WO2005122625A1 - Rfidタグからデータを受信する移動端末及び移動端末の制御ポリシー特定方法 - Google Patents
Rfidタグからデータを受信する移動端末及び移動端末の制御ポリシー特定方法 Download PDFInfo
- Publication number
- WO2005122625A1 WO2005122625A1 PCT/JP2005/010462 JP2005010462W WO2005122625A1 WO 2005122625 A1 WO2005122625 A1 WO 2005122625A1 JP 2005010462 W JP2005010462 W JP 2005010462W WO 2005122625 A1 WO2005122625 A1 WO 2005122625A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- policy
- mobile terminal
- control
- unit
- rfid tag
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/663—Preventing unauthorised calls to a telephone set
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72412—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
Definitions
- Mobile terminal receiving data from RFID tag and mobile terminal control policy specifying method
- the present invention relates to a mobile terminal that receives data from an RFID tag, a method for specifying a control policy of the mobile terminal, and a program.
- the user who owns the mobile terminal can make a call at any place such as a movie theater, a museum, a hospital, or inside a train.
- some places such as hospitals, museums, and trains, prohibit calls from mobile terminals to prevent inconvenience to other people.
- announcements are often made to prohibit calls from mobile terminals, or posters stating that calls are prohibited are often posted. Therefore, whether to actually communicate with the mobile terminal in such a place is left to the decision of the user.
- FIG. 17 shows an example.
- FIG. 17 shows a case where a user who owns a mobile terminal moves between a talkable area and a call prohibited area.
- the “call prohibited area” in FIG. 17 is a closed space.
- the closed space is, for example, the inside of a building.
- the gate of the building is provided with a sensor for detecting a user's entry and exit, and a transmission unit for transmitting a signal to the user's mobile terminal based on a detection signal from the sensor.
- the sensor When the user moves from the talkable area to the talk prohibited area (A), the sensor detects the moving direction of the user, and the transmitter transmits a signal to the mobile terminal based on the detection signal of the sensor. Based on this signal, the mobile terminal controls its own terminal so that it cannot receive calls.
- the sensor detects the moving direction of the user, and the transmitting unit transmits a signal to the mobile terminal based on the detection signal of the sensor. Based on this signal, the mobile terminal Control the end so that it can receive calls.
- Patent Document 1 discloses a system that controls a mobile phone so as to forcibly prohibit a call in a place where the call of the mobile phone is prohibited.
- FIG. 18 is a conceptual diagram of a system according to Patent Document 1.
- a simple base station device 401 installed at the entrance of a building or the like notifies a mobile phone 402 of a user moving into the building of a power-off signal.
- the mobile phone 402 that has received the power-off signal notifies the simple base station device 401 of the telephone number of its own terminal.
- the mobile phone 402 notifies and registers that the power has been turned off from the simple base station apparatus 401 to the position management server 405 in the wireless network 404 via the public base station apparatus 403.
- the incoming operation to the mobile phone 402 is performed with reference to the registered contents of the location management server 405.
- Patent Document 1 Japanese Patent Application Laid-Open No. H11-69412
- the user In the method of FIG. 17, the user must pass through an entrance where a sensor for detecting the user's operation is installed.
- the area where the mobile terminal wants to enforce the control policy is always a closed space partitioned by walls, and a gate must be provided in this closed space.
- users In areas that are not separated by walls, users do not always pass through the gate. In other words, it is difficult to force the mobile terminal to comply with the control policy in an area not partitioned by a wall.
- each of the divided areas must be a closed space, and a gate must be provided in the closed space. It is necessary to install a sensor and a transmitter at each gate. Therefore, the cost for installing gates, sensors, and transmission units installed in each area is increased.
- the system of Patent Document 1 requires a number of devices such as a simple base station device 401, a public base station device 403, a wireless network 404, and a location management server 405. That is, when the system of Patent Document 1 is used, the cost is increased.
- the present invention has solved these problems, and has a mobile terminal and a control of the mobile terminal that can follow a control policy determined in a corresponding area regardless of a user's intention.
- the purpose is to provide a policy identification system.
- Invention 1 provides a mobile terminal that receives data from an RFID (Radio Frequency-IDentification) tag.
- the mobile terminal includes a storage unit, a determination unit, and a control unit.
- the storage unit stores a control policy for controlling the mobile terminal and a policy identifier for identifying the control policy in association with each other.
- the determining means determines whether any of the policy identifiers stored in the storage means is included in the received data.
- the control unit determines the policy identifier based on the control policy associated with the received policy identifier. Control of own terminal.
- the mobile terminal controls itself according to a control policy determined in a specific area. For example, consider a case where the user of this mobile terminal has entered a zone where calling of the mobile terminal is prohibited, such as in a hospital or train. Then, it is assumed that a data policy of the RFID tag, for example, a control policy to “turn off the power of the mobile terminal” and a policy identifier for identifying the control policy are stored. In this case, the mobile terminal receives data from the RFID tag provided in the call prohibition area and searches for a policy identifier. Then, upon specifying the control policy in the data, the mobile terminal turns off the power based on the control policy. Therefore, the user of this mobile terminal can follow a defined control policy in a specific area without violating a defined social order.
- a data policy of the RFID tag for example, a control policy to “turn off the power of the mobile terminal” and a policy identifier for identifying the control policy are stored.
