BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a block diagram of a processing apparatus 1 with the authentication function in accordance with Embodiment 1.
FIG. 2 shows a configuration of a computer in which processing apparatus 1 with authentication function in accordance with Embodiment 1 is mounted.
FIG. 3 shows a specific example of a table storing correspondence between security rank and application valid time, and applications classified by the security rank.
FIG. 4 is a flowchart representing a process in processing apparatus 1 with authentication function in accordance with Embodiment 1.
FIG. 5 is a flowchart representing an example of the authentication process at step F01.
FIG. 6 is a flowchart representing a process of calculating similarity score between images A and B at step T16.
FIG. 7 is a flowchart of a process of limiting use by a user through individual authentication, in a conventional information processing apparatus.