摘要 |
PURPOSE:To continuously prevent information from being stolen by adding a function for detecting that a host or a server is accessed by any unauthorized illicit user. CONSTITUTION:The host or the server generates an authentication code to be inputted when a connecting user succeedingly accesses a system (S100), sends the generated authentication code to a terminal equipment (S101) and holds the authentication code (S102). Then, the held authentication code is transmitted to the host or the server (S106), the host or the server received with a connection request compares the authentication code received from the user with the authentication code held at the host or the server (S107) and when the authentication code received from the user is different from the held authentication code, it is judged that system invasion caused by the third person is generated (S108). When the authentication code received from the user is matched with the held authentication code, it is judged that the system invasion caused by the third person is not generated (S109). |