摘要 |
PROBLEM TO BE SOLVED: To suppress illegal access due to leakage of a key reliably.SOLUTION: An information processor comprises: a secret key generation unit for generating a secret key from a random number and a specified value received from an external device providing a service; a public key generation unit for generating a public key based on the secret key, by using a function set identically for a plurality of services; a transmission unit for transmitting the public key to the external device; and an authentication unit for authenticating the external device by using the secret key. With such a configuration, illegal access due to leakage of a key can be suppressed reliably. |