DE3678786D1 - Verfahren zum ueberfuehren von unbefugtem rechnerzugriff. - Google Patents
Verfahren zum ueberfuehren von unbefugtem rechnerzugriff.Info
- Publication number
- DE3678786D1 DE3678786D1 DE8686112768T DE3678786T DE3678786D1 DE 3678786 D1 DE3678786 D1 DE 3678786D1 DE 8686112768 T DE8686112768 T DE 8686112768T DE 3678786 T DE3678786 T DE 3678786T DE 3678786 D1 DE3678786 D1 DE 3678786D1
- Authority
- DE
- Germany
- Prior art keywords
- transferring
- computer access
- unauthorized computer
- unauthorized
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2127—Bluffing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US06/790,582 US4719566A (en) | 1985-10-23 | 1985-10-23 | Method for entrapping unauthorized computer access |
Publications (1)
Publication Number | Publication Date |
---|---|
DE3678786D1 true DE3678786D1 (de) | 1991-05-23 |
Family
ID=25151144
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE8686112768T Expired - Fee Related DE3678786D1 (de) | 1985-10-23 | 1986-09-16 | Verfahren zum ueberfuehren von unbefugtem rechnerzugriff. |
Country Status (4)
Country | Link |
---|---|
US (1) | US4719566A (de) |
EP (1) | EP0219685B1 (de) |
JP (1) | JPS6299831A (de) |
DE (1) | DE3678786D1 (de) |
Families Citing this family (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5014234A (en) * | 1986-08-25 | 1991-05-07 | Ncr Corporation | System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software |
US4896290A (en) * | 1987-08-24 | 1990-01-23 | Wang Laboratories, Inc. | Method for routing events from key strokes in a multi-processing computer systems |
JPH01175057A (ja) * | 1987-12-28 | 1989-07-11 | Toshiba Corp | セキュリティの動的管理方法 |
CA1314101C (en) * | 1988-02-17 | 1993-03-02 | Henry Shao-Lin Teng | Expert system for security inspection of a digital computer system in a network environment |
US4962449A (en) * | 1988-04-11 | 1990-10-09 | Artie Schlesinger | Computer security system having remote location recognition and remote location lock-out |
US4991089A (en) * | 1988-09-30 | 1991-02-05 | Ibm Corp. | Method for establishing current terminal addresses for system users processing distributed application programs in an SNA LU 6.2 network environment |
WO1990005340A1 (en) * | 1988-11-04 | 1990-05-17 | Lama Systems Inc. | Personal computer access control system |
US5263158A (en) * | 1990-02-15 | 1993-11-16 | International Business Machines Corporation | Method and system for variable authority level user access control in a distributed data processing system having multiple resource manager |
US5375244A (en) * | 1992-05-29 | 1994-12-20 | At&T Corp. | System and method for granting access to a resource |
US5469576A (en) * | 1993-03-22 | 1995-11-21 | International Business Machines Corporation | Front end for file access controller |
FR2706210B1 (fr) * | 1993-06-08 | 1995-07-21 | Bull Cp8 | Procédé d'authentification d'un objet portatif par un terminal hors ligne, objet portatif et terminal correspondants. |
GB2281645A (en) * | 1993-09-03 | 1995-03-08 | Ibm | Control of access to a networked system |
US5465387A (en) * | 1993-10-08 | 1995-11-07 | At&T Corp. | Adaptive fraud monitoring and control |
US5495521A (en) * | 1993-11-12 | 1996-02-27 | At&T Corp. | Method and means for preventing fraudulent use of telephone network |
