JP2661582B2 - Subsystem for preventing unauthorized use of wireless mobile terminal in wireless mobile terminal system - Google Patents

Subsystem for preventing unauthorized use of wireless mobile terminal in wireless mobile terminal system

Info

Publication number
JP2661582B2
JP2661582B2 JP7052454A JP5245495A JP2661582B2 JP 2661582 B2 JP2661582 B2 JP 2661582B2 JP 7052454 A JP7052454 A JP 7052454A JP 5245495 A JP5245495 A JP 5245495A JP 2661582 B2 JP2661582 B2 JP 2661582B2
Authority
JP
Japan
Prior art keywords
terminal
information center
portable terminal
wireless
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
JP7052454A
Other languages
Japanese (ja)
Other versions
JPH08251660A (en
Inventor
健一 有賀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
Nippon Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nippon Electric Co Ltd filed Critical Nippon Electric Co Ltd
Priority to JP7052454A priority Critical patent/JP2661582B2/en
Publication of JPH08251660A publication Critical patent/JPH08251660A/en
Application granted granted Critical
Publication of JP2661582B2 publication Critical patent/JP2661582B2/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Description

【発明の詳細な説明】DETAILED DESCRIPTION OF THE INVENTION

【0001】[0001]

【産業上の利用分野】本発明は、無線携帯端末における
不正使用に対するネットワークを介した防止方法に関す
る。
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a method for preventing unauthorized use in a wireless portable terminal via a network.

【0002】[0002]

【従来の技術】近年携帯端末が世の中に普及しつつある
が、携帯端末のセキュリティ確保についてはまだまだ発
展途上段階にある。
2. Description of the Related Art In recent years, portable terminals have become widespread in the world, but security of portable terminals is still in a developing stage.

【0003】従来の携帯端末の中には紛失したり盗難に
あった場合のセキュリティを確保するために、パスワー
ドを設定して起動時に入力させるようになっているもの
もある。
[0003] In some conventional portable terminals, in order to ensure security in the event of loss or theft, a password is set and input at the time of startup.

【0004】また特開平5−94225号公報は、パー
ソナルコンピュータに取り外し可能なICカード等の不
揮発性記憶装置を設け、カードが実装されていないとコ
ンピュータそのものが起動しないようにすることによっ
てセキュリティを保つ方法が記載している。
Japanese Patent Application Laid-Open No. Hei 5-94225 discloses that a personal computer is provided with a removable non-volatile storage device such as an IC card, and the security of the computer is maintained by preventing the computer from starting unless the card is mounted. The method is described.

【0005】また特開平5−145483号公報は、起
動時に所有者名を表示し、セキュリティコードと呼ばれ
るコードを入力しない限り所有者名の登録変更を禁止す
るという手段を有した無線端末を記載している。
Japanese Patent Application Laid-Open No. 5-145483 describes a wireless terminal having a means for displaying an owner name at the time of startup and prohibiting registration change of the owner name unless a code called a security code is input. ing.

【0006】[0006]

【発明が解決しようとする課題】無線携帯端末を紛失ま
たは盗難され、その端末を第三者が取得して不正に使用
した場合、パスワード機能がなければ自由に無線ネット
ワークへのアクセスや住所録などの内部データの参照が
可能である。またパスワード機能があっても、なんらか
の手段によってパスワードを解読されれば、不正使用を
防止することはできない。
When a wireless portable terminal is lost or stolen, and the terminal is obtained and used illegally by a third party, if there is no password function, access to a wireless network, an address book, etc. can be freely performed. Internal data can be referred to. Even with the password function, unauthorized use cannot be prevented if the password is decrypted by any means.

【0007】本発明の目的は、盗難・紛失した無線携帯
端末が第三者によって不正使用されることを防止して、
セキュリティの向上を図ることにある。
An object of the present invention is to prevent a stolen or lost wireless portable terminal from being illegally used by a third party,
The goal is to improve security.

【0008】[0008]

【課題を解決するための手段】本発明は、紛失または盗
難された無線携帯端末をロック状態(使用不可能な状
態)とすることによって、ネットワークへの不正なアク
セスや内部データの参照を防止する。このため本発明の
無線携帯端末不正使用防止方法においては、第三者によ
って取得された無線携帯端末を、不正使用される前に所
有者から無線ネットワークを通じて携帯端末にその旨を
通知する手段により、携帯端末をロック状態にすること
で上記目的を達成している。
SUMMARY OF THE INVENTION According to the present invention, a lost or stolen wireless portable terminal is locked (unusable), thereby preventing unauthorized access to a network and reference to internal data. . Therefore, in the wireless portable terminal unauthorized use prevention method of the present invention, before the unauthorized use of the wireless portable terminal obtained by a third party, the owner notifies the portable terminal through a wireless network to that effect, The above object is achieved by setting the mobile terminal in a locked state.

