produce, as use amount relating value information.
The historical record of the collection of letters data volume of each scheduled period that cost of use prediction section 16 is collected mail according to transacter 5 is inferred the expense trend prediction value of cost of use.Expense trend prediction value is used as threshold value.
Test section 12 compares cost of use and the expense trend prediction value of each scheduled period (for example 1 day), detects the illegal use of account.At this, test section 12 becomes when surpassing the value of predetermined permissible range apart from expense trend prediction value at cost of use, is judged to be account and is illegally used.
The feature of<the 6 embodiment 〉
(1)
The account of the 6th embodiment illegally uses pick-up unit 86 also to have cost of use prediction section 16, therefore, and the cost of use that can be by each scheduled period and the comparison of expense trend prediction value and the illegal use of early detection account.
(2)
Illegally use in the pick-up unit 86 in the account of the 6th embodiment, threshold value is the expense trend prediction value of obtaining according to the collection of letters data volume of transacter 5, in other words, is the use amount relating value of transacter 5 sides.The use amount relating value of transacter 5 sides accesses to your account with transacter 5 and the use amount of the internet 4 that produces is associated.That is, the use amount relating value (cost of use) of 12 pairs of internet management device 3 sides of test section and the use amount relating value of transacter side (expense trend prediction value) compare, and detect the illegal use of account.The use amount relating value of internet management device 3 sides accesses to your account with internet management device 3 and the use amount of the internet 4 that produces is associated.
Therefore, can come the illegal use of early detection account according to the relative variation between the use amount relating value of the use amount relating value of internet management device 3 sides and transacter 5 sides.
[the 7th embodiment]
Figure 10 represents to be used for the equipment management system 101 by management object equipment such as a plurality of device monitor 102 telemonitoring air conditioners.Equipment management system 101 has internet management device 103, transacter 105 and a plurality of device monitor 102.
A plurality of device monitors 102 are to monitor operational situation relevant with management object equipment such as air conditioner and fault state etc., and with these monitoring datas via the local controller (LC) that sends to transacter 105 as the internet 104 of public line net.The monitoring data that is sent reports to transacter 105 once (daily paper report) every day at least as daily paper.
Internet management device 103 is by the formations such as computing machine of ISP (ISP).The predetermined account that internet management device 103 management is used when the transacter 105 transmitting monitoring data via internet 104 from a plurality of device monitors 102.Predetermined account is the 1st account and the 2nd account that has.A plurality of device monitors 102 can use the 1st total account and the 2nd account access transacter 105.
Transacter 105 is collected the monitoring data that sends from a plurality of device monitors 102 and is managed.In addition, account selection portion 109, password setting information sending part 110, password rewriting portion 111 and the password change portion 112 in the transacter 105 of being built in is included in account described later and illegally uses in the restraining device 108.
And, between device monitor 102 and transacter 105, be provided with and be used for telephone line 115 that internet 104 is backed up.
The acquisition methods of<account 〉
Illegally use restraining device 108 sides to obtain account at transacter 105 and account in the following order.
At first, in the step S1 shown in the process flow diagram of Figure 14, transacter 105 sides are collected and be registered in to the article information relevant with object such as air conditioner.
After the registration article information, in step S2, transacter 105 is to internet management device 103 request accounts.
After being requested account, in step S3, internet management device 103 distribution ID.
Then, in step S4, transacter 105 obtains the account corresponding with the ID of new issue from internet management device 103.
Then, in step S5, account illegally uses restraining device 108 to carry out the registration and the renewal of account.
Then, in step S6, account illegally uses restraining device 108 to carry out the management of account.
<account is illegally used the structure of restraining device 108 〉
Account shown in Figure 10 illegally uses restraining device 108 to have account management database 106, download management database 107, account selection portion 109, password setting information sending part 110, password rewriting portion 111 and password change portion 112.
Account management database 106 as shown in figure 11, the password of the 1st account that storage and management are used when transacter 105 sends data via internet 104 from a plurality of device monitors 102 (below be called account A), the 2nd account (below be called account B) and each account.In account management database 106, store account management table 113.In account management table 113, with the title 113a of account, also include with account A and account B information corresponding be each account password 113b, each account object 113c and represent the sign 113d that each account is being used.
In the 7th embodiment, the object 113c of each account is set to all device monitors 102 (LC).That is, all device monitors 102 have account A and account B.
Download management database 107 is stored also management and is downloaded relevant information as shown in figure 12.In download management database 107, store download management table 114.In download management table 114, include each registration sequence number LC01, LC02 with device monitor 102 ... corresponding information about downloading, that is, and the state 114b that whether needs the sign 114a that downloads and whether implemented to download.
