"In a communication path, such as the Internet, where anyone can obtain communication data, it is imperative that secret data (authentication data) used in the above-described authentication is not leaked to a third party that is not associated with the authentication." . . . .