摘要 |
An authenticating program, system and method for authenticating permission of a user to use a computer system, by storing inhibiting information, supervising input manipulation to a protected computer upon transition of the operating condition of the protected computer to the usable condition, acquiring input information to indicate contents of relevant input manipulations, and comparing the acquired input information with the inhibiting information stored in said inhibiting information storing means. Then, permission of the user is authenticated based on the result of the comparison. When the permission of the user is determined to be unauthentic, the operating condition of the computer is transitioned to a restricted condition.
|