Account selection portion 109 was alternately selected from account A and account B in each scheduled period (for example 1 day).After any one party of having been selected by account selection portion 109 among account A and the account B, the sign 113d of account management table 113 becomes " using " in the account side of selecting.Because the daily paper from device monitor 102 is reported every day at least once, therefore, the scheduled period that is used for account selection and password change can be set at below 1 day or 1 day.
When using the account A select by account selection portion 109 or any one party slave unit monitoring arrangement 102 among the account B to conduct interviews, password setting information sending part 110 with account A or account B in the opposing party's the relevant password setting information of password setting situation, send to device monitor 102 via internet management device 103.For example, access to your account A visit data gathering-device 105 and carry out daily paper when report at device monitor 102, password setting information sending part 110 sends the password setting information relevant with account B to all device monitors 102.
Password rewriting portion 111 carries out the rewriting of the password of the opposing party among account A or the account B at the internet management device 103 of the password of account executive A, account B and each account whenever through the scheduled period time.Password rewriting portion 111 will comprise that the password rewriting information of the new password of the opposing party among account A or the account B sends to internet management device 103.
Whenever when the scheduled period, 112 changes of password change portion are stored among the password 113b in the account management database 106, the password 113b of the side among account A and the account B.For example, after process is utilized the scheduled period of account A, the password 113b corresponding in the password change portion 112 change account management tables 113 with account A.
<account is illegally used the sequence of movement of restraining device 108 〉
Then, illegally use the sequence of movement of restraining device 108 with reference to the flowchart text account of the sequential chart of Figure 13 and Figure 15.
During Figure 13 initial, in the I, be in the state that the A that can access to your account between device monitor 102 and the transacter 105 communicates.
In the I, at first shown in the step S11 of Figure 15, the accounts information that will be used for next time visiting returns to all device monitors 102 (LC) during Figure 13.Particularly, in the download management table 114 of the download management database 107 of Figure 12, at the sign 114a that downloads is that " needs " and state 114b are when being " enforcement ", as at letter in reply from the report of the daily paper of device monitor 102, password setting information sending part 110 sends to device monitor 102 with the password setting information of the account B that is used to visit in the II during the next one (with reference to Figure 13), and the state 114b with download management table 114 changes to " finishing " then.
Then, shown in step S12, during through Figure 13 behind the I, account selection portion 109 is selected the account B that is used to visit in the II during the next one in the account management table 113 of Figure 11.Particularly, by the account B that is used to visit in the II during 109 selections of account selection portion, the sign 113d of the account management table 113 of Figure 11 becomes " using " in the account B side of selecting, and becomes " using " in account A side.
Then, shown in step S13, the password of the account A that in account management table 113, is used to visit in the III during the change next but one.Particularly, the password 113b that uses of the account A of password change portion 112 change account management tables 113.
Then, shown in step S14, the content of change download management table 114.Particularly, password setting information sending part 110 is rewritten as " needs " with the sign 114a of the download relevant with all device monitor 102 in download management table 114, state 114b is changed to " implementing ".
Then, shown in step S15, after the content alteration of account management table 113 and download management table 114 was finished, password rewriting portion 111 carried out the correction of the accounts information of internet management device 103.Particularly, password rewriting portion 111 carries out the correction of accounts information at internet management device 103, from during the account A that uses in the I become during the account B that uses in the II.
By carry out the change of account according to above order, as shown in figure 13, all device monitors 102 utilize account A visit data gathering-device 105 during in the I, upgrade password about another account B, the encrypted message after upgrading is sent to all device monitors 102.On the other hand, all device monitors 102 utilize account B visit data gathering-device 105 during in the II, upgrade password about another account A, the encrypted message after upgrading is sent to all device monitors 102.
In addition, in the device monitor of newly establishing 102, be downloaded and account B when not being downloaded, during utilizing that account A conducts interviews, in the I, carry out the download of account B to the device monitor of newly establishing 102 at a side account A.
During after II finishes, then with during I identical, transfer to all device monitors 102 utilize account A visit data gathering-device 105 during III, upgrade password about another account B, the encrypted message after upgrading is sent to all device monitors 102.
