WO2001059579A1 - System and method for reflecting personal information on information processing terminal by carrying the personal information - Google Patents
System and method for reflecting personal information on information processing terminal by carrying the personal information Download PDFInfo
- Publication number
- WO2001059579A1 WO2001059579A1 PCT/JP2000/001473 JP0001473W WO0159579A1 WO 2001059579 A1 WO2001059579 A1 WO 2001059579A1 JP 0001473 W JP0001473 W JP 0001473W WO 0159579 A1 WO0159579 A1 WO 0159579A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- personal information
- information
- processing terminal
- information processing
- network
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Definitions
- the present invention uses a portable hardware having a rewritable information recording area to connect to a network.
- the present invention relates to a system for carrying personal information for carrying information, reflecting the personal information on an arbitrary information processing terminal, and thereby enabling a network service for a specific individual to be used on the arbitrary information processing terminal.
- Technology Background In recent years, information processing terminals such as personal computers have become widespread in ordinary households, and the number of Internet users, including the Internet, has been increasing year by year. Also, with the increase in Internet users, the exchange of information such as e-mails and youth groups has also been active.
- Another object of the present invention is to enable the above information to be easily reflected on an information processing terminal to be used.
- a system includes an information processing terminal, and a portable personal information recording device connectable to the information processing terminal.
- the personal information recording device records personal information of a specific user.
- the information processing terminal includes a personal information acquisition unit that acquires personal information from the personal information recording device, and reflects the acquired personal information on the information processing terminal.
- a personal information reflecting unit for setting the information processing terminal in a state desired by the specific user.
- the personal information of the specific user recorded in the personal information recording device is transmitted to the information processing device. It is read and reflected on the information processing device.
- the specific user can set an arbitrary information processing device to a desired state.
- the existing information saving unit that saves the existing personal information; After reflecting the personal information from the information recording device, the return unit that deletes the personal information from the information processing terminal and reflects the previously saved personal information back to the information processing terminal again, The processing terminal is provided. Thereby, the existing personal information is protected, and the security of the personal information in the personal information recording device is also ensured.
- the portable personal information recording device is portable by a specific user, is connectable to an information processing terminal, and has a user information recording area readable from the information processing terminal.
- the user information recording area has a personal information of the specific user for setting the information processing terminal in a state desired by the specific user. Information is recorded.
- the information processing terminal can be connected to a portable personal information recording device that records personal information of a specific user, and when the personal information recording device is connected, A personal information acquisition unit that acquires personal information from the personal information recording device; and a personal information reflection unit that reflects the acquired personal information on the information processing terminal to bring the information processing terminal into a state desired by the specific user. Section.
- a computer program product has a computer program for causing a computer to function as the information processing terminal.
- a network use system includes an information processing terminal having a network use function, and a portable personal information recording device connectable to the information processing terminal.
- Personal information of a specific user is recorded in a portable personal information recording device.
- the personal information is information necessary to connect the information processing terminal to a network so that a specific user can use the information processing terminal and receive a network service for the specific user.
- the information processing terminal includes a personal information acquisition unit that acquires the personal information from the personal information recording device; A personal information reflecting unit for reflecting the personal information acquired by the personal information acquiring unit on the information processing terminal so that the personal information acquiring unit can connect to the network so as to be able to receive the network service for the specific user.
- this system by connecting a personal information recording device carried by a specific user to an arbitrary information processing device having a network connection function, the personal information of the specific user recorded in the personal information recording device is connected. Is read into the information processing device and reflected on the information processing device. As a result, that particular user Using an information processing device, connect to a network so that you can use it (for example, connect to the Internet using your Internet connection account) and receive network services for yourself (for example, You can send and receive e-mail using your e-mail account.
- the personal information includes network connection information necessary for connecting to the network so that the specific user can use the information, and personal communication necessary for receiving the network service for the specific user. Information and are included. Also, if the specific user desires, the personal information described above can also include personalized environment information for customizing the environment in the information processing terminal to the preference of the specific user.
- the existing information saving unit when the information processing terminal has existing personal information, before reflecting the personal information from the personal information recording device, the existing information saving unit that saves the existing personal information; After the personal information from the information recording device is reflected and the use of the network by the personal information is completed, the personal information is deleted from the information processing terminal, and the existing personal information saved in advance is returned to the information processing terminal. Is provided in the information processing terminal. As a result, the existing personal information is protected, and the security of the personal information in the personal information recording device is also ensured.
