摘要 |
An access control method executed by a computer system, including applying a n access rate limit until a user issuing access requests is verified, a first control level involving verifying the user, a second control level applying hack program detection tests to the access requests and verifying the user, a third control level requiring use of predetermined download software for transmitting the access requests and verifying the user, a fourth control level blocking access to the service on the basis of at least one communications address corresponding to the access requests, and invoking th e control levels sequentially depending on a number of failed attempts to veri fy the user.
|