JPS6371762A - Security checking system for online system - Google Patents

Security checking system for online system

Info

Publication number
JPS6371762A
JPS6371762A JP61216498A JP21649886A JPS6371762A JP S6371762 A JPS6371762 A JP S6371762A JP 61216498 A JP61216498 A JP 61216498A JP 21649886 A JP21649886 A JP 21649886A JP S6371762 A JPS6371762 A JP S6371762A
Authority
JP
Japan
Prior art keywords
operator
security check
terminal
host computer
communication request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP61216498A
Other languages
Japanese (ja)
Inventor
Kunio Ichikawa
市川 国夫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Priority to JP61216498A priority Critical patent/JPS6371762A/en
Publication of JPS6371762A publication Critical patent/JPS6371762A/en
Pending legal-status Critical Current

Links

Abstract

PURPOSE:To prevent an online system from being illegally used from a terminal by executing the security check again at the time of restarting the communication request after a certain time even if an operator interrupts the use of the online terminal in the log-in state and leaves the terminal. CONSTITUTION:When the operator logs in from a keyboard 8 to a host computer 1, the host computer 1 checks the use right of the operator. Thereafter, a communication interval monitor program 3 sets a certain time to a timer, and the certain time is set again to the timer each time when the communication request is received, and the communication request is monitored by detection of overflow. If the operator leaves the terminal not to issue the communication request for the certain time and an interrupt occurs by overflow of the timer, the communication interval monitor program 3 reports the occurrence of the interrupt to a security check program 2, and this program 2 executes the security check again for the following computer access from the terminal of the operator.

Description

【発明の詳細な説明】 〔産業上の利用分野〕 本発明はオンラインシステムのセキュリティチェック方
式に関する。
DETAILED DESCRIPTION OF THE INVENTION [Field of Industrial Application] The present invention relates to a security check method for an online system.

〔従来の技術〕[Conventional technology]

従来、この株のセキ、 IJティチェックは、ログイン
時にパスワード、IDカード等によるセキュリティチェ
ックを行うようにしており、このチェッ、Qバスしたオ
ンラインシステムは無条件で使用可能な状態になってい
る。
Conventionally, the IJT Check has been designed to perform a security check using a password, ID card, etc. when logging in, and the online system that has been checked can be used unconditionally.

〔発明が解決しようとする問題点〕[Problem that the invention seeks to solve]

上述した様に、従来の方式によると、操作者が端末から
ログインした後に離席しても、その端末とコンビエータ
は、接続状態のままとなっているので、そのシステムの
利用権のない者でも、自由にコンビエータにアクセスし
て、情報入手、データの改ざん等を行えるという欠点が
ある。
As mentioned above, according to the conventional system, even if the operator leaves the seat after logging in from the terminal, the terminal and combiator remain connected, so even those who do not have the right to use the system can , has the disadvantage that they can freely access the Combiator to obtain information, falsify data, etc.

21点を餡決するため■手段〕 本発明の方式は、オンライン端末のログイン時に、操作
者が利用権を有して、いるかどうかのセキュリティチェ
ックを行う手段と、一定時間、端末とホストコンピュー
タ間で、通信が行われなかりた事を検出する手段とを設
け、通信が行わnなかりた事を検出した後の通信要求に
対して、再びセキ、 IJティチェックを行う手段を起
動してセキュリティチェックを実行するようにしている
■Means for determining 21 points] The method of the present invention includes a means for performing a security check to determine whether the operator has usage rights when logging in to an online terminal, and a means for performing a security check to determine whether or not the operator has the right to use the terminal, and a method for determining whether or not the operator has access rights for a certain period of time. , a means for detecting that communication has not been performed is provided, and a means for performing a security and IJ check again is activated in response to a communication request after detecting that no communication has been performed, thereby increasing security. I'm trying to run a check.

〔実施例〕〔Example〕

以下に本発明の実施例について図面を参照して説明する
Embodiments of the present invention will be described below with reference to the drawings.

第1図は本発明の一実施例である。FIG. 1 shows an embodiment of the present invention.

