摘要 |
<P>PROBLEM TO BE SOLVED: To provide an information processor adapted to detect illicit processing in addition of authentication, recognize the illicit processing as tamper, and erase security data in a security module. <P>SOLUTION: This information processor comprises a security module 2 for storing security data, and outputting a first hash obtained by decoding a signature of an application by use of a common key; and a main unit 1 for calculating a second hash that is the hash of the main body of the application, and outputting a signal to the security module 2 in the case that the first hash is not matched to the second hash. The security module 2 erases the security data upon receiving the signal from the main unit 1. <P>COPYRIGHT: (C)2006,JPO&NCIPI |