摘要 |
<p>A proxy server (30) is built in a terminal (10). By using a user password as a part of proxy authentication information, browsing information on the network is encrypted and stored in a cache area (41). When using the content of the cache, decryption is performed by using the user password. Accordingly, only when the password is identical, i.e., the same user can utilize the cache content. Each user has his/her own cache area (41) on a disc (40). A plurality of users can utilize heir own encryption caches. Since the cache is managed by the proxy server (30) in the terminal (10), it is also possible to use it in the offline state.</p> |