WO2007026580A1 - アカウント不正使用検出または抑制装置、データ収集装置ならびにアカウント不正使用検出または抑制プログラム - Google Patents
アカウント不正使用検出または抑制装置、データ収集装置ならびにアカウント不正使用検出または抑制プログラム Download PDFInfo
- Publication number
- WO2007026580A1 WO2007026580A1 PCT/JP2006/316499 JP2006316499W WO2007026580A1 WO 2007026580 A1 WO2007026580 A1 WO 2007026580A1 JP 2006316499 W JP2006316499 W JP 2006316499W WO 2007026580 A1 WO2007026580 A1 WO 2007026580A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- account
- usage
- password
- value
- unit
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0846—Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0281—Customer communication at a business location, e.g. providing product or service information, consulting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Definitions
- Account fraud detection / suppression device data collection device, and account fraud detection / suppression program
- the present invention relates to an account unauthorized use detection device, a data collection device, and an account unauthorized use detection program for detecting unauthorized use of an authentication account for accessing a public network.
- the present invention also relates to an account fraudulent use suppression device and an account fraudulent use suppression program.
- Patent Document 1 Japanese Patent Laid-Open No. 2002-245010
- a further object of the present invention is to provide an account unauthorized use suppression device and an account unauthorized use suppression program capable of suppressing unauthorized use of an account. is there.
- the unauthorized use detection apparatus for accounts of the first invention comprises a usage amount related value information receiving unit and a detecting unit.
- the usage-related value information receiving unit receives usage-related value information from the management device.
- the management device manages a predetermined account.
- the predetermined account is used when sending data to the data collection device via the public line network.
- the usage amount related value information relates to usage amount related values.
- the usage-related value is related to the usage of the public network using the account.
- the detection unit detects unauthorized use of the account by comparing the usage-related value with a predetermined threshold.
- the management device that manages a predetermined account.
- the detection unit uses the received usage-related value information to detect unauthorized use of the account. Therefore, it is possible to detect unauthorized use of accounts at an early stage in terms of the change in usage-related values.
- the unauthorized use detection apparatus for accounts of the second invention is the unauthorized use detection apparatus for accounts of the first invention, wherein the threshold value is a difference threshold related to a difference in usage-related values for each predetermined period. .
- the detection unit detects unauthorized use of the account by comparing the difference between the usage-related values for each predetermined period and the difference threshold.
- the unauthorized use detection apparatus for accounts of the third invention is the unauthorized use detection apparatus for accounts of the first invention, and further includes a usage amount related value prediction unit.
- the usage-related value prediction unit obtains the trend prediction value of the usage-related value from the history of the dose-related value.
- the threshold is the trend estimate.
- the detection unit detects unauthorized use of the account by comparing the usage-related value and the trend prediction value.
- unauthorized use of accounts can be detected at an early stage by comparing usage-related values with trend forecast values.
- the unauthorized use detection apparatus for accounts of the fourth invention is the unauthorized use detection apparatus for accounts of the first invention, wherein the usage-related value is a usage fee for the public network.
- the usage-related value is the usage fee for the public line network, it is possible to detect unauthorized use of the account early from the change in usage fee.
- the unauthorized use detection apparatus for accounts according to the fifth invention is the unauthorized use detection apparatus for accounts according to the fourth invention, further comprising a usage fee estimation unit.
- the usage fee estimation unit estimates the usage fee from the amount of incoming data for each predetermined period received by the data collection device.
- the threshold is an overall guess.
- the total estimated value is an estimated value for the entire usage fee determined by the usage fee estimation unit.
- the detection unit detects unauthorized use by comparing the usage fee for each predetermined period with the overall estimated value.
- the total estimated value obtained by estimating the usage fee from the amount of incoming data of the data collection device is used, and as a value, unauthorized use of the account can be detected at an early stage by comparing the usage fee with the total estimated value. Is possible.
- the unauthorized use detection apparatus for accounts of the sixth invention is the unauthorized use detection apparatus for accounts of the fourth invention, further comprising a usage charge difference estimation unit.
- the usage fee difference estimation unit estimates the difference in the amount of incoming data for each predetermined period received by the data collection device and the difference in the usage fee for each predetermined period.
- the threshold value is a difference estimation value.
- the estimated difference value is an estimated value for the difference in usage fee obtained by the usage fee difference estimation unit.
- the detection unit detects unauthorized use by comparing the difference between the usage charges for each predetermined period and the estimated difference value.
- the difference estimated value obtained by estimating the difference in usage charges from the amount of incoming data from the data collection device is used as a threshold, and unauthorized use of accounts is compared by comparing the difference in usage charges with the estimated difference value. It is possible to detect early.
- the unauthorized use detection apparatus for accounts of the seventh invention is the unauthorized use detection apparatus for accounts of the fourth invention, further comprising a usage fee estimation unit and a usage fee difference estimation unit.
- the usage fee estimation unit estimates the usage fee from the amount of incoming data for each predetermined period received by the data collection device.
- the usage fee difference estimation unit estimates a difference in usage fee for each predetermined period from the amount of incoming data for each predetermined period received by the data collection device.
- the threshold value is the ratio of the estimated charge to the overall estimated value in the difference estimated value.
- the difference estimated value is an estimated value for the difference in the usage fee obtained by the usage fee difference estimation unit.
- the total estimated value is an estimated value for the entire usage fee obtained by the usage fee estimation unit. is there.
- the detection unit detects unauthorized use by comparing the charge ratio with respect to the entire use charge in the difference in use charge for each predetermined period and the estimated charge ratio.
- the estimated charge ratio which is the ratio of the difference estimated value obtained by estimating the difference in usage charges from the amount of incoming data from the data collection device and the overall estimated value obtained by estimating the entire usage charge.
- a threshold we compare the ratio of charges to the total usage charges in the difference in usage charges and the estimated charge ratio. This makes it possible to detect unauthorized use of accounts at an early stage.
- An account unauthorized use detection device is the account unauthorized use detection device according to the fourth aspect of the present invention, further comprising a usage charge prediction unit.
- the usage fee prediction unit obtains a predicted trend value of usage fee from the history of the amount of incoming data for each predetermined period received by the data collection device.
- the threshold value is a price trend prediction value.
- the detection unit detects unauthorized use of the account by comparing the usage fee for each predetermined period with the estimated price trend value.
- the unauthorized use detection apparatus for accounts of the ninth invention is the account unauthorized use detection apparatus according to any of the first invention and the eighth invention, and the data transmission apparatus is a device monitoring apparatus.
- the output data of the device monitoring device is periodically sent to the data collecting device in a predetermined format.
- the amount of data transmission is predetermined. Therefore, it is possible to detect unauthorized use early.
- the unauthorized use detection apparatus for accounts of the tenth invention is the unauthorized use detection apparatus for accounts of the first invention, wherein the threshold value is a data collection apparatus side usage amount related value.
- the data usage-related value related to the data collection device is related to the usage of the public network by the data collection device using the account.
- the detection unit detects unauthorized use of the account by comparing the usage-related value on the management device side with the usage-related value on the data collection device side.
- the value related to usage on the management device side relates to the usage of the public line network by the management device using the account.
- a data collection device includes a usage amount related value information reception function and a detection function.
- the usage-related value information receiving function is a function that receives usage-related value information from the management device.
- the management device manages a predetermined account.
- the predetermined account is used when sending data to the data collection device via the public line network.