- the mobile terminal receives data from the RFID tag provided in the call prohibition area and
- Invention 2 provides the mobile terminal according to Invention 1, further comprising a transmitting means for transmitting a request for transmitting the policy identifier to the RFID tag at an arbitrary timing when a predetermined event occurs in its own terminal. .
- Invention 3 further includes communication means for communicating with another terminal in the above invention 2.
- the invention 3 provides a mobile terminal characterized in that the transmission means interrupts communication in the communication means and transmits a transmission request for the policy identifier to the RFID tag.
- the mobile terminals When the mobile terminals simultaneously transmit a request for transmitting a policy identifier to the RFID tag, a collision occurs between the transmission requests.
- This mobile terminal transmits a request for transmission of a policy identifier, for example, when there is an incoming call from another terminal, before ringing to notify the user of the incoming call. That is, the transmitting unit interrupts communication of another terminal in the communication unit and transmits a request for transmitting a policy identifier.
- the timing at which the own terminal receives an incoming call from another terminal differs for each mobile terminal. As a result, the probability that the mobile terminal will simultaneously transmit a request for transmission of the policy identifier to the RFID tag is reduced. That is, the timing of transmitting the request for transmitting the policy identifier to the RFID tag of the mobile terminal is shifted. Therefore, it is possible to avoid collision between transmission requests of the policy identifier.
- the invention 4 according to the invention 2 further includes a communication unit for communicating with another terminal.
- An invention 4 provides a mobile terminal characterized in that the transmission means detects the end of communication in the communication means and transmits a transmission request for the policy identifier to the RFID tag.
- the mobile terminals When the mobile terminals simultaneously transmit a request for transmitting a policy identifier to the RFID tag, a collision occurs between the transmission requests.
- the mobile terminal transmits a request for transmission of a policy identifier, for example, when another terminal mail is sent.
- the timing at which the own terminal receives mail from other terminals differs for each mobile terminal.
- the probability that the mobile terminal will simultaneously transmit a request for transmitting a policy identifier to the RFID tag is reduced. That is, the timing of transmitting the transmission request of the policy identifier to the RFID tag of the mobile terminal is shifted. Therefore, it is possible to avoid collision between transmission requests for policy identifiers.
- the invention 5 according to the invention 2 further includes a first detection means for detecting an instruction from a user of the own terminal.
- the transmitting means transmits a request for transmitting the policy identifier to the RFID tag.
- a mobile terminal characterized by communicating with a mobile terminal.
- This mobile terminal is assumed to be, for example, a mobile terminal having a TV function.
- the mobile terminal sends a policy identifier transmission request before the volume of the TV function of the mobile terminal increases. I do.
- the timing at which the user of the mobile terminal presses the volume button differs for each mobile terminal. As a result, the probability that the mobile terminal simultaneously transmits a request for transmitting a policy identifier to the RFID tag is reduced. Therefore, it is possible to avoid collision between transmission requests of the policy identifier.
- the storage means further stores an arbitrary application, and further includes a second detection means for detecting activation of the stored application.
- the transmitting means transmits a request for transmitting the policy identifier to the RFID tag. provide.
- the mobile terminals When the mobile terminals simultaneously transmit a request for transmitting a policy identifier to the RFID tag, a collision occurs between the transmission requests.
- This mobile terminal is assumed to be, for example, a mobile terminal having a music function.
- the mobile terminal When the user of the mobile terminal activates and uses the music function, the mobile terminal transmits a request for transmitting a policy identifier.
- the timing at which a user of a mobile terminal activates an application such as a music function differs for each mobile terminal. As a result, the probability that the mobile terminal will simultaneously transmit a request for transmitting a policy identifier to the RFID tag is reduced. Therefore, it is possible to avoid collision between transmission requests for policy identifiers.
- the storage means determines a current policy identifier for identifying a current control policy of the terminal itself, and the determining means sets the current policy identifier every time data is received. It is determined whether any of the policy identifiers stored in the storage means is included in the newly received data. When the determining unit determines that any of the stored policy identifiers is included in the newly received data, the determination unit determines the newly received policy identifier and the current policy identifier. And comparing means for comparing. Further, the newly received policy identifier and the current policy If the identifier is different from the one identifier, the storage means stores the newly received policy identifier as a current policy identifier.
- the mobile terminal When the mobile terminal receives a policy identifier different from the current control policy of the terminal, the mobile terminal controls the terminal based on the control policy indicated by the newly received policy identifier. That is, the mobile terminal can always follow the latest control policy.
- Invention 8 provides a method for specifying an RFID tag control policy of a mobile terminal that receives data from an RFID tag. Specifically, it includes the following steps.
- ⁇ storing a control policy for controlling the mobile terminal and a policy identifier for identifying the control policy in association with each other.
- a step of determining whether any of the stored policy identifiers is included in the received data is a step of determining whether any of the stored policy identifiers is included in the received data.
- control of the own terminal is performed based on a control policy associated with the received policy identifier. Step.
- the mobile terminal controls its own terminal according to a control policy determined in a specific area. For example, consider a case in which a user of this mobile terminal has entered an area where calling of the mobile terminal is prohibited, such as in a hospital or train. Then, it is assumed that a data policy of the RFID tag, for example, a control policy for “turning off the power of the mobile terminal” and a policy identifier for identifying the control policy are stored. In this case, the mobile terminal receives data from the RFID tag provided in the call prohibition area and searches for a policy identifier. When the mobile terminal specifies the control policy in the data, the mobile terminal turns off the power based on the control policy. Therefore, the user of this mobile terminal can follow the defined control policy in a specific area without violating the defined social order.
