摘要 |
PROBLEM TO BE SOLVED: To prevent spoofing of users who use a database device or the users' malicious unauthorized access, and refuse unscheduled, unexpected access by using a database use schedule. SOLUTION: Preliminarily, user keys and administrator keys are generated and sent to a user terminal and an administrator terminal respectively, and encrypted database user registration information is generated by encryption using these keys. At actual database access, a user key and an administrator key received from the user terminal and the administrator terminal respectively are used to decrypt the encrypted database user registration information (S1806), and if both are authorized keys, a new user registration is requested from a database device (S1807). COPYRIGHT: (C)2006,JPO&NCIPI
|