摘要 |
<P>PROBLEM TO BE SOLVED: To limit the execution of processing which is not desired by the user of an information processor even when the information processor is remotely operated by a third person. <P>SOLUTION: In a compound machine 10 equipped with an information processor 11, a control part 1 reads security information(secret key) from an IC card 3a through a card read part 3. When receiving an encrypted remote operation request from an external controller, the control part 1 decodes the encrypted request by using the security information. When the request is decrypted, and it is determined that the content is valid, the control part 1 permits a remote operation from the controller. <P>COPYRIGHT: (C)2007,JPO&INPIT |