- the usage amount related value information relates to the usage amount related value.
- the value related to usage is related to the usage of public network using account.
- the detection function is a function that detects unauthorized use of an account by comparing a usage-related value with a predetermined threshold.
- the data collection device detects the unauthorized use of an account by comparing the usage-related value with a predetermined threshold value using the received usage-related value information. It has a function. Therefore, it is possible to detect unauthorized use of the change power account count of the usage-related value at an early stage.
- the unauthorized use detection program for accounts of the twelfth invention includes a usage amount related value information reception step and a detection step.
- the usage-related value information receiving step is a step of receiving usage-related value information from the management device.
- the management device manages a predetermined account.
- the predetermined account is used when data is sent from a plurality of data transmission devices to the data collection device via the public network.
- Usage-related value information relates to usage-related values.
- the usage-related value is related to the usage of the public network using the account.
- the detection step is a step of detecting unauthorized use of an account by comparing the usage-related value with a predetermined threshold.
- the account unauthorized use detection program compares the usage amount related value with a predetermined threshold value using the received usage amount related value information to manage the predetermined account, and detects unauthorized use of the account. Since it has a detection step, it is possible to detect unauthorized use of the change account of the usage-related value at an early stage by executing this program on the data collection device.
- the account fraudulent use suppression apparatus of the thirteenth aspect includes an account storage unit, an account selection unit, a password setting information transmission unit, a password rewriting unit, and a password change unit.
- the account storage unit stores the first and second accounts and the password of each account. 1st account, 2nd account and each account
- the password is used when sending data from multiple data transmission devices to the data collection device via the public network.
- the account selection unit alternately selects from the first account and the second account every predetermined period.
- the password setting information transmission unit when the data transmission device power is also accessed using either the first account or the second account selected by the account selection unit, of the first account or the second account.
- the password setting information related to the setting status of the other password is sent to the data transmission device.
- the password rewriting unit rewrites the other password of the first account or the second account every time a predetermined period elapses with respect to the management device.
- the management device manages the first and second accounts and the password for each account.
- the password changing unit changes the password of one of the first account and the second account in the password stored in the account storage unit every time a predetermined period elapses.
- the account selection unit alternately selects the first account and the second account force for each predetermined period
- the password change unit selects the first account and the second account in the password stored in the account storage unit. Change one of the passwords every time the specified period elapses.
- the two accounts can be used interchangeably every predetermined period, and unauthorized use of the account can be suppressed.
- the account fraudulent use suppression device of the fourteenth invention comprises an account storage unit, a password change unit, a password setting information transmission unit, and a password rewriting unit.
- the account storage unit stores a plurality of accounts and the password of each account in association with each data transmission device. Multiple accounts and each account's password are used when sending data to the data collection device via the public data network.
- the password change unit changes each password of a plurality of accounts at predetermined intervals.
- the password setting information transmission unit transmits password setting information regarding the password setting status to the data transmission device.
- the password rewriting unit rewrites the password to the management device every time a predetermined period elapses.
- the management device manages multiple accounts and passwords for each account. Make sense.
- the password changing unit can change the password of each account corresponding to each data transmitting apparatus every predetermined period, thereby preventing unauthorized use of the account.
- An account fraudulent use suppression device of the fifteenth aspect of the present invention is the account fraudulent use suppression device of the thirteenth or fourteenth aspect of the present invention, further comprising a management database.
- the management database is a database for managing the transmission status of password setting information.
- the transmission status of password setting information can be managed by the management database.
- the unauthorized use suppression apparatus for accounts of the sixteenth aspect of the present invention is the apparatus for suppressing unauthorized use of accounts of the fifteenth aspect of the present invention, wherein the management database stores a status relating to the transmission status of the password setting information.
- An account fraudulent use suppression apparatus is the account fraudulent use suppression apparatus according to the fifteenth aspect of the present invention, wherein the management database is integrated with the account storage unit.
- management database is integrated with the account storage unit, it is possible to collectively manage the transmission status of the account and password setting information.
- the account fraudulent use suppression program of the eighteenth invention includes an account selection step, a password setting information transmission step, a password rewriting step, and a password change step.
- the first account and the second account are used when sending data from multiple data transmission devices to the data collection device via the public network.
- the account selection step the first account and the second account are alternately selected every predetermined period.
- the password setting information transmission step the password of the other of the first account or the second account is accessed when the data transmission device is also accessed using either the selected first account or the second account.
- the password setting information related to the setting status of is transmitted to the data transmitting apparatus.
- the nosword rewriting step is performed for the management device in the first account or the second account every time a predetermined period elapses. Rewrite the other password.
- the management device manages the first account, the second account, and the password for each account.
- the password change step the password of one of the first account and the second account is changed every time a predetermined period elapses.
- the account selection step the first account and the second account are alternately selected every predetermined period
- the password change step the first account and the second account are stored in the password stored in the account storage unit. Change the password of one of the accounts every time the specified period has elapsed. Therefore, the data collection device and the two accounts can be used alternately every predetermined period, and unauthorized use of the account can be suppressed.
- the first invention it is possible to detect unauthorized use of a change account of usage-related values at an early stage.
- the second aspect of the present invention it is possible to detect the change power of the difference in the usage-related value for each predetermined period at an early stage.
- the third invention it is possible to detect an unauthorized use of an account at an early stage by comparing the usage-related value and the trend prediction value.
- the fourth invention it is possible to detect unauthorized use of an account at an early stage with the changing power of the usage fee.
- unauthorized use of an account can be detected at an early stage by comparing the usage fee with the overall estimated value.
- the sixth aspect of the invention it is possible to detect an unauthorized use of an account at an early stage by comparing the difference between the usage charges and the estimated difference value.
- unauthorized use of an account can be detected at an early stage by comparing the ratio of the total usage charges to the estimated charge ratio in the difference in usage charges.
- unauthorized use of an account can be detected at an early stage by comparing the usage fee for each predetermined period and the estimated rate trend value.
- unauthorized use can be detected at an early stage using the transmission amount of output data of the device monitoring apparatus.
- the relative change between the usage amount related value on the management device side and the usage amount related value on the data collection device side can also detect unauthorized use of the account at an early stage.
- the changing power of the usage-related value can also detect unauthorized use of an account at an early stage.
- unauthorized use of an account can be suppressed by alternately using two accounts at predetermined intervals.
- unauthorized use of an account can be suppressed by changing the password of each account at predetermined intervals.
- the transmission status of password setting information can be managed. According to the sixteenth aspect, it is possible to manage the status related to the transmission status of the password setting information.
- the transmission status of the account and password setting information can be managed collectively.
- unauthorized use of an account can be suppressed by alternately using two accounts at predetermined intervals.
- FIG. 1 is a configuration diagram of a data collection device incorporating an account unauthorized use detection device of the present invention and a device management system including the data collection device.
- FIG. 2 is a block diagram of an account fraud detection device according to the first embodiment of the present invention.
- FIG. 3 is a graph showing usage charges and their differences in the first embodiment of the present invention.
- FIG. 4 is a configuration diagram of an account fraud detection device according to a second embodiment of the present invention.
- FIG. 5 is a graph showing usage charge history and trend prediction values in the second embodiment of the present invention.
- FIG. 6 is a configuration diagram of an account unauthorized use detection device according to a third embodiment of the present invention.
- FIG. 7 is a configuration diagram of an account fraud detection device according to a fourth embodiment of the present invention.