JP2757777B2 (ja) * | 1994-05-26 | 1998-05-25 | 住友金属工業株式会社 | メモリの不正アクセス検出方法及びシステム |
GB2381353B (en) * | 1998-05-06 | 2003-06-18 | Prc Inc | Dynamic system defense for information warfare |
US6748540B1 (en) | 1999-06-17 | 2004-06-08 | International Business Machines Corporation | Method and apparatus for detection and notification of unauthorized access attempts in a distributed data processing system |
US7117532B1 (en) * | 1999-07-14 | 2006-10-03 | Symantec Corporation | System and method for generating fictitious content for a computer |
AU6107600A (en) * | 1999-07-14 | 2001-01-30 | Recourse Technologies, Inc. | System and method for computer security |
US6981155B1 (en) * | 1999-07-14 | 2005-12-27 | Symantec Corporation | System and method for computer security |
US7203962B1 (en) * | 1999-08-30 | 2007-04-10 | Symantec Corporation | System and method for using timestamps to detect attacks |
US6907533B2 (en) * | 2000-07-14 | 2005-06-14 | Symantec Corporation | System and method for computer security using multiple cages |
US8087083B1 (en) * | 2002-01-04 | 2011-12-27 | Verizon Laboratories Inc. | Systems and methods for detecting a network sniffer |
US20030172228A1 (en) * | 2002-03-07 | 2003-09-11 | International Business Machines Corporation | Method and system for extending a hardfile partition table |
US7065627B2 (en) | 2002-03-25 | 2006-06-20 | International Business Machines Corporation | Method and system for providing an event driven image for a boot record |
JP2004153485A (ja) * | 2002-10-30 | 2004-05-27 | Jens Corp | 通信セキュリティシステム |
US8769680B2 (en) * | 2003-06-12 | 2014-07-01 | International Business Machines Corporation | Alert passwords for detecting password attacks on systems |
US7299367B2 (en) * | 2003-11-07 | 2007-11-20 | International Business Machines Corporation | Methods, systems and computer program products for developing resource monitoring systems from observational data |
US20060041940A1 (en) * | 2004-08-21 | 2006-02-23 | Ko-Cheng Fang | Computer data protecting method |
EP1638331A1 (de) * | 2004-09-17 | 2006-03-22 | Nagravision S.A. | Verfahren zum Verwalten von Zugangsmitteln zu Daten mit bedingtem Zugang |
US7934258B2 (en) * | 2006-08-17 | 2011-04-26 | Informod Control Inc. | System and method for remote authentication security management |
JP5015044B2 (ja) * | 2008-03-11 | 2012-08-29 | Necパーソナルコンピュータ株式会社 | 情報処理システム、情報端末、および、プログラム |
JP5015043B2 (ja) * | 2008-03-11 | 2012-08-29 | Necパーソナルコンピュータ株式会社 | 情報処理システム、情報端末、および、プログラム |
JP5282477B2 (ja) * | 2008-08-12 | 2013-09-04 | 富士通株式会社 | 認証方法、プログラム、及び認証装置 |
US20110196759A1 (en) * | 2010-02-05 | 2011-08-11 | Accelerize New Media, Inc. | Lead generation management system |
JP5613855B1 (ja) * | 2014-04-23 | 2014-10-29 | 株式会社 ディー・エヌ・エー | ユーザ認証システム |
US9270670B1 (en) | 2014-10-10 | 2016-02-23 | Joseph Fitzgerald | Systems and methods for providing a covert password manager |
JP5996615B2 (ja) * | 2014-11-19 | 2016-09-21 | 京セラドキュメントソリューションズ株式会社 | 電子装置および電子装置のユーザー認証方法 |
US11050769B2 (en) * | 2018-02-05 | 2021-06-29 | Bank Of America Corporation | Controlling dynamic user interface functionality using a machine learning control engine |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4087856A (en) * | 1976-06-30 | 1978-05-02 | International Business Machines Corporation | Location dependence for assuring the security of system-control operations |
