摘要 |
<p>With regard to data, stored in mobile phone 40, whose a security level is high and contents whose copyrights are protected, mobile phone 40 encapsulates data and contents, and comprises the encapsulated data or the encapsulated contents. Further, mobile phone 40 processes the encapsulated data as a perfect encapsulated object utilizing only a method which is not authorized access to the encapsulated data by an executed program (E.g. Downloaded Java Applications). Java AP downloaded to mobile phone 40 instructs a perfect encapsulated object to process the encapsulated data in the perfect encapsulated object by using a method belonging to the perfect encapsulated object. Therefore, this invention makes it possible to ensure securities for programs to be provided through the network without losing diversifications of programs. <IMAGE></p> |