In addition, owing to reasons such as Account Changes, in the time of can't be via the communication between internet 104 apparatus for establishing monitoring arrangements 102 and the transacter 105,, can communicate by letter by setting up as the telephone line 115 of other public line nets as the backup circuit.In addition, in that the device monitor newly established 102 is initial when communicating with transacter 105, do not give account yet, so communicate by telephone line 115 to this device monitor 102.
The feature of<the 7 embodiment 〉
(1)
Illegally use in the restraining device 108 in the account of the 7th embodiment, account selection portion 109 was alternately selected from account A and account B every the scheduled period.When account A that use is selected or any one party slave unit monitoring arrangement 102 among the account B conducted interviews, password setting information sending part sent to device monitor 102 with the password setting information of the opposing party among account A or the account B.Password rewriting portion 111 carries out the rewriting of the password of the opposing party among account A or the account B at internet management device 103 whenever through the scheduled period time.Whenever when the scheduled period, 112 changes of password change portion are stored in account A in the account management database 106 and the password of the side among the account B.Thus, by using 2 accounts, can suppress the illegal use of account every the scheduled period checker.
(2)
The account of the 7th embodiment illegally uses restraining device 108 also to have the download management database 107 of the transmission situation of administrator password set information, therefore, can carry out the transmission situation of the password setting information relevant with each device monitor 102 management, be download management.
(3)
In the 7th embodiment, therefore the download management database 107 storages state relevant with the transmission situation of password setting information, about each device monitor 102, can manage the state relevant with the transmission situation of password setting information.
The variation of<the 7 embodiment 〉
(A)
In the 7th embodiment, constitute account management database 106 and download management database 107 individually, but the invention is not restricted to this, download management database 107 also can constitute integratedly with account management database 106.Because download management database 107 becomes one with account management database 106, therefore, can the unified management account and the transmission situation of password setting information.
(B)
Illegally use in the restraining device 108 in the account of the 7th embodiment, used account management database 106 in order to manage a plurality of accounts, but the invention is not restricted to this, the management that also can access to your account uses server to replace account management database 106.In this case, can utilize account management to revise password of account etc. with server.
(C)
In above-mentioned the 7th embodiment, in order to suppress the illegal use of account, used the account that is built in the transacter 105 illegally to use restraining device 108, but the invention is not restricted to this, also can carry out account and illegally use the inhibition program, thereby self carry out the function that account illegally uses pick-up unit 108 to have by transacter 105 by transacter 105.In this case, account illegally uses the inhibition program to comprise account selection step, password setting information forwarding step, password rewriting step and password change step.The 1st account (account A) and the 2nd account (account B) are being used when transacter 105 sends data via internet 104 from a plurality of data sending devices (device monitor) 102.In account is selected step, in the 1st account from be stored in account management database 106 and the 2nd account every the scheduled period selection that hockets.In password setting information forwarding step, the 1st account of selecting in use or any one party in the 2nd account send to data sending device 102 with the password setting information relevant with the opposing party's the setting situation of password in the 1st account or the 2nd account when data sending device 102 conducts interviews.Rewrite in the step at password,, whenever through the scheduled period time, carry out the rewriting of the password of the opposing party in the 1st account or the 2nd account at internet management device 103.The password of internet management device 103 management the 1st account, the 2nd account and each accounts.In the password change step, whenever through the scheduled period time, in the password in being stored in account management database 106, change the password of the side in the 1st account and the 2nd account.
At this, select alternately from the 1st account and the 2nd account, to select every the scheduled period in the step in account, and, in the password change step, whenever the time through the scheduled period, in the password in being stored in the account storage part, change the password of the side in the 1st account and the 2nd account.Therefore, illegally use the inhibition program, can use 2 accounts, can suppress the illegal use of account every the scheduled period checker by carrying out account by transacter 105.
[the 8th embodiment]
As shown in figure 16, the account of the 8th embodiment illegally uses restraining device 128 to have account management database 126, download management database 127, password setting information sending part 130, password rewriting portion 131 and password change portion 132.Account illegally uses restraining device 128 to be arranged in the equipment management system 101 identical with the 7th embodiment.Therefore, internet management device 103, transacter 105 and a plurality of device monitor 102 shown in Figure 16 are identical with each inscape of same label among Figure 10 respectively.