【0009】[0009]

【作用】情報センタに盗難にあったことが通知される
と、情報センタから盗難端末を探して、相手を確認した
後に内部のデータを消去する要求を携帯端末に送信する
ことによって、システムロックさせる。これによって盗
難された携帯端末の不正使用を防止することができる。
When the information center is notified of the theft, the information center is searched for a stolen terminal, and after confirming the other party, a request to delete the internal data is transmitted to the portable terminal to lock the system. . This can prevent unauthorized use of the stolen mobile terminal.

【0010】[0010]

【実施例】以下、本発明の実施例について図面を参照し
て説明する。
Embodiments of the present invention will be described below with reference to the drawings.

【0011】図1は本発明の無線携帯端末不正使用防止
サブシステムが収容される。説明する無線携帯端末シス
テムのシステムの構成図であり、図2は本システムにお
ける無線携帯端末のブロック図であり、図3は無線携帯
端末と情報センタとの通信のシーケンスを示す図であ
る。
FIG. 1 contains a wireless portable terminal unauthorized use prevention subsystem of the present invention. FIG. 2 is a block diagram of the wireless portable terminal in the present system, and FIG. 3 is a diagram showing a communication sequence between the wireless portable terminal and an information center.

【0012】まず無線携帯端末のハードウェア構成を図
2のブロック図を用いて説明する。
First, the hardware configuration of the wireless portable terminal will be described with reference to the block diagram of FIG.

【0013】無線携帯端末はシステム全体を制御するC
PU21、制御プログラム等が蓄積されているROM2
4、制御プログラムが使用するワーク用RAM22、住
所録やスケジュールなどの個人データを蓄積がされてい
るデータ蓄積用RAM23、情報や操作を表示するため
の表示器25、データを入力するための入力装置26、
無線の制御を行う無線モジュール27で構成されてい
る。
The wireless portable terminal controls the entire system C
PU21, ROM2 in which control programs and the like are stored
4. A work RAM 22 used by the control program, a data storage RAM 23 storing personal data such as an address book and a schedule, a display 25 for displaying information and operations, and an input device for inputting data 26,
It is composed of a wireless module 27 that performs wireless control.

【0014】入力装置26で入力されたデータはデータ
蓄積用RAM23に蓄積される。
The data input by the input device 26 is stored in the data storage RAM 23.

【0015】一般的にデータ蓄積用RAM23は電池で
バックアップされているために、電源を落としても消去
されることはない。無線でデータの送信を行う場合に
は、RAM22,23、ROM24からシステムバスを
通じて、無線モジュール27にデータを送ることにより
行う。
Since the data storage RAM 23 is generally backed up by a battery, it is not erased even when the power is turned off. When data is transmitted wirelessly, the data is transmitted from the RAMs 22 and 23 and the ROM 24 to the wireless module 27 via the system bus.

【0016】次に本システムの構成を図1を用いて説明
する。無線携帯端末A(11)、B(12)は情報セン
タ14に登録されているものである。また有線端末C
(13)は情報センタ14にアクセス可能な端末であ
る。無線基地局15と情報センタ14は有線のネットワ
ーク16で接続されている。
Next, the configuration of this system will be described with reference to FIG. The wireless portable terminals A (11) and B (12) are registered in the information center 14. Wired terminal C
(13) is a terminal that can access the information center 14. The wireless base station 15 and the information center 14 are connected by a wired network 16.

【0017】いまある人が無線携帯端末A(11)を所
有していて、盗難にあったと仮定する。無線携帯端末A
(11)の所有者は盗難のあったことを情報センタ14
に通知するために、他の人の無線携帯端末B(12)ま
たは有線の端末C(13)を通じて情報センタ14にア
クセスする。有線端末C(13)でアクセスを行う場合
を図3の通知シーケンス図を用いて説明する。
It is assumed that a person now owns the wireless portable terminal A (11) and has been stolen. Wireless mobile terminal A
The owner of (11) informs the information center 14 of the theft.
, The information center 14 is accessed through another person's wireless portable terminal B (12) or wired terminal C (13). The case where access is performed by the wired terminal C (13) will be described with reference to the notification sequence diagram of FIG.

【0018】有線端末C(13)からID、電話番号、
パスワードを付加した接続要求を送信し、情報センタ1
4が受け付けると接続完了レスポンスを返す(図中30
1)。
From the wired terminal C (13), an ID, a telephone number,
A connection request with a password is transmitted, and the information center 1
4 receives a connection completion response (30 in the figure).
1).

