As a method for resolving this issue, there is a method where a program is distributed by being encrypted at the program distribution source using a user identifier for the program distribution destination, and a user uses the user identifier to decrypt and execute the program at the time of use (Refer to official publication of Japanese Laid-Open Patent Application No. 07-295800, for example).