摘要 |
PROBLEM TO BE SOLVED: To prevent any user other than an authorized user from illegally using a computer system. SOLUTION: When a log-in request is transmitted from a PC to a host, the host judges whether or not a user is an authorized user based on authentication information added to the log-in request (S200), and when the user is the authorized user, generates ticket information(ticket 1) (202), and registers the ticket information in the "latest ticket" of a final transaction information table, and transmits log-in permission response to which the ticket information is added to the PC. The PC makes a memory store the received ticket information (204). The following transmission information from the PC to the host is added with the ticket, and the host collates the ticket added to the received information with the ticket registered in the table for executing user authentication (206, 212), and generates a new ticket (208, 214), and registers it in the table(registers the already registered "latest ticket" in the "previous ticket"), and adds it to the response to the PC. COPYRIGHT: (C)2005,JPO&NCIPI |