WO2013180046A1 - Portable terminal using ic card - Google Patents

Portable terminal using ic card Download PDF

Info

Publication number
WO2013180046A1
WO2013180046A1 PCT/JP2013/064583 JP2013064583W WO2013180046A1 WO 2013180046 A1 WO2013180046 A1 WO 2013180046A1 JP 2013064583 W JP2013064583 W JP 2013064583W WO 2013180046 A1 WO2013180046 A1 WO 2013180046A1
Authority
WO
WIPO (PCT)
Prior art keywords
lock
card
receiving
specific area
lock state
Prior art date
Application number
PCT/JP2013/064583
Other languages
French (fr)
Japanese (ja)
Inventor
誠治 山田
広樹 小林
恵美子 栗山
Original Assignee
京セラ株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 京セラ株式会社 filed Critical 京セラ株式会社
Publication of WO2013180046A1 publication Critical patent/WO2013180046A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/082Access security using revocation of authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • H04M1/724631User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device by limiting the access to the user interface, e.g. locking a touch-screen or a keypad

Definitions

  • the present invention relates to a portable terminal using an IC card, and more particularly to a portable terminal using an IC card storing user identification information, for example, a SIM (Subscriber Identity Module) card.
  • SIM Subscriber Identity Module
  • the above-described background technology only prevents the browsing of personal information, and does not increase the safety against such unauthorized use of the SIM card.
  • a portable terminal using an IC card wherein a first receiving means for receiving a lock command transmitted via a network, and when the first receiving means receives the lock command. And setting means for setting a lock state in a specific area of the IC card.
  • a second aspect is a lock control program, a first receiving means for receiving a lock command transmitted via a network by a wireless communication circuit for a portable terminal computer having a wireless communication circuit and using an IC card.
  • the first receiving means functions as a setting means for setting a lock state in a specific area of the IC card.
  • a lock control method executed by a portable terminal having a wireless communication circuit and a computer and using an IC card, wherein the lock command transmitted via the network is received by the wireless communication circuit.
  • the receiving step includes a setting step of setting a lock state in a specific area of the IC card in response to the first receiving step receiving the lock command.
  • a portable terminal using an IC card that is highly safe against unauthorized use is realized.
  • FIG. 1 is a block diagram showing a configuration of a portable terminal according to an embodiment of the present invention.
  • FIG. 2 is a block diagram showing a configuration of a communication system including a mobile terminal.
  • FIG. 3A is a block diagram showing a configuration example of a server included in the communication system, and
  • FIG. 3B is an illustrative view showing contents of a table stored in a memory.
  • FIG. 4 is a memory map diagram showing the contents of the main memory of the portable terminal.
  • FIG. 5 is a memory map showing the contents of the memory of the SIM card mounted on the portable terminal.
  • FIG. 6 is a flowchart showing a part of the CPU operation (lock control processing) of the portable terminal.
  • FIG. 7 is a flowchart showing another part (reading control process) of the CPU operation of the portable terminal.
  • FIG. 8 is a flowchart showing a part of the CPU operation (command transmission processing) of the server.
  • FIG. 1 shows the hardware configuration of the mobile terminal 10.
  • mobile terminal 10 according to an embodiment of the present invention includes a CPU 24.
  • the CPU 24 is connected to a key input device 26, a main memory 32, and a flash memory 34, and further includes an antenna 12 via a wireless communication circuit 14, a microphone 18 via an A / D converter 16, and a D / A converter 20.
  • a wireless communication circuit 14 is connected to the speaker 22 and the driver 30 is connected to the display 30.
  • a SIM card 38 is detachably connected to the CPU 24 via the I / F 36.
  • the SIM card 38 stores identification information (hereinafter “user identification information”) of a user who uses the mobile terminal 10, for example, IMSI (International Mobile Subscriber Identity).
  • IMSI International Mobile Subscriber Identity
  • it is not limited to the SIM38 card, and an IC card based on an existing standard such as a USIM (Universal SIM card) or a UIM (User Identity Module) card may be used, or an IC card based on an original standard may be used. .
  • the antenna 12 captures (receives) a radio signal from a base station (not shown) and emits (transmits) a radio signal from the radio communication circuit 14.
  • the radio communication circuit 14 demodulates and decodes a radio signal received by the antenna 12, and encodes and modulates a signal from the CPU 24.
  • the microphone 18 converts the sound wave into an analog audio signal
  • the A / D converter 16 converts the audio signal from the microphone 18 into digital audio data.
  • the D / A converter 20 converts the audio data from the CPU 24 into an analog audio signal
  • the speaker 22 converts the audio signal from the D / A converter 20 into a sound wave.
  • the wireless communication circuit 14 has a function of performing data communication with a server and other portable terminals via a network.
  • An example of a communication system in which the mobile terminal 10 participates is shown in FIG.
  • the operator's server 4 is connected to the mobile terminal 10 and another mobile terminal 10 ⁇ / b> A via the network 6, and the wireless communication circuit 14 transmits control data transmitted from the server 4 via the network 6, for example. (Lock command / release command, etc.) are received.
  • the key input device 26 includes various keys, buttons, trackballs (not shown) operated by the user, and inputs signals (commands) corresponding to the operations to the CPU 24. To do.
  • the driver 28 displays an image corresponding to the signal from the CPU 24 on the display 30.
  • the main memory 32 is composed of, for example, an SDRAM or the like, and stores programs and data (see FIG. 4) for causing the CPU 24 to execute various processes and provides a necessary work area for the CPU 24.
  • the flash memory 34 is composed of, for example, a NAND flash memory and is used as a storage area for programs and the like.
  • the I / F 36 is an interface for reading various information stored in the SIM card 38 (82 to 88, 92: see FIG. 5, which will be described later). Further, the I / F 36 receives the lock status information 92 (see FIG. 5) stored in the SIM card 38 when the wireless communication circuit 14 receives the lock command / release command transmitted from the server 4 via the network 6. : An interface for updating (rewriting) later.
  • the lock state information 92 is information indicating whether the SIM card 38 is in a locked state or a normal state, and changes between the locked state and the normal state in accordance with a lock command and a release command transmitted from the server 4 via the network 6. To do.
  • the lock state information 92 is updated from the normal state to the lock state, and other information stored in the memory 38a, for example, user identification information 82, telephone number 84, address 86, personal information 88 and the like (described later) cannot be referred to (read out and used).
  • the lock state information 92 is updated from the lock state to the normal state, and the user identification information 82 in the memory 38a can be referred to from the outside. Return to possible state.
  • the lock state information 92 for setting the lock state for the SIM card 38 is written in the SIM card 38 itself (for example, a spare area 90 of the memory 38a: described later), the SIM card 38 is removed from the portable terminal 10. Even if it is removed and attached to another mobile terminal 10A, the mobile terminal 10A cannot be used.
  • the CPU 24 determines other hardware (12 to 88) based on programs, data (52 to 56, 62) stored in the main memory 32 and various information (82 to 88, 92) stored in the SIM card 38. 22, 26 to 38), and executes various processes (for example, telephone call, data communication, lock control, etc.).
  • a call mode for making a call and a data communication mode for performing data communication by connecting to a network can be selected through a menu screen (not shown).
  • the mobile terminal 10 When the call mode is selected, the mobile terminal 10 functions as a call device. Specifically, when a call operation is performed by the key input device 26, the CPU 24 refers to the user identification information 82 and the telephone number 84 of the SIM card 38 and controls the wireless communication circuit 14 to generate a call signal. Output. The output call signal is output via the antenna 12 and transmitted to the other telephone through a mobile communication network (not shown). The telephone starts calling by ringtone, vibration, light emission, and the like. When the other party performs an incoming call operation, the CPU 24 starts a call process. On the other hand, when the call signal from the other party is captured by the antenna 12, the wireless communication circuit 14 notifies the CPU 24 of the incoming call, and the CPU 24 starts calling by the ring tone. When an incoming call operation is performed by the key input device 26, the CPU 24 starts a call process.
  • Call processing is performed as follows, for example.
  • the received voice signal sent from the other party is captured by the antenna 12, demodulated and decoded by the wireless communication circuit 14, and then given to the speaker 22 via the D / A converter 20.
  • the received voice is output from the speaker 22.
  • the transmitted voice signal captured by the microphone 18 is sent to the wireless communication circuit 14 via the A / D converter 16, encoded and modulated by the wireless communication circuit 14, and then transmitted to the other party through the antenna 12. Is done.
  • the other party's telephone also demodulates and decodes the transmitted voice signal and outputs the transmitted voice.
  • the mobile terminal 10 When the data communication mode is selected, the mobile terminal 10 functions as a data communication terminal. Specifically, the CPU 24 refers to the user identification information 82 and the address 86 of the SIM card 38, controls the wireless communication circuit 14 and connects to the network 6, and registers a pre-registered homepage (for example, the business operator's address). Homepage address. Then, data communication is performed with the server 4, and the driver 28 is controlled based on the received data to display a home page on the display 30.
  • a pre-registered homepage for example, the business operator's address.
  • data communication with the server 4 is appropriately executed as a background process not only when the data communication mode is selected but also during standby or during a call.
  • the server 4 includes a CPU 4a, a memory 4b, a communication circuit 4c, an input device 4d, and a display device 4e.
  • the CPU 4 a is connected to the network 6 via the communication circuit 4 c and performs data communication with the mobile terminal 10.
  • the aforementioned lock command / release command is transmitted from the communication circuit 4 c to the mobile terminal 10 via the network 6.
  • the memory 4b stores programs and data (for example, table Tbl) for the CPU 4a to operate.
  • the input device 4d is composed of, for example, a keyboard, a pointing device, etc., and inputs a command corresponding to the operation of the operator to the CPU 4a.
  • the display device 4e is composed of a liquid crystal monitor, for example, and displays the processing result of the CPU 4a.
  • user identification information, telephone numbers, and addresses are registered in the table Tbl for each user (A, B,).
  • the main features of this embodiment are the lock control as background processing and the read control based on the lock state of the SIM card, which are performed in cooperation with the server 4. Therefore, hereinafter, the lock control process and the read control process by the mobile terminal 10 will be described in detail together with the command transmission process on the server 4 side.
  • the CPU 24 of the mobile terminal 10 stores the lock control program 52a and the lock command / release command 62 shown in FIG. 4 stored in the main memory 32, and the lock status information shown in FIG. Based on 92, it implement
  • the CPU 24 follows the flow of FIG. 7 based on the read control program 52b stored in the main memory 32 and the user identification information 82 and the lock state information 92 stored in the SIM card 38. This is realized by executing the process.
  • the CPU 4a of the server 4 executes processing according to the flow shown in FIG. 8 based on a transmission control program (not shown) and a table Tbl (FIG. 3B) stored in the memory 4b.
  • the main memory 32 includes a program area 50 and a transition data area 60.
  • the program area 50 includes a lock control program 52a, a read control program 52b, a call control program 54, and a data communication control program. 56 and the like are stored.
  • a lock command / release command 62 is stored in the transition data area 60.
  • the lock control program 52a is a software program that executes processing according to the flow of FIG. 6 via the CPU 24, and the read control program 52b is a software program that executes processing according to the flow of FIG.
  • the program 54 is a software program that controls the wireless communication circuit 14 via the CPU 24 and executes a call process (not shown), and the data communication control program 56 controls the wireless communication circuit 14 via the CPU 24. Software program for executing data communication processing (not shown).
  • the lock command / release command 62 is information (transition data) indicating a command transmitted from the server 4 via the network 6 and received by the wireless communication circuit 14, and is stored in the transition data area 60.
  • memory 38a includes a dedicated area 80 and a spare area 90.
  • User-dedicated information 82, telephone number 84, address 86, personal information 88 and the like are stored in spare area 80.
  • lock state information 92 is stored.
  • the user identification information 82 is identification information (for example, IMSI) uniquely assigned to the user of the mobile terminal 10, and is mainly referred to by the read control program 52b.
  • the telephone number 82 is information indicating a telephone number assigned to the user, and is mainly referred to by the call control program 54.
  • the address 84 is information indicating an address assigned to the user, and is mainly referred to by the data communication control program 56.
  • the personal information 88 is personal information of the user, and includes information such as a telephone book and an e-mail.
  • the lock state information 92 is information indicating whether or not the lock state is set in the memory 38a of the SIM card 38, is updated by the lock control program 52a, and is referenced by the read control program 52b. If the state where the lock state is not set is called a normal state, the lock state information 92 changes between the normal state and the lock state.
  • the user identification information 82, the telephone number 84, the address 86, the personal information 88 and the like can be read from the SIM card 38, and based on the read user identification information 82 and the like. If the mobile terminal 10 is turned off, it can be started, various operations such as standby, telephone call, and data communication can be started. If the mobile terminal 10 is operating, it can be continued.
