JP2005322261A5 - - Google Patents
Download PDFInfo
- Publication number
- JP2005322261A5 JP2005322261A5 JP2005156427A JP2005156427A JP2005322261A5 JP 2005322261 A5 JP2005322261 A5 JP 2005322261A5 JP 2005156427 A JP2005156427 A JP 2005156427A JP 2005156427 A JP2005156427 A JP 2005156427A JP 2005322261 A5 JP2005322261 A5 JP 2005322261A5
- Authority
- JP
- Japan
- Prior art keywords
- data
- output
- output instruction
- computer
- unauthorized
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Claims (3)
前記コンピュータと外部デバイスを接続する外部接続バスを通じて、外部出力装置に出力するための出力指示データを取得するステップと、
前記出力指示データが不正データであると判定するルールを格納する判定ルール格納部を参照して、前記出力指示データが不正データであるかを判定するステップと、
前記不正データであるかを判定するステップにおいて不正データであると判定された場合には、前記出力指示データにより実行される出力指示操作を、ドライバの実行する処理を停止させることにより停止させるステップと、
を実行させることを特徴とする不正監視プログラム。 A program for monitoring unauthorized data that causes a computer to perform unauthorized operations and stopping unauthorized output to an external output device , wherein the computer
Obtaining output instruction data for output to an external output device through an external connection bus connecting the computer and an external device;
Referring to a determination rule storage unit that stores a rule for determining that the output instruction data is illegal data, and determining whether the output instruction data is illegal data;
Stopping the output instruction operation executed by the output instruction data by stopping the process executed by the driver when it is determined in the step of determining whether the data is illegal data; ,
A fraud monitoring program characterized in that it is executed .
前記コンピュータが、前記コンピュータと外部デバイスを接続する外部接続バスを通じて、外部出力装置に出力するための出力指示データを取得するステップと、
前記コンピュータが、前記出力指示データが不正データであると判定するルールを格納する判定ルール格納部を参照して、前記出力指示データが不正データであるかを判定するステップと、
前記コンピュータが、前記不正データであるかを判定するステップにおいて不正データであると判定された場合には、前記出力指示データにより実行される出力指示操作を、ドライバの実行する処理を停止させることにより停止させるステップと、
を有することを特徴とする不正監視の方法。 A method for monitoring unauthorized data that causes a computer to perform unauthorized operations and stopping unauthorized output to an external output device ,
The computer obtaining output instruction data for output to an external output device through an external connection bus connecting the computer and an external device;
The computer refers to a determination rule storage that stores a rule for determining that the output instruction data is illegal data, and determines whether the output instruction data is illegal data;
When the computer determines that the data is illegal data in the step of determining whether the data is illegal data, the output instruction operation executed by the output instruction data is stopped by the process executed by the driver. A step to stop,
The method of fraud audit, characterized in that it comprises a.
