With commands from a terminal divided into a command to designate an
access area and a command to gain access, the terminal adds verification
data of the terminal to an argument of the command to gain access, and it
is thereby possible to verify the identity of a terminal application that
issues the command to designate an access area, a terminal application
that issues the command to gain access, and a terminal application that
holds a verification key.