  • the lock state when the lock state is set, the user identification information 82 and the like cannot be read from the SIM card 38, and as a result, various operations that are normally possible in the mobile terminal 10 are limited, and desired The process cannot be started or continued. For example, if the lock state information 92 is updated from the normal state to the lock state during the standby operation, the mobile terminal 10 cannot perform call processing, mail outgoing / incoming processing, or the like unless the lock state information 92 returns to the normal state. . In addition, when the lock state is set, normal activation may be limited and error processing may be performed in response to a power-on operation from power-off.
  • the lock control process is executed in the following manner in the background such as a call process, a data communication process or a standby process (all not shown) or in a power-off state.
  • the CPU 24 determines whether or not the SIM card 38 is connected to the I / F 36 based on a signal from the I / F 36. If “NO” here, the same determination is repeated after a predetermined waiting time (for example, 1 minute).
  • step S ⁇ b> 1 the CPU 24 determines whether the wireless communication circuit 14 is connected to the network 6 based on a signal from the wireless communication circuit 14. If “NO” here, in a step S5, the wireless communication circuit 14 is commanded to try to connect to the network 6. Then, it returns to step S1 and repeats the same process as the above. Note that the waiting time until step S1 is executed again is such that the loop processing of steps S1 to S5 (the same applies to other loop processing starting from step S1) is executed at a constant cycle (for example, every minute). It may be adjusted appropriately.
  • step S 3 the process proceeds to a step S 7 to determine whether or not the lock command transmitted from the server 4 via the network 6 is received with reference to the lock command / release command 62 in the transition data area 60. To do. If NO in step S7, it is further determined in step S9 whether or not a release command transmitted from the server 4 via the network 6 has been received. If NO in step S9, the process returns to step S1 and returns to step S1. Repeat the same process.
  • step S11 the SIM card 38 is accessed via the I / F 36, and the lock state is set for the spare area 90 of the memory 38a (that is, the lock state information 92 is updated to the lock state). After that, the process returns to step S1 to repeat the same processing as described above.
  • step S9 the SIM card 38 is accessed via the I / F 36 in step S13, and the lock state set for the spare area of the memory 38a is released (that is, the lock state information 92 is set to the normal state). After that, the process returns to step S1 to repeat the same processing as described above.
  • the CPU 24 first determines whether or not a specific event has occurred in step S21. If NO, the CPU 24 repeats the same determination after a predetermined waiting time (for example, 1/30 second).
  • the specific event is an event that requires reference to information stored in the SIM card 38, for example, user identification information 82, such as activation of a terminal body, connection to a network, transmission / reception of an e-mail, and the like. It is done.
  • step S21 the process proceeds to a step S23 to refer to the spare area 90 (the lock state information 92 stored in the SIM card 38).
  • step S25 based on the lock state information 92 stored in the spare area 90, it is determined whether or not the lock state is set for the SIM card 38. If YES here, the process proceeds to step S1. Returning to step 4, the same processing as above is repeated. Therefore, when the lock state is set, reading of the user identification information 82 and the like from the SIM card 38 is prohibited (restricted), and as a result, the mobile terminal 10 is restricted from normal processing. For example, in the activated state, the start or continuation of operations such as calls and data communication is restricted and cannot be performed.
  • step S25 the process proceeds to a step S27 to read the user identification information 82 and the like from the SIM card 38, and in a step S29, a process corresponding to the generated event is executed based on the read information.
  • the authentication process is executed based on the user identification information 82. If the authentication is established, the activation process is further executed and the standby process is started.
  • the generated event is the start of an operation such as a call or data communication
  • an authentication process is executed based on the user identification information 82. If the authentication is established, a call or data communication is performed based on the telephone number 84 or the address 86. Execute the process. Then, it returns to step S1 and repeats the same process as the above. Therefore, when the normal state is set, the mobile terminal 10 can be activated in response to a power-on operation, or can start or continue operations such as a call in response to various operations.
  • the lock command / release command (62) that becomes a trigger when the lock state is set / released in the spare area 90 of the SIM card 38 in steps S11 and S13 is transmitted from the server 4 of the business operator.
  • the memory 4b stores a table (not shown) describing the correspondence between user identification information, telephone numbers and addresses for all users.
  • the business operator operates the server 4 in response to a request from the user, and executes the following command transmission process.
  • CPU 4a of server 4 first inputs user identification information (for example, the same as user identification information 82 stored in SIM card 38) via input device 4d in step S41. If an instruction input is received in step S43, it is determined in step S45 whether or not the instruction is a lock instruction. If “NO” in the step S45, it is further determined whether or not the command is a release command in a step S47, and if “NO” in the step S47, the process is ended.
  • user identification information for example, the same as user identification information 82 stored in SIM card 38
  • step S45 a lock command addressed to the address corresponding to the input user identification information is created in step S49 with reference to the table Tbl (FIG. 3B) in the memory 4b.
  • the created lock instruction is stored in the memory 4b.
  • step S51 the portable terminal 10 with the SIM card 38 corresponding to the input user identification information (or another portable terminal 10A with the SIM card 38 removed from the portable terminal 10 may be used). Is determined to be connected to the network 6, and if “NO” here, the same determination is repeated after a predetermined waiting time (for example, 1 minute).
  • step S51 the process proceeds to a step S53, and the lock command stored in the memory 4b is transmitted from the wireless communication circuit 14 via the network 6.
  • the transmission of the lock command is finished in this way, this process ends.
  • the transmitted lock command is received by the mobile terminal 10 (or another mobile terminal 10A or the like) equipped with the SIM card 38, and the lock state is set by the CPU 24 (S11: see FIG. 6).
  • step S47 a release command addressed to the address corresponding to the input user identification information is created in step S55.
  • the created release instruction is stored in the memory 4b.
  • step S57 determines whether or not the mobile terminal 10 (or another mobile terminal 10A or the like) equipped with the SIM card 38 corresponding to the input user identification information is connected to the network 6, If NO, the same determination is repeated after a predetermined waiting time (for example, 1 minute).
  • step S57 the process proceeds to a step S59 to transmit the release command stored in the memory 4b from the wireless communication circuit 14 via the network 6.
  • step S59 the process ends.
  • the transmitted release command is received by the mobile terminal 10 (or another mobile terminal 10A or the like) equipped with the SIM card 38, and the lock state is released by the CPU 24 (S13: see FIG. 6).
  • the memory 38a of the SIM card 38 is set to the locked state (S7). S11).
  • the lock state is set in this manner, reading of the user identification information 82 from the SIM card 38 is prohibited or restricted, and as a result, the use of the mobile terminal 10 becomes impossible or difficult.
  • the SIM card 38 is removed from the mobile terminal 10 and attached to another mobile terminal 10A, it is impossible or difficult to use the mobile terminal 10A. Therefore, safety against unauthorized use of the SIM card 38 is increased.
  • the mobile terminal 10 when the mobile terminal 10 receives the release command transmitted from the server 4 via the network 6 (S9), the mobile terminal 10 releases the lock state set in the memory 38a (S13). Therefore, since the lock applied to the SIM card 38 can be released via the network 6, the convenience is enhanced.
  • the memory 38a of the SIM card 38 includes a dedicated area 80 for storing the user identification information 82 and the like, and a spare area 90 for storing the lock state information 92, and is locked in the memory 38a. Is set, based on the lock state information 92 of the spare area 90, reading of the user identification information 82 and the like from the dedicated area 80 is prohibited or restricted. As a result, the mobile terminal 10 (or another mobile terminal 10A) It is impossible or difficult to start or continue operations such as activation, communication, and data communication.
  • the memory of the SIM card 38 Even if the lock state is set in 38a, reading of the lock state information 92 from the spare area 90 is allowed, so that the read control of FIG. 7 can be performed without any problem. Therefore, not only unauthorized use of the SIM card 38 itself but also unauthorized use of the user identification information 82 stored therein can be prevented, and higher security can be obtained.
  • the CPU 24 of the mobile terminal 10 executes the lock control process of FIG. 6, but a control circuit (not shown) in the SIM card 38 replaces the CPU 24 of the mobile terminal 10 with this. May be executed.
  • the CPU 24 of the mobile terminal 10 and the control circuit in the SIM card 38 can execute this together.
  • the lock state is set / released in the memory 38 a of the SIM card 38 via the network 6.
  • a PIN code may be set in the memory 38 a of the SIM card 38 via the network 6.
  • the user who has lost the mobile terminal 10 asks the operator to set a desired PIN code on the SIM card 38 from the server 4 via the network 6, and the mobile terminal 10 returns to the hand later.
  • the PIN code may be input to the mobile terminal 10 to release the lock state. This also provides high safety and convenience.
  • the present invention is an IC card that includes a computer (CPU, processor), has a circuit for performing data communication by connecting to a network, and stores user identification information.
  • the present invention can be applied to various mobile terminals (mobile phone terminals, smart phones, mobile information terminals, etc.) using (a SIM card, a USIM card, a UIM card, or a proprietary standard IC card).
  • the first aspect is a portable terminal (10) using an IC card (38), and a first receiving means (14, 24, S7) for receiving a lock command transmitted via the network (6), and Setting means (24, S11) is provided for setting the lock state in the specific area (38a) of the IC card (38) in response to the first receiving means receiving the lock command.
  • a lock state is set in a specific area of the IC card.
  • the IC card is a SIM (Subscriber Identity Module) card in one embodiment, but may be a USIM (Universal SIM) card, a UIM (User Identity Module) card, or the like based on an original standard in another embodiment.
  • An IC card may be used.
  • the lock state is set in the specific area of the IC card itself, for example, even if the IC card is removed from the mobile terminal and attached to another mobile terminal, the mobile terminal can be used. Can not.
  • the lock state is set via the network, the IC card is locked when the mobile terminal is connected to the network, regardless of which mobile terminal the IC card is attached to. Therefore, safety against unauthorized use of the IC card is increased.
  • the second receiving means in response to the second receiving means (14, 24, S9) receiving a release command transmitted via the network, and the second receiving means receiving the release command And a release means (24, S13) for releasing the lock state set in the specific area.
  • the lock state set in the specific area of the IC card is released when a release command is received via the network.
  • the lock on the IC card can be released via the network, convenience is enhanced.
  • the third aspect is the first or second aspect, wherein the specific area is at least a first specific area (80) for storing user identification information (82) and a lock indicating whether or not a lock state is set.
  • the second specific area (90) for storing the state information (92) is included, and the lock state information of the second specific area is referred to in response to the occurrence of the specific event.
  • Read control means (24, S21 to S27) is further provided for reading at least user identification information from the specific area and restricting reading from the first specific area when the lock state is set.
  • the specific event is, for example, a start operation of a mobile terminal, a start operation of various operations such as a call or data communication.
  • the phone number (84) and address (86) of the portable terminal, as well as personal information of the user (88: for example, phone book and e-mail) are stored. May be.
  • the restriction on reading when the lock state is set applies to all or a part of various information stored in the first specific area.
  • the specific area of the IC card includes a first specific area for storing user identification information and the like, and a second specific area for storing lock state information, and is locked to the specific area of the IC card.
  • the state is set, reading of user identification information and the like from the first specific area is restricted based on the lock state information of the second specific area, and as a result, the mobile terminal is activated and various operations are started or continued. It becomes impossible.
  • a fourth aspect is a communication system (2) including a mobile terminal (10) using an IC card (38) and a server (4) that communicates with the mobile terminal via a network (6),
  • the server includes first transmission means (4c, 4a, S53) for transmitting a lock command via the network, and the portable terminal receives a lock command transmitted from the first transmission means via the network.
  • the means (14, 24, S7) and the setting means (24, S11) for setting the lock state in the specific area (38a) of the IC card in response to the first receiving means receiving the lock command.
  • the fifth aspect is a lock control program (52a), which transmits a computer (24) of a portable terminal (10) having a wireless communication circuit (14) and using an IC card (38) via a network.
  • a sixth aspect is a lock control method executed by a portable terminal (10) having a wireless communication circuit (14) and a computer (24) and using an IC card (38), which is transmitted via a network.
  • a first receiving step (S7) for receiving the lock command by the wireless communication circuit, and a setting step for setting the lock state in the specific area (38a) of the IC card in response to the first receiving step receiving the lock command (S11) is included.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A portable terminal (10), when a lock command that is transmitted via a network (6) is received (S7), sets a locked state in the memory (38a) of an IC card (38) (S11). If the locked state is set in such a way, read-out from the memory (38a) of user identification information (82) and the like is restricted, and as a result, it becomes difficult to use the portable terminal (10) that is equipped with the IC card (38), and the same is true even if the IC card (38) is inserted into another portable terminal (10A).

