JPH11134299A - Illegal network login prevention system - Google Patents
Illegal network login prevention systemInfo
- Publication number
- JPH11134299A JPH11134299A JP9330740A JP33074097A JPH11134299A JP H11134299 A JPH11134299 A JP H11134299A JP 9330740 A JP9330740 A JP 9330740A JP 33074097 A JP33074097 A JP 33074097A JP H11134299 A JPH11134299 A JP H11134299A
- Authority
- JP
- Japan
- Prior art keywords
- login
- time
- illegal
- user
- scheduled
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
Description
【0001】[0001]
【発明の属する技術分野】この発明は、次回ログイン予
定時刻を指定・登録することにより、システムへの不正
ログインを検知し、これを防止するシステムに関するも
のである。BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a system for detecting and preventing unauthorized login to a system by designating and registering the next scheduled login time.
【0002】[0002]
【従来の技術】従来の不正ログイン防止システムは、前
回ログアウト時刻をユーザーに知らせて、これをユーザ
ーが見て、不正ログインの有無を確認するものであっ
た。2. Description of the Related Art In a conventional unauthorized login prevention system, a user is notified of a previous logout time, and the user sees this to check for unauthorized login.
【0003】[0003]
【発明が解決しようとする課題】これには次のような欠
点があった。 (イ)不正ログインが確認される前に最低1回は不正ロ
グインを許してしまう。 (ロ)不正ログインの確認はユーザーが手動で行うの
で、確認のし忘れや、前回ログアウト時刻の記憶違い等
により、完全に行えない。本発明は、これらの欠点を除
くためになされたものである。This has the following disadvantages. (B) Unauthorized login is allowed at least once before the unauthorized login is confirmed. (B) Since the user manually checks for an unauthorized login, it cannot be completely performed due to forgetting to check or incorrectly remembering the previous logout time. The present invention has been made to eliminate these disadvantages.
【0004】[0004]
【課題を解決するための手段】システムのユーザーは、
ログインしてからログアウトするまでのいずれかの時点
において、次回のログイン予定時刻又は次回ログインま
での予定時間をシステムに指定・登録しておく。ログア
ウト後、指定・登録した時刻がくる前、あるいは時間が
たつ前に、本人以外が不正にログインを試みると、シス
テムはそれを不正ログインであると判断して、ログイン
を拒絶する。そして、不正アクセスがあったことを速や
かに正規のユーザーに通知する。本発明は、以上の処理
の構成よりなるネットワーク不正ログイン防止システム
である。SUMMARY OF THE INVENTION
At any time from login to logout, the next scheduled login time or the scheduled time until the next login is specified and registered in the system. After logging out, before the designated or registered time comes or before the time elapses, if an unauthorized person attempts to log in illegally, the system determines that the login is unauthorized and rejects the login. Then, the authorized user is immediately notified of the unauthorized access. The present invention is a system for preventing unauthorized log-in of a network having the above processing configuration.
【0005】[0005]
【発明の実施の形態】以下、本発明の実施の形態につい
て説明する。システムは、ログイン要求を受け付けたと
きに、以下の認証処理を行う。 (1)パスワード確認 (2)前回ログアウト前に指定・登録された、次回ログ
イン予定時刻と受付時刻の比較。 (3)受付時刻が、次回ログイン予定時刻よりも前であ
った場合、本人以外による不正ログインとみなし、
(4)以下の処理を行う。 (4)ログイン要求の拒絶。 (5)正規ユーザーへの通知。Embodiments of the present invention will be described below. The system performs the following authentication processing when receiving the login request. (1) Password confirmation (2) Comparison of next login scheduled time and reception time specified and registered before the previous logout. (3) If the reception time is before the next scheduled login time, it will be regarded as an unauthorized login by anyone other than the person,
(4) Perform the following processing. (4) Rejection of login request. (5) Notification to authorized users.
【0006】[0006]
【発明の効果】システムが自動的に本人以外からの不正
ログインを検知・拒絶するので、ユーザーが手動で行う
より確実に不正を防止できる。このシステムの存在が、
不正ログインを試みる者に対する牽制となり、システム
の不正ログインを減少させる。このシステムは、パソコ
ン通信等のあらゆるネットワークシステムに利用するこ
とができる。Since the system automatically detects and rejects unauthorized login from anyone other than the user, unauthorized access can be more reliably prevented than if the user manually performed the login. The existence of this system
It acts as a check against anyone attempting an unauthorized login, reducing the number of unauthorized logins in the system. This system can be used for any network system such as personal computer communication.