Account management database 126 is stored a plurality of accounts (account A and account B) used via internet 104 from a plurality of device monitors 102 and the password of each account accordingly with each device monitor 102 as shown in figure 17 when transacter 105 sends data.In account management table 133 with the title 133a of account, also include with account A and account B information corresponding be the password 133b of each account and the object 133c of each account.
In the 8th embodiment, the object 133c of each account is set to individual other device monitor 102 (LC).That is, device monitor 102 has intrinsic account respectively.
Download management database 127 is stored also management and is downloaded relevant information as shown in figure 18.In download management database 127, store download management table 134.In download management table 134, include each registration sequence number LC01, LC02 with device monitor 102 ... corresponding information about downloading, that is, and the state 134b that whether needs the sign 134a that downloads and whether implemented to download.
Change is stored in each password of a plurality of accounts in the account management database 126 every the scheduled period (for example 1 day) in password change portion 132.Because the daily paper from device monitor 102 is reported every day at least once, therefore, the scheduled period that is used for password change can be set at below 1 day or 1 day.
When slave unit monitoring arrangement 102 conducted interviews, password setting information sending part 130 sent to device monitor 102 with the password setting information relevant with the setting situation of password.
Password rewriting portion 131 carries out the rewriting of password at the internet management device 103 of the password of a plurality of accounts of management and each account whenever through the scheduled period time.
<account is illegally used the sequence of movement of restraining device 128 〉
Then, illegally use the sequence of movement of restraining device 128 with reference to the flowchart text account of the sequential chart of Figure 19 and Figure 20.
During Figure 19 initial, in the I, be in the state that can use each device monitor 102 intrinsic accounts to communicate between a plurality of device monitors 102 and the transacter 105.
In the I, at first shown in the step S21 of Figure 20, the accounts information that will be used for next time visiting returns to all device monitors 102 (LC) during Figure 19.Particularly, in the download management table 134 of the download management database 127 of Figure 18, at the sign 134a that downloads is that " needs " and state 134b are when being " enforcement ", as at letter in reply from the report of the daily paper of device monitor 102, password setting information sending part 130 sends to the password setting information of each account in the II during the next one (with reference to Figure 19) and account corresponding equipment monitoring arrangement 102, and the state 134b with download management table 134 changes to " finishing " then.
Then, during through Figure 19 behind the I, shown in step S22, the password of each account that in account management table 133, is used to visit in the III during next under the change.Particularly, the password 133b of each account of the account management table 133 of the 132 change Figure 17 of password change portion.
Then, shown in step S23, the content of change download management table 134.Particularly, password setting information sending part 130 is rewritten as " needs " with the sign 114a of the download relevant with all device monitor 102 in the download management table 134 of Figure 18, state 114b is changed to " implementing ".
Then, shown in step S24, after the content alteration of account management table 133 and download management table 134 was finished, password rewriting portion 131 carried out the correction of the accounts information of internet management device 103.Particularly, password rewriting portion 131 carries out the correction of accounts information at internet management device 103, from during the password that uses in the I become during the password that uses in the II.
By carrying out the change of account according to above order, as shown in figure 19, for the account corresponding with all device monitor 102, can be through Change Password after the scheduled period.
In addition, owing to reasons such as Account Changes, in the time of can't be via the communication between internet 104 apparatus for establishing monitoring arrangements 102 and the transacter 105,, can communicate by letter by setting up as the telephone line 115 of other public line nets as the backup circuit.
The feature of<the 8 embodiment 〉
(1)
Illegally use in the restraining device 128 in the account of the 8th embodiment, account management database 126 is stored the password of a plurality of accounts and each account accordingly with each device monitor 102.Password change portion 132 changes each password of a plurality of accounts every the scheduled period.When slave unit monitoring arrangement 102 conducted interviews, password setting information sending part 130 sent to device monitor 102 with the password setting information relevant with the setting situation of password.Password rewriting portion 131 carries out the rewriting of password at internet management device 103 whenever through the scheduled period time.Thus, by the password of password change portion 132, can suppress the illegal use of account every each corresponding account of scheduled period change and each device monitor 102.
(2)
The account of the 8th embodiment illegally uses restraining device 128 also to have the download management database 127 of the transmission situation of administrator password set information, therefore, can carry out the transmission situation of the password setting information relevant with each device monitor 102 management, be download management.
(3)
In the 8th embodiment, therefore the download management database 127 storages state relevant with the transmission situation of password setting information, about each device monitor 102, can manage the state relevant with the transmission situation of password setting information.