- FIG. 8 is a block diagram of an account fraud detection device according to a fifth embodiment of the present invention.
- FIG. 9 is a block diagram of an account fraud detection device according to a sixth embodiment of the present invention.
- FIG. 10 is a configuration diagram of a device management system including an account fraudulent use suppression apparatus according to a seventh embodiment of the present invention.
- FIG. 11 Configuration diagram of the account management database of FIG.
- FIG. 12 is a block diagram of the download management database in FIG.
- FIG. 13 is a time chart showing the operation of the account fraud suppression device in FIG. 10 in time series.
- FIG. 14 is a flowchart showing a procedure for obtaining an account in the data collection device and the account fraud suppression device in FIG.
- FIG. 15 is a flowchart showing an operation procedure of the account fraud suppression device in FIG.
- FIG. 16 is a configuration diagram of a device management system including an account fraudulent use suppression device according to an eighth embodiment of the present invention.
- FIG. 17 is a configuration diagram of the account management database in FIG.
- FIG. 18 is a configuration diagram of the download management database in FIG.
- FIG. 19 is a time chart showing the operation of the account fraud suppression device in FIG. 16 in time series.
- FIG. 20 is a flowchart showing an operation procedure of the account fraud suppression device in FIG.
- FIG. 21 is a configuration diagram of an account unauthorized use detection device included in an account unauthorized use suppression device according to a ninth embodiment of the present invention.
- FIG. 22 is a flowchart showing a procedure for detecting account unauthorized use using the account unauthorized use detection device of FIG.
- FIG. 23 is a flowchart showing the procedure of a method for setting account information when a device monitoring apparatus according to the tenth embodiment of the present invention is newly added.
- FIG. 1 shows a device management system 1 for remotely monitoring a managed device such as an air conditioner by a plurality of device monitoring devices 2.
- the device management system 1 includes a plurality of device monitoring devices 2, an Internet management device 3, and a data collection device 5.
- Multiple device monitoring devices 2 are used for managed devices such as air conditioners! This is a local controller (LC) that monitors the situation and transmits the monitoring data to the data collection device 5 via the Internet 4 which is a public network.
- the transmitted monitoring data is sent to the data collection device 5 as a daily report at least once a day (daily report).
- the output data of the device monitoring device 2 is periodically sent to the data collection device 5 in a predetermined format. In addition, the amount of data transmission is predetermined.
- the Internet management device 3 can also be used as an Internet 'service' provider (ISP) computer.
- the Internet management device 3 manages a predetermined account used when sending monitoring data from the plurality of device monitoring devices 2 via the Internet 4 to the data collection device 5.
- the plurality of device monitoring apparatuses 2 can access the data collection apparatus 5 using a shared account.
- the data collection device 5 collects and manages the monitoring data sent from the plurality of device monitoring devices 2. In addition, the data collection device 5 incorporates an account unauthorized use detection device 6 described later.
- the account unauthorized use detecting device 6 includes a usage-related value information receiving unit 11 and a detecting unit 12.
- the usage-related value information receiving unit 11 receives usage-related value information from the Internet management device 3.
- the usage-related value information received from the Internet management device 3 is information relating to the usage-related value related to the usage amount of the Internet 4 using an account by the Internet management device 3.
- the usage-related value is the Internet 4 usage fee.
- the detection unit 12 compares the usage-related value (Internet 4 usage fee) using an account by the Internet management device 3 with a predetermined threshold. To detect unauthorized use of the account.
- the predetermined threshold value is a difference threshold value regarding a difference in usage-related value for each predetermined period (for example, one day).
- the detection unit 12 detects unauthorized use of an account by comparing the difference between the usage-related values for each predetermined period and the difference threshold value. This makes it possible to change the difference in usage-related values for a given period. It is possible to detect use early.
- the detection unit 12 uses the difference threshold S th of the usage fee for the Internet 4 by the Internet management device 3 as a threshold value.
- the difference threshold value ⁇ th are compared, and when the difference in usage charges is larger than the difference threshold value, it is determined that the account has been illegally used.
- an unauthorized use of an account is detected by the account unauthorized use detection device 6, the fact that there has been an unauthorized use of the account from the data collection device 5 to the Internet management device 3 and the computer owned by the account holder Send information about the situation etc.
- the detection unit 12 uses the usage-related value information received from the Internet management device 3 that manages the predetermined account, and the detection unit 12 uses the usage-related value and the predetermined threshold. Compare the values to detect account misuse. Therefore, it is possible to detect unauthorized use of accounts at an early stage.
- the detection unit 12 detects fraudulent use of an account by comparing the difference between the usage-related values for each predetermined period and the difference threshold value. As a result, it is possible to detect an unauthorized use of the change power account of the difference in the usage-related value for each predetermined period at an early stage.
- the usage amount-related value power S Internet 4 is a usage fee, so the changing power of the usage fee can also detect an unauthorized use of the account at an early stage. (Four)
- the output data of the device monitoring device 2 is periodically sent to the data collection device 5 in a predetermined format.
- the amount of data transmission is predetermined. As a result, unauthorized use can be detected early.
- the usage fee of the Internet 4 is used as the usage amount related value.
- the present invention is not limited to this, as long as it is a value related to the usage amount of the public line network such as the Internet 4.
- Various usage amount related values may be adopted.
- the Internet 4 is used as an example of a public network, but the present invention is not limited to this. That is, the public line network in the present invention is a communication network using a public line and is a broad concept including the Internet and the like. Therefore, the account fraud detection device of the present invention may be applied to a public line network other than the Internet 4.
- the unauthorized use detection device 6 built in the data collection device 5 is used.
- the data collection device 5 itself may have the function of the account unauthorized use detection device 6.
- the data collection device 5 includes a usage amount related value information reception function and a detection function.
- the usage-related value information receiving function receives usage-related value information from the Internet management device 3.
- the detection function detects unauthorized use of an account by comparing the usage-related value with a predetermined threshold.
- the data collection device 5 compares the usage amount related value with a predetermined threshold value using the usage amount related value information received from the Internet management device 3 that manages the predetermined account. Since it has a function to detect unauthorized use of accounts, it is possible to detect unauthorized use of accounts at an early stage. (D)
- the unauthorized use detection device 6 built in the data collection device 5 is used.
- the data collection device 5 itself may execute the function of the account unauthorized use detection device 6 by executing the account unauthorized use detection program.
- the account unauthorized use detection program includes a usage amount related value information reception step and a detection step.
- the usage-related value information reception step receives usage-related value information from the Internet management device 3.
- an unauthorized use of the account is detected by comparing the usage-related value with a predetermined threshold value.
- the account fraud detection program uses the usage-related value information received from the Internet management device 3 that manages the predetermined account to calculate the usage-related value and a predetermined threshold value. Since it has a step to detect unauthorized use of accounts by comparison, it is possible to detect unauthorized use of accounts at an early stage from changes in usage-related values by executing this program on the data collection device 5. It is.
- the unauthorized account detection device 46 of the second embodiment includes the usage-related value information receiving unit 11 and the detection unit 12 of the first embodiment, and further includes a usage-related value predicting unit 13. Is further provided.
- the account unauthorized use detection device 46 is built in the data collection device 5 in the device management system 1 of FIG.
- the usage-related value predicting unit 13 obtains a trend predicted value of the usage-related value from the history of the usage-related value.
- the trend prediction value is used as a threshold value.