本システムはホストコンビ、−夕1と、ターミナル制御
部5と、ワークスチーシラン制御部9とを有しており、
ワークスチーシラン制御部9には、表示装置7とキーボ
ード8が接続される。ターミナル制御部5はワークステ
ージ曹ンインタフェース6を介して、ワークスチーシラ
ン制御部9と、又ターミナル制御部5は、通信回線4を
介して、ホストコンピュータlに接続される。ホストコ
ンピュータ1には、セキュリティチェックプログラム2
及び、ワークスチーシラン制御部9からの通信要求を監
視する通信間隔監視プログラムが格納されている。
This system includes a host combination, a terminal control section 5, and a workstation control section 9.
A display device 7 and a keyboard 8 are connected to the workstation control unit 9 . The terminal control section 5 is connected to a work stage control section 9 via a work stage control interface 6, and the terminal control section 5 is connected to a host computer l via a communication line 4. Security check program 2 is installed on host computer 1.
Additionally, a communication interval monitoring program for monitoring communication requests from the work station controller 9 is stored.

この様な構成に於いて、実行制御は次の様に行われる。In such a configuration, execution control is performed as follows.

操作者がキーボード8に依って、ホストコンビ為−夕1
にログインすると、ホストコンピュータlは、セキュリ
ティチェックプログラム2に依って、パスワード入力、
IDカード入力等の方法で操作者の利用権をチェックす
る。
The operator uses the keyboard 8 to select the host combination
When you log in to the host computer, the security check program 2 prompts you to enter your password,
The operator's usage rights are checked by a method such as inputting an ID card.

このセキュリティチェックにバスした後、通信間隔監視
プキグ之ム3はタイマーに一定時間をセットし、キーボ
ード8からの送信キーに依り、通信要求を受ける度に、
タイマーに一定時間を再セットし、オーバー70−の検
出で操作者からの通信要求を監視する。
After passing this security check, the communication interval monitoring program 3 sets a certain period of time on a timer, and each time it receives a communication request by pressing the send key from the keyboard 8,
The timer is reset to a certain period of time, and communication requests from the operator are monitored upon detection of over 70-.

操作者が離席して、一定時間通信要求がなくなり、タイ
マーがオーバーフローして、割込が発生すると、通信間
隔監視プログラム3は、その旨をホストコンピュータ1
のセキュリティチェックプログラム2へ通知し、その後
の操作者の端末からのコンビ具−タアクセスに対して、
セキュリティチェックプログラム2は、再びセキュリテ
ィチェックを実施する。
When the operator leaves the desk and there are no communication requests for a certain period of time, the timer overflows, and an interrupt occurs, the communication interval monitoring program 3 notifies the host computer 1 of this fact.
Security check program 2 is notified, and subsequent access to the combination tool from the operator's terminal is
The security check program 2 performs the security check again.

〔発明の効果〕〔Effect of the invention〕

以上説明した様に1本発明は、操作者の使用状態を監視
する事に依って、操作者がオンライン端末から、ログイ
ン状態の1まで使用を中断して、離席しても、一定時間
経過後に通信要求を再開する時に1再びセキュリティチ
ェックが実行されるので、不法にその端末からオンライ
ンシステムが使用されるのを防ぐ事が出来るという効果
がある。
As explained above, one aspect of the present invention is to monitor the usage status of the operator so that even if the operator interrupts the use of the online terminal to the logged-in status 1 and leaves his/her seat, a certain amount of time has elapsed. When the communication request is resumed later, the security check is executed again, which has the effect of preventing illegal use of the online system from that terminal.

【図面の簡単な説明】[Brief explanation of the drawing]

第1図は本発明の一実施例を示す。 1・・・・・・ホストコンピュータ、2・・・・・・セ
キュリティチェックプログラム、3・・・・・・通信間
隔監視プログラム、4・・・・・・通信回線、5・・・
・・・ターミナル制御部、6・・・・・・ワークステー
ジlフィンタフエース、7・・・・・・表示装置、8・
・・・・・キーボード、9・・・・・・ワー雛 l 図
FIG. 1 shows an embodiment of the invention. 1...Host computer, 2...Security check program, 3...Communication interval monitoring program, 4...Communication line, 5...
... Terminal control unit, 6 ... Work stage l fin tough face, 7 ... Display device, 8.
...Keyboard, 9...War Hina l Figure

