摘要 |
Since there is a possibility that an application downloaded to a terminal performs an invalid operation, an operation of the downloaded application is very much restricted, and the application cannot use local resources of the terminal With the use of information for authenticating the application, which is held in a tamper-resistant region of an authentication module, authentication for the application downloaded to a download section of the terminal is performed to confirm its source or whether or not it has been tampered with. Only an authenticated application is permitted to use the local resources of the terminal or the authentication module, so that an invalid application is prevented from using the local resources. Further, there is no need to make the terminal have the tamper-resistant region, manufacturing costs of the terminal can be held at a low level. |