- the network using method includes a step of preparing a portable personal information recording device that records personal information for network connection described above and an information processing terminal having a network using function. Connecting the information recording device, reading personal information in the personal information recording device into the information recording device, and reflecting the read personal information on the information processing terminal.
- the personal information recording device is portable by a specific user. It is possible to connect to the information processing terminal, and has a user storage area that can be read from the information processing terminal, and the above-mentioned personal information for network connection is recorded in the user storage area. Have been.
- An information processing terminal having a network use function is connectable to the portable personal information recording device described above, and includes a personal information acquisition unit that acquires personal information from the personal information recording device.
- a personal information reflecting unit for reflecting the acquired personal information on the information processing terminal.
- a computer program product has a computer program for causing a computer having a network use function to function as the information processing terminal according to the eighth aspect.
- the information input device can be connected to a portable personal information recording device having a user information recording area, and can be connected to a specific user for the above-described network connection.
- a personal information input unit for inputting personal information; and a personal information transfer unit for transferring the input personal information to a personal information recording device and recording the personal information in a user information storage area.
- the personal information of the user can be recorded in the portable personal information recording device.
- FIG. 1 is a block diagram showing the configuration of portable hardware (interkey) recording personal information for connecting to a network, which is used in a network utilization system according to an embodiment of the present invention.
- Figure 2 is a block diagram showing the structure of personal information recorded on the interkey for connecting to the network.
- FIG. 3 is a block diagram showing an overall configuration of a network using system according to an embodiment of the present invention and a hardware configuration example of an information processing terminal.
- FIG. 4 is a block diagram illustrating an example of a software configuration of the information processing terminal.
- FIG. 5 is a flowchart showing the processing flow of the information processing terminal 21 when the interkey 1 is connected to the information processing terminal 21 and used.
- FIG. 6 is a continuation of the flowchart of FIG.
- Figure 7 is a continuation of the flowchart in Figure 6.
- FIG. 8 is a diagram showing an example of a user interface screen of the information processing terminal 21 when an owner key of the inter key 1 is checked.
- FIG. 9 is a diagram illustrating an example of a user interface screen of the information processing terminal 21 when the existing personal information in the information processing terminal 21 is saved.
- FIG. 10 is a diagram showing an example of a user interface screen of the information processing terminal 21 when the personal information 11 is read from the interkey 1.
- FIG. 11 is a diagram showing an example of a user interface screen of the information processing terminal 21 when connected to a server on a network using personal information 11 from the interkey 1.
- FIG. 12 is a view showing an example of a user interface screen of the information processing terminal 21 when personal information 11 from the interkey 1 is deleted.
- FIG. 13 is a diagram illustrating an example of a user interface screen of the information processing terminal 21 when the personal information setting of the information processing terminal 21 is restored.
- FIG. 14 is a block diagram showing a software configuration of the information input terminal 51 for recording personal information 11 on the interkey 1.
- FIG. 15 is a flowchart showing a processing flow of the inter key rewriting software 53 of the information input terminal 51 when the personal information 11 is recorded in the inter key 1.
- FIG. 16 is a continuation of the flowchart of FIG.
- FIG. 17 is a continuation of the flowchart of FIG.
- FIG. 18 is a diagram showing an example of a user interface screen of the information input terminal 51 when network connection information is being input to the information input terminal 51.
- FIG. 19 is a diagram showing an example of a user interface screen of the information input terminal 51 when individual communication information is being input to the information input terminal 51.
- FIG. 20 is a diagram showing an example of a user interface screen of the information input terminal 51 when a desired item is selected from individual environment information.
- FIG. 21 is a diagram showing an example of a user interface screen of the information input terminal 51 for displaying a list of personal information input or selected.
- BEST MODE FOR CARRYING OUT THE INVENTION FIG. 1 shows a configuration of a portable hardware that records personal information for connecting to a network and is used in a network utilization system according to an embodiment of the present invention.
- each user carries hardware 1 that records personal information for connecting to a network as shown in FIG.