Description

ICカードを用いる携帯端末Mobile terminal using IC card
 この発明は、ICカードを用いる携帯端末に関し、特に、利用者識別情報を記憶したICカード、たとえばSIM(Subscriber Identity Module)カードを用いる、携帯端末に関する。 The present invention relates to a portable terminal using an IC card, and more particularly to a portable terminal using an IC card storing user identification information, for example, a SIM (Subscriber Identity Module) card.
 従来のこの種の携帯端末の一例が知られている。この背景技術では、SIMカードを携帯端末から引き抜く際に、携帯電話の内部メモリに記憶された個人データを消去する。 An example of a conventional portable terminal of this type is known. In this background art, personal data stored in the internal memory of a mobile phone is erased when the SIM card is pulled out from the mobile terminal.
 ところで、携帯端末が盗難に遭った場合、他人が携帯端末からSIMカードを抜き取って別の携帯端末に装着すれば、その携帯端末を利用できる可能性がある。 By the way, when a portable terminal is stolen, if another person pulls out the SIM card from the portable terminal and attaches it to another portable terminal, there is a possibility that the portable terminal can be used.
 しかし、上記の背景技術は、個人情報の閲覧を防止するだけで、このようなSIMカードの不正利用に対して安全性を高めるものではなかった。 However, the above-described background technology only prevents the browsing of personal information, and does not increase the safety against such unauthorized use of the SIM card.
 それゆえに、不正利用に対する安全性が高い、ICカードを用いる携帯端末が望まれる。 Therefore, a portable terminal using an IC card that is highly safe against unauthorized use is desired.
 この発明の第1の態様は、ICカードを用いる携帯端末であって、ネットワークを介して送信されるロック命令を受信する第1受信手段、および第1受信手段がロック命令を受信するのに応じて、ICカードの特定領域にロック状態を設定する設定手段を備える。 According to a first aspect of the present invention, there is provided a portable terminal using an IC card, wherein a first receiving means for receiving a lock command transmitted via a network, and when the first receiving means receives the lock command. And setting means for setting a lock state in a specific area of the IC card.
 第2の態様は、ロック制御プログラムであって、無線通信回路を有しかつICカードを用いる携帯端末のコンピュータを、ネットワークを介して送信されるロック命令を無線通信回路で受信する第1受信手段、および第1受信手段がロック命令を受信するのに応じて、ICカードの特定領域にロック状態を設定する設定手段として機能させる。 A second aspect is a lock control program, a first receiving means for receiving a lock command transmitted via a network by a wireless communication circuit for a portable terminal computer having a wireless communication circuit and using an IC card. In response to the first receiving means receiving the lock command, the first receiving means functions as a setting means for setting a lock state in a specific area of the IC card.
 第3の態様は、無線通信回路およびコンピュータを有しかつICカードを用いる携帯端末によって実行されるロック制御方法であって、ネットワークを介して送信されるロック命令を無線通信回路で受信する第1受信ステップ、および第1受信ステップがロック命令を受信するのに応じて、ICカードの特定領域にロック状態を設定する設定ステップを含む。 According to a third aspect of the present invention, there is provided a lock control method executed by a portable terminal having a wireless communication circuit and a computer and using an IC card, wherein the lock command transmitted via the network is received by the wireless communication circuit. The receiving step includes a setting step of setting a lock state in a specific area of the IC card in response to the first receiving step receiving the lock command.
 この発明の一態様によれば、不正利用に対する安全性が高い、ICカードを用いる携帯端末が実現される。 According to one aspect of the present invention, a portable terminal using an IC card that is highly safe against unauthorized use is realized.
 この発明の上述の目的、その他の目的、特徴および利点は、図面を参照して行う以下の実施例の詳細な説明から一層明らかとなろう。 The above object, other objects, features, and advantages of the present invention will become more apparent from the following detailed description of embodiments with reference to the drawings.
図1はこの発明の一実施例である携帯端末の構成を示すブロック図である。FIG. 1 is a block diagram showing a configuration of a portable terminal according to an embodiment of the present invention. 図2は携帯端末を含む通信システムの構成を示すブロック図である。FIG. 2 is a block diagram showing a configuration of a communication system including a mobile terminal. 図3(A)は通信システムに含まれるサーバの構成例を示すブロック図であり、図3(B)はメモリに記憶されたテーブルの内容を示す図解図である。FIG. 3A is a block diagram showing a configuration example of a server included in the communication system, and FIG. 3B is an illustrative view showing contents of a table stored in a memory. 図4は携帯端末のメインメモリの内容を示すメモリマップ図である。FIG. 4 is a memory map diagram showing the contents of the main memory of the portable terminal. 図5は携帯端末に装着されるSIMカードのメモリの内容を示すメモリマップ図である。FIG. 5 is a memory map showing the contents of the memory of the SIM card mounted on the portable terminal. 図6は携帯端末のCPU動作の一部(ロック制御処理)を示すフロー図である。FIG. 6 is a flowchart showing a part of the CPU operation (lock control processing) of the portable terminal. 図7は携帯端末のCPU動作の他の一部(読出制御処理)を示すフロー図である。FIG. 7 is a flowchart showing another part (reading control process) of the CPU operation of the portable terminal. 図8はサーバのCPU動作の一部(命令送信処理)を示すフロー図である。FIG. 8 is a flowchart showing a part of the CPU operation (command transmission processing) of the server.
 図1には、携帯端末10のハードウエア構成が示される。図1を参照して、この発明の一実施例である携帯端末10はCPU24を含む。CPU24には、キー入力装置26、メインメモリ32およびフラッシュメモリ34が接続され、さらに、無線通信回路14を介してアンテナ12が、A/Dコンバータ16を介してマイク18が、D/Aコンバータ20を介してスピーカ22が、そしてドライバ28を介してディスプレイ30が、それぞれ接続される。 FIG. 1 shows the hardware configuration of the mobile terminal 10. Referring to FIG. 1, mobile terminal 10 according to an embodiment of the present invention includes a CPU 24. The CPU 24 is connected to a key input device 26, a main memory 32, and a flash memory 34, and further includes an antenna 12 via a wireless communication circuit 14, a microphone 18 via an A / D converter 16, and a D / A converter 20. Are connected to the speaker 22 and the driver 30 is connected to the display 30.
 また、CPU24には、I/F36を介してSIMカード38が着脱可能に接続される。SIMカード38には、携帯端末10を利用する利用者の識別情報(以下“利用者識別情報”)、たとえばIMSI(International Mobile Subscriber Identity)が記憶される。なお、SIM38カードとは限らず、USIM(Universal SIM)カード,UIM(User Identity Module)カードといった既存の規格に基づくICカードを用いてもよいし、独自の規格に基づくICカードを用いることもできる。 Further, a SIM card 38 is detachably connected to the CPU 24 via the I / F 36. The SIM card 38 stores identification information (hereinafter “user identification information”) of a user who uses the mobile terminal 10, for example, IMSI (International Mobile Subscriber Identity). In addition, it is not limited to the SIM38 card, and an IC card based on an existing standard such as a USIM (Universal SIM card) or a UIM (User Identity Module) card may be used, or an IC card based on an original standard may be used. .
 アンテナ12は、図示しない基地局からの無線信号を捕捉(受信)し、また、無線通信回路14からの無線信号を放出(送信)する。無線通信回路14は、アンテナ12で受信された無線信号を復調および復号化し、また、CPU24からの信号を符号化および変調する。マイク18は、音波をアナログの音声信号に変換し、A/Dコンバータ16は、マイク18からの音声信号をディジタルの音声データに変換する。D/Aコンバータ20は、CPU24からの音声データをアナログの音声信号に変換し、スピーカ22は、D/Aコ ンバータ20からの音声信号を音波に変換する。 The antenna 12 captures (receives) a radio signal from a base station (not shown) and emits (transmits) a radio signal from the radio communication circuit 14. The radio communication circuit 14 demodulates and decodes a radio signal received by the antenna 12, and encodes and modulates a signal from the CPU 24. The microphone 18 converts the sound wave into an analog audio signal, and the A / D converter 16 converts the audio signal from the microphone 18 into digital audio data. The D / A converter 20 converts the audio data from the CPU 24 into an analog audio signal, and the speaker 22 converts the audio signal from the D / A converter 20 into a sound wave.
 また、無線通信回路14は、上記のような音声通話に加えて、ネットワークを介してサーバや他の携帯端末との間でデータ通信を行う機能も有している。携帯端末10が参加する通信システムの一例を図2に示す。通信システム2では、事業者のサーバ4と携帯端末10および他の携帯端末10Aとがネットワーク6を介して接続され、無線通信回路14は、たとえばサーバ4からネットワーク6を介して送信される制御データ(ロック命令/解除命令など)を受信する。 Further, in addition to the voice call as described above, the wireless communication circuit 14 has a function of performing data communication with a server and other portable terminals via a network. An example of a communication system in which the mobile terminal 10 participates is shown in FIG. In the communication system 2, the operator's server 4 is connected to the mobile terminal 10 and another mobile terminal 10 </ b> A via the network 6, and the wireless communication circuit 14 transmits control data transmitted from the server 4 via the network 6, for example. (Lock command / release command, etc.) are received.
 再び図1を参照して、キー入力装置26は、利用者によって操作される各種のキー,ボタン,トラックボール(図示せず)などで構成され、操作に応じた信号(コマンド)をCPU24に入力する。ドライバ28は、CPU24からの信号に応じた画像をディスプレイ30に表示する。 Referring again to FIG. 1, the key input device 26 includes various keys, buttons, trackballs (not shown) operated by the user, and inputs signals (commands) corresponding to the operations to the CPU 24. To do. The driver 28 displays an image corresponding to the signal from the CPU 24 on the display 30.
 メインメモリ32は、たとえばSDRAMなどで構成され、CPU24に各種の処理を実行させるためのプログラム,データ類(図4参照)を記憶する共に、CPU24に必要な作業領域を提供する。フラッシュメモリ34は、たとえばNAND型のフラッシュメモリで構成され、プログラムなどの保存領域として利用される。 The main memory 32 is composed of, for example, an SDRAM or the like, and stores programs and data (see FIG. 4) for causing the CPU 24 to execute various processes and provides a necessary work area for the CPU 24. The flash memory 34 is composed of, for example, a NAND flash memory and is used as a storage area for programs and the like.
 I/F36は、SIMカード38に記憶されている各種情報(82~88,92:図5参照。後述)を読み出すためのインターフェースである。また、I/F36は、サーバ4からネットワーク6を介して送信されたロック命令/解除命令が無線通信回路14によって受信されたとき、SIMカード38に記憶されているロック状態情報92(図5参照:後述)を更新する(書き換える)ためのインターフェースでもある。 The I / F 36 is an interface for reading various information stored in the SIM card 38 (82 to 88, 92: see FIG. 5, which will be described later). Further, the I / F 36 receives the lock status information 92 (see FIG. 5) stored in the SIM card 38 when the wireless communication circuit 14 receives the lock command / release command transmitted from the server 4 via the network 6. : An interface for updating (rewriting) later.
 ロック状態情報92は、SIMカード38がロック状態か通常状態かを示す情報であり、サーバ4からネットワーク6を介して送信されるロック命令および解除命令に応じてロック状態および通常状態の間で変化する。 The lock state information 92 is information indicating whether the SIM card 38 is in a locked state or a normal state, and changes between the locked state and the normal state in accordance with a lock command and a release command transmitted from the server 4 via the network 6. To do.
 SIMカード38に対してロック状態が設定されると、ロック状態情報92が通常状態からロック状態に更新され、メモリ38aに記憶されている他の情報たとえば利用者識別情報82,電話番号84,アドレス86,個人情報88など(後述)を参照する(読み出して利用する)ことができなくなる。一方、SIMカード38に対して設定されたロック状態が解除されると、ロック状態情報92がロック状態から通常状態に更新され、外部からメモリ38a内の利用者識別情報82等を参照することが可能な状態に戻る。 When the lock state is set for the SIM card 38, the lock state information 92 is updated from the normal state to the lock state, and other information stored in the memory 38a, for example, user identification information 82, telephone number 84, address 86, personal information 88 and the like (described later) cannot be referred to (read out and used). On the other hand, when the lock state set for the SIM card 38 is released, the lock state information 92 is updated from the lock state to the normal state, and the user identification information 82 in the memory 38a can be referred to from the outside. Return to possible state.
 このように、SIMカード38に対してロック状態を設定するためのロック状態情報92がSIMカード38自身(たとえばメモリ38aの予備領域90:後述)に書き込まれるので、携帯端末10からSIMカード38を取り外して他の携帯端末10Aに装着しても、その携帯端末10Aを利用することはできない。 Thus, since the lock state information 92 for setting the lock state for the SIM card 38 is written in the SIM card 38 itself (for example, a spare area 90 of the memory 38a: described later), the SIM card 38 is removed from the portable terminal 10. Even if it is removed and attached to another mobile terminal 10A, the mobile terminal 10A cannot be used.
 CPU24は、メインメモリ32に記憶されたプログラム,データ類(52~56,62)およびSIMカード38に記憶された各種の情報(82~88,92)に基づいて、他のハードウエア(12~22,26~38)を利用しつつ、各種の処理(たとえば通話,データ通信,ロック制御など)を実行する。 The CPU 24 determines other hardware (12 to 88) based on programs, data (52 to 56, 62) stored in the main memory 32 and various information (82 to 88, 92) stored in the SIM card 38. 22, 26 to 38), and executes various processes (for example, telephone call, data communication, lock control, etc.).
 以上のように構成された携帯端末10では、図示しないメニュー画面を通して、通話を行う通話モード、およびネットワークに接続してデータ通信を行うデータ通信モードなどを選択することができる。 With the mobile terminal 10 configured as described above, a call mode for making a call and a data communication mode for performing data communication by connecting to a network can be selected through a menu screen (not shown).