US4096356A (en) * | 1977-07-26 | 1978-06-20 | Bell Telephone Laboratories, Incorporated | Call restriction arrangement |
US4525599A (en) * | 1982-05-21 | 1985-06-25 | General Computer Corporation | Software protection methods and apparatus |
US4531023A (en) * | 1982-08-13 | 1985-07-23 | Hlf Corporation | Computer security system for a time shared computer accessed over telephone lines |
JPS5936860A (ja) * | 1982-08-26 | 1984-02-29 | Nitsuko Ltd | 不本意なデ−タ入力の識別方式 |
JPS59151261A (ja) * | 1983-02-18 | 1984-08-29 | Fujitsu Ltd | 取引保障方式 |
DE3342651A1 (de) * | 1983-11-25 | 1985-06-05 | Karl-Hans 6233 Kelkheim Mau | Verfahren zur absicherung des zugriffs an terminals |
-
1985
- 1985-10-23 US US06/790,582 patent/US4719566A/en not_active Expired - Lifetime
-
1986
- 1986-09-08 JP JP61209802A patent/JPS6299831A/ja active Granted
- 1986-09-16 DE DE8686112768T patent/DE3678786D1/de not_active Expired - Fee Related
- 1986-09-16 EP EP86112768A patent/EP0219685B1/de not_active Expired
Also Published As
Publication number | Publication date |
---|---|
EP0219685B1 (de) | 1991-04-17 |
US4719566A (en) | 1988-01-12 |
EP0219685A2 (de) | 1987-04-29 |
EP0219685A3 (en) | 1988-07-20 |
JPS6299831A (ja) | 1987-05-09 |
JPH0325820B2 (de) | 1991-04-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE3678786D1 (de) | Verfahren zum ueberfuehren von unbefugtem rechnerzugriff. | |
DE3677425D1 (de) | Verfahren zum filmdragieren von hartkapseln. | |
DE3670641D1 (de) | Verfahren zum ableiten von polynukleotiden. | |
DE3672059D1 (de) | Verfahren zum komprimieren von zwei-pegeldaten. | |
DE3677430D1 (de) | Verfahren und anordnung zur datenuebertragung. | |
DE3682928D1 (de) | Verfahren zum polymerisieren von aethylen. | |
DE3689574D1 (de) | System zum Feststellen der Echtheit von Software in einer Informationsverarbeitungsanlage. | |
DE3584738D1 (de) | Vorrichtung zum schutz von rechnersoftware. | |
DE3684380D1 (de) | Verfahren zum einebnen von halbleiteranordnungen. | |
DE68915006D1 (de) | System zum Generieren von Musterdaten. | |
DE3680824D1 (de) | Verfahren zum erzeugen von graphit. | |
DE3673102D1 (de) | Verfahren zum stabilisieren von organopolysiloxanen. | |
DE3882862D1 (de) | Verfahren zum extrahieren von atp. | |
DE3577408D1 (de) | Verfahren zum einlegen von dokumenten. | |
DE3578139D1 (de) | Geraet zum automatischen ueberpruefen von bedruckten etiketten. | |
DE3668028D1 (de) | Verfahren zum handhaben eines sicherheitssystems. | |
DE3684306D1 (de) | Verfahren zum aufzeichnen von optischer information. | |
DE3481144D1 (de) | Verfahren zum identifizieren von objekten. | |
DE3771670D1 (de) | Verfahren zum entschleimen von triglyceridoelen. | |
DE3767747D1 (de) | Verfahren zum bestimmen von abmessungen. | |
DE3688517D1 (de) | Anpassungsfaehiges verfahren zum komprimieren von zeichendaten. | |
DE3672358D1 (de) | Verfahren zum auswaehlen von informationen eines plattenspielers. | |
DE3777513D1 (de) | Systemen zum kopieren von schraegschriftaufzeichnungen. | |
DE3685845D1 (de) | Vorrichtung zum aufnehmen von dokumenten. | |
DE3780494D1 (de) | Geraet und verfahren zum drucken von information. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
8364 | No opposition during term of opposition | ||
8339 | Ceased/non-payment of the annual fee |