- this portable hardware 1 will be referred to as “interkey”.
- This interkey 1 uses the user's personal information to connect to the network.
- a user information storage area 3 using, for example, a RAM for recording, a firmware recording area 5 using, for example, a ROM in which firmware for processing for input / output of the personal information is programmed, and the execution of the firmware.
- An input / output (I / O) controller 7 for exchanging personal information between the user information storage area 3 and an information processing terminal described later, and the I / O controller 7 is physically connected to an information processing terminal described later.
- An input / output terminal (IZO port, for example, a US-side device side port) 9 for connection is provided.
- the personal information 11 includes network connection information 13 and personal communication information 15. If desired by the user, the personal information 11 can also include personalized environmental information 17.
- the network connection information 13 is personal information necessary for connecting to the network.
- the personal communication information 15 is personal information necessary for connecting to a server that provides a specific service after connecting to the network.
- the individual environment information 17 is personal information indicating settings customized by the user for software and hardware in the information processing terminal. The specific contents of these pieces of information 13 to 17 will be described later.
- the user information storage area 3 contains a user-specific personal code used to check whether the user is a valid owner of the interkey 1.
- the inter-key 1 is an arbitrary information processing terminal 21 (for example, a personal computer, a personal digital assistant (PDA), a mobile phone, or the like, including hardware and software for network connection). Connected). As will be described in detail later, the information processing terminal 21 transmits the personal information 11 1 for connecting to the network recorded in the inter key 1. Read and reflect the personal information 11 on the information processing terminal 21 so that the user of the inter-key 1 can use the information processing terminal 21 to connect to a network and use a desired service. Becomes possible.
- the information processing terminal 21 has the ability to automatically delete the personal information 11 from the information processing terminal 21 after use, or to prevent the personal information 11 from being recorded inside the information processing terminal 21 when used. This ensures the security of personal information 11.
- any operation that can execute the operation according to the principle of the present invention may be used.
- a transmitter that emits radio waves of a specific wavelength (4) A transmitter that emits radio waves of a specific wavelength.
- the recording magnetic material is passed through a hardware capable of reading information on a magnetic or optical recording medium.
- Network Connection Information 1 3 The specific contents of the network connection information 13, individual communication information 15, and individual environmental information 17 included in the personal information 11 shown in Fig. 2 vary slightly depending on the software and hardware used. The following can be mentioned as examples. 1. Network Connection Information 1 3
- a password for accessing the network is A password for accessing the network.
- An e-mail name that is generally recognized as the sender of the e-mail.
- the name to access the mail server is the name to access the mail server.
- the information processing terminal 21 to which the interkey 1 can be connected has a basic environment for connecting to a network and has the necessary functions to read personal information from the interkey 1. Any device can be used.
- the basic environment for connecting to the network refers to an environment that satisfies the conditions necessary for connecting to the network in a hardware manner, and the above-described personal information 11 and its settings are initialized. Then, it is not included in the above basic environment.
- Examples of the information processing terminal 21 include a personal computer, a PDA, a mobile phone, a game computer, a home appliance having a network connection function, a car navigation device, and the like. 3 and 4 show typical hardware and software configuration examples of the information processing terminal 21.
- the information processing terminal 21 has an IZO port (for example, a USB host side port) 23 to which the interkey 1 can be connected, a memory 25, a firmware ROM 27, a CPU 31 and the like.
- Various other devices for network connection Hardware (including hardware).
- the information processing terminal 21 includes software such as an OS 47, network connection software 45, an e-mail software 41, and an Internet web browser 43.
- the interkey 1 is accessed by accessing the appropriate hardware or software in the information processing terminal 21 1 to access the interkey 1.
- a software module hereinafter, referred to as an inter utility 42 having a function for using the interkey 1 is added to the e-mail software 41.
- the interactivity 42 reads the personal information 11 from the interkey 1 and reflects it on the e-mail software 41 in the information processing terminal 21, the Internet browser 43, and the network connection software 45.
- FIGS. 5 to 7 show a processing flow of the information processing terminal 21 when the inter key 1 is connected to the information processing terminal 21 and used.
- FIGS. 8 to 13 show the graphics user interface screen displayed on the display of the information processing terminal 21 at this time.
