JPS6371762A - Security checking system for online system - Google Patents
Security checking system for online systemInfo
- Publication number
- JPS6371762A JPS6371762A JP61216498A JP21649886A JPS6371762A JP S6371762 A JPS6371762 A JP S6371762A JP 61216498 A JP61216498 A JP 61216498A JP 21649886 A JP21649886 A JP 21649886A JP S6371762 A JPS6371762 A JP S6371762A
- Authority
- JP
- Japan
- Prior art keywords
- operator
- security check
- terminal
- host computer
- communication request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 claims abstract description 22
- 238000001514 detection method Methods 0.000 claims abstract description 3
- 238000000034 method Methods 0.000 claims description 5
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
Abstract
Description
【発明の詳細な説明】
〔産業上の利用分野〕
本発明はオンラインシステムのセキュリティチェック方
式に関する。DETAILED DESCRIPTION OF THE INVENTION [Field of Industrial Application] The present invention relates to a security check method for an online system.
従来、この株のセキ、 IJティチェックは、ログイン
時にパスワード、IDカード等によるセキュリティチェ
ックを行うようにしており、このチェッ、Qバスしたオ
ンラインシステムは無条件で使用可能な状態になってい
る。Conventionally, the IJT Check has been designed to perform a security check using a password, ID card, etc. when logging in, and the online system that has been checked can be used unconditionally.
上述した様に、従来の方式によると、操作者が端末から
ログインした後に離席しても、その端末とコンビエータ
は、接続状態のままとなっているので、そのシステムの
利用権のない者でも、自由にコンビエータにアクセスし
て、情報入手、データの改ざん等を行えるという欠点が
ある。As mentioned above, according to the conventional system, even if the operator leaves the seat after logging in from the terminal, the terminal and combiator remain connected, so even those who do not have the right to use the system can , has the disadvantage that they can freely access the Combiator to obtain information, falsify data, etc.
21点を餡決するため■手段〕
本発明の方式は、オンライン端末のログイン時に、操作
者が利用権を有して、いるかどうかのセキュリティチェ
ックを行う手段と、一定時間、端末とホストコンピュー
タ間で、通信が行われなかりた事を検出する手段とを設
け、通信が行わnなかりた事を検出した後の通信要求に
対して、再びセキ、 IJティチェックを行う手段を起
動してセキュリティチェックを実行するようにしている
。■Means for determining 21 points] The method of the present invention includes a means for performing a security check to determine whether the operator has usage rights when logging in to an online terminal, and a means for performing a security check to determine whether or not the operator has the right to use the terminal, and a method for determining whether or not the operator has access rights for a certain period of time. , a means for detecting that communication has not been performed is provided, and a means for performing a security and IJ check again is activated in response to a communication request after detecting that no communication has been performed, thereby increasing security. I'm trying to run a check.
以下に本発明の実施例について図面を参照して説明する
。Embodiments of the present invention will be described below with reference to the drawings.
第1図は本発明の一実施例である。FIG. 1 shows an embodiment of the present invention.
本システムはホストコンビ、−夕1と、ターミナル制御
部5と、ワークスチーシラン制御部9とを有しており、
ワークスチーシラン制御部9には、表示装置7とキーボ
ード8が接続される。ターミナル制御部5はワークステ
ージ曹ンインタフェース6を介して、ワークスチーシラ
ン制御部9と、又ターミナル制御部5は、通信回線4を
介して、ホストコンピュータlに接続される。ホストコ
ンピュータ1には、セキュリティチェックプログラム2
及び、ワークスチーシラン制御部9からの通信要求を監
視する通信間隔監視プログラムが格納されている。This system includes a host combination, a terminal control section 5, and a workstation control section 9.
A display device 7 and a keyboard 8 are connected to the workstation control unit 9 . The terminal control section 5 is connected to a work stage control section 9 via a work stage control interface 6, and the terminal control section 5 is connected to a host computer l via a communication line 4. Security check program 2 is installed on host computer 1.
Additionally, a communication interval monitoring program for monitoring communication requests from the work station controller 9 is stored.
この様な構成に於いて、実行制御は次の様に行われる。In such a configuration, execution control is performed as follows.
操作者がキーボード8に依って、ホストコンビ為−夕1
にログインすると、ホストコンピュータlは、セキュリ
ティチェックプログラム2に依って、パスワード入力、
IDカード入力等の方法で操作者の利用権をチェックす
る。The operator uses the keyboard 8 to select the host combination
When you log in to the host computer, the security check program 2 prompts you to enter your password,
The operator's usage rights are checked by a method such as inputting an ID card.
このセキュリティチェックにバスした後、通信間隔監視
プキグ之ム3はタイマーに一定時間をセットし、キーボ
ード8からの送信キーに依り、通信要求を受ける度に、
タイマーに一定時間を再セットし、オーバー70−の検
出で操作者からの通信要求を監視する。After passing this security check, the communication interval monitoring program 3 sets a certain period of time on a timer, and each time it receives a communication request by pressing the send key from the keyboard 8,
The timer is reset to a certain period of time, and communication requests from the operator are monitored upon detection of over 70-.
操作者が離席して、一定時間通信要求がなくなり、タイ
マーがオーバーフローして、割込が発生すると、通信間
隔監視プログラム3は、その旨をホストコンピュータ1
のセキュリティチェックプログラム2へ通知し、その後
の操作者の端末からのコンビ具−タアクセスに対して、
セキュリティチェックプログラム2は、再びセキュリテ
ィチェックを実施する。When the operator leaves the desk and there are no communication requests for a certain period of time, the timer overflows, and an interrupt occurs, the communication interval monitoring program 3 notifies the host computer 1 of this fact.