 通話モードが選択されると、携帯端末10は、通話装置として機能する。詳しくは、キー入力装置26によって発呼操作が行われると、CPU24は、SIMカード38の利用者識別情報82,電話番号84などを参照しつつ、無線通信回路14を制御して発呼信号を出力する。出力された発呼信号は、アンテナ12を介して出力され、図示しない移動通信網を経て相手の電話機に伝達される。電話機は、着信音,振動,発光などによる呼び出しを開始する。相手が着呼操作を行うと、CPU24は通話処理を開始する。一方、相手からの発呼信号がアンテナ12によって捕捉されると、無線通信回路14は着信をCPU24に通知し、CPU24は、着信音による呼び出しを開始する。キー入力装置26によって着呼操作が行われると、CPU24は通話処理を開始する。 When the call mode is selected, the mobile terminal 10 functions as a call device. Specifically, when a call operation is performed by the key input device 26, the CPU 24 refers to the user identification information 82 and the telephone number 84 of the SIM card 38 and controls the wireless communication circuit 14 to generate a call signal. Output. The output call signal is output via the antenna 12 and transmitted to the other telephone through a mobile communication network (not shown). The telephone starts calling by ringtone, vibration, light emission, and the like. When the other party performs an incoming call operation, the CPU 24 starts a call process. On the other hand, when the call signal from the other party is captured by the antenna 12, the wireless communication circuit 14 notifies the CPU 24 of the incoming call, and the CPU 24 starts calling by the ring tone. When an incoming call operation is performed by the key input device 26, the CPU 24 starts a call process.
 通話処理は、たとえば、次のように行われる。相手から送られてきた受話音声信号は、アンテナ12によって捕捉され、無線通信回路14によって復調および復号化を施された後、D/Aコンバータ20を経てスピーカ22に与えられる。これにより、スピーカ22から受話音声が出力される。一方、マイク18によって取り込まれた送話音声信号は、A/Dコンバータ16を経て無線通信回路14に送られ、無線通信回路14によって符号化および変調を施された後、アンテナ12を通して相手に送信される。相手の電話機でも、送話音声信号の復調および復号化が行われ、送話音声が出力される。 Call processing is performed as follows, for example. The received voice signal sent from the other party is captured by the antenna 12, demodulated and decoded by the wireless communication circuit 14, and then given to the speaker 22 via the D / A converter 20. As a result, the received voice is output from the speaker 22. On the other hand, the transmitted voice signal captured by the microphone 18 is sent to the wireless communication circuit 14 via the A / D converter 16, encoded and modulated by the wireless communication circuit 14, and then transmitted to the other party through the antenna 12. Is done. The other party's telephone also demodulates and decodes the transmitted voice signal and outputs the transmitted voice.
 データ通信モードが選択されると、携帯端末10は、データ通信端末として機能する。具体的には、CPU24は、SIMカード38の利用者識別情報82,アドレス86などを参照しつつ、無線通信回路14を制御してネットワーク6に接続し、予め登録されたホームページ(たとえば事業者のホームページ)のアドレスにアクセスする。そして、サーバ4との間でデータ通信を行い、受信データに基づきドライバ28を制御してディスプレイ30にホームページを表示する。 When the data communication mode is selected, the mobile terminal 10 functions as a data communication terminal. Specifically, the CPU 24 refers to the user identification information 82 and the address 86 of the SIM card 38, controls the wireless communication circuit 14 and connects to the network 6, and registers a pre-registered homepage (for example, the business operator's address). Homepage address. Then, data communication is performed with the server 4, and the driver 28 is controlled based on the received data to display a home page on the display 30.
 なお、サーバ4との間のデータ通信は、データ通信モードが選択された場合に限らず、待ち受け時や通話時などにもバックグラウンド処理として適宜実行される。 Note that data communication with the server 4 is appropriately executed as a background process not only when the data communication mode is selected but also during standby or during a call.
 サーバ4の構成例を図3に示す。まず図3(A)を参照して、サーバ4は、CPU4a,メモリ4b,通信回路4c,入力装置4dおよび表示装置4eを備える。CPU4aは、通信回路4cを介してネットワーク6に接続して、携帯端末10との間でデータ通信を行う。前述のロック命令/解除命令は、通信回路4cからネットワーク6を介して携帯端末10に送信される。メモリ4bは、CPU4aが動作するためのプログラム,データ類(たとえばテーブルTbl)を記憶する。入力装置4dは、たとえばキーボード,ポインティングデバイス等で構成され、オペレータの操作に対応する命令をCPU4aに入力する。表示装置4eは、たとえば液晶モニタで構成され、CPU4aの処理結果などを表示する。次に図3(B)を参照して、テーブルTblには、各利用者(A,B,…)について、利用者識別情報,電話番号およびアドレスが登録される。 A configuration example of the server 4 is shown in FIG. First, referring to FIG. 3A, the server 4 includes a CPU 4a, a memory 4b, a communication circuit 4c, an input device 4d, and a display device 4e. The CPU 4 a is connected to the network 6 via the communication circuit 4 c and performs data communication with the mobile terminal 10. The aforementioned lock command / release command is transmitted from the communication circuit 4 c to the mobile terminal 10 via the network 6. The memory 4b stores programs and data (for example, table Tbl) for the CPU 4a to operate. The input device 4d is composed of, for example, a keyboard, a pointing device, etc., and inputs a command corresponding to the operation of the operator to the CPU 4a. The display device 4e is composed of a liquid crystal monitor, for example, and displays the processing result of the CPU 4a. Next, referring to FIG. 3B, user identification information, telephone numbers, and addresses are registered in the table Tbl for each user (A, B,...).
 この実施例の主要な特徴は、サーバ4と共働して行われる、バックグラウンド処理としてのロック制御と、SIMカードのロック状態に基づく読出制御にある。そこで、以下、携帯端末10によるロック制御処理および読出制御処理について、サーバ4側の命令送信処理と共に詳しく説明する。 The main features of this embodiment are the lock control as background processing and the read control based on the lock state of the SIM card, which are performed in cooperation with the server 4. Therefore, hereinafter, the lock control process and the read control process by the mobile terminal 10 will be described in detail together with the command transmission process on the server 4 side.
 ロック制御処理は、携帯端末10のCPU24が、メインメモリ32に記憶された図4に示すロック制御プログラム52aおよびロック命令/解除命令62、ならびにSIMカード38に記憶された図5に示すロック状態情報92に基づいて、図6に示すフローに従う処理を実行することにより実現される。また、読出制御処理は、同じくCPU24が、メインメモリ32に記憶された読出制御プログラム52b、ならびにSIMカード38に記憶された利用者識別情報82およびロック状態情報92に基づいて、図7のフローに従う処理を実行することにより実現される。一方、サーバ4のCPU4aは、メモリ4bに記憶された送信制御プログラム(図示せず)およびテーブルTbl(図3(B))に基づいて、図8に示すフローに従う処理を実行する。 In the lock control process, the CPU 24 of the mobile terminal 10 stores the lock control program 52a and the lock command / release command 62 shown in FIG. 4 stored in the main memory 32, and the lock status information shown in FIG. Based on 92, it implement | achieves by performing the process according to the flow shown in FIG. Similarly, in the read control process, the CPU 24 follows the flow of FIG. 7 based on the read control program 52b stored in the main memory 32 and the user identification information 82 and the lock state information 92 stored in the SIM card 38. This is realized by executing the process. On the other hand, the CPU 4a of the server 4 executes processing according to the flow shown in FIG. 8 based on a transmission control program (not shown) and a table Tbl (FIG. 3B) stored in the memory 4b.
 詳しくは、まず図4を参照して、メインメモリ32はプログラム領域50,遷移データ領域60を含み、プログラム領域50にはロック制御プログラム52a,読出制御プログラム52b,通話制御プログラム54およびデータ通信制御プログラム56などが記憶される。遷移データ領域60にはロック命令/解除命令62が記憶される。 Specifically, referring to FIG. 4, first, the main memory 32 includes a program area 50 and a transition data area 60. The program area 50 includes a lock control program 52a, a read control program 52b, a call control program 54, and a data communication control program. 56 and the like are stored. In the transition data area 60, a lock command / release command 62 is stored.
 ロック制御プログラム52aは、CPU24を介して図6のフローに従う処理を実行するソフトウェアプログラムであり、読出制御プログラム52bは、CPU24を介して図7のフローに従う処理を実行するソフトウェアプログラムであり、通話制御プログラム54は、CPU24を介して無線通信回路14を制御して通話処理(図示せず)を実行するソフトウェアプログラムであり、そしてデータ通信制御プログラム56は、CPU24を介して無線通信回路14を制御してデータ通信処理(図示せず)を実行するソフトウェアプログラムである。 The lock control program 52a is a software program that executes processing according to the flow of FIG. 6 via the CPU 24, and the read control program 52b is a software program that executes processing according to the flow of FIG. The program 54 is a software program that controls the wireless communication circuit 14 via the CPU 24 and executes a call process (not shown), and the data communication control program 56 controls the wireless communication circuit 14 via the CPU 24. Software program for executing data communication processing (not shown).
 ロック命令/解除命令62は、サーバ4からネットワーク6を介して送信され、無線通信回路14によって受信された命令を示す情報(遷移データ)であり、遷移データ領域60に記憶される。 The lock command / release command 62 is information (transition data) indicating a command transmitted from the server 4 via the network 6 and received by the wireless communication circuit 14, and is stored in the transition data area 60.
 次に、図5を参照して、メモリ38aは、専用領域80および予備領域90を含み、専用領域80には利用者識別情報82,電話番号84,アドレス86および個人情報88などが、予備領域90にはロック状態情報92が、それぞれ記憶される。利用者識別情報82は、携帯端末10の利用者に対して一意に割り当てられた識別情報(たとえばIMSI)であり、主として読出制御プログラム52bによって参照される。電話番号82は、利用者に割り当てられた電話番号を示す情報であり、主として通話制御プログラム54によって参照される。アドレス84は、利用者に割り当てられたアドレスを示す情報であり、主としてデータ通信制御プログラム56によって参照される。個人情報88は、利用者の個人的な情報であり、たとえば電話帳,電子メールなどの情報を含む。 Next, referring to FIG. 5, memory 38a includes a dedicated area 80 and a spare area 90. User-dedicated information 82, telephone number 84, address 86, personal information 88 and the like are stored in spare area 80. In 90, lock state information 92 is stored. The user identification information 82 is identification information (for example, IMSI) uniquely assigned to the user of the mobile terminal 10, and is mainly referred to by the read control program 52b. The telephone number 82 is information indicating a telephone number assigned to the user, and is mainly referred to by the call control program 54. The address 84 is information indicating an address assigned to the user, and is mainly referred to by the data communication control program 56. The personal information 88 is personal information of the user, and includes information such as a telephone book and an e-mail.
 ロック状態情報92は、SIMカード38のメモリ38aにロック状態が設定されているか否かを示す情報であり、ロック制御プログラム52aによって更新され、読出制御プログラム52bによって参照される。ロック状態が設定されていない状態を通常状態と呼ぶことにすると、ロック状態情報92は、通常状態およびロック状態の間で変化する。 The lock state information 92 is information indicating whether or not the lock state is set in the memory 38a of the SIM card 38, is updated by the lock control program 52a, and is referenced by the read control program 52b. If the state where the lock state is not set is called a normal state, the lock state information 92 changes between the normal state and the lock state.
 ロック状態が設定されていない場合つまり通常状態では、SIMカード38から利用者識別情報82,電話番号84,アドレス86および個人情報88等を読み出すことができ、読み出した利用者識別情報82等に基づいて、携帯端末10の電源がOFFであればこれを起動したり、待ち受け,通話,データ通信など各種の動作を開始したり、動作中であればそれを継続したりすることができる。 When the lock state is not set, that is, in the normal state, the user identification information 82, the telephone number 84, the address 86, the personal information 88 and the like can be read from the SIM card 38, and based on the read user identification information 82 and the like. If the mobile terminal 10 is turned off, it can be started, various operations such as standby, telephone call, and data communication can be started. If the mobile terminal 10 is operating, it can be continued.
 これに対して、ロック状態が設定されている場合、SIMカード38から利用者識別情報82等を読み出すことができず、その結果、携帯端末10において通常可能な各種の動作が制限され、所望の処理を開始したり継続したりすることなどができなくなる。たとえば、待ち受け動作中にロック状態情報92が通常状態からロック状態に更新されると、携帯端末10は、ロック状態情報92が通常状態に戻らない限り、通話処理、メール発着信処理などができなくなる。この他、ロック状態が設定されると、電源OFFから電源ON操作に応じて通常起動が制限されエラー処理されるとしてもよい。 On the other hand, when the lock state is set, the user identification information 82 and the like cannot be read from the SIM card 38, and as a result, various operations that are normally possible in the mobile terminal 10 are limited, and desired The process cannot be started or continued. For example, if the lock state information 92 is updated from the normal state to the lock state during the standby operation, the mobile terminal 10 cannot perform call processing, mail outgoing / incoming processing, or the like unless the lock state information 92 returns to the normal state. . In addition, when the lock state is set, normal activation may be limited and error processing may be performed in response to a power-on operation from power-off.
 つまり、この実施例でロック状態が設定されている場合の読み出しの制限は、メモリ38aの専用領域80に記憶された各種情報(82~88)の全部が対象となる。ただし、他の実施例では、専用領域80に記憶された各種情報(82~88)の一部のみを対象としてもよい。 That is, in the case where the lock state is set in this embodiment, all the various information (82 to 88) stored in the dedicated area 80 of the memory 38a is subject to the restriction on reading. However, in other embodiments, only a part of various information (82 to 88) stored in the dedicated area 80 may be targeted.
 次に、図6を参照して、ロック制御処理は、通話処理,データ通信処理または待ち受け処理(いずれも図示せず)などのバックグラウンドで、もしくは電源OFFの状態で、次のように実行される。CPU24は、まずステップS1で、I/F36からの信号に基づいて、SIMカード38がI/F36に接続されているか否かを判別する。ここでNOであれば、所定の待機時間(たとえば1分)を経て上記と同じ判別を繰り返す。 Next, referring to FIG. 6, the lock control process is executed in the following manner in the background such as a call process, a data communication process or a standby process (all not shown) or in a power-off state. The First, in step S1, the CPU 24 determines whether or not the SIM card 38 is connected to the I / F 36 based on a signal from the I / F 36. If “NO” here, the same determination is repeated after a predetermined waiting time (for example, 1 minute).