- the user carries the inter key 1 in which his / her personal information 11 is recorded in advance.
- the inter key 11 itself has a data input function such as a key input device and a pen input device, and the personal information is input and recorded by the inter key 1 alone.
- the interkey 1 by connecting the interkey 1 to a device having a data input function, such as a personal computer, a PDA, and a mobile phone, the hardware and software of the information input device may be used. Use to record personal information in the interkey 1 1 (In the latter case, the flow of recording personal information will be described later.
- the user connects the interkey 1 to any information processing terminal 21 in which his / her personal information 11 is not recorded (FIG. 5, step S1).
- the information processing terminal 21 needs to have a basic environment for connecting to the network in advance.
- the information processing terminal 21 accesses the connected inter key 1 and reads the user's personal information 11 recorded on the inter key 1 into the information processing terminal 21 in the following procedure, and reads the information. 21 Reflect it on the hardware or software in 1 (Fig. 5, S2 and below). As described above, this processing can be performed by appropriate hardware or software in the information processing terminal 21 having a function of using the inter key 1. In this embodiment, as an example, FIG. This is performed mainly by the interface utility 42 added to the e-mail software 41 shown in (1). Hereinafter, the processing will be described step by step.
- the e-mail software 41 is started by the user, and then the inter-key utility 42 added thereto accesses the inter-key 1 connected to the I / O port 23 to access it. Recognize (Fig. 5, S2). Subsequently, if the interkey utility 42 is set in advance to check the owner of the interkey 1 (check whether the user is a valid owner of the interkey 1) (see FIG. 5, Yes in S3;), execute owner check (Fig. 5, S4). In this owner check, the interkey utility 42 displays a screen as shown in Fig. 8 and prompts the user to enter a personal code. The entered personal code and the personal code recorded in interkey 1 are displayed.
- a screen as shown in Fig. 9 is displayed to urge the user to confirm, and the user is asked to confirm on the screen. If OK is clicked, the existing personal information is saved and saved in a predetermined storage area (memory or storage) of the information processing terminal 21 (FIG. 5, S9). On the other hand, if there is no need to protect existing personal information (1 ⁇ 0 in Fig. 5, 38), the existing personal information is destroyed (Fig. 5, S10).
- the interkey utility 42 asks the user whether or not to use the personal environment information 17 of the interkey 1 (FIG. 6, S11). If you answered that you would use 7 (Fig. 6, Yes in S11), read the individual environment information 17 from the interkey 1 and send it to the e-mail software 41 or the Internet Reflect it in the settings of the user 43 or the network connection software 45 or OS 47 (Fig. 6, S12). Further, the interkey utility 42 checks whether the information processing terminal 21 is currently connected to the network (FIG. 6, S13), and if so, disconnects the current connection. It checks whether the user can use it (Fig. 6, S14), and if the user can use the current connection, asks the user whether to use the current connection as it is (Fig. 6 , S 15).
- the interkey utility 42 checks whether or not the network connection information available to the user already exists in the information processing terminal 21 (FIG. 6, S17), and the existing network connection available to the user. If there is information (Yes in S17 in Fig. 6), ask the user whether to use it (Fig. 6, S18). As a result, there is no network connection information that can be used by the user in the information processing terminal 21 (No in S17 in FIG. 6), or even if existing network connection information exists, it must be used. If the user answers (No in FIG.
- the inter-key utility 42 reads the network connection information 15 from the inter-key 1 and reads it from the network connection software of the information processing terminal 21. 45 ( Figure 6, S19). Subsequently, the interkey utility 42 activates the network connection software 45 to connect to the network using the network connection information 13 from the interkey 1 or the existing network connection information that the user has answered to use ( S 20). As described above, a network connection that can be used by the user is established (for example, a connection to the Internet is established by logging in to the DNS server of the Internet provider contracted by the user). Thereafter, the inter-key utility 42 proceeds to step S 21 in FIG.
- the e-mail software 41 or the Internet browser 43 uses the personal communication information 15 from the interkey 1 set in step S21 in FIG. To send and receive contents such as e-mails and HTML files (Fig. 7, S22).
- the interkey utility 42 displays a screen as shown in FIG. 11 to inform the user of the connection from the interkey 1.