- the detection unit 12 detects unauthorized use of an account by comparing the usage-related value and the trend prediction value. This makes it possible to detect unauthorized use of an account at an early stage. Specifically, as shown in the graph of FIG. 5, the usage-related value prediction unit 13 calculates tomorrow from fl to f4, which is a daily history of Internet 4 usage fees by the Internet management device 3. Calculate the trend forecast value ft of the usage charge on the date. The detection unit 12 uses the trend prediction value ft as a threshold value. The detection unit 12 is connected to the Internet management device 3. Then, the unauthorized use of the account is detected by comparing the Internet 4 usage fee f5 when the Internet 4 is actually used and the trend forecast value ft. Here, the detection unit 12 determines that the account has been illegally used when the usage fee f5 becomes a value in which the trend prediction value ft force exceeds the predetermined allowable range.
- the account unauthorized use detection device 46 of the second embodiment further includes a usage amount related value prediction unit 13.
- the usage amount related value prediction unit 13 obtains a trend prediction value of the usage amount related value from the history of the usage amount related value.
- the trend prediction value is used as a threshold value.
- the detection unit 12 can detect the unauthorized use of the account at an early stage by comparing the usage-related value with the trend prediction value.
- the account unauthorized use detection device 56 of the third embodiment includes the usage amount related value information receiving unit 11 and the detection unit 12 of the first embodiment, and further includes a usage fee estimation unit 14.
- the usage-related value information receiving unit 11 receives information related to the usage fee of the Internet 4 by the Internet management device 3 from the Internet management device 3 as usage-related value information.
- the usage fee estimation unit 14 uses the map on the correlation between the incoming data amount and the usage fee from the incoming data amount received every predetermined period (for example, one day) received by the data collection device 5. , Guess the usage fee.
- the overall estimated value which is an estimated value for the entire usage fee obtained by the usage fee estimation unit 14, is used as a threshold value.
- the detection unit 12 compares the usage fee for each predetermined period with the overall estimated value to detect unauthorized use. The detecting unit 12 determines that the account has been illegally used when the usage fee has reached a value exceeding the predetermined allowable range from the overall estimated value.
- the account fraud detection device 56 of the third embodiment further includes a usage fee estimation unit 14, the total estimated value obtained by estimating the usage fee from the amount of incoming data of the data collection device 5 is calculated. As a value, fraudulent use of an account can be detected early by comparing the usage fee with the overall estimate. In addition, since the usage fee is estimated from the amount of incoming data, even if the number of device monitoring devices 2 is small, the rate of false detection is small.
- the threshold value is an overall estimated value of the usage fee obtained from the amount of incoming data of the data collection device 5, and V,, in other words, the data collection device 5 This is the usage-related value on the side.
- the usage-related value on the data collection device 5 side is related to the usage amount of the Internet 4 by the data collection device 5 using an account.
- the detection unit 12 detects unauthorized use of an account by comparing the usage-related value (usage fee) on the Internet management device 3 side with the usage-related value (overall estimated value) on the data collection device side. .
- the usage related value on the Internet management device 3 side is related to the usage of the Internet 4 by the Internet management device 3 using the account.
- the account unauthorized use detecting device 66 of the fourth embodiment includes the usage-related value information receiving unit 11 and the detecting unit 12 of the first embodiment, and further includes a usage fee difference estimating unit 15. Prepare for more.
- the usage-related value information receiving unit 11 receives, as usage-related value information, information related to the Internet 4 usage fee from the Internet management device 3 from the Internet management device 3. Receive.
- the usage fee difference estimation unit 15 estimates the difference in usage fee for each predetermined period from the amount of incoming data for each predetermined period (for example, one day) received by the data collection device 5.
- the difference estimate is used as a threshold.
- the estimated difference value is an estimated value for the difference in the usage fee obtained by the usage fee difference estimation unit 15.
- the detection unit 12 compares the difference between the usage charges for each predetermined period and the estimated difference value to detect unauthorized use. Here, the detection unit 12 determines that the account has been illegally used when the usage fee becomes a value exceeding a predetermined allowable range from the estimated difference value.
- the account fraud detection device 66 of the fourth embodiment further includes a usage charge difference estimation unit 15, the difference estimation obtained by estimating the difference in usage charges from the amount of incoming data of the data collection device 5. As a value, it is possible to detect unauthorized use of an account at an early stage by comparing the difference between usage charges and the estimated difference value.
- the threshold value is a difference estimated value obtained from the amount of incoming data of the data collection device 5, in other words, the usage amount related value on the data collection device 5 side. It is.
- the usage-related value on the data collection device 5 side is related to the usage amount of the Internet 4 by the data collection device 5 using the account.
- the detection unit 12 detects unauthorized use of an account by comparing the usage-related value (usage fee) on the Internet management device 3 side with the usage-related value (difference estimated value) on the data collection device side. To do.
- the usage related value on the Internet management device 3 side is related to the usage of the Internet 4 by the Internet management device 3 using the account.
- the relative change between the usage amount related value on the Internet management device 3 side and the usage amount related value on the data collection device 5 side can be detected at an early stage.
- the account fraud detection device 76 of the fifth embodiment is the first implementation as shown in FIG.
- the usage fee estimation unit 14 and the usage fee difference estimation unit 15 are further provided.
- the usage-related value information receiving unit 11 receives information related to the usage fee of the Internet 4 by the Internet management device 3 from the Internet management device 3 as usage-related value information.
- the usage fee estimation unit 14 estimates the usage fee from the amount of incoming data for each predetermined period received by the data collection device 5.
- the usage charge difference estimation unit 15 estimates the amount of incoming data received for each predetermined period received by the data collection device 5 and the difference between the usage charges for each predetermined period.
- the estimated charge ratio with respect to the overall estimated value in the difference estimated value is the threshold! / ⁇ Used as a value.
- the estimated difference value is an estimated value for the difference in the usage fee obtained by the usage fee difference estimation unit 15.
- the overall estimated value is an estimated value for the entire usage fee obtained by the usage fee estimation unit 14.
- the detection unit 12 detects unauthorized use by comparing the charge ratio with respect to the entire use charge in the difference in use charges for each predetermined period (for example, one day) and the estimated charge ratio. Here, the detection unit 12 determines that the account is illegally used when the charge ratio exceeds a predetermined allowable range of the estimated charge specific power.
- the account unauthorized use detection device 76 of the fifth embodiment further includes a usage fee estimation unit 14 and a usage fee difference estimation unit 15, it estimates the usage fee difference from the amount of incoming data of the data collection device 5.
- the estimated charge ratio which is the ratio between the estimated difference value obtained in this way and the estimated total value for the entire usage fee, is used as the value. Compare the ratio to the estimated charge ratio. This makes it possible to detect unauthorized use of accounts at an early stage.
- the threshold is the estimated charge ratio obtained from the amount of incoming data of the data collection device 5, in other words, the data collection It is a usage-related value on the device 5 side.
- the usage-related value on the data collection device 5 side is related to the usage amount of the Internet 4 by the data collection device 5 using the account.
- the detection unit 12 compares the usage amount related value on the Internet management device 3 side (the charge ratio with respect to the entire usage charge in the difference in usage charges) with the usage amount related value on the data collection device side (the estimated charge ratio). To detect unauthorized use of your account.
- the rate-related value on the Internet management device 3 side is related to the usage of the Internet 4 by the Internet management device 3 using the account.
- the relative change power between the usage amount related value on the Internet management device 3 side and the usage amount related value on the data collection device 5 side can be detected at an early stage.
