PROBLEM TO BE SOLVED: To effectively suppress a fraudulent use of an IC card by appropriately reflecting negative card information to a negative list.;SOLUTION: A computer 100 executes processes of: communicating with management devices 103 and acquiring usage history data of a negative card that has been determined not available in one issuer, in other issuers before a time and date when the one issuer has determined not available; calculating a ratio of a usage situation in each organization to the whole usage situations of the negative card of other issuers for across the respective organizations on the basis of the usage history data, calculating an expectation value obtained based on the ratio and which represents anticipated uses of the negative card in the respective organizations, and storing it in a table 125, with the negative card associated with the other issuers and the organizations; and reading from the table 125, each negative card and its expectation value for each of the other issuers and respective data of the organizations, and transmitting the read data as an other-issuer negative list to the management devices 104 of the other issuers.;COPYRIGHT: (C)2013,JPO&INPIT
展开▼