- the user can use his / her own network service using his / her personal information.
- the interkey utility 42 asks the user whether or not to restore the personal information setting of the information terminal 21 (S24 in FIG. 7). If the user does not return (No in S24 in FIG. 7), the interkey utility 42 transfers the personal information 11 from the interkey 1 reflected on the information processing terminal 21 to the information processing terminal 21 as it is. Then, the process is terminated with the data remaining in (S28). On the other hand, if the user replies (FIG. 7, 324 at 324), the interkey utility 42 checks whether or not the existing personal information is stored (FIG. 7, S25), and is stored. If not (Fig.
- the personal information 11 from the interkey 1 reflected on the information processing terminal 21 is discarded (Fig. 7, S26), and the process is terminated ( S 28).
- the stored existing personal information Y es in FIG 7, S 25
- the existing personal information is reflected back to the information processing terminal 21 (Fig. 7, S27), Then, the process ends (S28).
- the interkey utility 42 displays a screen as shown in Fig. 12 while discarding the personal information 11 from the interkey 1, and restores the existing personal information that has been saved to the original. During this setting, a screen as shown in Fig. 13 is displayed.
- the user can connect any information processing terminal 21 under the same conditions as the environment that the user normally uses on his own terminal. It can be used to connect to a network. Also, using any information processing terminal 21, a connection is made to the network using the network connection information 13 from the interkey 1, and after connecting to the network, the individual communication information 15 from the interkey 1 is used. And receive services from various servers.
- the information processing terminal 21 already has network connection information available to the user, or is already connected to the network and the user is permitted to use the network connection. In this case, the existing access environment to the network in the information processing terminal 21 can be used without using the network connection information 13 in the interkey 1.
- the terminal 21 uses the OS 47 that cannot use the personal information 11 in the interkey 1, the information in the interkey 1 that depends on the OS 47 is automatically included in the information. It can also be set to not be reflected.
- a pseudo OS environment can be prepared by software or hardware processing.
- the personal information 11 in the interkey 1 be reflected on the information processing terminal 21.
- the existing personal information is It can be temporarily saved in a storage area for protection.
- the personal information 11 from the inter key 1 is deleted from the information processing terminal 21 and evacuated.
- the stored personal information can be set again to return the information processing terminal 21 to its original state.
- the user does not delete the personal information 11 from the interkey 1 at the discretion of the user, so that when the user possesses a plurality of information processing terminals 21, etc.
- the work of setting personal information 11 for connecting to the information processing terminal 21 to the network can be easily performed.
- the personal information 11 from the interkey 1 is recorded in the information processing terminal 21.
- the personal information 1 from the interkey 1 is recorded. It is also possible not to make the information processing terminal 21 record 1. By not allowing the information processing terminal 21 to record the personal information 11 from the interkey 1, a more secure system can be constructed, and the personal information 11 is erased from the information processing terminal 21 at the end of network use. This eliminates the need to perform operations, which leads to reduced labor.
- the hardware or software in the information processing terminal 21 for using the inter key 1 may be initially incorporated in the information processing terminal 21 or may be incorporated later.
- the software for using Interkey 1 is a dedicated software that is independent of other software, even if it is a part built into other software, such as the inter-utility 42 shown in Fig. 4. It may be.
- each user can Personal information for connecting to a network can be easily carried without carrying the device, and a wide variety of information processing terminals can be easily set to be usable by the user. . Therefore, even when you are on a business trip or while traveling, you can operate any information processing terminal using the same familiar procedure as when using your own information processing terminal and use the network. As a result, speedy and convenient information can be transmitted, and the network can be used more effectively than before.
- the interkey 1 is connected to a terminal device having an information input function, such as a personal computer, a PDA, or a mobile phone, and the personal information is input to the interkey 1 using the hardware and software of the information input terminal.
- an information input function such as a personal computer, a PDA, or a mobile phone
- FIG. 14 shows a software configuration of an information input terminal 51 for recording personal information 11 in the inter key 1.
- the information input terminal 51 has an OS 55 and an interkey rewriting software 53 for recording personal information in the interkey 1.
- the hardware configuration of the information input terminal 51 may be the same as that of the information processing terminal 21 shown in FIG. 3, for example.
