摘要 |
<p><P>PROBLEM TO BE SOLVED: To provide an authentication system capable of more surely preventing resources from being the fraudulently used by an unauthorized user having no use authority. <P>SOLUTION: When the collated result of user information for identifying a user (steps 1-3) and the collated result of manager information for identifying a manager (steps S4-S6) both match, use permission information for permitting the use of resources is generated (step S7). When the collated result of the use permission information (steps S8-S13) match, the use of prescribed resources is permitted (step S14). <P>COPYRIGHT: (C)2007,JPO&INPIT</p> |