- the account unauthorized use detecting device 86 of the sixth embodiment includes the usage-related value information receiving unit 11 and the detecting unit 12 of the first embodiment, and further includes a usage fee predicting unit 16. Prepare and speak.
- the usage-related value information receiving unit 11 receives information related to the usage fee of the Internet 4 by the Internet management device 3 from the Internet management device 3 as usage-related value information.
- the usage fee prediction unit 16 obtains a usage fee fee trend prediction value from the history of the amount of incoming data for each predetermined period received by the data collection device 5.
- the price trend forecast value is used as the threshold value.
- the detection unit 12 detects an unauthorized use of an account by comparing a usage fee for each predetermined period (for example, one day) with a predicted price trend value.
- the detection unit 12 determines that the account has been illegally used when the usage fee becomes a value that exceeds the predetermined allowable range of the rate trend value.
- the account unauthorized use detection device 86 of the sixth embodiment further includes a usage fee prediction unit 16, it is possible to compare the usage fee for each predetermined period with the predicted value of the fee trend. It is possible to detect unauthorized use of events early.
- the threshold value is a predicted price trend obtained from the amount of incoming data of the data collection device 5, in other words, the usage amount related to the data collection device 5 side. Value.
- the usage-related value on the data collection device 5 side is related to the usage amount of the Internet 4 by the data collection device 5 using the end count.
- the detection unit 12 compares the usage-related value (usage fee) on the Internet management device 3 side with the usage-related value (fee trend prediction value) on the data collection device side to detect unauthorized use of the account. To do.
- the usage-related value on the Internet management device 3 side is related to the usage of the Internet 4 by the Internet management device 3 using an account.
- FIG. 10 shows a device management system 101 for remotely monitoring a management target device such as an air conditioner using a plurality of device monitoring devices 102.
- the device management system 101 includes a plurality of device monitoring devices 102, an Internet management device 103, and a data collection device 105.
- Multiple device monitoring devices 102 monitor the operating status and failure status of managed devices such as air conditioners, and send the monitoring data to the data collection device 105 via the Internet 104, which is a public network.
- the local controller (LC) to send.
- the monitoring data to be transmitted is sent as a daily report to the data collection device 105 at least once a day (daily report).
- the Internet management device 103 also serves as a computer of an Internet 'service' provider (ISP).
- the Internet management device 103 manages a predetermined account used when sending monitoring data from a plurality of device monitoring devices 102 via the Internet 104 to the data collection device 105.
- the given accounts are the shared first and second accounts.
- the plurality of device monitoring apparatuses 102 are shared first account and second account. It is possible to access the data collection device 105 using the event.
- the data collection device 105 collects and manages monitoring data sent from a plurality of device monitoring devices 102.
- the account selection unit 109, the password setting information transmission unit 110, the password rewriting unit 111, and the password change unit 112 built in the data collection device 105 are included in the account unauthorized use suppression device 108 described later.
- a telephone line 115 for knocking up the Internet 104 is provided between the device monitoring apparatus 102 and the data collection apparatus 105.
- the account is obtained on the data collection device 105 and the account fraud suppression device 108 side by the following procedure.
- step S1 shown in the flowchart of FIG. 14 the data collection device 105 side collects and registers property information about properties such as air conditioners.
- the data collection device 105 requests an account from the Internet management device 103 in step S2.
- the Internet management apparatus 103 issues an ID in step S3.
- step S4 the data collection device 105 acquires an account corresponding to the newly issued ID.
- step S5 the account fraud suppression device 108 registers and updates the account.
- step S6 the account fraudulent use suppression apparatus 108 manages the account.
- the account unauthorized use suppression device 108 shown in FIG. 10 includes an account management database 106, a download management database 107, an account selection unit 109, a password setting information transmission unit 110, a password rewriting unit 111, and a password change unit 112. It is equipped with.
- the account management database 106 includes a plurality of device monitoring devices as shown in FIG.
- the first account hereinafter referred to as account A
- second account hereinafter referred to as account B t
- An account management table 113 is stored in the account management database 106.
- the account management table 113 includes the name 113a of the account and the information associated with account A and account B, that is, the password 113b of each account, the target 113c of each account, and that each account is in use.
- a flag 113d is also included.
- the target 113c of each account is set in all the device monitoring apparatuses 102 (LC). That is, all the device monitoring apparatuses 102 share account A and account B.
- the download management database 107 stores and manages information related to download.
- the download management database 107 stores a download management table 114.
- the information related to the download associated with each registration number LC01, LC02, etc. of the device monitoring device 102 that is, the flag 114a indicating whether or not the download is necessary, and the download were executed.
- the account selection unit 109 alternately selects account A and account B force every predetermined period (for example, one day).
- the flag 113d of the account management table 113 becomes “in use” on the selected account side. Since the daily report from the device monitoring device 102 is issued at least once a day, the predetermined period for account selection and password change can be set to one day or less.
- the password setting information transmission unit 110 receives an account from the device monitoring apparatus 102 using either account A or account B selected by the account selection unit 109. Password setting information related to the setting status of the other password of A or account B is transmitted to the device monitoring device 102 via the Internet management device 103. For example, when the device monitoring device 102 accesses the data collection device 105 using the account A and issues a daily report, the password setting information transmission unit 110 Send password setting information related to account B to all device monitoring devices 102.
- the password rewriting unit 111 rewrites the password of account A or account B to account A and account B and the Internet management device 103 that manages the password of each account every time a predetermined period elapses. .
- the password rewriting unit 111 transmits the password rewriting information including the new! / Of the other of the account A or the account B and the password to the Internet management apparatus 103.
- the password changing unit 112 changes one of the passwords 113b of the account A and the account B in the password 113b stored in the account management database 106 every time a predetermined period elapses. For example, the password changing unit 112 changes the password 113 b corresponding to the account A in the account management table 113 after a predetermined period in which the account A is used.
- the device monitoring apparatus 102 and the data collection apparatus 105 are in a state where they can communicate using the account A.
- step S11 of FIG. 15 the account information for the next access is returned to all the device monitoring apparatuses 102 (LC). Specifically, in the download management table 114 of the download management database 107 in FIG. 12, when the download flag 114a is “necessary” and the status 114b is “not implemented”, the daily report from the device monitoring device 102 is displayed. As a reply to the notification, the password setting information transmission unit 110 sends the account B password setting information for access in the next period II (see FIG. 13) to the device monitoring apparatus 102, and then download management table 1 Change 14's status 114b to "complete".
- step S12 after the period I in FIG. 13 has elapsed, the account selection unit 109 selects the account B for access in the next period II in the account management table 113 in FIG. Specifically, the account selection unit 109 selects account B for access in period II, and the account management table 113 in FIG.
- the flag 113d is “in use” on the selected account B side, and “unused” on the account A side.
- step S 13 the password of account A for access in the next period III is changed in the account management table 113.
- the password changing unit 112 changes the password 113b for account A in the account management table 113.
- step S14 the contents of the download management table 114 are changed. Specifically, in the download management table 114, the password setting information transmission unit 110 rewrites the download flag 114 & for all the device monitoring apparatuses 102 to “necessary” and changes the status 114b to “not implemented”.
- the nosword rewriting unit 111 corrects the account information of the Internet management device 103. Specifically, the password rewriting unit 111 corrects the account information for the Internet management apparatus 103 from the account A used in the period I to the account B used in the period ⁇ .
