摘要 |
PROBLEM TO BE SOLVED: To provide a method of detecting unauthorized use capable of efficiently identifying a critical point such as falsification etc. in a complicated system for professional-use which uses plural servers and operates under virtual environment.SOLUTION: When determining an occurrence of a critical problem such as falsification etc. by using a hash value in a system including plural virtual environment servers, constitutional elements of the system are hierarchically investigated. For example, comparisons are made according to the type of business, on each server, on each module in order by using the hash value. And further, by storing coefficients representing susceptibility to an external influences, comparisons are carried out by using the hash values in the respective hierarchies in the order of the coefficients. |