【図1】本発明の処理の手順を示したフローチャートで
ある。FIG. 1 is a flowchart showing a procedure of a process of the present invention.
Claims (1)
刻を指定・登録することにより、本人以外からその予定
時刻前に不正にログインが試みられた場合、システムが
不正行為を検知して、ログインを拒絶すると共に、正規
のユーザーにそのことを通知する、ネットワーク不正ロ
グイン防止システム。1. Before logging out, by designating and registering the next scheduled log-in time, if an unauthorized person attempts to log in before the scheduled time, the system detects an improper act and logs in. A network fraudulent login prevention system that rejects and informs authorized users of this.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP9330740A JPH11134299A (en) | 1997-10-27 | 1997-10-27 | Illegal network login prevention system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP9330740A JPH11134299A (en) | 1997-10-27 | 1997-10-27 | Illegal network login prevention system |
Publications (1)
Publication Number | Publication Date |
---|---|
JPH11134299A true JPH11134299A (en) | 1999-05-21 |
Family
ID=18236038
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP9330740A Pending JPH11134299A (en) | 1997-10-27 | 1997-10-27 | Illegal network login prevention system |
Country Status (1)
Country | Link |
---|---|
JP (1) | JPH11134299A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007200355A (en) * | 2007-04-16 | 2007-08-09 | Fujitsu Ltd | Information processing system, information processor, access distribution method and program |
JP2007249988A (en) * | 2007-04-16 | 2007-09-27 | Fujitsu Ltd | Information processing system, information processor, access distribution method and program |
-
1997
- 1997-10-27 JP JP9330740A patent/JPH11134299A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007200355A (en) * | 2007-04-16 | 2007-08-09 | Fujitsu Ltd | Information processing system, information processor, access distribution method and program |
JP2007249988A (en) * | 2007-04-16 | 2007-09-27 | Fujitsu Ltd | Information processing system, information processor, access distribution method and program |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9391985B2 (en) | Environment-based two-factor authentication without geo-location | |
US20210295327A1 (en) | Unique transaction identifier, which may also include a time expiration value, is assigned by a first network website to an electronic instruction to collect specified distinctive identifiers from a local/mobile computing device seeking access to said first network website | |
US6938167B2 (en) | Using trusted communication channel to combat user name/password theft | |
US20230055282A1 (en) | Multi-Factor Authentication with Increased Security | |
US8090944B2 (en) | Method and apparatus for authenticating users of an emergency communication network | |
US7158776B1 (en) | Techniques for voice-based user authentication for mobile access to network services | |
US8528078B2 (en) | System and method for blocking unauthorized network log in using stolen password | |
US7406713B2 (en) | Systems and methods for distributed network protection | |
US20120284778A1 (en) | Controlling access to a protected network | |
JP4245151B2 (en) | Mobile phone with use restriction function and method of restricting use of the machine | |
JP2000137679A (en) | Method and system for maintaining safety | |
US7032026B1 (en) | Method and apparatus to facilitate individual and global lockouts to network applications | |
US8207815B2 (en) | Facility access integrated with other security systems | |
US10630679B2 (en) | Methods providing authentication during a session using image data and related devices and computer program products | |
KR101860314B1 (en) | Method and system for user authentication using supplementary system | |
JPH11134299A (en) | Illegal network login prevention system | |
JP2002091917A (en) | Network security system and connection managing method utilizing the same | |
JP2006277063A (en) | Hacking defence device and hacking defence program | |
JP3830360B2 (en) | Security protection device and method | |
US20020009185A1 (en) | Method and device for security control of network distant input using caller ID | |
US20180068504A1 (en) | Multi-level security mechanism for accessing a panel | |
EP0952511A3 (en) | Method and system for providing data security and protection against unauthorised telephonic access | |
CN107403114B (en) | Input locking structure and method | |
JPH11205448A (en) | Authentication system and authentication method | |
JPH06152747A (en) | Illegal use detecting system for public exclusive service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20010213 |