摘要 |
PURPOSE:To attain delicate secrecy protection operation and system operation by providing an access limit time so as to limit the access to a system or a data according to the time. CONSTITUTION:When the user accesses the system 1, a profile name and a password are designated from a terminal device 2. When the system 1 receives an access request, the password in a system access managing table 3-1 and an input password are compared and an access limit time and a system clock 5 are compared. As a result, when the passwords are not coincident or the access limit time is processed, the access of the system by the user is inhibited. The comparison of profile name and the check of the access limit time are conducted by a data managing table 4-1 and the clock 5 similarly in case of access to the data. Delicate secrecy protection operation and system operation are attained by providing the access limit time in this way. |