Hacking damage reports about the leakage of corporate and personal information continue to occur as long as they are forgotten, and the damage is serious. More fundamentally, there is a widespread social awareness that it is necessary to respond with a second authentication key (one-time authentication key) that is safe for hacking. When logging in to an information asset, it is never safe with ..