- a data policy of the RFID tag for example, a control policy for “turning off the power of the mobile terminal” and a policy identifier for identifying the control policy are stored.
- the mobile terminal receives data from the RFID tag provided in the call
- Invention 9 provides a control policy identification system including a plurality of RFID tags and a mobile terminal that receives the plurality of RFID tag force data.
- the mobile terminal according to the present system includes a storage unit, a determination unit, and a control unit.
- the storage unit stores a control policy for controlling the mobile terminal and a policy identifier for identifying the control policy in association with each other.
- the determination means determines whether any of the policy identifiers stored in the storage means is included in the received data.
- the control means when the determining means determines that any of the stored policy identifiers is included in the received data, the terminal based on the control policy associated with the received policy identifier. Is controlled.
- each of the plurality of RFID tags according to the present system uses a generating unit that generates a slot of each RFID tag based on unique information for identifying each RFID tag, and the slot generated by the generating unit.
- the RFID tag generates a timing for transmitting the policy identifier to the mobile terminal.
- the policy identifier transmitted by the RFID tag to the mobile terminal is time-divisionally transmitted based on the slot generated by each RFID tag.
- the mobile terminal receives the sequentially transmitted policy identifiers. Thereby, each policy identifier transmitted from a plurality of RFID tags does not overlap. Therefore, it is possible to avoid collision between policy identifiers transmitted from a plurality of RFID tags.
- the mobile terminal further includes a transmission unit configured to transmit a transmission request for the policy identifier to the RFID tag. Then, the determining means, when receiving the policy identifier from at least one of the plurality of RFID tags, stops transmitting the policy identifier transmission request by the transmitting means. Provide a policy identification system.
- Invention 11 provides a control policy specifying program executed by a computer mounted on a mobile terminal that receives data from an RFID tag. Specifically, it includes the following means. A means for storing a control policy for controlling the mobile terminal and a policy identifier for identifying the control policy in association with each other.
- a determination means for determining whether any of the policy identifiers stored in the storage means is included in the received data.
- determining means determines that any of the stored policy identifiers is included in the received data, the determination is made based on the control policy associated with the received policy identifier.
- Control means for controlling the terminal If the determining means determines that any of the stored policy identifiers is included in the received data, the determination is made based on the control policy associated with the received policy identifier. Control means for controlling the terminal.
- the mobile terminal controls its own terminal according to a control policy determined in a specific area. For example, consider a case in which the user of this mobile terminal enters a zone where calling by the mobile terminal is prohibited, such as in a hospital or train. Then, it is assumed that a data policy of the RFID tag, for example, a control policy for “turning off the power of the mobile terminal” and a policy identifier for identifying the control policy are stored. In this case, the mobile terminal receives data from the RFID tag provided in the call prohibition area and searches for a policy identifier. Then, upon specifying the control policy in the data, the mobile terminal turns off the power based on the control policy. Therefore, the user of this mobile terminal can follow a prescribed control policy in a specific area without violating a prescribed social order.
- a data policy of the RFID tag for example, a control policy for “turning off the power of the mobile terminal” and a policy identifier for identifying the control policy are stored.
- the mobile terminal receives data from the RFID tag provided in
- the mobile terminal can follow the control policy in the relevant area.
- FIG. 1 is a configuration diagram of a control policy specifying system according to a first embodiment.
- FIG. 2 is an explanatory diagram of policy code information of an RFID tag.
- FIG. 3 is a functional configuration diagram of a mobile terminal according to the first embodiment.
- FIG. 4 is a conceptual diagram of policy information stored in a storage unit according to the first embodiment.
- FIG. 5 is an operation flowchart of the control policy specifying system according to the first embodiment.
- FIG. 6 is a configuration diagram of a control policy specifying system according to the first embodiment.
- FIG. 7 is an operation flowchart of the control policy specifying system according to the first embodiment.
- FIG. 8 is a configuration diagram of a control policy identification system according to a second embodiment.
- FIG. 9 is a functional configuration diagram of a mobile terminal according to the second embodiment.
- FIG. 10 is a conceptual diagram of policy information stored in a storage unit according to the second embodiment.
- FIG. 11 is an operation flowchart of a control policy identification system according to a second embodiment.
- FIG. 12 is a configuration diagram of a control policy specifying system according to a third embodiment.
- FIG. 13 is a timing chart showing the operation of the mobile terminal and a plurality of RFID tags according to the third embodiment.
- FIG. 14 is a configuration diagram of a control policy specifying system according to a fourth embodiment.
- FIG. 15 is a conceptual diagram of policy information stored in a storage unit according to the fourth embodiment.
- FIG. 16 is an operation flowchart of the control policy specifying system according to the fourth embodiment.
- FIG. 17 shows an example of a conventional method for controlling a mobile terminal.
- FIG. 18 is a system configuration diagram using a mobile terminal and an RFID tag according to Patent Document 1.
- FIG. 1 is a configuration diagram of a control policy specifying system according to the first embodiment of the present invention.
- the control policy is a control signal for forcibly controlling a mobile terminal based on a rule determined in an arbitrary area.
- the first embodiment exemplifies a system in which, for example, a mobile terminal 3a, b in a train 2 enforces a control policy in the train 2.
