In this configuration, at least two authentication processes are performed and, when authentication is successfully done in either one of the processes, the locked apparatus such as a computer is unlocked; here, the spare identification information to be used in the second authentication process is created in the apparatus to be locked.