- the electronic information terminal 21 shown in FIG. Software such as mail software 41, Internet browser 43, and network connection software 45 are also installed in the information input terminal 51, and therefore, the personal information of the user is stored in the information input terminal 5. Often it already exists in 1.
- FIGS. 15 to 17 show the processing flow of the interkey rewriting software 53 of the information input terminal 51 when the personal information 11 is recorded in the inter key 1.
- 18 to 21 show examples of the user interface screen of the interkey rewriting software 53 displayed on the display of the information input terminal 51 at that time.
- the user connects the interkey 1 to the information input terminal 51 (FIG. 15, S31), and activates the interkey rewriting software 53.
- the interkey rewriting software 53 recognizes the interkey 1 and searches for personal information 11 in the interkey 1 (Fig. 15, S32). If the personal information 11 is present in the inter key 1 (Yes in FIG. 15, S 33), the interkey rewriting software 53 determines whether or not the personal information 11 is to be deleted in the inter key 1. Ask the user (Fig. 15, S34). If the user answers that he / she does not delete, the personal information record processing is terminated (Fig. 15, S36). Delete information 1 1
- the rewriting of the interkey is performed.
- the software 53 allows the user to enter the personal code twice for use in the owner check (Fig. 15, S37, S38), and if the personal code entered twice matches (Fig. 15. At S39, Yes;), the personal code is transferred to the inter key 1 and stored in the user information storage area 3 (Fig. 16, S40).
- the interkey rewriting software 53 searches the information input terminal 51 for the existing network connection information and the existing personal communication information (FIG. 16, S41), and searches the existing network connection information or the existing personal information. If separate communication information exists (Yes in S42 in FIG. 16), the user determines whether or not to use the existing information with interkey 1. In question (Fig. 1 6, S 43), if you answer user uses to automatically entry that existing information on the input screen of the I Enter key rewrite soft air 5 3 (FIG. 1 6, S 4 4), and FIG 1 Jump to step S49 of 7.
- the interkey rewriting software 53 displays the screen shown in Fig. 18 and allows the user to connect to the network. Enter the connection information (Fig. 16, S45). After that, if the user inputs that the entered network connection information is correct (for example, by clicking the “Next” button on the screen of FIG. 18) (FIG. 16, Yes in S46), the inter-key Next, the rewriting software 53 displays a screen as shown in Fig. 19, and allows the user to input personalized communication information on this screen (Fig. 16, S47).
- step S49 of FIG. 17 the interkey rewriting software 53 searches the information input terminal 41 for existing individual environmental information.
- the interkey rewriting software 53 displays a screen as shown in FIG.
- the user selects which item in the personal environment information is transferred to the interkey 1 (Fig. 17, S51).
- the interkey rewriting software 5 3 displays a screen as shown in Fig. 21 and displays this screen in steps S45 to S51 List of network connection information, personal communication information and personal environmental information entered or selected by the user (Fig. 17, S53) o
- the interkey rewriting is performed.
- the software 53 transfers all of the input information to the inter key 1 and stores it in the user information storage area 3 (FIG. 17, S55), and ends the information recording process (FIG. 17). 17 and S56).
- the personal information input or selected by the user is recorded in the inter key 1.