 ステップS1でYESであれば、CPU24は、無線通信回路14からの信号に基づいて、無線通信回路14がネットワーク6に接続しているか否かを判別する。ここでNOであれば、ステップS5で、無線通信回路14に命じてネットワーク6への接続を試行させる。その後、ステップS1に戻って上記と同様の処理を繰り返す。なお、ステップS1を再び実行するまでの待機時間は、ステップS1~S5のループ処理(ステップS1を起点とする他のループ処理でも同様)が一定周期で(たとえば1分毎に)実行されるように、適宜調整されてよい。 If YES in step S <b> 1, the CPU 24 determines whether the wireless communication circuit 14 is connected to the network 6 based on a signal from the wireless communication circuit 14. If “NO” here, in a step S5, the wireless communication circuit 14 is commanded to try to connect to the network 6. Then, it returns to step S1 and repeats the same process as the above. Note that the waiting time until step S1 is executed again is such that the loop processing of steps S1 to S5 (the same applies to other loop processing starting from step S1) is executed at a constant cycle (for example, every minute). It may be adjusted appropriately.
 ステップS3でYESであれば、ステップS7に進み、遷移データ領域60のロック命令/解除命令62を参照して、サーバ4からネットワーク6を介して送信されたロック命令を受信したか否かを判別する。ステップS7でNOであれば、ステップS9で、サーバ4からネットワーク6を介して送信された解除命令を受信したか否かをさらに判別し、ステップS9でもNOであれば、ステップS1に戻って上記と同様の処理を繰り返す。 If “YES” in the step S 3, the process proceeds to a step S 7 to determine whether or not the lock command transmitted from the server 4 via the network 6 is received with reference to the lock command / release command 62 in the transition data area 60. To do. If NO in step S7, it is further determined in step S9 whether or not a release command transmitted from the server 4 via the network 6 has been received. If NO in step S9, the process returns to step S1 and returns to step S1. Repeat the same process.
 ステップS7でYESであれば、ステップS11で、I/F36を介してSIMカード38にアクセスして、メモリ38aの予備領域90に対してロック状態を設定(つまりロック状態情報92をロック状態に更新)した後、ステップS1に戻って上記と同様の処理を繰り返す。 If YES in step S7, in step S11, the SIM card 38 is accessed via the I / F 36, and the lock state is set for the spare area 90 of the memory 38a (that is, the lock state information 92 is updated to the lock state). After that, the process returns to step S1 to repeat the same processing as described above.
 ステップS9でYESであれば、ステップS13で、I/F36を介してSIMカード38にアクセスして、メモリ38aの予備領域に対して設定されたロック状態を解除(つまりロック状態情報92を通常状態に更新)した後、ステップS1に戻って上記と同様の処理を繰り返す。 If YES in step S9, the SIM card 38 is accessed via the I / F 36 in step S13, and the lock state set for the spare area of the memory 38a is released (that is, the lock state information 92 is set to the normal state). After that, the process returns to step S1 to repeat the same processing as described above.
 次に、図7を参照して、読出制御処理について説明する。なお、この読出制御処理と、図6のロック制御処理とは、いずれか一方が実行されているときは、他方の処理が一次停止され、一方の処理終了後、他方の処理が実行されるとしてよい。CPU24は、まずステップS21で特定イベントが発生したか否かを判別し、NOであれば所定の待機時間(たとえば1/30秒)を経て同様の判別を繰り返す。なお、特定イベントは、SIMカード38に記憶された情報たとえば利用者識別情報82の参照を必要とするようなイベントであり、たとえば端末本体の起動,ネットワークへの接続,電子メールの送受信などが挙げられる。 Next, the read control process will be described with reference to FIG. Note that when either one of the read control process and the lock control process of FIG. 6 is executed, the other process is temporarily stopped, and after the other process is completed, the other process is executed. Good. The CPU 24 first determines whether or not a specific event has occurred in step S21. If NO, the CPU 24 repeats the same determination after a predetermined waiting time (for example, 1/30 second). The specific event is an event that requires reference to information stored in the SIM card 38, for example, user identification information 82, such as activation of a terminal body, connection to a network, transmission / reception of an e-mail, and the like. It is done.
 ステップS21でYESであれば、ステップS23に進んで、SIMカード38の予備領域90(に記憶されているロック状態情報92)を参照する。次に、ステップS25で、予備領域90に記憶されているロック状態情報92に基づき、SIMカード38に対してロック状態が設定されているか否かを判別し、ここでYESであれば、ステップS1に戻って上記と同様の処理を繰り返す。したがって、ロック状態が設定されると、SIMカード38からの利用者識別情報82等の読み出しが禁止(制限)され、その結果、携帯端末10は、通常の処理が制限される。たとえば、起動状態の場合は、通話,データ通信といった動作の開始ないし継続が制限され行えなくなる。 If “YES” in the step S21, the process proceeds to a step S23 to refer to the spare area 90 (the lock state information 92 stored in the SIM card 38). Next, in step S25, based on the lock state information 92 stored in the spare area 90, it is determined whether or not the lock state is set for the SIM card 38. If YES here, the process proceeds to step S1. Returning to step 4, the same processing as above is repeated. Therefore, when the lock state is set, reading of the user identification information 82 and the like from the SIM card 38 is prohibited (restricted), and as a result, the mobile terminal 10 is restricted from normal processing. For example, in the activated state, the start or continuation of operations such as calls and data communication is restricted and cannot be performed.
 ステップS25でNOであれば、ステップS27に進んで、SIMカード38から利用者識別情報82等を読み出し、そしてステップS29で、読み出した情報に基づき、発生イベントに応じた処理を実行する。たとえば、発生イベントが端末本体の起動の場合、利用者識別情報82に基づいて認証処理を実行し、認証が成立すればさらに起動処理を実行して待ち受け処理を開始する。また、発生イベントが通話やデータ通信といった動作の開始の場合、利用者識別情報82に基づいて認証処理を実行し、認証が成立すればさらに電話番号84やアドレス86に基づいて通話やデータ通信などの処理を実行する。その後、ステップS1に戻って上記と同様の処理を繰り返す。したがって、携帯端末10は、通常状態が設定されると、電源ON操作に応じて起動したり、各種操作に応じて通話などの動作を開始または継続したりすることができる。 If “NO” in the step S25, the process proceeds to a step S27 to read the user identification information 82 and the like from the SIM card 38, and in a step S29, a process corresponding to the generated event is executed based on the read information. For example, when the generated event is the activation of the terminal body, the authentication process is executed based on the user identification information 82. If the authentication is established, the activation process is further executed and the standby process is started. When the generated event is the start of an operation such as a call or data communication, an authentication process is executed based on the user identification information 82. If the authentication is established, a call or data communication is performed based on the telephone number 84 or the address 86. Execute the process. Then, it returns to step S1 and repeats the same process as the above. Therefore, when the normal state is set, the mobile terminal 10 can be activated in response to a power-on operation, or can start or continue operations such as a call in response to various operations.
 上記ステップS11およびS13でSIMカード38の予備領域90にロック状態を設定/解除する際のトリガとなるロック命令/解除命令(62)は、事業者のサーバ4から送信される。メモリ4bには、全ての利用者について利用者識別情報,電話番号およびアドレスの対応関係を記述したテーブル(図示せず)が記憶されている。事業者は、利用者からの依頼に応じてサーバ4を操作し、次のような命令送信処理を実行させる。 The lock command / release command (62) that becomes a trigger when the lock state is set / released in the spare area 90 of the SIM card 38 in steps S11 and S13 is transmitted from the server 4 of the business operator. The memory 4b stores a table (not shown) describing the correspondence between user identification information, telephone numbers and addresses for all users. The business operator operates the server 4 in response to a request from the user, and executes the following command transmission process.
 図8を参照して、サーバ4のCPU4aは、まずステップS41で、入力装置4dを介して利用者識別情報(たとえばSIMカード38に記憶されている利用者識別情報82と同じもの)の入力を受け付け、さらにステップS43で命令の入力を受け付けると、ステップS45でその命令がロック命令であるか否かを判別する。ステップS45でNOであれば、ステップS47でその命令が解除命令であるか否かをさらに判別し、ステップS47でもNOであれば、この処理は終了となる。 Referring to FIG. 8, CPU 4a of server 4 first inputs user identification information (for example, the same as user identification information 82 stored in SIM card 38) via input device 4d in step S41. If an instruction input is received in step S43, it is determined in step S45 whether or not the instruction is a lock instruction. If “NO” in the step S45, it is further determined whether or not the command is a release command in a step S47, and if “NO” in the step S47, the process is ended.
 ステップS45でYESであれば、ステップS49で、メモリ4bのテーブルTbl(図3(B))を参照して、入力された利用者識別情報に対応するアドレス宛のロック命令を作成する。作成されたロック命令は、メモリ4bに記憶される。その後、ステップS51に進み、入力された利用者識別情報に対応するSIMカード38を装着した携帯端末10(または携帯端末10から取り外されたSIMカード38を装着した他の携帯端末10Aなどでもよい)がネットワーク6に接続されているか否かを判別し、ここでNOであれば、所定の待機時間(たとえば1分)を経て同様の判別を繰り返す。 If YES in step S45, a lock command addressed to the address corresponding to the input user identification information is created in step S49 with reference to the table Tbl (FIG. 3B) in the memory 4b. The created lock instruction is stored in the memory 4b. Thereafter, the process proceeds to step S51, and the portable terminal 10 with the SIM card 38 corresponding to the input user identification information (or another portable terminal 10A with the SIM card 38 removed from the portable terminal 10 may be used). Is determined to be connected to the network 6, and if “NO” here, the same determination is repeated after a predetermined waiting time (for example, 1 minute).
 ステップS51でYESであれば、ステップS53に進み、メモリ4bに記憶しているロック命令を無線通信回路14からネットワーク6を介して送信する。こうしてロック命令の送信を終えると、この処理は終了となる。送信されたロック命令は、SIMカード38を装着した携帯端末10(または他の携帯端末10Aなど)によって受信され、CPU24によってロック状態の設定が行われる(S11:図6参照)。 If “YES” in the step S51, the process proceeds to a step S53, and the lock command stored in the memory 4b is transmitted from the wireless communication circuit 14 via the network 6. When the transmission of the lock command is finished in this way, this process ends. The transmitted lock command is received by the mobile terminal 10 (or another mobile terminal 10A or the like) equipped with the SIM card 38, and the lock state is set by the CPU 24 (S11: see FIG. 6).
 また、ステップS47でYESであれば、ステップS55で、入力された利用者識別情報に対応するアドレス宛の解除命令を作成する。作成された解除命令は、メモリ4bに記憶される。その後、ステップS57に進み、入力された利用者識別情報に対応するSIMカード38を装着した携帯端末10(または他の携帯端末10Aなど)がネットワーク6に接続されているか否かを判別し、ここでNOであれば、所定の待機時間(たとえば1分)を経て同様の判別を繰り返す。 If YES in step S47, a release command addressed to the address corresponding to the input user identification information is created in step S55. The created release instruction is stored in the memory 4b. Thereafter, the process proceeds to step S57 to determine whether or not the mobile terminal 10 (or another mobile terminal 10A or the like) equipped with the SIM card 38 corresponding to the input user identification information is connected to the network 6, If NO, the same determination is repeated after a predetermined waiting time (for example, 1 minute).
 ステップS57でYESであれば、ステップS59に進み、メモリ4bに記憶している解除命令を無線通信回路14からネットワーク6を介して送信する。こうして解除命令の送信を終えると、この処理は終了となる。送信された解除命令は、SIMカード38を装着した携帯端末10(または他の携帯端末10Aなど)によって受信され、CPU24によってロック状態の解除が行われる(S13:図6参照)。 If “YES” in the step S57, the process proceeds to a step S59 to transmit the release command stored in the memory 4b from the wireless communication circuit 14 via the network 6. When the transmission of the release command is finished in this way, this process ends. The transmitted release command is received by the mobile terminal 10 (or another mobile terminal 10A or the like) equipped with the SIM card 38, and the lock state is released by the CPU 24 (S13: see FIG. 6).
 以上から明らかなように、この実施例では、携帯端末10は、サーバ4からネットワーク6を介して送信されるロック命令を受信すると(S7)、SIMカード38のメモリ38aをロック状態に設定する(S11)。こうしてロック状態が設定された場合、SIMカード38からの利用者識別情報82の読み出しが禁止ないし制限され、その結果、携帯端末10の利用が不可能ないし困難となる。携帯端末10からSIMカード38を抜き取って他の携帯端末10Aに装着した場合も、携帯端末10Aを利用することは不可能ないし困難である。したがって、SIMカード38の不正利用に対する安全性が高まる。 As apparent from the above, in this embodiment, when the mobile terminal 10 receives the lock command transmitted from the server 4 via the network 6 (S7), the memory 38a of the SIM card 38 is set to the locked state (S7). S11). When the lock state is set in this manner, reading of the user identification information 82 from the SIM card 38 is prohibited or restricted, and as a result, the use of the mobile terminal 10 becomes impossible or difficult. Even when the SIM card 38 is removed from the mobile terminal 10 and attached to another mobile terminal 10A, it is impossible or difficult to use the mobile terminal 10A. Therefore, safety against unauthorized use of the SIM card 38 is increased.
 また、携帯端末10は、サーバ4からネットワーク6を介して送信される解除命令を受信すると(S9)、メモリ38aに設定されたロック状態を解除する(S13)。したがって、SIMカード38にかかったロックをネットワーク6を介して解除できるので、利便性が高まる。 Further, when the mobile terminal 10 receives the release command transmitted from the server 4 via the network 6 (S9), the mobile terminal 10 releases the lock state set in the memory 38a (S13). Therefore, since the lock applied to the SIM card 38 can be released via the network 6, the convenience is enhanced.
