BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a view showing a general system configuration in the first embodiment;
FIG. 2 is a block diagram showing the hardware configuration of a server computer in which server software is installed in the first embodiment;
FIG. 3A is a table showing a settable functional restriction information list in the first embodiment;
FIG. 3B is a table (continued from FIG. 3A) showing the settable functional restriction information list in the first embodiment;
FIG. 4 is a view showing the directory structures of device information and user information stored in a user information server 1001 in the first embodiment;
FIG. 5A is a view showing the directory structure of a functional restriction information list stored in the user information server 1001 in the first embodiment;
FIG. 5B is a view (continued from FIG. 5A) showing the directory structure of the functional restriction information list stored in the user information server 1001 in the first embodiment;
FIG. 6 is a view showing the class structure of a user, group, role, functional restriction information list, and functional restriction information in the first embodiment;
FIG. 7 is a flowchart showing a process to list groups to which the user belongs, as a pre-process when issuing an access control token 1005 in the first embodiment;
FIG. 8 is a flowchart showing a group information analysis process in the first embodiment;
FIG. 9 is a flowchart showing a process to list roles by deleting repetitive roles from roles assigned to a user and group in the first embodiment;
FIG. 10 is a flowchart showing a process to acquire a functional restriction information list from the user information server 1001 and generate the access control token 1005 based on a role list generated by the flowchart in FIG. 9 in the first embodiment;
FIG. 11 is a table showing the merge condition of a merge process for the applied access control token 1005 in the first embodiment;
FIG. 12A is a view showing an example of the generated access control token 1005 in the first embodiment;
FIG. 12B is a view (continued from FIG. 12A) showing the example of the generated access control token 1005 in the first embodiment;
FIG. 13 is a table showing the merge condition of a merge process for the applied access control token 1005 in the second embodiment; and
FIG. 14 is a functional block diagram of the first embodiment.