摘要 |
PROBLEM TO BE SOLVED: To enable, in the event of theft of an information processor, rapid recovery of information resources within the information processor and buying of time for capture of an unauthorized user in addition to prevention of leakage of the information resources. SOLUTION: The information processor comprises a position information unit preliminarily equipment-registered to a predetermined management organization and reporting position information of equipment to the management organization through a wireless public data line network. A user authentication function process (S203-S212) for accessing the information resources within the information processor makes even an unauthorized user believe that user authentication is successful. Upon detection of the unauthorized user, the information processor protects data so as not to be accessible to the information resources, and reports the theft to the management organization by the function of the position information unit. In this case, the detection of unauthorized user and the report of theft are not reported to the user. COPYRIGHT: (C)2007,JPO&INPIT
|