摘要 |
<p><P>PROBLEM TO BE SOLVED: To effectively prevent key data from being leaked and stolen. <P>SOLUTION: The key data is input to a key data management server 1, and registered in a storage medium 2 while subjected to an encryption processing such that the key data can be installed in a terminal device 3. A key data file is installed in the terminal device 3, and management software registers identification information inherent to the terminal device 3 in the key data file. When an application using a key data management system is started, the identification information of the terminal device 3 is compared with identification information of the key data file, and if the identification information is consistent with each other, the key data is decrypted and used by the application. <P>COPYRIGHT: (C)2010,JPO&INPIT</p> |