摘要 |
A leakage source can be identified when personal information is leaked to unauthorized entities. A search request section acquires a request to search a database together with information to identify the search requester. A search processing section searches the database and mixes dummy data into the search result. A search result section outputs the search result into which the dummy data is mixed to the search requester. A use history creates information indicating a relationship between information identifying the search requester and the dummy data mixed into the search result. Another section controls the search result acquiring section, the search processing section, the search result outputting section and the use history creating section.
|