【0019】情報センタ14に接続完了後、無線携帯端
末A(11)の端末IDを付加した盗難通知を情報セン
タ14に送信する(図中302)。盗難通知を受信した
情報センタ14ではコマンド確認レスポンスを有線端末
C(13)に返した後、無線基地局15を通じて盗難端
末が通信可能状態(受け待ち状態)にあるかどうかを確
認するために盗難端末のIDを付加したID確認要求コ
マンドを送信する(図中303)。もし盗難端末A(1
1)が通信可能状態であればID通知レスポンスを返
す。
After the connection to the information center 14 is completed, a theft notification to which the terminal ID of the wireless portable terminal A (11) is added is transmitted to the information center 14 (302 in the figure). After receiving the theft notification, the information center 14 returns a command confirmation response to the wired terminal C (13), and then checks through the wireless base station 15 whether or not the theft terminal is in a communicable state (waiting for reception). An ID confirmation request command with the terminal ID added is transmitted (303 in the figure). If the stolen terminal A (1
If 1) is in a communicable state, an ID notification response is returned.

【0020】ID通知レスポンスを確認した情報センタ
14では、盗難端末A(11)が特定できたため、シス
テムロック要求コマンドを送信する(図中304)。こ
のコマンドを受信した盗難端末A(11)では、データ
蓄積用RAM23の内容を消去した後、システムロック
完了レスポンスを情報センタ14に送信する。
In the information center 14 which has confirmed the ID notification response, the stolen terminal A (11) has been identified, and therefore a system lock request command is transmitted (304 in the figure). Upon receiving this command, the stolen terminal A (11) deletes the contents of the data storage RAM 23, and then transmits a system lock completion response to the information center 14.

【0021】端末のシステムロックを確認した情報セン
タ14では、その旨をシステムロック完了通知により有
線端末C(13)に端末がロック状態になったことを通
知する(図中305)。ここで、盗難端末A(11)の
内部データは消去されたために端末のセキュリティが保
たれることになる。
The information center 14, which has confirmed the system lock of the terminal, notifies the wired terminal C (13) that the terminal has been locked by a system lock completion notification (305 in the figure). Here, since the internal data of the stolen terminal A (11) has been deleted, the security of the terminal is maintained.

【0022】[0022]

【発明の効果】以上説明したように本発明の無線携帯端
末不正使用防止サブシステムは、第三者によって取得さ
れた無線携帯端末を不正使用される前に所有者から無線
ネットワークを通じてコマンドを送ることによって端末
をロック状態にするために、携帯端末を紛失したり盗難
にあった後に第三者が無線ネットワークへのアクセスや
住所録などの内部データの参照することができなくな
る。このため端末のセキュリティが保たれる。
As described above, the wireless portable terminal unauthorized use prevention subsystem of the present invention transmits a command from the owner through the wireless network before the wireless portable terminal acquired by a third party is illegally used. Because the terminal is locked, the third party cannot access the wireless network or refer to internal data such as an address book after the portable terminal is lost or stolen. For this reason, the security of the terminal is maintained.

【図面の簡単な説明】[Brief description of the drawings]

【図1】本発明の実施例のシステム構成図である。FIG. 1 is a system configuration diagram of an embodiment of the present invention.

【図2】本発明の実施例の端末のブロック図である。FIG. 2 is a block diagram of a terminal according to an embodiment of the present invention.

【図3】本発明の実施例の動作を示すシーケンス図であ
る。
FIG. 3 is a sequence diagram showing an operation of the embodiment of the present invention.

【符号の説明】[Explanation of symbols]

11 盗難端末A 12 無線端末B 13 有線端末C 14 情報センタ 15 無線基地局 16 有線ネットワーク 21 CPU 22 ワーク用RAM 23 データ蓄積用RAM 24 ROM 25 表示器 26 入力装置 27 無線モジュール Reference Signs List 11 stolen terminal A 12 wireless terminal B 13 wired terminal C 14 information center 15 wireless base station 16 wired network 21 CPU 22 work RAM 23 data storage RAM 24 ROM 25 display 26 input device 27 wireless module

Claims (2)

