摘要 |
<P>PROBLEM TO BE SOLVED: To obtain a security system capable of enhancing security strength of files. <P>SOLUTION: Only when a tag key 2 exists in a predetermined monitoring area 5, encryption keys can be generated from a tag ID to perform encryption processing for encrypting encryption processing target files or decryption processing for decrypting encrypted files. Thus, if the tag key 2 does not exist in the predetermined monitoring area 5, encryption or decryption of files cannot be performed, so that it is possible to enhance security strength of files. <P>COPYRIGHT: (C)2012,JPO&INPIT |