摘要 |
PROBLEM TO BE SOLVED: To easily recognize which influence of various functions installed in an information processor exerts on security, and which constraint is given by security functions. SOLUTION: Security information when various functions installed in an information processor are set, constraint information and the item information of various functions are related to each other and registered in a database beforehand. Prior to the execution of set various functions, a display device at the terminal equipment side or a control panel installed in the information processor is caused to display the security information when the functions are executed and the constraint information when the functions are executed, by referring to the information database. COPYRIGHT: (C)2008,JPO&INPIT |