The variation of<the 8 embodiment 〉
(A)
In the 8th embodiment, constitute account management database 126 and download management database 127 individually, but the invention is not restricted to this, download management database 127 also can constitute integratedly with account management database 126.Because download management database 127 becomes one with account management database 126, therefore, can the unified management account and the transmission situation of password setting information.
(B)
Illegally use in the restraining device 128 in the account of the 8th embodiment, used account management database 126 in order to manage a plurality of accounts, but the invention is not restricted to this, the management that also can access to your account uses server to replace account management database 126.In this case, can utilize account management to revise password of account etc. with server.
[the 9th embodiment]
In the above-mentioned the 7th and the 8th embodiment, the account by every day, change was used to visit can suppress the illegal use of account, and can be the longest 2 days with illegally using the infringement that causes to be suppressed to.At this, for the illegal use of early detection account, transacter 105 receives and the relevant information of use amount relating value such as cost of use from internet management device 103; For illegal use that can the early detection account, also account shown in Figure 21 illegally can be used pick-up unit 151 be appended to above-mentioned account and illegally be used in restraining device 108 or 128.
<account is illegally used the structure of pick-up unit 151 〉
As shown in figure 21, account illegally uses pick-up unit 151 to have cost information acceptance division 152 and test section 153.
Cost information acceptance division 152 receives cost information from internet management device 103.Cost information is to access to your account with internet management device 103 and the relevant information of cost of use of the internet 104 that produces.
153 pairs of internet management devices 103 of test section access to your account and the cost of use and the predetermined threshold of the internet 104 that produces compare, and detect the illegal use of account.
The illegal detection order of using of<account 〉
Shown in the process flow diagram of Figure 22, at first in step S31, manage the cost information of every day by internet management device 103.Cost information is sent to every day termly to be arranged on account and illegally to use the account on restraining device 108 or 128 illegally to use pick-up unit 151.
Then, in step S32, account illegally uses pick-up unit 151 to detect the generation of the illegal use of account according to cost information.
illegally use pick-up unit 151 to detect the illegal use of account by account after, in step S33, carry out the renewal of account.For example, only Change Password or change account and these both sides of password get final product illegally to use restraining device 108 or 128 by above-mentioned account.Meanwhile, from the personal computer that transacter 105 is held to internet management device 103 and account holder, send the expression account occurred the illegal content of using with the relevant information such as situation of illegal use.
The variation of<the 9 embodiment 〉
(A)
In the 9th embodiment, show the example of reception, but the invention is not restricted to this from the cost information of internet management device 103 transmissions, also can receive the information relevant with the collection of letters data volume of internet management device 103.Collection of letters data volume and cost of use have correlationship, therefore, can infer cost of use according to 1 day collection of letters data volume.When inferring cost of use according to collection of letters data volume, even the negligible amounts of device monitor 102, the ratio that flase drop is surveyed also diminishes.
[the 10th embodiment]
After the equipment management system 101 of above-mentioned the 7th embodiment and the 8th embodiment has been appended new device monitor (LC) 102, can carry out the setting of accounts information according to following order.
At first, in the step S41 of the process flow diagram of Figure 23, after new device monitor 102 is installed at the scene that is provided with objects such as air conditioner, carry out the trial run of device monitor 102.
Then, in step S42, carry out initial daily paper report to transacter 105 from new device monitor 102.At this, current time is a state of not setting account, therefore, does not carry out initial daily paper report via internet 104 via the telephone line 115 of backup usefulness.
Then, in step S43, transacter 105 carries out daily paper and receives processing.
Then, in step S44, transacter 105 is differentiated the registration sequence number that whether has device monitor 102.When having the registration sequence number, enter step S45, when not having the registration sequence number, enter step S47.
In step S45, transacter 105 differentiates whether need issuing account, when needed, in step S46, carries out the intrinsic account distribution corresponding with the registration sequence number of device monitor 102 and handles.
On the other hand, in step S47, transacter 105 differentiates whether need issuing account, when needed, in step S48, carries out the distribution of the total account of all device monitors 102 and handles.
Then, in step S49, transacter 105 returns to new device monitor 102 with accounts information.
Then, in step S50, new device monitor 102 is set accounts information.Thus, can carry out via internet 104 from daily paper report next time.
Utilizability on the industry
The present invention can be widely used in detecting the illegal use of account or suppressing illegal use for early stage Device or program, wherein, above-mentioned account is used in order to use the public line net such as internet The authentication of carrying out.