 また、携帯端末10では、SIMカード38のメモリ38aが利用者識別情報82等を記憶するための専用領域80とロック状態情報92を記憶するための予備領域90とを含み、メモリ38aにロック状態が設定された場合、予備領域90のロック状態情報92に基づいて、専用領域80からの利用者識別情報82等の読み出しが禁止ないし制限される結果、携帯端末10(または他の携帯端末10A)の起動や、通話,データ通信といった動作の開始ないし継続が不可能ないし困難となる。また、ロック状態情報92の記憶場所を利用者識別情報82等が記憶される専用領域80とは別の予備領域90とし、読み出し制限の対象を専用領域80に限った結果、SIMカード38のメモリ38aにロック状態が設定されていても、予備領域90からのロック状態情報92の読み出しは許容されるので、問題なく図7の読み出し制御が行える。したがって、SIMカード38自体の不正利用だけでなく、そこに記憶された利用者識別情報82の不正利用をも防ぐことができ、より高い安全性が得られる。 In the mobile terminal 10, the memory 38a of the SIM card 38 includes a dedicated area 80 for storing the user identification information 82 and the like, and a spare area 90 for storing the lock state information 92, and is locked in the memory 38a. Is set, based on the lock state information 92 of the spare area 90, reading of the user identification information 82 and the like from the dedicated area 80 is prohibited or restricted. As a result, the mobile terminal 10 (or another mobile terminal 10A) It is impossible or difficult to start or continue operations such as activation, communication, and data communication. Further, as a result of setting the storage location of the lock state information 92 as a spare area 90 different from the dedicated area 80 in which the user identification information 82 and the like are stored, and limiting the read restriction to the dedicated area 80, the memory of the SIM card 38 Even if the lock state is set in 38a, reading of the lock state information 92 from the spare area 90 is allowed, so that the read control of FIG. 7 can be performed without any problem. Therefore, not only unauthorized use of the SIM card 38 itself but also unauthorized use of the user identification information 82 stored therein can be prevented, and higher security can be obtained.
 なお、この実施例では、携帯端末10のCPU24が図6のロック制御処理を実行しているが、携帯端末10のCPU24に代えて、SIMカード38内の制御回路(図示せず)がこれを実行してもよい。または、携帯端末10のCPU24およびSIMカード38内の制御回路が共働してこれを実行することも可能である。 In this embodiment, the CPU 24 of the mobile terminal 10 executes the lock control process of FIG. 6, but a control circuit (not shown) in the SIM card 38 replaces the CPU 24 of the mobile terminal 10 with this. May be executed. Alternatively, the CPU 24 of the mobile terminal 10 and the control circuit in the SIM card 38 can execute this together.
 なお、この実施例では、ネットワーク6を介してSIMカード38のメモリ38aにロック状態を設定/解除したが、ネットワーク6を介してSIMカード38のメモリ38aにPINコードを設定してもよい。この場合、たとえば、携帯端末10を紛失した利用者は、事業者に依頼してサーバ4からネットワーク6経由でSIMカード38に所望のPINコードを設定してもらい、後に携帯端末10が手元に戻ったとき、そのPINコードを携帯端末10に入力してロック状態を解除すればよい。これによっても、高い安全性と利便性が得られる。 In this embodiment, the lock state is set / released in the memory 38 a of the SIM card 38 via the network 6. However, a PIN code may be set in the memory 38 a of the SIM card 38 via the network 6. In this case, for example, the user who has lost the mobile terminal 10 asks the operator to set a desired PIN code on the SIM card 38 from the server 4 via the network 6, and the mobile terminal 10 returns to the hand later. When this occurs, the PIN code may be input to the mobile terminal 10 to release the lock state. This also provides high safety and convenience.
 以上では、携帯端末10について説明したが、この発明は、コンピュータ(CPU、プロセッサ)を備え、ネットワークに接続してデータ通信を行うための回路を有し、そして利用者識別情報を記憶したICカード(SIMカード,USIMカードまたはUIMカードもしくは独自規格のICカード)を用いる、様々な携帯端末(携帯電話端末,スマートフォン,携帯情報端末など)に適用可能である。 Although the portable terminal 10 has been described above, the present invention is an IC card that includes a computer (CPU, processor), has a circuit for performing data communication by connecting to a network, and stores user identification information. The present invention can be applied to various mobile terminals (mobile phone terminals, smart phones, mobile information terminals, etc.) using (a SIM card, a USIM card, a UIM card, or a proprietary standard IC card).
 なお、以上で挙げた具体的なハードウェア,フローチャート,数値等は、いずれも一例であり、適宜変更可能である。 It should be noted that the specific hardware, flowcharts, numerical values, etc. mentioned above are only examples, and can be changed as appropriate.
 一般には、この発明を実施するための形態として、以下の構成を採用してよい。なお、括弧内の参照符号および補足説明等は、この発明の理解を助けるために前述した実施例との対応関係を示したものであって、この発明を何ら限定するものではない。 Generally, the following configuration may be adopted as a mode for carrying out the present invention. The reference numerals in parentheses, supplementary explanations, and the like indicate the correspondence with the above-described embodiments in order to help understanding of the present invention, and do not limit the present invention.
 第1の局面は、ICカード(38)を用いる携帯端末(10)であって、ネットワーク(6)を介して送信されるロック命令を受信する第1受信手段(14,24,S7)、および第1受信手段がロック命令を受信するのに応じて、ICカード(38)の特定領域(38a)にロック状態を設定する設定手段(24,S11)を備える。 The first aspect is a portable terminal (10) using an IC card (38), and a first receiving means (14, 24, S7) for receiving a lock command transmitted via the network (6), and Setting means (24, S11) is provided for setting the lock state in the specific area (38a) of the IC card (38) in response to the first receiving means receiving the lock command.
 第1の局面では、ネットワークを介してロック命令を受け取ったとき、ICカードの特定領域にロック状態が設定される。なお、ICカードは、ある実施例ではSIM(Subscriber Identity Module)カードであるが、他の実施例ではUSIM(Universal SIM)カード,UIM(User Identity Module)カードなどでもよいし、独自の規格に基づくICカードでもよい。 In the first aspect, when a lock command is received via the network, a lock state is set in a specific area of the IC card. The IC card is a SIM (Subscriber Identity Module) card in one embodiment, but may be a USIM (Universal SIM) card, a UIM (User Identity Module) card, or the like based on an original standard in another embodiment. An IC card may be used.
 第1の局面によれば、ICカード自体の特定領域にロック状態を設定するので、たとえば、携帯端末からICカードを取り外して他の携帯端末に装着しても、その携帯端末を利用することができない。また、ロック状態の設定をネットワーク経由で行うので、ICカードがどこのどの携帯端末に装着されても、その携帯端末がネットワークに接続されれば、ICカードにロックがかかる。したがって、ICカードの不正利用に対する安全性が高まる。 According to the first aspect, since the lock state is set in the specific area of the IC card itself, for example, even if the IC card is removed from the mobile terminal and attached to another mobile terminal, the mobile terminal can be used. Can not. In addition, since the lock state is set via the network, the IC card is locked when the mobile terminal is connected to the network, regardless of which mobile terminal the IC card is attached to. Therefore, safety against unauthorized use of the IC card is increased.
 第2の局面は、第1の局面において、ネットワークを介して送信される解除命令を受信する第2受信手段(14,24,S9)、および第2受信手段が解除命令を受信するのに応じて、特定領域に設定されたロック状態を解除する解除手段(24,S13)をさらに備える。 According to a second aspect, in the first aspect, in response to the second receiving means (14, 24, S9) receiving a release command transmitted via the network, and the second receiving means receiving the release command And a release means (24, S13) for releasing the lock state set in the specific area.
 第2の局面では、ICカードの特定領域に設定されたロック状態は、ネットワークを介して解除命令を受け取ったとき解除される。 In the second aspect, the lock state set in the specific area of the IC card is released when a release command is received via the network.
 第2の局面によれば、ICカードにかかったロックをネットワーク経由で解除できるので、利便性が高まる。 According to the second aspect, since the lock on the IC card can be released via the network, convenience is enhanced.
 第3の局面は、第1または2の局面において、特定領域は、少なくとも利用者識別情報(82)を記憶する第1特定領域(80)、およびロック状態が設定されているか否かを示すロック状態情報(92)を記憶する第2特定領域(90)を含み、特定イベントの発生に応じて第2特定領域のロック状態情報を参照して、ロック状態が設定されていない場合には第1特定領域から少なくとも利用者識別情報の読み出しを行い、ロック状態が設定されている場合には第1特定領域からの読み出しを制限する、読出制御手段(24,S21~S27)をさらに備える。 The third aspect is the first or second aspect, wherein the specific area is at least a first specific area (80) for storing user identification information (82) and a lock indicating whether or not a lock state is set. The second specific area (90) for storing the state information (92) is included, and the lock state information of the second specific area is referred to in response to the occurrence of the specific event. Read control means (24, S21 to S27) is further provided for reading at least user identification information from the specific area and restricting reading from the first specific area when the lock state is set.
 なお、特定イベントは、たとえば携帯端末の起動操作や、通話,データ通信といった各種動作の開始操作などである。第1特定領域には、利用者識別情報に加えて、携帯端末の電話番号(84)やアドレス(86)、さらには利用者の個人情報(88:たとえば電話帳や電子メール)などが記憶されてもよい。ロック状態が設定されている場合の読み出しの制限は、第1特定領域に記憶された各種情報の全部または一部が対象となる。 The specific event is, for example, a start operation of a mobile terminal, a start operation of various operations such as a call or data communication. In the first specific area, in addition to the user identification information, the phone number (84) and address (86) of the portable terminal, as well as personal information of the user (88: for example, phone book and e-mail) are stored. May be. The restriction on reading when the lock state is set applies to all or a part of various information stored in the first specific area.
 第3の局面では、ICカードの特定領域が利用者識別情報等を記憶するための第1特定領域とロック状態情報を記憶するための第2特定領域とを含み、ICカードの特定領域にロック状態が設定された場合、第2特定領域のロック状態情報に基づいて、第1特定領域からの利用者識別情報等の読み出しが制限される結果、携帯端末の起動や各種動作の開始ないし継続が不可能となる。また、ロック状態情報の記憶場所を利用者識別情報等が記憶される第1特定領域とは別の第2特定領域とし、読み出し制限の対象を第1特定領域に限った結果、ICカードの特定領域にロック状態が設定されていても、第2特定領域からのロック状態情報の読み出しは許容されるので、問題なく読み出し制御が行える。 In the third aspect, the specific area of the IC card includes a first specific area for storing user identification information and the like, and a second specific area for storing lock state information, and is locked to the specific area of the IC card. When the state is set, reading of user identification information and the like from the first specific area is restricted based on the lock state information of the second specific area, and as a result, the mobile terminal is activated and various operations are started or continued. It becomes impossible. In addition, as a result of limiting the storage location of the lock state information to a second specific area different from the first specific area in which user identification information and the like are stored, and limiting the read restriction target to the first specific area, Even if the lock state is set in the area, reading of the lock state information from the second specific area is allowed, so that read control can be performed without any problem.
 第3の局面によれば、ICカード自体の不正利用だけでなく、そこに記憶された利用者識別情報の不正利用をも防ぐことができ、より高い安全性が得られる。 According to the third aspect, not only unauthorized use of the IC card itself but also unauthorized use of the user identification information stored therein can be prevented, and higher safety can be obtained.
 第4の局面は、ICカード(38)を用いる携帯端末(10)および携帯端末との間でネットワーク(6)を介して通信を行うサーバ(4)を含む通信システム(2)であって、サーバは、ネットワークを介してロック命令を送信する第1送信手段(4c,4a,S53)を備え、携帯端末は、第1送信手段からネットワークを介して送信されるロック命令を受信する第1受信手段(14,24,S7)、および第1受信手段がロック命令を受信するのに応じて、ICカードの特定領域(38a)にロック状態を設定する設定手段(24,S11)を備える。 A fourth aspect is a communication system (2) including a mobile terminal (10) using an IC card (38) and a server (4) that communicates with the mobile terminal via a network (6), The server includes first transmission means (4c, 4a, S53) for transmitting a lock command via the network, and the portable terminal receives a lock command transmitted from the first transmission means via the network. The means (14, 24, S7) and the setting means (24, S11) for setting the lock state in the specific area (38a) of the IC card in response to the first receiving means receiving the lock command.
 第5の局面は、ロック制御プログラム(52a)であって、無線通信回路(14)を有しかつICカード(38)を用いる携帯端末(10)のコンピュータ(24)を、ネットワークを介して送信されるロック命令を無線通信回路で受信する第1受信手段(S7)、および第1受信手段がロック命令を受信するのに応じて、ICカードの特定領域(38a)にロック状態を設定する設定手段(S11)として機能させる。 The fifth aspect is a lock control program (52a), which transmits a computer (24) of a portable terminal (10) having a wireless communication circuit (14) and using an IC card (38) via a network. First receiving means (S7) for receiving the lock command to be received by the wireless communication circuit, and setting for setting the lock state in the specific area (38a) of the IC card in response to the first receiving means receiving the lock command It functions as means (S11).
 第6の局面は、無線通信回路(14)およびコンピュータ(24)を有しかつICカード(38)を用いる携帯端末(10)によって実行されるロック制御方法であって、ネットワークを介して送信されるロック命令を無線通信回路で受信する第1受信ステップ(S7)、および第1受信ステップがロック命令を受信するのに応じて、ICカードの特定領域(38a)にロック状態を設定する設定ステップ(S11)を含む。 A sixth aspect is a lock control method executed by a portable terminal (10) having a wireless communication circuit (14) and a computer (24) and using an IC card (38), which is transmitted via a network. A first receiving step (S7) for receiving the lock command by the wireless communication circuit, and a setting step for setting the lock state in the specific area (38a) of the IC card in response to the first receiving step receiving the lock command (S11) is included.
 第4~6の各局面によっても、第1の局面と同様に、ICカードの不正利用に対する安全性が高まる。 Also in each of the fourth to sixth aspects, as in the first aspect, the safety against unauthorized use of the IC card is increased.
 この発明が詳細に説明され図示されたが、それは単なる図解および一例として用いたものであり、限定であると解されるべきではないことは明らかであり、この発明の精神および範囲は添付されたクレームの文言によってのみ限定される。 Although the present invention has been described and illustrated in detail, it is clear that it has been used merely as an illustration and example and should not be construed as limiting, and the spirit and scope of the present invention are attached Limited only by the wording of the claims.
 2 …通信システム
 4 …サーバ
 6 …ネットワーク
 10 …携帯端末
 14 …無線通信回路
 24 …CPU
 32 …メインメモリ
 36 …I/F
 38 …SIMカード
 38a …メモリ(特定領域)
2 ... Communication system 4 ... Server 6 ... Network 10 ... Mobile terminal 14 ... Wireless communication circuit 24 ... CPU
32 ... Main memory 36 ... I / F
38 ... SIM card 38a ... Memory (specific area)

