摘要 |
<P>PROBLEM TO BE SOLVED: To prevent spoofing of a host by a third person. <P>SOLUTION: A device 11 stores data to be read/written by a host. A storage part 12 has a command storage part 12a. The command storage part 12a stores a command for acquiring information on the device. A control part 13 has a command acquisition part 13a and an access determination part 13b. The command acquisition part 13a acquires the command issued from the host requesting for access to data stored in the device 11 to the device 11, when the host requests for access. The access determination part 13b permits access, when the command acquired by the command acquisition part 13a is stored in the command storage part 12a. <P>COPYRIGHT: (C)2012,JPO&INPIT |