Claims (18)

1. an account is illegally used pick-up unit (6,46,56,66,76,86), and it has:
Use amount relating value message pick-up portion (11), it receives the use amount relating value information relevant with the use amount relating value from management devices (3), wherein, the predetermined account that above-mentioned management devices (3) management is used when transacter (5) sends data via public line net (4) from a plurality of data sending devices (2), the use amount of the above-mentioned public line net (4) that above-mentioned use amount relating value produces with using above-mentioned account is associated; And
Test section (12), it compares above-mentioned use amount relating value and predetermined threshold, detects the illegal use of above-mentioned account.
2. account according to claim 1 is illegally used pick-up unit (6), wherein,
Above-mentioned threshold value is the relevant difference threshold of difference with the above-mentioned use amount relating value of each scheduled period,
Above-mentioned test section (12) compares the difference and the above-mentioned difference threshold of the use amount relating value of each scheduled period, detects the illegal use of above-mentioned account.
3. account according to claim 1 is illegally used pick-up unit (46), wherein,
Above-mentioned account illegally uses pick-up unit also to have the use amount relating value prediction section (13) of obtaining the trend prediction value of use amount relating value according to the historical record of above-mentioned use amount relating value,
Above-mentioned threshold value is above-mentioned trend prediction value,
Above-mentioned test section (12) compares above-mentioned use amount relating value and above-mentioned trend prediction value, detects the illegal use of above-mentioned account.
4. account according to claim 1 is illegally used pick-up unit (6,46,56,66,76,86), and wherein, above-mentioned use amount relating value is the cost of use of above-mentioned public line net (4).
5. account according to claim 4 is illegally used pick-up unit (56), wherein,
The collection of letters data volume that above-mentioned account illegally uses pick-up unit also to have each scheduled period of being collected mail according to above-mentioned transacter (5) is inferred the cost of use supposition portion (14) of above-mentioned cost of use,
Above-mentioned threshold value is that the guess value relevant with the integral body of the cost of use of being obtained by above-mentioned cost of use supposition portion (14) is whole guess value,
Above-mentioned test section (12) compares above-mentioned cost of use and the above-mentioned whole guess value of each scheduled period, detects illegal use.
6. account according to claim 4 is illegally used pick-up unit (66), wherein,
The collection of letters data volume that above-mentioned account illegally uses pick-up unit also to have each scheduled period of being collected mail according to above-mentioned transacter (5) is inferred the cost of use difference supposition portion (15) of difference of the above-mentioned cost of use of each scheduled period,
Above-mentioned threshold value is that the guess value relevant with the difference of the cost of use of being obtained by above-mentioned cost of use difference supposition portion (15) is the difference guess value,
Above-mentioned test section (12) compares the difference and the above-mentioned difference guess value of the above-mentioned cost of use of each scheduled period, detects illegal use.
7. account according to claim 4 is illegally used pick-up unit (76), wherein,
Above-mentioned account illegally uses pick-up unit also to have:
Cost of use supposition portion (14), its collection of letters data volume according to each scheduled period that above-mentioned transacter (5) is collected mail is inferred above-mentioned cost of use; And
Cost of use difference supposition portion (15), the collection of letters data volume of each scheduled period that it is collected mail according to above-mentioned transacter (5) is inferred the difference of the above-mentioned cost of use of each scheduled period,
Above-mentioned threshold value is that the guess value relevant with the difference of the cost of use of being obtained by above-mentioned cost of use difference supposition portion (15) is the difference guess value, is the supposition expense ratio of whole guess value with respect to the guess value relevant with the integral body of the cost of use of being obtained by above-mentioned cost of use supposition portion (14)
Above-mentioned test section (12) to the difference of the above-mentioned cost of use of each scheduled period with respect to the expense of the integral body of above-mentioned cost of use than and above-mentioned supposition expense ratio compare, detect illegal use.
8. account according to claim 4 is illegally used pick-up unit (86), wherein,
The historical record that above-mentioned account illegally uses pick-up unit also to have the collection of letters data volume of each scheduled period of being collected mail according to above-mentioned transacter (5) is obtained the cost of use prediction section (16) of the expense trend prediction value of cost of use,
Above-mentioned threshold value is an expense trend prediction value,
Above-mentioned test section (12) compares above-mentioned cost of use and the above-mentioned expense trend prediction value of each scheduled period, detects the illegal use of above-mentioned account.
9. illegally use pick-up unit (6,46,56,66,76,86) according to any described account in the claim 1~8, wherein, above-mentioned data sending device (2) is a device monitor.
10. account according to claim 1 is illegally used pick-up unit (46,56,66,76,86), wherein,
Above-mentioned threshold value is to use above-mentioned account with above-mentioned transacter (5) and the related transacter side use amount relating value of use amount of the above-mentioned public line net (4) that produces,
The related management devices side use amount relating value and the above-mentioned transacter side use amount relating value of use amount of the above-mentioned public line net (4) that above-mentioned test section (12) produces using above-mentioned account with above-mentioned management devices (3) compares, and detects the illegal use of above-mentioned account.
11. a transacter (5), it has:
