摘要 |
PURPOSE:To protect secrecy and to rapidly and accurately graspe necessary information even when an information owner does not exists in a system by registering an operator's identification(ID) name, and at the time of requesting information, inspecting the ID name. CONSTITUTION:The receiving processing of an information request is executed, and if an error exists, the request is transmitted to a requesting source. An information request message identifies a proper request data name and inputs an ID name deciding file stored in a magnetic disk device 10 to a CPU 2. The validity of access to a data base requested by an information requester is inspected and the ID name of the request message is collated with the ID name registered in a decision file 20. When the collated result passes the inspection, the requested data base is retrieved and sent to the requesting source. When the inspection is failed, an access invalid message is sent to the requesting computer. In the constitution, the secrecy of requested information is protected, and even when an information owner does not exist in the system, necessary information is rapidly and accurately grasped. |