SYSTEM AND METHOD FOR DETECTING INVASION UPON IMAGE PROCESSOR
PROBLEM TO BE SOLVED: To detect unauthorized entries into an image processor in the image processor. SOLUTION: State transition data which define processing functions of a document processor 104 are enciphered and stored in a data storing device 108 as a state transition file. A log file of access o...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | PROBLEM TO BE SOLVED: To detect unauthorized entries into an image processor in the image processor. SOLUTION: State transition data which define processing functions of a document processor 104 are enciphered and stored in a data storing device 108 as a state transition file. A log file of access operations to the document processor 104 is compared with the state transition file. If the state transition data in the log file has missing parts compared with the state transition file, the log file is abnormal and invasion is detected. COPYRIGHT: (C)2008,JPO&INPIT |
---|