Unlock instant, AI-driven research and patent intelligence for your innovation.

Access filtering device and access filtering method

A technology for restricting access and restricting information, which is applied in computer security devices, instruments, electronic digital data processing, etc., and can solve problems such as unrecognizable, inability to read site or page information without knowing, etc.

Active Publication Date: 2014-12-17
FUJITSU LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, when the input URL corresponds to the URL of a prohibited site, access to the site corresponding to the input URL is prohibited, thereby preventing browsing of the site information, so the user does not know that the URL corresponding to the input cannot be browsed. The reason for the corresponding site or page information
[0006] For example, on the user's side, it is impossible to identify whether the site or page corresponding to the URL entered by the user corresponds to the URL of a prohibited site or a page that is prohibited from viewing, or whether the site or page corresponding to the entered URL corresponds to a prohibited site due to an input error in the URL. Or view the URL of the prohibited page
[0007] That is, the user does not know the reason why the site or page information corresponding to the input URL cannot be browsed, so many attempts are made to access the restricted site such as the forbidden site.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access filtering device and access filtering method
  • Access filtering device and access filtering method
  • Access filtering device and access filtering method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] figure 1 It is a block diagram showing the configuration of the browsing-prohibited page restriction system of the first embodiment. figure 1 The shown browsing prohibited page restriction system 1 includes, for example, a plurality of client terminals 2 , a management server 3 that manages the plurality of client terminals 2 , and a management console 4 that executes various settings of the management server 3 . The management server 3 has a function of recording the operation of the client terminal 2 that poses a risk of information leakage, suppressing problematic actions, and preventing electronic information from being leaked to the outside.

[0023] Therefore, the management server 3 has functions such as login control / recording function, policy management function, operation restriction / recording function, original storage function of retrieved documents, and service activation control function, for example. First, the log-in control / logging function is a functi...

Embodiment 2

[0078] Figure 8 It is a flowchart showing processing operations related to the browsing-prohibited page restriction processing of the second embodiment. Additionally, for figure 1 The same configurations of the browsing-prohibited page restriction system 1 of the first embodiment shown are denoted by the same reference numerals, and descriptions of their redundant configurations and operations are omitted.

[0079] exist Figure 8In Step S17, the monitoring application disables the operation on the display screen of the browsing-prohibited page, and then obtains a hard copy of the display screen of the browsing-prohibited page through the hard copy acquisition unit 47A (step S17A). Here, the hard copy acquisition unit 47A is executed by a monitoring application. Then, after the monitoring application acquires the hard copy of the display screen in step S17A, it transfers to step S18 in order to perform see-through display of the display screen.

[0080] Next, after the mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An access filtering device includes a receiving unit that receives a URL of a prohibited site or a prohibited page; an executing unit that accesses the page by using the URL; an acquiring unit that acquires page information corresponding to the URL; a prohibited site list that includes character strings of prohibited sites and prohibited pages; a determining unit that determines whether the URL is a character string of a prohibited site or a prohibited page; a display control unit that, when the URL is a character string of a prohibited site or a prohibited page, displays the page in a decreased page-readability state, i.e., in a transparent state.

Description

technical field [0001] The present invention relates to an access restriction device and an access restriction method. Background technique [0002] For example, when a user accesses a web page (Web page) (hereinafter referred to as a page) published on the network from a terminal, a URL (Uniform Resource Locator: Uniform Resource Locator) indicating the address of a desired page is input. For example, when a user wants to access a specific website (Web site) (hereinafter referred to as a site), the user inputs a URL corresponding to the top page of the specific site. Next, the terminal is guided to a desired page according to the input URL. However, in recent years, an administrator who manages an in-company terminal prohibits in-company users from accessing inappropriate sites or inappropriate pages within the site, taking smooth completion of business as one of their goals. [0003] Therefore, there is known a technique for preventing browsing of inappropriate sites by ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06G06F3/048G06F21/00G06F21/60G06F21/62
CPCG06F21/51G06F2221/2101G06F2221/2119
Inventor 松根伸志小笠原奏子
Owner FUJITSU LTD