Claims (1)

【特許請求の範囲】[Claims] ホストコンピュータにオンライン接続された端末装置か
らのログイン時に操作者が利用権を有しているかどうか
のセキュリティチェックを行う手段と、前記端末装置と
前記ホストコンピュータ間で所定の時間だけ通信が行わ
れなかった事を検出する手段とを設け、該検出後の通信
要求に対して再び前記セキュリティチェックを行う手段
を起動するようにしたことを特徴とするオンラインシス
テムのセキュリティチェック方式。
A means for performing a security check to determine whether an operator has usage rights when logging in from a terminal device connected online to a host computer, and a means for performing a security check to determine whether an operator has usage rights when logging in from a terminal device connected online to a host computer, and a means for performing a security check to determine whether or not an operator has usage rights when logging in from a terminal device connected online to a host computer, and a means for performing a security check to determine whether or not an operator has usage rights when logging in from a terminal device connected online to a host computer, and a means for performing a security check to determine whether or not an operator has usage rights when logging in from a terminal device connected online to a host computer. 1. A security check method for an online system, comprising: a means for detecting that a communication request has occurred, and the means for performing the security check is activated again in response to a communication request after the detection.
JP61216498A 1986-09-12 1986-09-12 Security checking system for online system Pending JPS6371762A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP61216498A JPS6371762A (en) 1986-09-12 1986-09-12 Security checking system for online system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP61216498A JPS6371762A (en) 1986-09-12 1986-09-12 Security checking system for online system

Publications (1)

Publication Number Publication Date
JPS6371762A true JPS6371762A (en) 1988-04-01

Family

ID=16689370

Family Applications (1)

Application Number Title Priority Date Filing Date
JP61216498A Pending JPS6371762A (en) 1986-09-12 1986-09-12 Security checking system for online system

Country Status (1)

Country Link
JP (1) JPS6371762A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005115760A (en) * 2003-10-09 2005-04-28 Casio Comput Co Ltd Communication terminal and communication processing program
JP2010250855A (en) * 2010-07-07 2010-11-04 Casio Computer Co Ltd Terminal device and program

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005115760A (en) * 2003-10-09 2005-04-28 Casio Comput Co Ltd Communication terminal and communication processing program
JP4586348B2 (en) * 2003-10-09 2010-11-24 カシオ計算機株式会社 Communication terminal and communication processing program
JP2010250855A (en) * 2010-07-07 2010-11-04 Casio Computer Co Ltd Terminal device and program

Similar Documents

Publication Publication Date Title
US5877483A (en) Method and apparatus for automatically implementing computer power on and logon functions using encoded ID card
JP4383413B2 (en) Unauthorized operation determination system, unauthorized operation determination method, and unauthorized operation determination program
ATE402450T1 (en) SAFETY PROCEDURES BASED ON TESTING
CA2509579A1 (en) Systems and methods for detecting a security breach in a computer system
JP2003186850A (en) Computer or computer resource lock control device and method of implementing same
KR101552950B1 (en) direct access management system for a server and network device
US20070255946A1 (en) Information processing apparatus and authentication method
KR20170056876A (en) Method, Apparatus and System for Security Monitoring Based On Log Analysis
US20210168147A1 (en) Monitoring resource utilization of an online system based on statistics describing browser attributes
US8645706B2 (en) Preventing error in an access protocol
JP3187194B2 (en) Method and apparatus for providing group questions
JPH10340254A (en) Network system which can detect illegal use
CN113094678A (en) Enterprise information security management system
JPS6371762A (en) Security checking system for online system
CN103226676A (en) Mixed method for measuring creditability of application software
US20060259953A1 (en) Method and apparatus for managing computer system access
CN113806789B (en) Game memory privacy protection system
US8826418B2 (en) Trust retention
JPS633326A (en) Computer system
CN105989310B (en) A kind of data destruction method and system
JP2007095022A (en) Control method of computer using externally connected equipment and control system of computer
CN101777102A (en) Security audit method and system for kernel
CN115473732A (en) Method, device, equipment and storage medium for sharing Web application account
KR100923842B1 (en) Computer Approach control device and method for inner security strenthening
JP2008243028A (en) Terminal to be connected to network