(57)【特許請求の範囲】(57) [Claims] 【請求項1】 情報センタに登録されサービスを受けて
いる無線携帯端末システムにおける無線携帯端末不正使
用防止サブシステムであり、 前記情報センタは携帯端末の盗難通知に応答して、 前記携帯端末に対して内部データを消去する指示を送る
手段を備え、 前記携帯端末は、前記情報センタからの消去指示に基づ
いて、その内部データを消去する手段と、 該内部データを消去完了した旨を情報センタに通知する
手段とを備え、 前記情報センタは、前記携帯端末からの通知内容を盗難
通知を発した端末に返す手段をさらに備えることを特徴
とする無線携帯端末不正使用防止サブシステム。
1. A wireless portable terminal unauthorized use prevention subsystem in a wireless portable terminal system registered and receiving a service in an information center, wherein said information center responds to a notification of the theft of the portable terminal, and Means for sending an instruction to erase internal data by means of the portable terminal, based on an erase instruction from the information center, means for erasing the internal data, and a notice to the effect that the internal data has been erased to the information center. Means for notifying, the information center further comprising means for returning the contents of the notification from the mobile terminal to the terminal that issued the theft notification, the wireless mobile terminal unauthorized use prevention subsystem.
【請求項2】 前記情報センタは前記携帯端末のID確
認要求を送信する手段をさらに含み、 前記携帯端末はこのID確認要求に応答してIDを情報
センタに通知する手段をさらに含むことを特徴とする請
求項1記載の無線携帯端末不正使用防止サブシステム。
2. The information center further comprises means for transmitting an ID confirmation request of the portable terminal, and the portable terminal further comprises means for notifying an ID to the information center in response to the ID confirmation request. The subsystem for preventing unauthorized use of a wireless portable terminal according to claim 1.
JP7052454A 1995-03-13 1995-03-13 Subsystem for preventing unauthorized use of wireless mobile terminal in wireless mobile terminal system Expired - Lifetime JP2661582B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP7052454A JP2661582B2 (en) 1995-03-13 1995-03-13 Subsystem for preventing unauthorized use of wireless mobile terminal in wireless mobile terminal system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP7052454A JP2661582B2 (en) 1995-03-13 1995-03-13 Subsystem for preventing unauthorized use of wireless mobile terminal in wireless mobile terminal system

Publications (2)

Publication Number Publication Date
JPH08251660A JPH08251660A (en) 1996-09-27
JP2661582B2 true JP2661582B2 (en) 1997-10-08

Family

ID=12915173

Family Applications (1)

Application Number Title Priority Date Filing Date
JP7052454A Expired - Lifetime JP2661582B2 (en) 1995-03-13 1995-03-13 Subsystem for preventing unauthorized use of wireless mobile terminal in wireless mobile terminal system

Country Status (1)

Country Link
JP (1) JP2661582B2 (en)

Families Citing this family (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000270376A (en) 1999-03-17 2000-09-29 Fujitsu Ltd Mobile phone maintenance service system and method for maintenance service
JP4188690B2 (en) * 2001-01-12 2008-11-26 セコム株式会社 Search support device and search support system
JP2002259869A (en) * 2001-03-01 2002-09-13 Fujitsu Ltd Method of controlling portable equipment, method of preventing illicit use of ic card, program for changing setting of portable equipment, and program for preventing illicit use of ic card
KR100414219B1 (en) * 2001-04-10 2004-01-07 주식회사 팬택앤큐리텔 Method of mobile station control for using telephone/mobile station
JP2002374564A (en) * 2001-06-12 2002-12-26 Koji Yamamoto Security system with respect to recorded contents of mobile phone
US7159120B2 (en) * 2001-11-19 2007-01-02 Good Technology, Inc. Method and system for protecting data within portable electronic devices
CA2481872A1 (en) * 2002-04-28 2003-11-13 Paycool International Limited System to enable a telecom operator provide financial transactions services and methods for implementing such transactions
JP4292160B2 (en) 2003-05-21 2009-07-08 富士通株式会社 Information processing system
JP4281966B2 (en) 2005-04-19 2009-06-17 シャープ株式会社 Information preservation system for portable terminal device, information preservation method for portable terminal device, control program, readable recording medium, and electronic information device
US8326264B2 (en) 2006-09-15 2012-12-04 Ntt Docomo, Inc. Mobile communication network system and locking method of a mobile terminal apparatus
WO2008129701A1 (en) * 2007-04-10 2008-10-30 Hitachi Software Engineering Co., Ltd. File management system and method, and mobile terminal
JP5298729B2 (en) 2008-09-24 2013-09-25 富士通株式会社 Terminal device, program
US8429759B2 (en) 2009-03-31 2013-04-23 Intel Corporation Theft management system and method
US8978156B2 (en) 2011-04-19 2015-03-10 Panasonic Intellectual Property Management Co., Ltd. Information terminal and information leakage prevention method
JP5214796B2 (en) * 2011-11-17 2013-06-19 株式会社東芝 Electronic device, electronic device control method, electronic device control program
US9680763B2 (en) 2012-02-14 2017-06-13 Airwatch, Llc Controlling distribution of resources in a network
US10404615B2 (en) 2012-02-14 2019-09-03 Airwatch, Llc Controlling distribution of resources on a network
US8832785B2 (en) 2012-12-06 2014-09-09 Airwatch, Llc Systems and methods for controlling email access
US8826432B2 (en) 2012-12-06 2014-09-02 Airwatch, Llc Systems and methods for controlling email access
US8862868B2 (en) 2012-12-06 2014-10-14 Airwatch, Llc Systems and methods for controlling email access
US9021037B2 (en) 2012-12-06 2015-04-28 Airwatch Llc Systems and methods for controlling email access
US8978110B2 (en) 2012-12-06 2015-03-10 Airwatch Llc Systems and methods for controlling email access
US20140280955A1 (en) 2013-03-14 2014-09-18 Sky Socket, Llc Controlling Electronically Communicated Resources
US9787686B2 (en) 2013-04-12 2017-10-10 Airwatch Llc On-demand security policy activation
US9900261B2 (en) 2013-06-02 2018-02-20 Airwatch Llc Shared resource watermarking and management
US9584437B2 (en) 2013-06-02 2017-02-28 Airwatch Llc Resource watermarking and management
US8806217B2 (en) 2013-07-03 2014-08-12 Sky Socket, Llc Functionality watermarking and management
US8756426B2 (en) 2013-07-03 2014-06-17 Sky Socket, Llc Functionality watermarking and management
US8775815B2 (en) 2013-07-03 2014-07-08 Sky Socket, Llc Enterprise-specific functionality watermarking and management
US9665723B2 (en) 2013-08-15 2017-05-30 Airwatch, Llc Watermarking detection and management
US9516005B2 (en) 2013-08-20 2016-12-06 Airwatch Llc Individual-specific content management
US9544306B2 (en) 2013-10-29 2017-01-10 Airwatch Llc Attempted security breach remediation
US9258301B2 (en) 2013-10-29 2016-02-09 Airwatch Llc Advanced authentication techniques
JP6325874B2 (en) * 2014-04-02 2018-05-16 能美防災株式会社 Inspection support device and inspection support system

