摘要:
PROBLEM TO BE SOLVED: To set a lost cellular phone to outgoing-call-disabled mode from another phone and make it never display registered private information. SOLUTION: When a set count of incoming calls have arrived within a set time period from a same telephone device (Step 113 Yes), functions for displaying information such as memory dials or the like are stopped (Step 118), and an outgoing call is disabled (Step 120 or 121). As to count of the incoming calls, when an incoming call mode is set to "successive", if at least one incoming call arrives from a different device on the way, the count is reset to 1. When set to "normal", the incoming call from the different device in the counting is ignored. COPYRIGHT: (C)2009,JPO&INPIT
摘要:
PROBLEM TO BE SOLVED: To prevent a connection that is not intended by an operator, during roaming. SOLUTION: There are provided a means which calculates a user's country time from operator information (country code, time difference) obtained by roaming authentication at a roaming destination and displays a warning screen, at the user's country time, when starting a speech; and a means which raises a warning against a non-intended connection from the roaming destination to a user's country service server on the basis of roaming information and prevents the connection. COPYRIGHT: (C)2009,JPO&INPIT
摘要:
PROBLEM TO BE SOLVED: To provide a portable terminal by which cancellation of restriction by a disqualified person is made difficult and the cancellation of restriction by a qualified person is facilitated. SOLUTION: A state of a cellular phone terminal transits between a first restriction state for restricting key operations at least except a code input operation, a second restriction state for restricting key operations at least including the code input operation and a non-restriction state for making the key operations into non-restriction. The non-restriction state is selected when a code input by the code input operations at the first restriction state is the fixed code. A CPU of the cellular phone terminal repeatedly discriminates whether or not the execution frequencies of the code input operations at the first restriction state exceed a threshold, selects the first restriction state when a discrimination result is negative and on the other hand, selects the second restriction state when the discrimination result is affirmative (S49, S51). Then, possibility that the key operator is the qualified person is repeatedly discriminated to increase the threshold as the possibility is higher (S43). COPYRIGHT: (C)2009,JPO&INPIT
摘要:
PROBLEM TO BE SOLVED: To release the lock of a function for utilizing an electronic value by using a method different from a conventional one. SOLUTION: A mobile communication terminal 50 has a control section 51, an IC chip section 56, and a motion detection section 57. The IC chip section 56 stores information, such as the electronic value. The motion detection section 57 has an acceleration sensor 57a and gyro sensor 57b, and detects the movement (position variation) of an own machine. The control section 51 stores pattern information indicating the pattern of the position variation of the own machine in an EEPROM 51d. The control section 51 detects the position variation of the own machine, allows the exchange of information at the IC chip section 56 when the detected position variation corresponds to position variation indicated by the pattern information stored in the EEPROM 51d. Otherwise, the control section 51 prohibits the exchange of information at the IC chip section 56. COPYRIGHT: (C)2009,JPO&INPIT
摘要:
PROBLEM TO BE SOLVED: To provide portable electronic equipment in which a transmissive type biometrics authentication element of high detection precision is accurately assembled at a low cost. SOLUTION: In the portable electronic equipment constituted of an upper case and a lower case connected via a first hinge portion, the upper case comprises a light source for detecting biometrics information and the lower case comprises a detection means for detecting the biometrics information using transmission light, thereby accurately assembling a transmissive type biometrics authentication element of high detection precision at a low cost. COPYRIGHT: (C)2009,JPO&INPIT
摘要:
PROBLEM TO BE SOLVED: To provide a cellular phone capable of restricting functions to a nuisance such as origination of a nuisance call and transmission of a nuisance e-mail. SOLUTION: An action monitoring/control part 14, when biometrics data is acquired from a biometrics data input part 12 in an unmonitored state, transmits the biometrics data to a monitoring information confirmation/update part 21 to inquire monitoring information. When individual monitoring information is acquired from the monitoring information confirmation/update part 21, the action monitoring/control part 14 refers to a monitoring action pattern from a monitoring action pattern storage part 15 to verify monitoring function definition, conditions described in nuisance condition definition for functions matched to monitoring functions with information about monitoring state information. The action monitoring/control part 14, when the information included in the monitoring state information satisfies conditions described in the nuisance condition definition, transmits function restriction described in function restriction definition to a function restriction execution part 13 to restrict cellular phone functions 11. COPYRIGHT: (C)2008,JPO&INPIT
摘要:
A mobile telephone (1), when being folded, is set in a lock state by an opening/closing detection and lock mechanism (50), and then a control circuit (30) stops supply of an electric power to a fingerprint authentication unit (60). In this state, upon detection of an incoming call from an external apparatus, the control circuit (30) restarts the supply of the electric power to the fingerprint authentication unit (60), and when a user is authenticated as a legitimate user by the fingerprint authentication unit (60), instructs the opening/closing detection and lock mechanism (50) to carry out an unlocking operation.
摘要:
PROBLEM TO BE SOLVED: To provide a communications system and a method to reliably protect a communication systems such as a mobile phone system from an unauthorized use, and to make the interception of wireless communication more difficult. SOLUTION: Specifically, a static wireless phone number or other similar identifiers are not used for identification and authorization during communication between a mobile unit and a base station. Instead, a set of private identifiers are determined and known only to a phone company and the base stations controlling mobile phone calls. These private identifiers allow the dynamic and continual updating of the mobile phone and base station directories by using current valid identifiers that are used for communication between the devices. COPYRIGHT: (C)2008,JPO&INPIT