首页>
外国专利>
COMPUTER SYSTEM AND SECRET PROTECTION METHOD, TRANSMITTING/RECEIVING LOG MANAGEMENT METHOD, MUTUAL CHECKING METHOD, AND A DISCLOSED KEY GENERATION MANAGEMENT METHOD TO BE APPLIED TO ITS SYSTEM
COMPUTER SYSTEM AND SECRET PROTECTION METHOD, TRANSMITTING/RECEIVING LOG MANAGEMENT METHOD, MUTUAL CHECKING METHOD, AND A DISCLOSED KEY GENERATION MANAGEMENT METHOD TO BE APPLIED TO ITS SYSTEM
PROBLEM TO BE SOLVED: To provide a computer system capable of easily integrating a mutual certification function while applying access control matched with the security policy of an existing system. ;SOLUTION: At the time of receiving a certification request from a client program 11, a server program 21 checks the identity of the opposite party by a challenge and response system by using a disclosed key stored in a disclosed key holder 22. When the certification succeeds, the program 21 extracts an identifier(ID) allowed to correspond to the disclosed key from the holder 22 and extracts user management data for the program 11 from a user management data file 23 based on the ID. In the case of starting an optional service program 24 requested from the program 11, a right range indicated by the extracted user management data is applied to the program 24.;COPYRIGHT: (C)1999,JPO
展开▼