- the newly installed device monitoring device 102 if one account A is downloaded, if account B is not downloaded, it will be newly added during period I when account A is accessed. Download the device monitoring device 102 Hair Count B.
- period II After the end of period II, as in period I, the period shifts to period III in which all device monitoring devices 102 access the data collection device 105 with account A, and updates the passwords for other account B And send the updated password information to all device monitoring devices 102.
- the other public line network is used as a knock-up line. Communication can be established via a telephone line 115. Also, when the newly added device monitoring apparatus 102 communicates with the data collecting apparatus 105 for the first time, since no account is given to the device monitoring apparatus 102, communication is performed via the telephone line 115.
- the account selection unit 109 alternately selects from the account A and the account B every predetermined period.
- the password setting information transmission unit monitors the other password setting information of account A or account B when accessed from the device monitoring apparatus 102 using either the selected account A or account B. Transmit to device 102.
- the password rewriting unit 111 rewrites the other password of the account A or the account B to the Internet management apparatus 103 every time a predetermined period elapses.
- the password changing unit 112 changes the password of one of the account A and the account B stored in the account management database 106 every time a predetermined period elapses. In this way, it is possible to suppress unauthorized use of accounts by alternately using two accounts at predetermined intervals.
- the account fraudulent use suppression device 108 of the seventh embodiment further includes a download management database 107 that manages the transmission status of password setting information, it manages the transmission status of password setting information related to each device monitoring device 102, that is, downloads. Management is possible.
- the download management database 107 stores the status regarding the transmission status of the password setting information. It is possible to manage the status regarding the transmission status of the word setting information.
- the account management database 106 and the download management database 107 are configured separately.
- the present invention is not limited to this.
- the download management database 107 includes the account management database 106 and It may be configured integrally. Since the download management database 107 is integrated with the account management database 106, it is possible to collectively manage the transmission status of account and password setting information.
- the account management database 106 is used to manage a plurality of accounts, but the present invention is not limited to this.
- an account management server may be used.
- the account password can be modified by the account management server.
- the power of using the account unauthorized use suppression device 108 built in the data collection device 105 is not limited to this.
- the data collection device 105 itself may execute the function of the account unauthorized use detection device 108 by the data collection device 105 executing the account unauthorized use suppression program.
- the account unauthorized use suppression program includes an account selection step, a password setting information transmission step, a password rewrite step, and a password change step.
- the first account (account A) and the second account (account B) are used when data is transmitted from a plurality of data transmission devices (device monitoring devices) 102 to the data collection device 105 via the Internet 104.
- the first account and the second account stored in the account management database 106 are alternately selected every predetermined period.
- the password setting information transmission step is performed in either of the selected first account or second account.
- the password setting information regarding the setting status of the other password of the first account or the second account is transmitted to the data transmission device 102.
- the password rewriting step the other password of the first account or the second account is rewritten to the Internet management apparatus 103 every time a predetermined period elapses.
- the Internet management device 103 manages the first account, the second account, and the password of each account.
- the password changing step one of the first account and the second account in the password stored in the account management database 106 is changed every time a predetermined period elapses.
- the first account and the second account are alternately selected every predetermined period
- the password change step the first account is selected for the password stored in the account storage unit. Change the password of either the second account or the second account every time the specified period elapses. Therefore, when the data collection device 105 executes the account fraud suppression program, the two accounts can be used alternately every predetermined period, thereby suppressing the account fraud. Is possible.
- the account fraudulent use suppression device 128 of the eighth embodiment includes an account management database 126, a download management database 127, a password setting information transmission unit 130, a password rewriting unit 131, And a password changing unit 132.
- the account fraudulent use suppression device 128 is provided in the device management system 101 common to the seventh embodiment. Therefore, the plurality of device monitoring apparatuses 102, the Internet management apparatus 103, and the data collection apparatus 105 shown in FIG. 16 are in common with the components having the same reference numerals in FIG.
- the account management database 126 corresponds to each device monitoring device 102 when sending data from a plurality of device monitoring devices 102 to the data collecting device 105 via the Internet 104, as shown in FIG. Add and remember.
- Account management table 133 contains Along with the account name 133a, it also contains information associated with account A and account B, ie the password 133b for each account, and the target 133c for each account.
- the target 133c of each account is set in the individual device monitoring apparatus 102 (LC). That is, each device monitoring apparatus 102 has a unique account.
- the download management database 127 stores and manages information related to download.
- a download management table 134 is stored in the download management database 127.
- the password changing unit 132 changes each password of the plurality of accounts stored in the account management database 126 every predetermined period (for example, one day). Since there is at least one daily report from the equipment monitoring device 102 per day, the predetermined period for changing the word can be set to one day or less.
- the password setting information transmission unit 130 transmits password setting information related to the setting status of the password to the device monitoring device 102.
- the password rewriting unit 131 includes a plurality of accounts. The password is rewritten every time a predetermined period elapses for the Internet management device 103 that manages the password of each account.
- the account information for the next access is returned to all the device monitoring apparatuses 102 (LC).
- the download management table 134 of the download management database 127 in FIG. 18 when the download flag 134a is “necessary” and the status 134b is “not implemented”, the daily report from the device monitoring device 102 is displayed.
- the password setting information transmission unit 130 sends the password setting information of each account in the next period II (see FIG. 19) to the device monitoring device 102 corresponding to the account, and then the download management table. Change the status 134b of 134 to “complete”.
- the account management table 133 changes the password of each account for the subsequent access in period III.
- the password changing unit 132 changes the password 133b of each account in the account management table 133 in FIG.
- step S23 the contents of the download management table 134 are changed. Specifically, the password setting information transmission unit 130 rewrites the download flag 11 4a for all the device monitoring devices 102 to “necessary” and changes the status 114b to “not implemented” in the download management table 134 of FIG. To do.
- the word rewrite unit 131 corrects the account information of the Internet management device 103. Specifically, the password rewriting unit 131 corrects the account information for the Internet management apparatus 103 from the password used in the period I to the password used in the period ⁇ .
- the account management data base 126 stores a plurality of accounts and passwords of each account in association with each device monitoring device 102.
- the password changing unit 132 changes passwords of a plurality of accounts every predetermined period.
- the password setting information transmission unit 130 transmits password setting information regarding the password setting status to the apparatus monitoring device 102.
- the password rewriting unit 131 rewrites the password to the Internet management apparatus 103 every time a predetermined period elapses.
- the password changing unit 132 can change the password of each account corresponding to each device monitoring apparatus 102 every predetermined period, thereby preventing unauthorized use of the account.
- the account fraudulent use suppression device 128 of the eighth embodiment further includes a download management database 127 that manages the transmission status of password setting information, and therefore manages the transmission status of password setting information related to each device monitoring device 102, ie, download. Management is possible.
- the download management database 127 since the download management database 127 stores the status related to the transmission status of the password setting information, it is possible to manage the status related to the transmission status of the password setting information for each device monitoring apparatus 102.
- the power of the account management database 126 and the download management database 127 being configured separately.
- the present invention is not limited to this. It may be configured integrally.
- the download management database 127 is integrated with the account management database 126, so that the transmission status of account and password setting information is collectively managed. Is possible.
- the account management database 126 is used to manage a plurality of accounts, but the present invention is not limited to this.
- an account management server may be used.
- the account password can be modified by the account management server.
- the account for unauthorized use is suppressed by changing the account for access every day, and the damage caused by unauthorized use can be suppressed for up to 2 days. It is.
