摘要 |
PROBLEM TO BE SOLVED: To provide an information processing device that can manage decryption of an encrypted file in such a manner as preventing fraudulent information leakage from a user to whom the decryption is permitted to a third party.SOLUTION: An encrypted file 30 includes a plurality of user terminals (for example, 10A and 10B) as destinations for confirming a permission of decryption, registered therein. A user terminal 10C that tries to decrypt the encrypted file tries to communicate with the plurality of user terminals 10A and 10B designated as the confirmation destinations by near-field communication and, when capable of communicating with all of the plurality of user terminals 10A and 10B by near-field communication, the user terminal 10C is permitted to decrypt the encrypted file. Namely, when a user A and a user B are present near the user terminal 10C, the decryption is permitted. |