摘要 |
PURPOSE:To simply and surely check the illicit use of an ID in a communication service system using a personal computer, etc. CONSTITUTION:A terminal equipment 1 like a personal computer, a word processor, etc., has an access to a center 2 with use of an ID so that the center 2 can enjoy various communication services. At the same time, the center 2 stores the service end time t0 in response to the ID and also sends this end time to the equipment 1 after reception of a service end command. Meanwhile the center 2 reads the time t1 corresponding to the relevant ID out of those service end times stored for each ID after reception of a service start command. The time t1 is also sent to the equipment 1. The equipment 1 stores the time t0 and then collates this time with the preceding time t1 sent from the center 2 when a new service start command is issued. |