| http://www.w3.org/ns/prov#value | - Since, in the client computer such as PC, the input personal identification information is generally stored in a hard disk, an ill-intentioned third party directly reads the information in the hard disk, reads out the information by intruding into a terminal apparatus via network and peeping remaining histories when the authenticated person is away from the terminal apparatus, resulting in the per
|