摘要 |
PROBLEM TO BE SOLVED: To inspect character data when character data are transmitted on a network and to previously detect leakage of secrecy and mental abuse. SOLUTION: In terminal equipment, an electronic mail is generated in a mail generation part 201 and transmission of it is instructed. A communication acquirement part 203 acquires electronic mail data. A sentence detection part 204 inspects a constrained phrase by using a profile where a specified character string is previously stored. When the sentence detection part 204 detects the constrained phrase in a text of the electronic mail, a flag (identification information) showing the effect is set. A communication authentication part 205 detects the flag, transmits an alarm message to a user being a transmitter and re-confirms will of transmission. COPYRIGHT: (C)2004,JPO&NCIPI
|