Use amount relating value message pick-up function, receive the use amount relating value information relevant from management devices (3) with the use amount relating value, wherein, the predetermined account that above-mentioned management devices (3) management is used when transacter (5) sends data via public line net (4) from a plurality of data sending devices (2), the use amount of the public line net (4) that above-mentioned use amount relating value produces with using above-mentioned account is related; And
Measuring ability compares above-mentioned use amount relating value and predetermined threshold, detects the illegal use of above-mentioned account.
12. an account is illegally used trace routine, it comprises:
Use amount relating value message pick-up step, receive the use amount relating value information relevant from management devices (3) with the use amount relating value, wherein, the predetermined account that above-mentioned management devices (3) management is used when transacter (5) sends data via public line net (4) from a plurality of data sending devices (2), the use amount of the public line net (4) that above-mentioned use amount relating value produces with using above-mentioned account is related; And
Detect step, above-mentioned use amount relating value and predetermined threshold are compared, detect the illegal use of above-mentioned account.
13. an account is illegally used restraining device (108), it has:
Account storage part (106), it stores the password of the 1st account, the 2nd account and each account used via public line net (104) from a plurality of data sending devices (102) when transacter (105) sends data;
Account selection portion (109), it is every the scheduled period selection that hockets from above-mentioned the 1st account and the 2nd account;
Password setting information sending part (110), it is using above-mentioned the 1st account selected by above-mentioned account selection portion (109) or any one party in the 2nd account from above-mentioned data sending device (102) when conducting interviews, and the password setting information relevant with the opposing party's the setting situation of above-mentioned password in above-mentioned the 1st account or the 2nd account is sent to above-mentioned data sending device (102);
Password rewriting portion (111), it is to managing the management devices (103) of above-mentioned the 1st account, the 2nd account and each account password, whenever through above-mentioned scheduled period the time, rewrites the above-mentioned password of the opposing party in above-mentioned the 1st account or the 2nd account; And
Password change portion (112) in its password in being stored in above-mentioned account storage part (106), whenever through above-mentioned scheduled period the time, changes the above-mentioned password of the side in above-mentioned the 1st account and the 2nd account.
14. an account is illegally used restraining device (128), it has:
Account storage part (126), itself and each data sending device (102) store a plurality of accounts used via public line net (104) from a plurality of data sending devices (102) and the password of each account accordingly when transacter (105) sends data;
Password change portion (132), it changes each password of a plurality of above-mentioned accounts every the scheduled period;
Password setting information sending part (130), it when conducting interviews, is sending to above-mentioned data sending device (102) with the password setting information relevant with the setting situation of above-mentioned password from above-mentioned data sending device (102); And
Password rewriting portion (131), it is to the management devices (103) of the password of managing a plurality of above-mentioned accounts and each account, rewrites above-mentioned password whenever through above-mentioned scheduled period the time.
15. illegally use restraining device (108,128) according to claim 13 or 14 described accounts, wherein, above-mentioned account illegally uses restraining device also to have to be used to the management database (107) of the transmission situation of managing above-mentioned password setting information.
16. account according to claim 15 is illegally used restraining device (108,128), wherein, and the state that above-mentioned management database (107) storage is relevant with the transmission situation of above-mentioned password setting information.
17. account according to claim 15 is illegally used restraining device (108,128), wherein, above-mentioned management database (107) becomes one with above-mentioned account storage part (106).
18. an account is illegally used the inhibition program, it has:
Account is selected step, every the scheduled period selection that from the 1st account and the 2nd account, hockets, wherein, above-mentioned the 1st account and the 2nd account are being used when transacter (105) sends data via public line net (104) from a plurality of data sending devices (102);
Password setting information forwarding step, above-mentioned the 1st account of selecting in use or any one party in the 2nd account be from above-mentioned data sending device (102) when conducting interviews, and the password setting information relevant with the opposing party's the setting situation of password in above-mentioned the 1st account or the 2nd account is sent to above-mentioned data sending device (102);
Password is rewritten step, whenever through above-mentioned scheduled period the time, to managing the management devices (103) of above-mentioned the 1st account, the 2nd account and each account password, rewrites the above-mentioned password of the opposing party in above-mentioned the 1st account or the 2nd account; And
The password change step whenever through above-mentioned scheduled period the time, changes the above-mentioned password of the side in above-mentioned the 1st account and the 2nd account.
CN200680031999XA 2005-08-29 2006-08-23 Account false use detecting/suppressing device, data collecting device Expired - Fee Related CN101253507B (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
JP248043/2005 2005-08-29
JP2005248043A JP3925546B2 (en) 2005-08-29 2005-08-29 Account fraud detection device, data collection device, and account fraud detection program
JP248044/2005 2005-08-29
JP2005248044A JP4020133B2 (en) 2005-08-29 2005-08-29 Account fraud suppression device and account fraud suppression program
PCT/JP2006/316499 WO2007026580A1 (en) 2005-08-29 2006-08-23 Account false use detecting/suppressing device, data collecting device, and account false use detecting/suppressing program

