Access filtering device and access filtering method
A technology for restricting access and restricting information, which is applied in computer security devices, instruments, electronic digital data processing, etc., and can solve problems such as unrecognizable, inability to read site or page information without knowing, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0022] figure 1 It is a block diagram showing the configuration of the browsing-prohibited page restriction system of the first embodiment. figure 1 The shown browsing prohibited page restriction system 1 includes, for example, a plurality of client terminals 2 , a management server 3 that manages the plurality of client terminals 2 , and a management console 4 that executes various settings of the management server 3 . The management server 3 has a function of recording the operation of the client terminal 2 that poses a risk of information leakage, suppressing problematic actions, and preventing electronic information from being leaked to the outside.
[0023] Therefore, the management server 3 has functions such as login control / recording function, policy management function, operation restriction / recording function, original storage function of retrieved documents, and service activation control function, for example. First, the log-in control / logging function is a functi...
Embodiment 2
[0078] Figure 8 It is a flowchart showing processing operations related to the browsing-prohibited page restriction processing of the second embodiment. Additionally, for figure 1 The same configurations of the browsing-prohibited page restriction system 1 of the first embodiment shown are denoted by the same reference numerals, and descriptions of their redundant configurations and operations are omitted.
[0079] exist Figure 8In Step S17, the monitoring application disables the operation on the display screen of the browsing-prohibited page, and then obtains a hard copy of the display screen of the browsing-prohibited page through the hard copy acquisition unit 47A (step S17A). Here, the hard copy acquisition unit 47A is executed by a monitoring application. Then, after the monitoring application acquires the hard copy of the display screen in step S17A, it transfers to step S18 in order to perform see-through display of the display screen.
[0080] Next, after the mo...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


