A deactivation method is for a system including a communication terminal, a secure device, and a management apparatus. An identification number and communication identification code are notified to the management apparatus while the secure device is attached to the communication terminal. The management apparatus holds the identification number and the communication identification code by correlating them, acquires an identification number of a secure device to be deactivated, when instructed to deactivate the secure device by an authentic owner of a right to use the secure device, extracts the communication identification code in accordance with the identification number, and transmits the deactivation authentication code to an apparatus identified by the extracted communication identification code. If the communication terminal receives the deactivation authentication code while the secure device is attached to it, the secure device is deactivated.

 
Web www.patentalert.com

< Reactive system safety verification device, method, program, and recording medium containing the program

> Contents management method, contents management apparatus, and recording medium

> Method of generating cryptographic key using elliptic curve and expansion in joint sparse form and using same

~ 00504