Publications (2)

Publication Number Publication Date
CN101253507A true CN101253507A (en) 2008-08-27
CN101253507B CN101253507B (en) 2010-08-18

Family

ID=37927948

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200680031999XA Expired - Fee Related CN101253507B (en) 2005-08-29 2006-08-23 Account false use detecting/suppressing device, data collecting device

Country Status (2)

Country Link
JP (1) JP3925546B2 (en)
CN (1) CN101253507B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105653536A (en) * 2014-11-13 2016-06-08 阿里巴巴集团控股有限公司 Method and device for data processing
CN107305662A (en) * 2016-04-25 2017-10-31 阿里巴巴集团控股有限公司 Recognize the method and device of violation account
CN112085497A (en) * 2020-08-28 2020-12-15 银清科技有限公司 User account data processing method and device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5598112B2 (en) * 2009-06-22 2014-10-01 横河電機株式会社 Method and system for creating a security threat report in a plant

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4109467B2 (en) * 2002-02-28 2008-07-02 株式会社リコー Authentication information management apparatus and authentication information management system
GB2396780A (en) * 2002-12-27 2004-06-30 Nokia Corp Providing games to a mobile communication device for use online and offline
JP2004295799A (en) * 2003-03-28 2004-10-21 Osaka Gas Co Ltd Remote control system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105653536A (en) * 2014-11-13 2016-06-08 阿里巴巴集团控股有限公司 Method and device for data processing
CN105653536B (en) * 2014-11-13 2018-10-23 阿里巴巴集团控股有限公司 Data processing method and device
CN107305662A (en) * 2016-04-25 2017-10-31 阿里巴巴集团控股有限公司 Recognize the method and device of violation account
CN112085497A (en) * 2020-08-28 2020-12-15 银清科技有限公司 User account data processing method and device

Also Published As

Publication number Publication date
JP2007065773A (en) 2007-03-15
CN101253507B (en) 2010-08-18
JP3925546B2 (en) 2007-06-06

Similar Documents

Publication Publication Date Title
RU2446610C2 (en) Stream-oriented setup for working in amr/ami-service networks
US10212055B2 (en) System and method for dynamically grouping devices based on present device conditions
US8286036B2 (en) Objective assessment of application crashes from a customer environment
US5758077A (en) Service-centric monitoring system and method for monitoring of distributed services in a computing network
CN101689235B (en) User authentication device, user authentication method
CN101617501B (en) Method, product and system for operating a communications network
EP1936529A1 (en) Account false use detecting/suppressing device, data collecting device, and account false use detecting/suppressing program
CN106487574A (en) Automatic operating safeguards monitoring system
US20050010434A1 (en) Vending machine management system and method of managing vending machines
JP2008530637A (en) Digital rights management system adaptable for multiple device domains
KR20140090194A (en) Providing per-application resource usage information
CN103593376A (en) Method and device for collecting user behavior data
CN106104495A (en) Information processor and the method for supervision
WO2004044804A1 (en) Rental estimation method
CN108874559A (en) electronic device, distributed system service link analysis method and storage medium
CN101253507B (en) Account false use detecting/suppressing device, data collecting device
CN103168279B (en) Data transmission method and control system
CN102859505B (en) The management method of management system and computer system
WO2003036874A2 (en) Communication system
US20060200794A1 (en) System and method for managing user interaction data in a networked environment
WO2003005735A1 (en) System and method for broadband capacity tracking
JP5752932B2 (en) Device information management system
CN106469091B (en) For distributing the method and apparatus of available area
CN107784463A (en) Inventory information processing method, system and equipment
CN101231654A (en) Document information management apparatus and document information management method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100818

Termination date: 20110823