- the data collection device 105 receives information on usage-related values such as usage charges from the Internet management device 103, and detects unauthorized use of accounts early. 21 may be added to the above-mentioned account improper use suppression device 108 or 128.
- the account unauthorized use detecting device 151 includes a fee information receiving unit 152 and a detecting unit 153.
- the fee information receiving unit 152 receives fee information from the Internet management device 103.
- the fee information is information related to the usage fee of the Internet 104 using an account by the Internet management device 103.
- the detection unit 153 compares the usage fee of the Internet 104 using the account by the Internet management apparatus 103 with a predetermined threshold value, and detects unauthorized use of the account.
- step S31 daily fee information is managed by the Internet management device 103.
- the fee information is periodically transmitted to the account fraud detection device 151 provided in the account fraud suppression device 108 or 128 every day.
- step S32 the account unauthorized use detection device 151 detects the occurrence of unauthorized use of the account based on the fee information.
- the account fraud detection device 151 detects an account fraud
- the account is updated in step S33. For example, it is only necessary to change only the password or both the account and the password by the account improper use suppression device 108 or 128 described above.
- information about the unauthorized use of the account and the status of unauthorized use is transmitted from the data collection device 105 to the Internet management device 103 and the personal computer owned by the account holder.
- the present invention is not limited to this, and information related to the incoming data amount of the Internet management device 103 is not limited to this. You may receive it. Since the amount of incoming data correlates with the usage fee, the usage fee can be estimated from the amount of incoming data per day. When the usage fee is estimated from the amount of incoming data, the rate of false detection decreases even if the number of device monitoring devices 102 is small.
- the account information can be set by the following procedure.
- step S41 in the flowchart of FIG. 23 after installing a new device monitoring device 102 at the site where the property such as an air conditioner is installed, a trial operation of the device monitoring device 102 is performed.
- step S42 the first daily report is issued from the new device monitoring apparatus 102 to the data collecting apparatus 105.
- the first daily report is issued through the backup telephone line 115 without going through the Internet 104.
- step S43 the data collection device 105 performs daily report reception processing.
- step S44 the data collection device 105 determines whether the registration number of the device monitoring device 102 exists. If the registration number exists, the process proceeds to step S45, and if not, the process proceeds to step S47.
- step S45 the data collection device 105 determines whether or not it is necessary to issue an account, and if necessary, performs a unique account issuance process corresponding to the registration number of the device monitoring device 102 in step S46.
- step S47 the data collection device 105 determines whether or not it is necessary to issue an account. If necessary, in step S48, the data collection device 105 performs an account issuance process shared by all the device monitoring devices 102.
- step S49 the data collection device 105 returns the account information to the new device monitoring device 102.
- step S50 the new device monitoring apparatus 102 sets account information.
- the next daily report can be issued via the Internet 104.
- the present invention is widely applied to an apparatus or a program for early detection of unauthorized use of an account used for authentication for using a public line network such as the Internet or suppressing unauthorized use. Is possible.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Development Economics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Game Theory and Decision Science (AREA)
- Economics (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP06782952A EP1936529A4 (en) | 2005-08-29 | 2006-08-23 | DEVICE FOR DETECTING / UNDERPRINING AN INCORRECT USE OF ACCOUNTS, DATA COLLECTING EQUIPMENT AND PROGRAM FOR DETECTING / UNDERPRINING AN INCORRECT USE OF ACCOUNTS |
AU2006285986A AU2006285986B8 (en) | 2005-08-29 | 2006-08-23 | Account Abuse Detection or Prevention Device, Data Collection Device, and Account Abuse Detection or Prevention Program |
US12/064,977 US20090281816A1 (en) | 2005-08-29 | 2006-08-23 | Account abuse detection or prevention device, data collection device, and account abuse detection or prevention program |
CN200680031999XA CN101253507B (zh) | 2005-08-29 | 2006-08-23 | 账户非法使用检测或抑制装置、数据收集装置 |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2005-248043 | 2005-08-29 | ||
JP2005248044A JP4020133B2 (ja) | 2005-08-29 | 2005-08-29 | アカウント不正使用抑制装置およびアカウント不正使用抑制プログラム |
JP2005248043A JP3925546B2 (ja) | 2005-08-29 | 2005-08-29 | アカウント不正使用検出装置、データ収集装置ならびにアカウント不正使用検出プログラム |
JP2005-248044 | 2005-08-29 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007026580A1 true WO2007026580A1 (ja) | 2007-03-08 |
Family
ID=37808678
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2006/316499 WO2007026580A1 (ja) | 2005-08-29 | 2006-08-23 | アカウント不正使用検出または抑制装置、データ収集装置ならびにアカウント不正使用検出または抑制プログラム |
Country Status (4)
Country | Link |
---|---|
US (1) | US20090281816A1 (ja) |
EP (1) | EP1936529A4 (ja) |
AU (1) | AU2006285986B8 (ja) |
WO (1) | WO2007026580A1 (ja) |
Families Citing this family (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9990674B1 (en) | 2007-12-14 | 2018-06-05 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US8127986B1 (en) | 2007-12-14 | 2012-03-06 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US9183377B1 (en) * | 2008-06-18 | 2015-11-10 | Symantec Corporation | Unauthorized account monitoring system and method |
US8312033B1 (en) | 2008-06-26 | 2012-11-13 | Experian Marketing Solutions, Inc. | Systems and methods for providing an integrated identifier |
KR101074624B1 (ko) * | 2008-11-03 | 2011-10-17 | 엔에이치엔비즈니스플랫폼 주식회사 | 브라우저 기반 어뷰징 방지 방법 및 시스템 |
US8060424B2 (en) | 2008-11-05 | 2011-11-15 | Consumerinfo.Com, Inc. | On-line method and system for monitoring and reporting unused available credit |
US9665854B1 (en) | 2011-06-16 | 2017-05-30 | Consumerinfo.Com, Inc. | Authentication alerts |
US9483606B1 (en) | 2011-07-08 | 2016-11-01 | Consumerinfo.Com, Inc. | Lifescore |
US9106691B1 (en) | 2011-09-16 | 2015-08-11 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US8738516B1 (en) | 2011-10-13 | 2014-05-27 | Consumerinfo.Com, Inc. | Debt services candidate locator |
