摘要 |
This invention relates to an access control by using the cryptographic technology. The method according to this invention comprises receiving a first digital signature for specific data from a user terminal; comparing the received first digital signature with a second digital signature, which is registered in a data storage unit so as to correspond to the specific data; if it is judged that the first and second digital signatures are identical, granting the user an authority to update the specific data; if it is judged that the first and second digital signatures are not identical, generating first hash data from the first digital signature; comparing the first hash data with second hash data, which is registered in the data storage unit so as to correspond to the specific data; and if it is judged that the first and second digital signatures are identical, granting the user an authority to read the specific data.
|