In order to prevent illegal data tampering or leakage of information
caused by devices connected to a system such as a conference system and
save time and trouble in setting functional restrictions separately from
an application, an access point uses authentication information for
authenticating electronic devices operated by participants who
participate in a conference also as the information to decide functional
restrictions on the electronic devices during the conference.