Claims (6)

  1.  ICカードを用いる携帯端末であって、
     ネットワークを介して送信されるロック命令を受信する第1受信手段、および
     前記第1受信手段がロック命令を受信するのに応じて、前記ICカードの特定領域にロック状態を設定する設定手段を備える、携帯端末。
    A portable terminal using an IC card,
    First receiving means for receiving a lock command transmitted via a network, and setting means for setting a lock state in a specific area of the IC card in response to the first receiving means receiving the lock command , Mobile devices.
  2.  前記ネットワークを介して送信される解除命令を受信する第2受信手段、および
     前記第2受信手段が前記解除命令を受信するのに応じて、前記特定領域に設定された前記ロック状態を解除する解除手段をさらに備える、請求項1記載の携帯端末。
    A second receiving means for receiving a release command transmitted via the network; and a release for releasing the lock state set in the specific area in response to the second receiving means receiving the release command. The mobile terminal according to claim 1, further comprising means.
  3.  前記特定領域は、少なくとも利用者識別情報を記憶する第1特定領域、および前記ロック状態が設定されているか否かを示すロック状態情報を記憶する第2特定領域を含み、
     特定イベントの発生に応じて前記第2特定領域のロック状態情報を参照して、前記ロック状態が設定されていない場合には前記第1特定領域から少なくとも前記利用者識別情報の読み出しを行い、前記ロック状態が設定されている場合には前記第1特定領域からの読み出しを制限する、読出制御手段をさらに備える、請求項1または2記載の携帯端末。
    The specific area includes at least a first specific area for storing user identification information and a second specific area for storing lock state information indicating whether or not the lock state is set,
    Referring to the lock state information of the second specific area in response to the occurrence of a specific event, if the lock state is not set, at least the user identification information is read from the first specific area, The portable terminal according to claim 1, further comprising a reading control unit that limits reading from the first specific area when the lock state is set.
  4.  ICカードを用いる携帯端末および前記携帯端末との間でネットワークを介して通信を行うサーバを含む通信システムであって、
     前記サーバは、前記ネットワークを介してロック命令を送信する第1送信手段を備え、
     前記携帯端末は、
      前記第1送信手段から前記ネットワークを介して送信されるロック命令を受信する第1受信手段、および
      前記第1受信手段がロック命令を受信するのに応じて、前記ICカードの特定領域にロック状態を設定する設定手段を備える、通信システム。
    A communication system including a mobile terminal using an IC card and a server that communicates with the mobile terminal via a network,
    The server includes first transmission means for transmitting a lock command via the network,
    The portable terminal is
    A first receiving means for receiving a lock command transmitted from the first transmitting means via the network; and a lock state in a specific area of the IC card in response to the first receiving means receiving the lock command. A communication system comprising setting means for setting.
  5.  無線通信回路を有しかつICカードを用いる携帯端末のコンピュータを、
     ネットワークを介して送信されるロック命令を前記無線通信回路で受信する第1受信手段、および
     前記第1受信手段が前記ロック命令を受信するのに応じて、前記ICカードの特定領域にロック状態を設定する設定手段として機能させる、ロック制御プログラム。
    A portable terminal computer having a wireless communication circuit and using an IC card,
    A first receiving means for receiving a lock command transmitted via a network by the wireless communication circuit; and a lock state in a specific area of the IC card in response to the first receiving means receiving the lock command. A lock control program that functions as a setting means for setting.
  6.  無線通信回路およびコンピュータを有しかつICカードを用いる携帯端末によって実行されるロック制御方法であって、
     ネットワークを介して送信されるロック命令を前記無線通信回路で受信する第1受信ステップ、および
     前記第1受信ステップが前記ロック命令を受信するのに応じて、前記ICカードの特定領域にロック状態を設定する設定ステップを含む、ロック制御方法。
    A lock control method executed by a mobile terminal having a wireless communication circuit and a computer and using an IC card,
    A first reception step of receiving a lock command transmitted via a network by the wireless communication circuit; and a lock state in a specific area of the IC card in response to the first reception step receiving the lock command. A lock control method including a setting step for setting.
PCT/JP2013/064583 2012-05-28 2013-05-27 Portable terminal using ic card WO2013180046A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2012-120406 2012-05-28
JP2012120406A JP2013247534A (en) 2012-05-28 2012-05-28 Portable terminal using ic card

