摘要 |
<p><P>PROBLEM TO BE SOLVED: To solve the problem that both security authentication levels and strength levels of data protection are not taken into consideration when data is migrated between security devices. <P>SOLUTION: A first terminal has a mechanism for protecting data by a pubic key type secret key held by a TPM (Trusted Platform Module), a second terminal has a secret key type key encrypted by the public key type secret key held by the TPM and a mechanism for protecting data by the key, and a certificate authority holds a security policy table describing security polices, and determines the acceptance/rejection of data on the basis of the security policy table when the data is moved from the second terminal to the first terminal. <P>COPYRIGHT: (C)2009,JPO&INPIT</p> |