DE3678786D1 - Verfahren zum ueberfuehren von unbefugtem rechnerzugriff. - Google Patents

Verfahren zum ueberfuehren von unbefugtem rechnerzugriff.

Info

Publication number
DE3678786D1
DE3678786D1 DE8686112768T DE3678786T DE3678786D1 DE 3678786 D1 DE3678786 D1 DE 3678786D1 DE 8686112768 T DE8686112768 T DE 8686112768T DE 3678786 T DE3678786 T DE 3678786T DE 3678786 D1 DE3678786 D1 DE 3678786D1
Authority
DE
Germany
Prior art keywords
transferring
computer access
unauthorized computer
unauthorized
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
DE8686112768T
Other languages
English (en)
Inventor
Henry Herbert Kelley
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Application granted granted Critical
Publication of DE3678786D1 publication Critical patent/DE3678786D1/de
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2127Bluffing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
DE8686112768T 1985-10-23 1986-09-16 Verfahren zum ueberfuehren von unbefugtem rechnerzugriff. Expired - Fee Related DE3678786D1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US06/790,582 US4719566A (en) 1985-10-23 1985-10-23 Method for entrapping unauthorized computer access

Publications (1)

Publication Number Publication Date
DE3678786D1 true DE3678786D1 (de) 1991-05-23

Family

ID=25151144

Family Applications (1)

Application Number Title Priority Date Filing Date
DE8686112768T Expired - Fee Related DE3678786D1 (de) 1985-10-23 1986-09-16 Verfahren zum ueberfuehren von unbefugtem rechnerzugriff.

Country Status (4)

Country Link
US (1) US4719566A (de)
EP (1) EP0219685B1 (de)
JP (1) JPS6299831A (de)
DE (1) DE3678786D1 (de)

Families Citing this family (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5014234A (en) * 1986-08-25 1991-05-07 Ncr Corporation System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software
US4896290A (en) * 1987-08-24 1990-01-23 Wang Laboratories, Inc. Method for routing events from key strokes in a multi-processing computer systems
JPH01175057A (ja) * 1987-12-28 1989-07-11 Toshiba Corp セキュリティの動的管理方法
CA1314101C (en) * 1988-02-17 1993-03-02 Henry Shao-Lin Teng Expert system for security inspection of a digital computer system in a network environment
US4962449A (en) * 1988-04-11 1990-10-09 Artie Schlesinger Computer security system having remote location recognition and remote location lock-out
US4991089A (en) * 1988-09-30 1991-02-05 Ibm Corp. Method for establishing current terminal addresses for system users processing distributed application programs in an SNA LU 6.2 network environment
WO1990005340A1 (en) * 1988-11-04 1990-05-17 Lama Systems Inc. Personal computer access control system
US5263158A (en) * 1990-02-15 1993-11-16 International Business Machines Corporation Method and system for variable authority level user access control in a distributed data processing system having multiple resource manager
US5375244A (en) * 1992-05-29 1994-12-20 At&T Corp. System and method for granting access to a resource
US5469576A (en) * 1993-03-22 1995-11-21 International Business Machines Corporation Front end for file access controller
FR2706210B1 (fr) * 1993-06-08 1995-07-21 Bull Cp8 Procédé d'authentification d'un objet portatif par un terminal hors ligne, objet portatif et terminal correspondants.
GB2281645A (en) * 1993-09-03 1995-03-08 Ibm Control of access to a networked system
US5465387A (en) * 1993-10-08 1995-11-07 At&T Corp. Adaptive fraud monitoring and control
US5495521A (en) * 1993-11-12 1996-02-27 At&T Corp. Method and means for preventing fraudulent use of telephone network
JP2757777B2 (ja) * 1994-05-26 1998-05-25 住友金属工業株式会社 メモリの不正アクセス検出方法及びシステム
GB2381353B (en) * 1998-05-06 2003-06-18 Prc Inc Dynamic system defense for information warfare
US6748540B1 (en) 1999-06-17 2004-06-08 International Business Machines Corporation Method and apparatus for detection and notification of unauthorized access attempts in a distributed data processing system
US7117532B1 (en) * 1999-07-14 2006-10-03 Symantec Corporation System and method for generating fictitious content for a computer
AU6107600A (en) * 1999-07-14 2001-01-30 Recourse Technologies, Inc. System and method for computer security
US6981155B1 (en) * 1999-07-14 2005-12-27 Symantec Corporation System and method for computer security
US7203962B1 (en) * 1999-08-30 2007-04-10 Symantec Corporation System and method for using timestamps to detect attacks
US6907533B2 (en) * 2000-07-14 2005-06-14 Symantec Corporation System and method for computer security using multiple cages
US8087083B1 (en) * 2002-01-04 2011-12-27 Verizon Laboratories Inc. Systems and methods for detecting a network sniffer
US20030172228A1 (en) * 2002-03-07 2003-09-11 International Business Machines Corporation Method and system for extending a hardfile partition table
US7065627B2 (en) 2002-03-25 2006-06-20 International Business Machines Corporation Method and system for providing an event driven image for a boot record
JP2004153485A (ja) * 2002-10-30 2004-05-27 Jens Corp 通信セキュリティシステム
US8769680B2 (en) * 2003-06-12 2014-07-01 International Business Machines Corporation Alert passwords for detecting password attacks on systems
US7299367B2 (en) * 2003-11-07 2007-11-20 International Business Machines Corporation Methods, systems and computer program products for developing resource monitoring systems from observational data
US20060041940A1 (en) * 2004-08-21 2006-02-23 Ko-Cheng Fang Computer data protecting method
EP1638331A1 (de) * 2004-09-17 2006-03-22 Nagravision S.A. Verfahren zum Verwalten von Zugangsmitteln zu Daten mit bedingtem Zugang
US7934258B2 (en) * 2006-08-17 2011-04-26 Informod Control Inc. System and method for remote authentication security management
JP5015044B2 (ja) * 2008-03-11 2012-08-29 Necパーソナルコンピュータ株式会社 情報処理システム、情報端末、および、プログラム
JP5015043B2 (ja) * 2008-03-11 2012-08-29 Necパーソナルコンピュータ株式会社 情報処理システム、情報端末、および、プログラム
JP5282477B2 (ja) * 2008-08-12 2013-09-04 富士通株式会社 認証方法、プログラム、及び認証装置
US20110196759A1 (en) * 2010-02-05 2011-08-11 Accelerize New Media, Inc. Lead generation management system
JP5613855B1 (ja) * 2014-04-23 2014-10-29 株式会社 ディー・エヌ・エー ユーザ認証システム
US9270670B1 (en) 2014-10-10 2016-02-23 Joseph Fitzgerald Systems and methods for providing a covert password manager
JP5996615B2 (ja) * 2014-11-19 2016-09-21 京セラドキュメントソリューションズ株式会社 電子装置および電子装置のユーザー認証方法
US11050769B2 (en) * 2018-02-05 2021-06-29 Bank Of America Corporation Controlling dynamic user interface functionality using a machine learning control engine

