JP2005322261A5 - - Google Patents

Download PDF

Info

Publication number
JP2005322261A5
JP2005322261A5 JP2005156427A JP2005156427A JP2005322261A5 JP 2005322261 A5 JP2005322261 A5 JP 2005322261A5 JP 2005156427 A JP2005156427 A JP 2005156427A JP 2005156427 A JP2005156427 A JP 2005156427A JP 2005322261 A5 JP2005322261 A5 JP 2005322261A5
Authority
JP
Japan
Prior art keywords
data
output
output instruction
computer
unauthorized
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP2005156427A
Other languages
Japanese (ja)
Other versions
JP2005322261A (en
Filing date
Publication date
Application filed filed Critical
Priority to JP2005156427A priority Critical patent/JP2005322261A/en
Priority claimed from JP2005156427A external-priority patent/JP2005322261A/en
Publication of JP2005322261A publication Critical patent/JP2005322261A/en
Publication of JP2005322261A5 publication Critical patent/JP2005322261A5/ja
Pending legal-status Critical Current

Links

Claims (3)

コンピュータに不正な操作を実行させる不正データを監視して外部出力装置への不正な出力を停止させるためのプログラムであって、前記コンピュータに、
前記コンピュータと外部デバイスを接続する外部接続バスを通じて、外部出力装置に出力するための出力指示データを取得するステップと、
前記出力指示データが不正データであると判定するルールを格納する判定ルール格納部を参照して、前記出力指示データが不正データであるかを判定するステップと、
前記不正データであるかを判定するステップにおいて不正データであると判定された場合には、前記出力指示データにより実行される出力指示操作を、ドライバの実行する処理を停止させることにより停止させるステップと、
を実行させることを特徴とする不正監視プログラム。
A program for monitoring unauthorized data that causes a computer to perform unauthorized operations and stopping unauthorized output to an external output device , wherein the computer
Obtaining output instruction data for output to an external output device through an external connection bus connecting the computer and an external device;
Referring to a determination rule storage unit that stores a rule for determining that the output instruction data is illegal data, and determining whether the output instruction data is illegal data;
Stopping the output instruction operation executed by the output instruction data by stopping the process executed by the driver when it is determined in the step of determining whether the data is illegal data; ,
A fraud monitoring program characterized in that it is executed .
コンピュータに不正な操作を実行させる不正データを監視して外部出力装置への不正な出力を停止させるための方法であって、
前記コンピュータが、前記コンピュータと外部デバイスを接続する外部接続バスを通じて、外部出力装置に出力するための出力指示データを取得するステップと、
前記コンピュータが、前記出力指示データが不正データであると判定するルールを格納する判定ルール格納部を参照して、前記出力指示データが不正データであるかを判定するステップと、
前記コンピュータが、前記不正データであるかを判定するステップにおいて不正データであると判定された場合には、前記出力指示データにより実行される出力指示操作を、ドライバの実行する処理を停止させることにより停止させるステップと、
を有することを特徴とする不正監視の方法。
A method for monitoring unauthorized data that causes a computer to perform unauthorized operations and stopping unauthorized output to an external output device ,
The computer obtaining output instruction data for output to an external output device through an external connection bus connecting the computer and an external device;
The computer refers to a determination rule storage that stores a rule for determining that the output instruction data is illegal data, and determines whether the output instruction data is illegal data;
When the computer determines that the data is illegal data in the step of determining whether the data is illegal data, the output instruction operation executed by the output instruction data is stopped by the process executed by the driver. A step to stop,
The method of fraud audit, characterized in that it comprises a.
コンピュータに不正な操作を実行させる不正データを監視して外部出力装置への不正な出力を停止させるためのシステムであって、
前記コンピュータと外部デバイスを接続する外部接続バスを通じて、外部出力装置に出力するための出力指示データを取得するデータ取得手段と、
前記出力指示データが不正データであると判定するルールを格納する判定ルール格納手段と、
前記判定ルール格納手段を参照して、前記出力指示データが不正データであるかを判定する不正データ判定手段と、
前記不正データ判定手段において不正データであると判定された場合には、前記出力指示データにより実行される出力指示操作を、ドライバの実行する処理を停止させることにより停止させる停止手段と、
を備えることを特徴とする不正監視システム。
A system for monitoring unauthorized data that causes a computer to perform unauthorized operations and stopping unauthorized output to an external output device ,
Data acquisition means for acquiring output instruction data for output to an external output device through an external connection bus connecting the computer and an external device;
Determination rule storage means for storing a rule for determining that the output instruction data is illegal data;
Referring to the determination rule storage means, an unauthorized data determination means for determining whether the output instruction data is unauthorized data;
Stop means for stopping the output instruction operation executed by the output instruction data by stopping the process executed by the driver when the illegal data determination means determines that the data is illegal data;
Fraud monitoring system comprising: a.
JP2005156427A 2005-05-27 2005-05-27 Irregularity monitoring program, irregularity monitoring method and irregularity monitoring system Pending JP2005322261A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2005156427A JP2005322261A (en) 2005-05-27 2005-05-27 Irregularity monitoring program, irregularity monitoring method and irregularity monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2005156427A JP2005322261A (en) 2005-05-27 2005-05-27 Irregularity monitoring program, irregularity monitoring method and irregularity monitoring system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
JP2003387212A Division JP3758661B2 (en) 2003-11-17 2003-11-17 Fraud monitoring program, fraud monitoring method and fraud monitoring system

