| http://www.w3.org/ns/prov#value | - Accordingly, it is preferred to perform the common key cryptographic processing for the cryption and decryption described hereinbefore only after the data key has been shared by the host and the terminal.FIG. 2 is a block diagram for illustrating in detail a structure of the host system 115 shown in FIG. 1.Referring to FIG. 2, four programs 203 to 206 stored in the memory 202 are executed by a cen
|