摘要 |
PROBLEM TO BE SOLVED: To provide an access control program capable of specifying, in units of device, a receiving device from which confidential information leaked out and was illegally duplicated.SOLUTION: An access control program P is characterized by causing a computer of a receiving device to function as: first individual information processing means 21 for acquiring a work key by decoding individual information including the work key encrypted by a transmission device using a master key specific to the receiving device, the decoding performed using the master key of the receiving device; first common information processing means 22 for acquiring a scramble key by decoding common information including the scramble key encrypted by the transmission device using the work key; and decoding stoppage delay means 23 for counting, when information for instructing stoppage of decoding of the scramble key is included in the common information, a delay time predefined as a delay parameter, and, after an elapse of the delay time, instructing the first common information processing means 22 to stop the decoding. |