- the control policy identification system 1 in FIG. 1 includes a poster 4 in a train 2 and an RFID tag 5a. Poster 4 shows a control policy for forcing manners in train 2 on mobile terminals 3a and 3b in train 2, and has RFID tag 5a attached thereto.
- the RFID tag 5a stores a policy code including a policy ID for specifying a control policy in the train 2, and transmits the policy code to the mobile terminals 3a and 3b.
- the RFID tags 5a and 5b according to the present embodiment have no internal power supply, convert a carrier wave transmitted from an external device such as the mobile terminal 3a or b into electric power, and use the converted carrier wave for the mobile terminal.
- Provide a policy code That is, in the present embodiment, it is assumed that the RFID tags 5a and 5b are passive tags.
- FIG. 2 is an explanatory diagram of policy code information stored in the RFID tags 5a and 5b.
- the policy codes stored in the RFID tags 5a and 5b include the policy ID and the corresponding It includes a device code and a sequence number.
- the policy ID identifies the control policy in the area where the RFID tags 5a and 5b are located.
- the corresponding device code indicates the device for which the control policy is enforced.
- the sequence number is unique information for identifying the RFID tags 5a and 5b.
- the mobile terminals 3a and 3b Upon receiving the policy code from the RFID tag 5a, the mobile terminals 3a and 3b specify a control policy in the train 2 based on the policy code, and control their own terminals based on the specified control policy.
- the RFID tag 5 is not limited to the force that is assumed to be attached to the poster 4.
- the RFID tag 5 may be installed anywhere as long as the policy ID corresponding to the control policy in the train 2 can be transmitted to the mobile terminals 3a and 3b in the train 2.
- FIG. 3 is a functional configuration diagram of the mobile terminal 3a according to the first embodiment of the present invention.
- the mobile terminal 3a according to the present embodiment has a function as a reader that receives data from the RFID tags 5a and 5b.
- the mobile terminal 3a in FIG. 3 includes a reception unit 31, a transmission unit 32, a storage unit 33, a determination unit 34, a comparison unit 35, a control unit 36, and a communication unit 37.
- each function will be described in detail.
- the receiving unit 31 receives data including the policy code from the RFID tags 5a and 5b.
- the transmitting unit 32 transmits a request for transmitting a policy code including a policy ID to the RFID tags 5a and 5b at an arbitrary timing when a predetermined event occurs in the own terminal. Then, the transmission unit 32 transmits a carrier for supplying power to the RFID tags 5a and 5b. "The predetermined event of the own terminal will be described later.
- the storage unit 33 stores policy information.
- the policy information stores a control policy for controlling the mobile terminal and a policy ID for identifying the control policy as one record.
- FIG. 4 is a conceptual diagram of the policy information stored in the storage unit 33. Specifically, the storage unit 33 stores the policy ID “01h” and the control policy “turn off the power” in association with each other. The storage unit 33 stores the policy ID “02h” and the control policy “power on” in association with each other. The storage unit 33 stores the policy ID “03h” and the control policy “reject incoming call” in association with each other. The storage unit 33 stores the policy ID “04h” and the control policy “allow incoming” in association with each other.
- the correspondence information between the policy ID and the control policy stored in the storage unit 33 is common to other mobile terminals and the RFID tags 5a and 5b.
- the storage unit 33 cannot rewrite the correspondence information between the policy ID and the control policy. If the correspondence information between the policy ID and the control policy stored in the storage unit 33 is rewritten, the correspondence information between the policy ID and the control policy may be different for each mobile terminal. Then, even if each mobile terminal receives the same policy code, different control is performed for each mobile terminal because the control policy corresponding to the policy ID differs for each mobile terminal. Therefore, there are cases where mobile terminals cannot be enforced by a unified control policy.
- the mobile terminal 3a can acquire the correspondence information from the external device by using an arbitrary method.
- the arbitrary method includes, for example, a method using an SD card.
- Mobile terminal 3 a user insert the SD card that stores correspondence information between the new policy ID and the control policy to the mobile terminal 3a, the storage unit 33 of the mobile terminal 3a new correspondence information in the SD card May be read and added.
- the storage unit 33 of the mobile terminal 3a may download new corresponding information from a server (not shown) constructing a network with the mobile terminal 3a.
- a server not shown
- the storage unit 33 stores the current control policy of the terminal itself (hereinafter, referred to as the current control policy) in a distinguishable manner. For example, as shown in FIG. 4, the storage unit 33 further stores a flag for identifying the current control policy. The flag indicates which of the policy information is a record of the current control policy. The position of the flag changes with the change of the current control policy. (2-4) Judgment Unit
- the determination unit 34 determines whether any of the policy identifiers stored in the storage unit 33 is included in the data received from the RFID tags 5a and 5b. In other words, the determination unit 34 searches the data received from the RFID tags 5a and 5b for a policy identifier that matches the policy identifier stored in the storage unit 33. For example, it is assumed that the data received by the receiving unit 31 has the policy ID “01h” in the policy code. The determination unit 34 searches whether any of the policy IDs “01h”, “02h”, “03h”, and “04h” stored in the storage unit 33 is included in the received data. In the present embodiment, the policy ID “01h” stored in the storage unit 33 matches the policy ID “01h” in the data received by the reception unit 31.
