Method signatures included in an input program are detected. An access
analyzer sequentially analyzes the method signatures and obtains a
run-time access right list based on a rule. This rule specifies method
signatures and the access rights which may possibly be included in the
program so that the method signatures correspond to the access rights,
respectively. A comparator compares the run-time access right list with
the design-time access right list in width of restriction based on
another rule. This rule specifies widths related to restrictions of the
access rights which may possibly be included in the program.