摘要 |
<p>When a program is introduced into a computer terminal from an external source via a wired or wireless network or by using an external memory card, unauthorized access by the introduced program to various functions within the terminal is prevented by verifying the source from which the program was distributed and performing execution control appropriately according to the identity of the program. In order to reference the security policy data which specifies functions available to each program given from an external source and restrict functions used by the program, the information concerning the security domain or the certificate or signature attached to the program is extracted, and the extracted information is associated with one of a plurality of function access types held as security policy data.</p> |