US8751405B2 (en) | 2012-04-16 | 2014-06-10 | Wal-Mart Stores, Inc. | Processing online transactions |
US9853959B1 (en) | 2012-05-07 | 2017-12-26 | Consumerinfo.Com, Inc. | Storage and maintenance of personal data |
US9654541B1 (en) | 2012-11-12 | 2017-05-16 | Consumerinfo.Com, Inc. | Aggregating user web browsing data |
US9916621B1 (en) | 2012-11-30 | 2018-03-13 | Consumerinfo.Com, Inc. | Presentation of credit score factors |
US10255598B1 (en) | 2012-12-06 | 2019-04-09 | Consumerinfo.Com, Inc. | Credit card account data extraction |
US9870589B1 (en) | 2013-03-14 | 2018-01-16 | Consumerinfo.Com, Inc. | Credit utilization tracking and reporting |
US9406085B1 (en) | 2013-03-14 | 2016-08-02 | Consumerinfo.Com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US10102570B1 (en) | 2013-03-14 | 2018-10-16 | Consumerinfo.Com, Inc. | Account vulnerability alerts |
US10685398B1 (en) | 2013-04-23 | 2020-06-16 | Consumerinfo.Com, Inc. | Presenting credit score information |
US10325314B1 (en) | 2013-11-15 | 2019-06-18 | Consumerinfo.Com, Inc. | Payment reporting systems |
US9477737B1 (en) | 2013-11-20 | 2016-10-25 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
US9892457B1 (en) | 2014-04-16 | 2018-02-13 | Consumerinfo.Com, Inc. | Providing credit data in search results |
US10949863B1 (en) * | 2016-05-25 | 2021-03-16 | Wells Fargo Bank, N.A. | System and method for account abuse risk analysis |
US20200074541A1 (en) | 2018-09-05 | 2020-03-05 | Consumerinfo.Com, Inc. | Generation of data structures based on categories of matched data items |
US11315179B1 (en) | 2018-11-16 | 2022-04-26 | Consumerinfo.Com, Inc. | Methods and apparatuses for customized card recommendations |
US11238656B1 (en) | 2019-02-22 | 2022-02-01 | Consumerinfo.Com, Inc. | System and method for an augmented reality experience via an artificial intelligence bot |
US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
US11301549B2 (en) * | 2020-04-28 | 2022-04-12 | Jpmorgan Chase Bank, N.A. | Method for performing password transitions |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07160638A (ja) * | 1993-12-02 | 1995-06-23 | Hitachi Ltd | 情報機器端末装置 |
JPH09289686A (ja) * | 1996-04-23 | 1997-11-04 | Nippon Denki Ido Tsushin Kk | 不正使用防止方法 |
JP2003256371A (ja) * | 2002-02-28 | 2003-09-12 | Ricoh Co Ltd | 認証情報管理装置、端末装置及び認証情報管理システム |
JP2004208199A (ja) * | 2002-12-26 | 2004-07-22 | Hitachi Kokusai Electric Inc | 携帯端末 |
JP2004295799A (ja) * | 2003-03-28 | 2004-10-21 | Osaka Gas Co Ltd | 遠隔制御システム |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0901269A1 (en) * | 1996-06-18 | 1999-03-10 | Mitsubishi Denki Kabushiki Kaisha | Portable telephone system |
WO2000078004A2 (en) * | 1999-06-10 | 2000-12-21 | Alcatel Internetworking, Inc. | Policy based network architecture |
US6519509B1 (en) * | 2000-06-22 | 2003-02-11 | Stonewater Software, Inc. | System and method for monitoring and controlling energy distribution |
US20030055677A1 (en) * | 2001-09-14 | 2003-03-20 | Automated Energy, Inc. | Utility monitoring and management system |
US20030110103A1 (en) * | 2001-12-10 | 2003-06-12 | Robert Sesek | Cost and usage based configurable alerts |
US7072640B2 (en) * | 2003-11-18 | 2006-07-04 | Nokia Corporation | Terminal, method and computer program product for producing a user perceptible output upon reaching a predefined threshold |
US7848501B2 (en) * | 2005-01-25 | 2010-12-07 | Microsoft Corporation | Storage abuse prevention |
US20070203860A1 (en) * | 2006-02-24 | 2007-08-30 | Gridpoint, Inc. | Energy budget manager |
-
2006
- 2006-08-23 AU AU2006285986A patent/AU2006285986B8/en not_active Ceased
- 2006-08-23 US US12/064,977 patent/US20090281816A1/en not_active Abandoned
- 2006-08-23 WO PCT/JP2006/316499 patent/WO2007026580A1/ja active Application Filing
- 2006-08-23 EP EP06782952A patent/EP1936529A4/en not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07160638A (ja) * | 1993-12-02 | 1995-06-23 | Hitachi Ltd | 情報機器端末装置 |
JPH09289686A (ja) * | 1996-04-23 | 1997-11-04 | Nippon Denki Ido Tsushin Kk | 不正使用防止方法 |
JP2003256371A (ja) * | 2002-02-28 | 2003-09-12 | Ricoh Co Ltd | 認証情報管理装置、端末装置及び認証情報管理システム |
JP2004208199A (ja) * | 2002-12-26 | 2004-07-22 | Hitachi Kokusai Electric Inc | 携帯端末 |
JP2004295799A (ja) * | 2003-03-28 | 2004-10-21 | Osaka Gas Co Ltd | 遠隔制御システム |
Also Published As
Publication number | Publication date |
---|---|
AU2006285986A1 (en) | 2007-03-08 |
AU2006285986B2 (en) | 2009-12-10 |
AU2006285986B8 (en) | 2010-04-01 |
US20090281816A1 (en) | 2009-11-12 |
EP1936529A4 (en) | 2010-06-23 |
EP1936529A1 (en) | 2008-06-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2007026580A1 (ja) | アカウント不正使用検出または抑制装置、データ収集装置ならびにアカウント不正使用検出または抑制プログラム | |
RU2446610C2 (ru) | Потоковая подготовка к работе в amr/ami-служебных сетях | |
JP2012252580A (ja) | 電力制御装置、電力管理装置および電力管理システム | |
JP2008530637A (ja) | 複数の装置ドメインのために適応可能なデジタル著作権管理システム | |
EP1984876A1 (en) | Computer hosting multiple secure execution environments | |
KR101152188B1 (ko) | 객실 사용 자원 관리 시스템 | |
CN109063423A (zh) | 应用软件授权方法及系统 | |
WO2008094780A1 (en) | Secure provisioning with time synchronization | |
KR101653148B1 (ko) | 원격검침시스템용 보안장치 | |
JP4020133B2 (ja) | アカウント不正使用抑制装置およびアカウント不正使用抑制プログラム | |
US20150244588A1 (en) | Method of setting a transmission cycle for information on construction equipment | |
JP2002351564A (ja) | アプリケーション提供サービスのための装置及び方法並びにプログラム | |
JP3925546B2 (ja) | アカウント不正使用検出装置、データ収集装置ならびにアカウント不正使用検出プログラム | |
CN104994520A (zh) | 一种用于移动终端流量共享的方法及移动终端 | |
US20070027821A1 (en) | Method for controlling the delivery of a flow of items to at least a client of an item provider | |
KR101062396B1 (ko) | 네트워크를 통한 사용자 단말기의 관리 방법 및 이에 사용되는 웹서버 | |
CN105591980B (zh) | 一种带宽消耗管理方法及装置 | |
CN104378402A (zh) | 用户联系信息更新方法及装置 | |
JP2010146029A (ja) | メールアドレス漏洩検出システムおよび方法ならびにメールアドレス管理サーバおよびプログラム | |
JP5329323B2 (ja) | プリペイド式サービス提供システム | |
KR101135841B1 (ko) | 원격검침 프로토콜을 활용한 보안시스템 및 그 방법 | |
US20030194070A1 (en) | Method of billing charge for used functions of communication device, method of regulating function of communication device, customer center for carrying out the method, and an user system including the communication device | |
EP4163863A1 (en) | Program, information processing method, and information processing device | |
JP2005182142A (ja) | タイムスタンプ発行受付装置、タイムスタンプ押印サービスの代理店システム | |
CN105163331A (zh) | 一种用于移动终端流量共享的方法及移动终端 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200680031999.X Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 12064977 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006782952 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1174/KOLNP/2008 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006285986 Country of ref document: AU |
|
ENP | Entry into the national phase |
Ref document number: 2006285986 Country of ref document: AU Date of ref document: 20060823 Kind code of ref document: A |