A security apparatus and a security method for controlling electric devices by
use of electronic mails. A modem receives an electronic mail sent from a sending
side and stores the received electronic mail into a RAM of a controller. A CPU
extracts certification information encrypted by a secret key of a user of the sending
side and decrypts the certification information by use of a public key. Based on
the decrypted information, the CPU determines whether the user of the sending side
is authentic or not. Only when the user is found authentic, the CPU extracts a
control command from the received electronic mail and stores the extracted control
command into a RAM. Then, the CPU transmits an electronic mail to the sending side
for confirming content of the control. If an electronic mail for approving the
confirmation is returned from the sending side, the CPU extracts second certification
information obtained by encrypting information different from that mentioned above,
determines again whether the sender of the electronic mail is authentic, and, if
the sender is found authentic, executes the control command received before.