摘要 |
<p><P>PROBLEM TO BE SOLVED: To protect the privacy of a user from any unintended access from the outside to stored data, and to save any labor to input a user name and password in order to perform access, and to evade such a risk as data burglar or natural disaster, and to mentally prevent information from being leaked by clarifying the locus of the responsibility of the stored data. <P>SOLUTION: In this system, encrypted and multiplexed/redundant/cut data are dynamically distributed and stored in servers 3 to 8 installed at a plurality of spots. Also, a user performs, for example, biological authentication or the composition of a plurality of authentication methods or the like with high safety to achieve personal identification by a simple method by performing security processing necessary for all services by proxy. Thus, it is possible to improve security by transmitting and receiving the encryption of the section of communication. Also, it is possible to thoroughly pursue responsibility for information management to personal level by making clearly understood when access has been performed, who has performed access, what data have been accessed and what has been performed by leaving access logs to the data. Thus, it is possible to protect the stored data from all powers under the consideration of personal privacy which should be originally protected by combining all of them. <P>COPYRIGHT: (C)2007,JPO&INPIT</p> |