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4087856A (en) * 1976-06-30 1978-05-02 International Business Machines Corporation Location dependence for assuring the security of system-control operations
US4096356A (en) * 1977-07-26 1978-06-20 Bell Telephone Laboratories, Incorporated Call restriction arrangement
US4525599A (en) * 1982-05-21 1985-06-25 General Computer Corporation Software protection methods and apparatus
US4531023A (en) * 1982-08-13 1985-07-23 Hlf Corporation Computer security system for a time shared computer accessed over telephone lines
JPS5936860A (ja) * 1982-08-26 1984-02-29 Nitsuko Ltd 不本意なデ−タ入力の識別方式
JPS59151261A (ja) * 1983-02-18 1984-08-29 Fujitsu Ltd 取引保障方式
DE3342651A1 (de) * 1983-11-25 1985-06-05 Karl-Hans 6233 Kelkheim Mau Verfahren zur absicherung des zugriffs an terminals

Also Published As

Publication number Publication date
EP0219685B1 (de) 1991-04-17
US4719566A (en) 1988-01-12
EP0219685A2 (de) 1987-04-29
EP0219685A3 (en) 1988-07-20
JPS6299831A (ja) 1987-05-09
JPH0325820B2 (de) 1991-04-09

Similar Documents

Publication Publication Date Title
DE3678786D1 (de) Verfahren zum ueberfuehren von unbefugtem rechnerzugriff.
DE3677425D1 (de) Verfahren zum filmdragieren von hartkapseln.
DE3670641D1 (de) Verfahren zum ableiten von polynukleotiden.
DE3672059D1 (de) Verfahren zum komprimieren von zwei-pegeldaten.
DE3677430D1 (de) Verfahren und anordnung zur datenuebertragung.
DE3682928D1 (de) Verfahren zum polymerisieren von aethylen.
DE3689574D1 (de) System zum Feststellen der Echtheit von Software in einer Informationsverarbeitungsanlage.
DE3584738D1 (de) Vorrichtung zum schutz von rechnersoftware.
DE3684380D1 (de) Verfahren zum einebnen von halbleiteranordnungen.
DE68915006D1 (de) System zum Generieren von Musterdaten.
DE3680824D1 (de) Verfahren zum erzeugen von graphit.
DE3673102D1 (de) Verfahren zum stabilisieren von organopolysiloxanen.
DE3882862D1 (de) Verfahren zum extrahieren von atp.
DE3577408D1 (de) Verfahren zum einlegen von dokumenten.
DE3578139D1 (de) Geraet zum automatischen ueberpruefen von bedruckten etiketten.
DE3668028D1 (de) Verfahren zum handhaben eines sicherheitssystems.
DE3684306D1 (de) Verfahren zum aufzeichnen von optischer information.
DE3481144D1 (de) Verfahren zum identifizieren von objekten.
DE3771670D1 (de) Verfahren zum entschleimen von triglyceridoelen.
DE3767747D1 (de) Verfahren zum bestimmen von abmessungen.
DE3688517D1 (de) Anpassungsfaehiges verfahren zum komprimieren von zeichendaten.
DE3672358D1 (de) Verfahren zum auswaehlen von informationen eines plattenspielers.
DE3777513D1 (de) Systemen zum kopieren von schraegschriftaufzeichnungen.
DE3685845D1 (de) Vorrichtung zum aufnehmen von dokumenten.
DE3780494D1 (de) Geraet und verfahren zum drucken von information.

Legal Events

Date Code Title Description
8364 No opposition during term of opposition
8339 Ceased/non-payment of the annual fee