摘要 |
<p>A computer having two or more processors is used to perform a secure data communication in a suitable manner. A data including a processor ID for identifying one of two or more processors of a first computer (computer 31) is transmitted from the first computer to a second computer (a node at the other end of communication) (S91,S92). The second computer sends a data, which includes not only the processor ID included in the data transmitted in the steps (S91) and (S92) but also a public key certificate related to the second computer, back to the first computer (S96). The first computer receives the data sent back from the second computer, acquires, from the received data, the processor ID included therein, and uses a processor (SPE1), which is identified by use of the acquired processor ID, to process the received data. At this moment, the processing of the data is limited in accordance with the content of the public key certificate included in the received data.</p> |