- the determination unit 34 determines that the policy identifier “Olh” stored in the storage unit 33 is included in the data received by the reception unit 31. Then, the determination unit 34 extracts a control policy corresponding to the policy ID “01h” in the data received by the reception unit 31.
- the determining unit 34 determines whether or not any of the policy IDs stored in the storage unit 33 is included in the newly received data. .
- the comparing unit 35 determines whether the newly received policy ID and the current policy stored in the storage unit 33 are stored.
- the control policy is compared with the policy ID of the control policy (hereinafter referred to as the current policy ID), and it is determined whether or not they match. For example, it is assumed that the data newly received by the receiving unit 31 has the policy ID “02h” in the policy code, and the determining unit 34 specifies this.
- the comparison unit 35 extracts the current policy ID “Olh” from the policy information stored in the storage unit 33. Then, the comparing unit 35 compares the newly received policy ID “02h” with the current policy ID “01h”.
- the comparison unit 35 determines that “Olh” and “02h” do not match, and transmits the determination result to the control unit 36 and the storage unit 33.
- the storage unit 33 updates the current policy ID from “Olh” to “02h” based on the determination result from the comparison unit 35. For example, the storage unit 33 changes the position of the flag.
- the control unit 36 controls its own terminal based on the control policy associated with the policy ID received by the reception unit 31. For example, if the received policy ID is “Olh”, the control unit 36 turns off the power of the terminal itself. If the received policy ID is “02h”, the control unit 36 turns on the power of the terminal itself. When the received policy ID is “03h”, the control unit 36 sets the own terminal in a state of rejection of incoming call. If the received policy ID is “04h”, the control unit 36 sets the own terminal to be able to receive a call.
- the control unit 36 controls its own terminal based on the updated current control policy. For example, when the current policy ID changes from “Olh” to “02h”, the control unit 36 extracts the control policy indicated by the new policy ID “02h” from the policy information in the storage unit 33. Then, the control unit 36 controls its own terminal in accordance with the control policy indicated by the policy ID “02h” “power is set to ⁇ N”. Thereby, the mobile terminal 3a can always follow the latest policy.
- the determination unit 34 determines that any of the policy IDs in the storage unit 33 is not included in the received data, and when the comparison unit 35 receives the received policy ID and the current policy ID, If it is determined that the values match, the control unit 36 continues the control according to the current control policy.
- the communication unit 37 performs communication with another communication terminal.
- the communication unit 37 is a telephone, an application, a mailer, a browser, or the like.
- “Other communication terminals” include mobile phones, PDAs, fixed phones, faxes, PDAs, PCs, etc.
- the other communication terminal is a device that can communicate with the mobile terminal 3a.
- the “predetermined event” in the mobile terminal 3a includes the following four, for example.
- the communication unit 37 corresponds to, for example, a telephone and an Internet browser.
- "Suspend communication '' means that a connection for communication has already been established. Means to interrupt.
- the communication unit 37 is a telephone application.
- a mobile terminal 3a receives an incoming call from another communication terminal.
- a connection has been established between the mobile terminal 3a and another communication terminal.
- the transmission unit 32 interrupts the communication of the communication unit 37 and issues a request to transmit a policy code.
- the determining unit 34 specifies a policy ID from the data, and the control unit 36 controls according to the policy ID. For example, it is assumed that the control policy power indicated by the policy ID in this data is “turn off the power”. Then, the control unit 36 turns off the power of the own terminal. Therefore, the connection between the mobile terminal 3a and another communication terminal is disconnected.
- the communication unit 37 is an Internet browser. It is assumed that the communication unit 37 of the mobile terminal 3a accesses, for example, a web page site of the PC. At this point, the connection between the mobile terminal 3a and the PC has been established.
- the transmission unit 32 suspends this, and transmits a policy code transmission request to the RFID tags 5a and 5b. That is, before the communication unit 37 accesses the site of the new web page, the transmission unit 32 interrupts the communication of the communication unit 37 and transmits a policy code transmission request to the RFID tags 5a and 5b.
- the timing at which the mobile terminal 3a suspends communication with another communication terminal depends on the mobile terminal 3a.
- the communication unit 37 in this case corresponds to, for example, a mailer.
- End communication means that the end of the communication is detected in the state where the connection for communication has already been established. For example, when the communication section 37 of the mobile terminal 3a receives the mail, the transmission section 32 of the mobile terminal 3a detects that the communication section 37 has received the mail, and sends a policy code transmission request to the RFID tag 5a, Send to b.
- the timing of receiving a mail differs for each mobile terminal 3a. Therefore, when there are multiple mobile terminals in an area where the control policies are unified, the probability that multiple mobile terminals will simultaneously request the RFID tags 5a and 5b to transmit a policy code transmission request is reduced. That is, the timing of transmitting the policy code transmission request to the RFID tags 5a and 5b of the mobile terminal 3a is shifted. Therefore, it is possible to avoid collision between policy code transmission requests.
- Mobile terminal 3a is provided with a call transmission button, a mail transmission button, a camera function shutter button, and the like. "Instruction from user” corresponds to a case where these buttons are pressed by a user.
- Mobile terminal 3a includes a first detection unit (not shown) that detects that these buttons have been pressed by the user. When the first detection unit detects that the button is pressed by the user, the transmission unit 32 suspends the start of the operation of the function corresponding to each button, and transmits a policy code transmission request to the RFID tags 5a and 5b. I do. For example, assume that the mobile terminal 3a has already activated the TV function.