Also Published As

Publication number Publication date
JPH08251660A (en) 1996-09-27

Similar Documents

Publication Publication Date Title
JP2661582B2 (en) Subsystem for preventing unauthorized use of wireless mobile terminal in wireless mobile terminal system
US5940764A (en) PHS terminal disabling system
RU2126603C1 (en) Telecommunication system
US6480096B1 (en) Method and apparatus for theft deterrence and secure data retrieval in a communication device
US7151922B2 (en) Mobile telephone using subscriber card
US20040046638A1 (en) Terminal lock system comprising key device carried by user and terminal-associated device incorporated in terminal device
US20050253554A1 (en) Apparatus for backing up data stored in a portable device
EP1517569B1 (en) System and method for storing and managing personal information
JP2009225475A (en) Cell phone feature
EP1901577B1 (en) Apparatus and method for controlling bluetooth in portable terminal
JP4695040B2 (en) Remote lock system and communication terminal
JPH09215057A (en) Portable terminal and portable terminal information protecting method
US20030181219A1 (en) Method of indicating unauthorized use of a mobile terminal
US6370402B1 (en) Portable radio terminal
JP2003319453A (en) Method for controlling portable communication terminal, portable communication terminal, server device, program and recording medium
JPH08314805A (en) System for preventing portable radio terminal from being illegally used and method for executing the same
US20060281450A1 (en) Methods and apparatuses for safeguarding data
JP4716644B2 (en) Mobile communication system and apparatus constituting the system
JP2001230858A (en) Mobile phone system and mobile phone
EP1860605A1 (en) Electronic money system, information storage medium, and mobile terminal device
JP4323681B2 (en) Communication device, communication device with electronic payment function, and electronic payment method
JP2003264631A (en) Security method for sim card information
JP2007288494A (en) Personal information self-management system, method and program of portable communication terminal such as mobile phone
JP2003018652A (en) Data processing system and program
JP4935120B2 (en) Information processing device, device use function control system, and device use function control program

Legal Events

Date Code Title Description
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 19970513

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20080613

Year of fee payment: 11

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20090613

Year of fee payment: 12

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20100613

Year of fee payment: 13

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20100613

Year of fee payment: 13

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20110613

Year of fee payment: 14

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20110613

Year of fee payment: 14

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20120613

Year of fee payment: 15

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20120613

Year of fee payment: 15

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20130613

Year of fee payment: 16

EXPY Cancellation because of completion of term