摘要 |
PURPOSE:To protect a privacy even to a manage of a data base by setting cipher and a cipher converting rule from a terminal equipment by an user and transferring them from the terminal equipment to a host computer and converting the cipher and comparing every time of an access of a file. CONSTITUTION:Formation and regstration of cipher and a cipher converting rule are carried out by operation of user. The user sets a card issued from a sensor at a terminal equipment, and inputs the cipher and the cipher converting rule by a keyboard. Responding thereto, a controller of the terminal equipment takes in the cipher and the cipher converting rule. The cipher converting rule is, for instance, operation making a numeric value of respective digits of the cipher a parameter. A host machine side decided presence or absence of a cipher registration mark, and if there is not mark, the cipher converting rule is used, operation is done, the cipher 21 is written in a cipher field of a security record and a result 22 of operation in a converting result field, and the cipher registering mark is written.
|