- the transmission unit 32 suspends the operation of increasing the volume of the TV function, and transmits a policy code transmission request to the RFID tags 5a and 5b.
- the control policy indicated by the policy ID in the data of the RFID tags 5a and 5b is "mute"
- the mobile terminal 3a controls its own terminal so that no sound is output even when the volume button is pressed.
- the timing at which the user of the mobile terminal 3a presses each button differs depending on each mobile terminal. For this reason, the probability that the mobile terminal will simultaneously transmit a policy code transmission request to the RFID tags 5a and 5b is reduced. Therefore, it is possible to avoid collision between policy code transmission requests.
- the storage unit 33 of the mobile terminal 3a further stores applications such as a camera function, a TV function, a music function, and an Internet function.
- the mobile terminal 3a includes a second detection unit (see FIG. 1) that detects that the application has been selected and activated by a user on a menu screen or the like. Not shown).
- the transmission unit 32 transmits a policy code transmission request to the RFID tags 5a and 5b.
- the control policy indicated by the policy ID in the data of the RFID tags 5a and 5b is “turn off music playback.” In this case, the mobile terminal 3a controls its own terminal so that it cannot play back.
- the timing at which the user of the mobile terminal 3a starts the application differs depending on each mobile terminal. As a result, the probability that the mobile terminal will simultaneously transmit a policy code transmission request to the RFID tags 5a and 5b is reduced. Therefore, it is possible to avoid collision between policy code transmission requests.
- the transmitting unit 32 may transmit a transmission request to the RFID tag at an arbitrary timing when a predetermined event occurs in the own terminal.
- FIG. 5 is an operation flowchart of the control policy identification system 1 using the mobile terminal 3a according to the first embodiment.
- a case where the user of the mobile terminal 3a gets on the train 2 that prompts the user to turn off the power of the mobile terminal in the car will be described as an example. It is assumed that when the user of the mobile terminal 3a gets on the train 2, the power of the mobile terminal 3a is on.
- the communication unit 37 of the mobile terminal 3a detects an incoming call (# 2). Then, the transmission unit 32 of the mobile terminal 3a interrupts the process of notifying the user of the incoming call by the communication unit 37, and transmits a policy code transmission request to the RFID tag 5a in the train 2 (# 3).
- the RFID tag 5a that has received the policy code transmission request from the mobile terminal 3a transmits the policy code (# 4). Where poly It is assumed that the sea code includes a policy ID “01h” for identifying a control policy in the train 2.
- the receiving unit 31 of the mobile terminal 3a receives this (# 5).
- the determination unit 34 of the mobile terminal 3a searches the policy code received by the reception unit 31 for a policy ID that matches the policy ID in the policy information stored in the storage unit 33. (# 7).
- the policy ID “01h” in the received policy code matches the policy ID “01h” in the policy information of the storage unit 33. Accordingly, the determination unit 34 of the mobile terminal 3a extracts the control policy “turn off the power” indicated by the policy ID “01h” as the central part of the policy information of the storage unit 33, and transmits the control policy to the control unit 36.
- the control unit 36 of the mobile terminal 3a turns off the power of its own terminal based on the control policy “turn off power” extracted from the storage unit 33 (# 8). Then, the power of the communication unit 37 of the mobile terminal 3a is also turned off, so that the connection between the mobile terminal 3a and the communication terminal is disconnected.
- the communication terminal receives from the base station that the mobile terminal 3a is in a state of being unable to talk (# 9).
- FIG. 6 is a schematic diagram of the control policy specifying system according to the first embodiment of the present invention, showing a case where the mobile terminal 3a has moved out of the train 2.
- FIG. 7 is an operation flowchart of the control policy identification system 1 shown in FIG.
- the transmission unit 32 of the mobile terminal 3a transmits a policy code transmission request every time a predetermined time elapses (# 11) (# 12).
- the RFID tag 5b that has received the policy code transmission request from the mobile terminal 3a includes the policy ID “02h” that identifies the control policy of “turn on the power”.
- the policy code is transmitted to the mobile terminal 3a (# 13).
- the receiving unit 31 of the mobile terminal 3a receives this (# 14).
- the determination unit 34 of the mobile terminal searches whether or not the policy code received by the reception unit 31 has a policy ID that matches the policy ID in the policy information stored in the storage unit 33 ( # 15).
- the received policy code has the policy ID “02h”, and matches the policy ID “02h” in the policy information of the storage unit 33. Accordingly, the determination unit 34 of the mobile terminal 3a extracts the control policy “power on” indicated by the policy ID “02h” from the policy information in the storage unit 33, and transmits the control policy to the comparison unit 36.
- the comparing unit 35 of the mobile terminal 3a compares the current policy ID stored in the storage unit 33 with the extracted policy ID "02h" (# 16). Here, since the power of the mobile terminal 3a has been turned off, the current policy ID is "Olh”. Therefore, the comparing unit 35 determines that the extracted policy ID “02h” is different from the current policy ID “01h”. The comparison unit 35 transmits the comparison result to the storage unit 33 and the control unit 36. The storage unit 33 changes the position of the flag indicating the current policy ID from the current policy ID “01h” to “02h” based on the comparison result.