前記コンピュータと外部デバイスを接続する外部接続バスを通じて、外部出力装置に出力するための出力指示データを取得するデータ取得手段と、
前記出力指示データが不正データであると判定するルールを格納する判定ルール格納手段と、
前記判定ルール格納手段を参照して、前記出力指示データが不正データであるかを判定する不正データ判定手段と、
前記不正データ判定手段において不正データであると判定された場合には、前記出力指示データにより実行される出力指示操作を、ドライバの実行する処理を停止させることにより停止させる停止手段と、
を備えることを特徴とする不正監視システム。
A system for monitoring unauthorized data that causes a computer to perform unauthorized operations and stopping unauthorized output to an external output device ,
Data acquisition means for acquiring output instruction data for output to an external output device through an external connection bus connecting the computer and an external device;
Determination rule storage means for storing a rule for determining that the output instruction data is illegal data;
Referring to the determination rule storage means, an unauthorized data determination means for determining whether the output instruction data is unauthorized data;
Stop means for stopping the output instruction operation executed by the output instruction data by stopping the process executed by the driver when the illegal data determination means determines that the data is illegal data;
Fraud monitoring system comprising: a.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2005156427A JP2005322261A (en) | 2005-05-27 | 2005-05-27 | Irregularity monitoring program, irregularity monitoring method and irregularity monitoring system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2005156427A JP2005322261A (en) | 2005-05-27 | 2005-05-27 | Irregularity monitoring program, irregularity monitoring method and irregularity monitoring system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2003387212A Division JP3758661B2 (en) | 2003-11-17 | 2003-11-17 | Fraud monitoring program, fraud monitoring method and fraud monitoring system |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2005322261A JP2005322261A (en) | 2005-11-17 |
JP2005322261A5 true JP2005322261A5 (en) | 2006-12-28 |
Family
ID=35469446
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2005156427A Pending JP2005322261A (en) | 2005-05-27 | 2005-05-27 | Irregularity monitoring program, irregularity monitoring method and irregularity monitoring system |
Country Status (1)
Country | Link |
---|---|
JP (1) | JP2005322261A (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5051786B2 (en) * | 2009-05-29 | 2012-10-17 | キヤノンマーケティングジャパン株式会社 | Information processing apparatus, information processing method, and program |
WO2012001795A1 (en) | 2010-06-30 | 2012-01-05 | 富士通株式会社 | Trail log analysis system, trail log analysis program, and trail log analysis method |
WO2015155888A1 (en) * | 2014-04-11 | 2015-10-15 | 株式会社Ubic | Information leakage sensing device, information leakage sensing method, and information leakage sensing program |
US10419468B2 (en) * | 2017-07-11 | 2019-09-17 | The Boeing Company | Cyber security system with adaptive machine learning features |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000253241A (en) * | 1999-02-26 | 2000-09-14 | Matsushita Electric Ind Co Ltd | Data monitoring method and device therefor |
JP2000253240A (en) * | 1999-02-26 | 2000-09-14 | Matsushita Electric Ind Co Ltd | Duplicating device |
WO2000051338A1 (en) * | 1999-02-26 | 2000-08-31 | Matsushita Electric Industrial Co., Ltd. | Data monitoring method, data monitoring device, copying device, and storage medium |
-
2005
- 2005-05-27 JP JP2005156427A patent/JP2005322261A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP2005339561A5 (en) | ||
WO2007078538A3 (en) | Coordinating access to memory locations for hardware transactional memory transactions and software transactional memory transactions | |
JP2008033561A5 (en) | ||
TWI447646B (en) | Data transmission device and method for merging multiple instruction | |
JP2010068509A5 (en) | ||
JP2008034076A5 (en) | ||
JP2010191717A5 (en) | ||
EP2290528A3 (en) | Efficient execution of memory barrier bus commands | |
HK1149611A1 (en) | Consumer abuse detection system and method | |
WO2007141206A3 (en) | System, method and computer program product for secure access control to a storage device | |
WO2014099678A3 (en) | Method and apparatus for using sensors on a portable electronic device to verify transactions | |
WO2009006070A3 (en) | Techniques for managing annotation transformations for context changes | |
WO2007004219A3 (en) | System, device and method of verifying that a code is executed by a processor | |
JP2010097524A5 (en) | ||
JP2009005019A5 (en) | ||
JP2005322261A5 (en) | ||
JP2014050976A5 (en) | Information processing apparatus, control method thereof, and program | |
JP2015523668A5 (en) | ||
WO2007109707A3 (en) | Method and system for rendering harmless a locked pestware executable object | |
JP2011014106A5 (en) | ||
JP2011198185A5 (en) | ||
WO2009013831A1 (en) | Information processing terminal and falsification verification method | |
EP2618276A3 (en) | Systems and methods for locating application specific data | |
EP2151760A3 (en) | Method and apparatus for detecting a data access violation | |
JP2010066797A5 (en) |