Publications (2)

Publication Number Publication Date
JP2005322261A JP2005322261A (en) 2005-11-17
JP2005322261A5 true JP2005322261A5 (en) 2006-12-28

Family

ID=35469446

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2005156427A Pending JP2005322261A (en) 2005-05-27 2005-05-27 Irregularity monitoring program, irregularity monitoring method and irregularity monitoring system

Country Status (1)

Country Link
JP (1) JP2005322261A (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5051786B2 (en) * 2009-05-29 2012-10-17 キヤノンマーケティングジャパン株式会社 Information processing apparatus, information processing method, and program
WO2012001795A1 (en) 2010-06-30 2012-01-05 富士通株式会社 Trail log analysis system, trail log analysis program, and trail log analysis method
WO2015155888A1 (en) * 2014-04-11 2015-10-15 株式会社Ubic Information leakage sensing device, information leakage sensing method, and information leakage sensing program
US10419468B2 (en) * 2017-07-11 2019-09-17 The Boeing Company Cyber security system with adaptive machine learning features

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000253241A (en) * 1999-02-26 2000-09-14 Matsushita Electric Ind Co Ltd Data monitoring method and device therefor
JP2000253240A (en) * 1999-02-26 2000-09-14 Matsushita Electric Ind Co Ltd Duplicating device
WO2000051338A1 (en) * 1999-02-26 2000-08-31 Matsushita Electric Industrial Co., Ltd. Data monitoring method, data monitoring device, copying device, and storage medium

Similar Documents

Publication Publication Date Title
JP2005339561A5 (en)
WO2007078538A3 (en) Coordinating access to memory locations for hardware transactional memory transactions and software transactional memory transactions
JP2008033561A5 (en)
TWI447646B (en) Data transmission device and method for merging multiple instruction
JP2010068509A5 (en)
JP2008034076A5 (en)
JP2010191717A5 (en)
EP2290528A3 (en) Efficient execution of memory barrier bus commands
HK1149611A1 (en) Consumer abuse detection system and method
WO2007141206A3 (en) System, method and computer program product for secure access control to a storage device
WO2014099678A3 (en) Method and apparatus for using sensors on a portable electronic device to verify transactions
WO2009006070A3 (en) Techniques for managing annotation transformations for context changes
WO2007004219A3 (en) System, device and method of verifying that a code is executed by a processor
JP2010097524A5 (en)
JP2009005019A5 (en)
JP2005322261A5 (en)
JP2014050976A5 (en) Information processing apparatus, control method thereof, and program
JP2015523668A5 (en)
WO2007109707A3 (en) Method and system for rendering harmless a locked pestware executable object
JP2011014106A5 (en)
JP2011198185A5 (en)
WO2009013831A1 (en) Information processing terminal and falsification verification method
EP2618276A3 (en) Systems and methods for locating application specific data
EP2151760A3 (en) Method and apparatus for detecting a data access violation
JP2010066797A5 (en)