- the control unit 36 of the mobile terminal 3a turns on the power of its own terminal based on the control policy “turn on power” corresponding to the policy ID “02h” (# 17). Therefore, a connection between the mobile terminal 3a and the communication terminal is established. As a result, the mobile terminal 3a can communicate with the communication terminal (# 18, # 19).
- each of the RFID tags 5a and 5b stores a policy ID for identifying a control policy of “turn off the power” and “turn on the power”.
- the force S is not limited to this. Les ,.
- each of the RFID tags 5a and 5b may store a policy ID for identifying a control policy of “set to silent mode” and “set to silent mode”.
- the storage unit 33 of the mobile terminal 3a stores a policy ID corresponding to the control policy "change to silent mode” and "change to silent mode”.
- the ring tone does not need to be output in the train 2.
- the mobile terminals 3a and 3b automatically operate according to a control policy determined in a specific area. Control the terminal. Therefore, the user of each of the mobile terminals 3a and 3b can follow the determined control policy in a specific area without violating the determined social order. Further, the mobile terminals 3a and 3b transmit a request for transmitting a policy code including a policy ID to the RFID tags 5a and 5b at an arbitrary timing when a predetermined event occurs in the mobile terminals 3a and 3b. The timing at which a predetermined event occurs in its own terminal differs for each mobile terminal. Therefore, the probability that the mobile terminals 3a and b simultaneously receive the policy codes including the policy IDs of the RFID tags 5a and 5b is reduced. That is, the timing at which the mobile terminals 3a and 3b transmit a policy code transmission request to the RFID tags 5a and b is lost. Therefore, collision between policy code transmission requests can be avoided.
- the mobile terminal 3a of the present embodiment When the mobile terminal 3a of the present embodiment is located in an area without an RFID tag, for example, the following operation is performed. In an area where no RFID tag is installed, even if the transmitting unit 32 of the mobile terminal 3a transmits a request for transmitting a policy code including a policy ID, the receiving unit 31 cannot acquire the policy code. Therefore, the receiving unit 31 of the mobile terminal 3a waits for a predetermined period after transmitting the policy code transmission request. If the receiving unit 31 does not receive the policy code within a predetermined period, it is determined that the RFID tag is not near the own terminal. Then, the storage unit 33 of the mobile terminal 3a deletes the flag indicating the current control policy and the current policy ID, and the control unit 36 controls to accept the instruction from the user. Thereby, the mobile terminal 3a performs control such as turning on the power, for example, based on the instruction from the user.
- FIG. 8 is a configuration diagram of the control policy specifying system according to the second embodiment of the present invention.
- the second embodiment exemplifies a system in which mobile terminals 103a to 103d with a camera function in a concert hall 102 are forced to prohibit shooting.
- the control policy specifying system 101 of FIG. 8 includes posters 104a to 104c in a concert hall 102 and RFID tags 105a to 105c.
- the posters 104a to 104c post control policies for enforcing manners in the concert hall 102 on mobile terminals 103a to 103d in the concert hall 102, and have RFID tags 105a to 105c attached thereto.
- the posters 104a-c show the manners in the concert venue 102
- the RFID tags 105a to 105c store a policy code including a policy ID “05h” for specifying the control policy “turn off the camera function” in the concert hall 102.
- the RFID tags 105a to 105c transmit a policy code to each of the mobile terminals 103a to (!.
- the RFID tags 105a to 105c according to the present embodiment have a power supply therein and voluntarily generate a policy code.
- the case where the active tag is an active tag that transmits the same is taken as an example.
- the types of information of the policy codes stored in the RFID tags 105a to 105c are the same as those in FIG. .
- the mobile terminals 103a-d Upon receiving the policy codes from the RFID tags 105a-c, the mobile terminals 103a-d specify the control policy in the concert venue 102 based on the policy codes, and control their own terminals based on the specified control policy. Do.
- the RFID tags 105a to 105c are attached to the posters 104a to 104c, but the present invention is not limited to this.
- the RFID tags 105a to 105c can be installed in any place where the policy ID corresponding to the control policy in the concert hall 102 can be transmitted to the mobile terminals 103a to 103d in the concert hall 102.
- FIG. 9 is a functional configuration diagram of mobile terminal 103a according to the second embodiment of the present invention.
- the mobile terminal 103a according to the present embodiment has a functional configuration that does not include a transmission unit in the function of the mobile terminal 3a according to the first embodiment, that is, the mobile terminals 103a to 103d according to the second embodiment of the present invention , A reception unit 131, a storage unit 133, a determination unit 134, a comparison unit 135, a control unit 136, and a communication unit 137.
- the receiving unit 131 receives data including a policy code from the RFID tags 105a to 105c.
- the storage unit 133 stores policy information.
- the policy information stores a control policy for controlling the mobile terminal and a policy ID for identifying the control policy as one record.
- FIG. 10 is a conceptual diagram of the policy information stored in the storage unit 133.
- the storage unit 133 in FIG. 10 further stores a policy ID “05h” and a control policy “turn off the camera function” in association with the policy information stored in the storage unit 33 of the first embodiment. And ing.
- the storage unit 133 stores the current control policy in a distinguishable manner. For example, as shown in FIG. 10, the storage unit 133 further stores a flag for identifying the current control policy. The flag indicates which of the policy information is the record of the current control policy. The position of the flag changes with the change of the current control policy.
- the determining unit 134 determines whether any of the policy identifiers stored in the storage unit 133 is an RFID tag.