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020017012884A KR20010112415A (en) | 2000-02-10 | 2000-03-10 | System and method for reflecting personal information on information processing terminal by carrying the personal information |
AU29418/00A AU2941800A (en) | 2000-02-10 | 2000-03-10 | System and method for reflecting personal information on information processing terminal by carrying the personal information |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2000033944A JP2002163236A (en) | 2000-02-10 | 2000-02-10 | System and method for carrying personal information and reflecting the same in information processing terminal |
JP2000-33944 | 2000-02-10 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001059579A1 true WO2001059579A1 (en) | 2001-08-16 |
Family
ID=18558357
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2000/001473 WO2001059579A1 (en) | 2000-02-10 | 2000-03-10 | System and method for reflecting personal information on information processing terminal by carrying the personal information |
Country Status (4)
Country | Link |
---|---|
JP (1) | JP2002163236A (en) |
KR (1) | KR20010112415A (en) |
AU (1) | AU2941800A (en) |
WO (1) | WO2001059579A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20030035172A (en) * | 2001-10-30 | 2003-05-09 | 주식회사 넥스터 정보기술 | A portable storage device and Method for accessing an incoming and outgoing electronic mail from a remote mail box to a local computer system by using the same device |
US8339880B2 (en) | 2008-02-22 | 2012-12-25 | Hynix Semiconductor Inc. | Circuit for controlling redundancy in semiconductor memory apparatus |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009131130A1 (en) * | 2008-04-23 | 2009-10-29 | 日本電気株式会社 | Information processing system, information processing device, mobile communication device, and method for managing user information used for them |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08202662A (en) * | 1995-01-30 | 1996-08-09 | Toshiba Corp | Information processor |
JPH11175225A (en) * | 1997-12-16 | 1999-07-02 | Canon Inc | Manipulator and manipulation setting method for oa equipment |
-
2000
- 2000-02-10 JP JP2000033944A patent/JP2002163236A/en active Pending
- 2000-03-10 KR KR1020017012884A patent/KR20010112415A/en not_active Application Discontinuation
- 2000-03-10 AU AU29418/00A patent/AU2941800A/en not_active Abandoned
- 2000-03-10 WO PCT/JP2000/001473 patent/WO2001059579A1/en not_active Application Discontinuation
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08202662A (en) * | 1995-01-30 | 1996-08-09 | Toshiba Corp | Information processor |
JPH11175225A (en) * | 1997-12-16 | 1999-07-02 | Canon Inc | Manipulator and manipulation setting method for oa equipment |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20030035172A (en) * | 2001-10-30 | 2003-05-09 | 주식회사 넥스터 정보기술 | A portable storage device and Method for accessing an incoming and outgoing electronic mail from a remote mail box to a local computer system by using the same device |
US8339880B2 (en) | 2008-02-22 | 2012-12-25 | Hynix Semiconductor Inc. | Circuit for controlling redundancy in semiconductor memory apparatus |
Also Published As
Publication number | Publication date |
---|---|
KR20010112415A (en) | 2001-12-20 |
AU2941800A (en) | 2001-08-20 |
JP2002163236A (en) | 2002-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6678727B1 (en) | Automatic and secure system for remote access to electronic mail and the internet | |
JP4763332B2 (en) | Mobile terminal device, contactless card function management system, and contactless card function acquisition system | |
US8463878B2 (en) | Network server for providing scanning functionality to a computer | |
JP3844026B2 (en) | Information communication method, information communication system, communication terminal, and server apparatus | |
JP4675816B2 (en) | Communication terminal and list display method | |
US8364793B2 (en) | Communication terminal, user data transferring system and user data transferring method | |
US8620274B2 (en) | Server, mobile communication system, and data updating method in the same | |
WO2005081117A1 (en) | Portal site providing system, and server, method, and program used for the same | |
JP4592369B2 (en) | Service providing server | |
JP4381446B2 (en) | Electronic money system, information storage medium, and portable terminal device | |
WO2001065766A1 (en) | Method for accessing webpage using telephone number and system for servicing the same | |
JP4268341B2 (en) | Data registration system | |
WO2001059579A1 (en) | System and method for reflecting personal information on information processing terminal by carrying the personal information | |
JP2002291045A (en) | Data management unit for portable terminal, data management system, data management method, and program and recording medium for the method | |
JP2004112478A (en) | Data backup system for mobile terminal | |
JP4778202B2 (en) | Automatic character code recognition, display system, method and program using mobile phone | |
US20070130198A1 (en) | Data management device, data management system and data management method | |
JP5476820B2 (en) | Client terminal and program | |
JP4507033B2 (en) | Device equipment | |
JP3982024B2 (en) | Information communication system, information communication terminal, and information communication method | |
KR100522106B1 (en) | Method for video tape rental service using an internet | |
JP2001306518A (en) | Information-managing method and recording medium | |
JPH11134268A (en) | Message data processor | |
KR100466008B1 (en) | Intelligent advertising method and system based upon web site | |
JP2001331427A (en) | Electronic mail system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020017012884 Country of ref document: KR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 09926304 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 1020017012884 Country of ref document: KR |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
WWR | Wipo information: refused in national office |
Ref document number: 1020017012884 Country of ref document: KR |