Security check program 2 is notified, and subsequent access to the combination tool from the operator's terminal is
The security check program 2 performs the security check again.
以上説明した様に1本発明は、操作者の使用状態を監視
する事に依って、操作者がオンライン端末から、ログイ
ン状態の1まで使用を中断して、離席しても、一定時間
経過後に通信要求を再開する時に1再びセキュリティチ
ェックが実行されるので、不法にその端末からオンライ
ンシステムが使用されるのを防ぐ事が出来るという効果
がある。As explained above, one aspect of the present invention is to monitor the usage status of the operator so that even if the operator interrupts the use of the online terminal to the logged-in status 1 and leaves his/her seat, a certain amount of time has elapsed. When the communication request is resumed later, the security check is executed again, which has the effect of preventing illegal use of the online system from that terminal.
第1図は本発明の一実施例を示す。
1・・・・・・ホストコンピュータ、2・・・・・・セ
キュリティチェックプログラム、3・・・・・・通信間
隔監視プログラム、4・・・・・・通信回線、5・・・
・・・ターミナル制御部、6・・・・・・ワークステー
ジlフィンタフエース、7・・・・・・表示装置、8・
・・・・・キーボード、9・・・・・・ワー雛 l 図FIG. 1 shows an embodiment of the invention. 1...Host computer, 2...Security check program, 3...Communication interval monitoring program, 4...Communication line, 5...
... Terminal control unit, 6 ... Work stage l fin tough face, 7 ... Display device, 8.
...Keyboard, 9...War Hina l Figure
Claims (1)
らのログイン時に操作者が利用権を有しているかどうか
のセキュリティチェックを行う手段と、前記端末装置と
前記ホストコンピュータ間で所定の時間だけ通信が行わ
れなかった事を検出する手段とを設け、該検出後の通信
要求に対して再び前記セキュリティチェックを行う手段
を起動するようにしたことを特徴とするオンラインシス
テムのセキュリティチェック方式。A means for performing a security check to determine whether an operator has usage rights when logging in from a terminal device connected online to a host computer, and a means for performing a security check to determine whether an operator has usage rights when logging in from a terminal device connected online to a host computer, and a means for performing a security check to determine whether or not an operator has usage rights when logging in from a terminal device connected online to a host computer, and a means for performing a security check to determine whether or not an operator has usage rights when logging in from a terminal device connected online to a host computer, and a means for performing a security check to determine whether or not an operator has usage rights when logging in from a terminal device connected online to a host computer. 1. A security check method for an online system, comprising: a means for detecting that a communication request has occurred, and the means for performing the security check is activated again in response to a communication request after the detection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP61216498A JPS6371762A (en) | 1986-09-12 | 1986-09-12 | Security checking system for online system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP61216498A JPS6371762A (en) | 1986-09-12 | 1986-09-12 | Security checking system for online system |
Publications (1)
Publication Number | Publication Date |
---|---|
JPS6371762A true JPS6371762A (en) | 1988-04-01 |
Family
ID=16689370
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP61216498A Pending JPS6371762A (en) | 1986-09-12 | 1986-09-12 | Security checking system for online system |
Country Status (1)
Country | Link |
---|---|
JP (1) | JPS6371762A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005115760A (en) * | 2003-10-09 | 2005-04-28 | Casio Comput Co Ltd | Communication terminal and communication processing program |
JP2010250855A (en) * | 2010-07-07 | 2010-11-04 | Casio Computer Co Ltd | Terminal device and program |
-
1986
- 1986-09-12 JP JP61216498A patent/JPS6371762A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005115760A (en) * | 2003-10-09 | 2005-04-28 | Casio Comput Co Ltd | Communication terminal and communication processing program |
JP4586348B2 (en) * | 2003-10-09 | 2010-11-24 | カシオ計算機株式会社 | Communication terminal and communication processing program |
JP2010250855A (en) * | 2010-07-07 | 2010-11-04 | Casio Computer Co Ltd | Terminal device and program |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5877483A (en) | Method and apparatus for automatically implementing computer power on and logon functions using encoded ID card | |
JP4383413B2 (en) | Unauthorized operation determination system, unauthorized operation determination method, and unauthorized operation determination program | |
ATE402450T1 (en) | SAFETY PROCEDURES BASED ON TESTING | |
CA2509579A1 (en) | Systems and methods for detecting a security breach in a computer system | |
JP2003186850A (en) | Computer or computer resource lock control device and method of implementing same | |
KR101552950B1 (en) | direct access management system for a server and network device | |
US20070255946A1 (en) | Information processing apparatus and authentication method | |
KR20170056876A (en) | Method, Apparatus and System for Security Monitoring Based On Log Analysis | |
US20210168147A1 (en) | Monitoring resource utilization of an online system based on statistics describing browser attributes | |
US8645706B2 (en) | Preventing error in an access protocol | |
JP3187194B2 (en) | Method and apparatus for providing group questions | |
JPH10340254A (en) | Network system which can detect illegal use | |
CN113094678A (en) | Enterprise information security management system | |
JPS6371762A (en) | Security checking system for online system | |
CN103226676A (en) | Mixed method for measuring creditability of application software | |
US20060259953A1 (en) | Method and apparatus for managing computer system access | |
CN113806789B (en) | Game memory privacy protection system | |
US8826418B2 (en) | Trust retention | |
JPS633326A (en) | Computer system | |
CN105989310B (en) | A kind of data destruction method and system | |
JP2007095022A (en) | Control method of computer using externally connected equipment and control system of computer | |
CN101777102A (en) | Security audit method and system for kernel | |
CN115473732A (en) | Method, device, equipment and storage medium for sharing Web application account | |
KR100923842B1 (en) | Computer Approach control device and method for inner security strenthening | |
JP2008243028A (en) | Terminal to be connected to network |