Publications (1)

Publication Number Publication Date
WO2013180046A1 true WO2013180046A1 (en) 2013-12-05

Family

ID=49673241

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2013/064583 WO2013180046A1 (en) 2012-05-28 2013-05-27 Portable terminal using ic card

Country Status (2)

Country Link
JP (1) JP2013247534A (en)
WO (1) WO2013180046A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5920946B2 (en) * 2014-08-28 2016-05-18 Necプラットフォームズ株式会社 Unauthorized use prevention device, unauthorized use prevention method and communication terminal of subscriber authentication module

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009200845A (en) * 2008-02-21 2009-09-03 Ntt Docomo Inc Storage system of mobile terminal and access control method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009200845A (en) * 2008-02-21 2009-09-03 Ntt Docomo Inc Storage system of mobile terminal and access control method

Also Published As

Publication number Publication date
JP2013247534A (en) 2013-12-09

Similar Documents

Publication Publication Date Title
US11656843B2 (en) Method for quickly starting application service, and terminal
US20080064370A1 (en) Function lock information notification method and mobile communication terminal
CN105208529A (en) Position prompt method and module of mobile terminal
US20080003979A1 (en) Method for tracking a lost mobile station
CN110062929A (en) A kind of method, apparatus and terminal showing data
KR20050086980A (en) System and method enable of a remote-function setting
JP4330255B2 (en) Mobile device
WO2013180046A1 (en) Portable terminal using ic card
US8050654B2 (en) Method for locking function and mobile communication terminal
US20070130435A1 (en) Terminal apparatus and its data management method
KR101106695B1 (en) Method for managing using message of mobile communication terminal
JP4864592B2 (en) Mobile communication terminal and system having the mobile communication terminal
JP4726736B2 (en) MOBILE COMMUNICATION DEVICE AND CALL FUNCTION SELECTION METHOD FOR THE MOBILE COMMUNICATION DEVICE
JP4873484B2 (en) Mobile device
KR20040022286A (en) Method for finding the location of a lost mobile by short message and mobile phone using the same
KR100660464B1 (en) Method for connecting bluetooth device in portable terminal
KR101635413B1 (en) Apparatus and method for preventing use of portable terminal in mobile communication system
KR100832268B1 (en) Apparatus and method for tracking of mobile terminal
CN114727272B (en) Emergency networking method, electronic equipment and storage medium
KR100664259B1 (en) Mobile terminal having information security function and method thereof
KR100595974B1 (en) Method and apparatus for outputting receiving confirmation message of an arrival terminal in a sending terminal
JP2000041102A (en) Radio communication device
KR100601404B1 (en) Mobile phone having function of preventing illegal use
KR20030048196A (en) Mobile phone with phone lock using short messages and method for the same
JP2006019873A (en) Mobile phone

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13797096

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13797096

Country of ref document: EP

Kind code of ref document: A1