- the determining unit 134 determines whether any of the policy IDs stored in the storage unit 133 is included in the newly received data. Then, the determination unit 134 transmits the determination result to the comparison unit 135 and the control unit 136.
- comparing section 135 stores the newly received policy ID and stored in storage section 133.
- the current policy ID is compared with the current policy ID to determine whether they match.
- the comparison unit 135 transmits the comparison result to the control unit 136 and the storage unit 133. For example, when the comparison result does not match, the storage unit 133 changes the position of the flag indicating the current policy ID.
- Control section 136 controls its own terminal based on the policy ID received by receiving section 131. Also, every time the control policy indicated by the current policy ID is changed, the control unit 136 controls its own terminal based on the updated current control policy.
- Communication unit 137 performs communication with another communication terminal.
- FIG. 11 is an operation flowchart of the control policy identification system using the mobile terminals 103a and 103b according to the second embodiment.
- the operation of the mobile terminals 103a, b among the mobile terminals 103a-d and the RFID tags 105a, b among the RFID tags 105a-c will be described.
- the user's mobile terminals 103a and 103b are in a power-on state.
- the user 104 of the mobile terminal 103a has entered the concert hall 102 on which the posters 104a and 104b with the RFID tags 105a and 105b attached are attached.
- concert In the field 102 it is assumed that the RFID tag 105a, b which is an active tag always transmits a policy code including a policy ID “05h” for identifying a power control policy “turn off the camera function” (# 101, 102). ).
- the receiving unit 131 of the mobile terminal 103a receives the policy code constantly transmitted by the RFID tag 105a (# 103).
- the determination unit 134 of the mobile terminal 103a determines whether or not the policy code received by the reception unit 131 includes a policy ID that matches the policy ID in the policy information stored in the storage unit 133. (# 104).
- the policy ID “05h” in the received policy code matches the policy ID “05h” in the policy information in the storage unit 133. Therefore, the determination unit 134 of the mobile terminal 103a extracts the control policy “turn off the camera function” indicated by the policy ID “05h” from the policy information in the storage unit 133, and transmits the control policy to the control unit 136.
- the control unit 136 of the mobile terminal 103a turns off the camera function based on the control policy "turn off the camera function” that also extracts the internal force of the storage unit 133 (# 105).
- "To turn off the camera function” means, for example, that the control unit 136 of the mobile terminal 103a does not start the camera function application even when the user presses a button for starting the camera function application. .
- the control unit 136 may close the camera function application.
- the control unit 136 may control the mobile terminal 103a in which the camera function has already been activated, such that the mobile terminal 103a cannot take a picture even if the user presses the shutter of the camera.
- the determination unit 134 of the mobile terminal 103a determines whether the policy code received by the reception unit 131 includes a policy ID that matches the policy ID in the policy information stored in the storage unit 133. (# 107).
- the policy ID “05h” in the received policy code matches the policy ID “05h” in the policy information in the storage unit 133. Therefore, the determination unit 134 of the mobile terminal 103a extracts the policy ID “05h” and the corresponding control policy “turn off the camera function” from the policy information in the storage unit 133, and sends the extracted policy ID to the comparison unit 136. Send.
- the comparison unit 135 of the mobile terminal 103a stores the current policy ID stored in the storage unit 133, The extracted policy ID is compared with "05h"(# 108). At this time, since the mobile terminal 103a has the camera function turned off, the current policy ID is "05h”. Therefore, the comparing unit 135 determines that the extracted policy ID “05h” is the same as the current policy ID “05h”. The comparing unit 135 transmits a comparison result indicating that they are the same to the control unit 136. Upon receiving the comparison result, control section 136 maintains the state of mobile terminal 103a.
- the receiving unit 131 of the mobile terminal 103b receives the policy code constantly transmitted by the RFID tag 105a (# 109).
- the determination unit 134 of the mobile terminal 103b determines whether the policy code received by the reception unit 131 includes a policy ID that matches the policy ID in the policy information stored in the storage unit 133. (# 110). The policy ID “05h” in the received policy code matches the policy ID “05h” in the policy information in the storage unit 133. Therefore, the determination unit 134 of the mobile terminal 103b extracts the control policy “turn off the camera function” indicated by the policy ID “05h” from the policy information in the storage unit 133, and transmits the control policy to the control unit 136.
- the control unit 136 of the mobile terminal 103b turns off the camera function based on the control policy "turn off the camera function" extracted from the storage unit 133 (# 111).
- "To turn off the camera function” means, for example, that the control unit 136 of the mobile terminal 103b does not start the camera function application even if the user presses a button for starting the camera function application. .
- the control unit 136 may close the camera function application.
- the control unit 136 may control the mobile terminal 103b in which the camera function has already been activated so that even if the user presses the shutter of the camera, the mobile terminal 103b cannot shoot.
- receiving section 131 of mobile terminal 103b has received the policy code constantly transmitted by RFID tag 105a (# 112).
- the determination unit 134 of the mobile terminal 103b determines whether there is a policy ID in the policy code received by the reception unit 131 that matches the policy ID in the policy information stored in the storage unit 133. (# 113).
- the storage unit 1 stores the policy ID “05h” in the received policy code. Matches with policy ID "05h” in 33 policy information. Accordingly, the determination unit 134 of the mobile terminal 103b extracts the policy ID “05h” and the corresponding control policy “turn off the camera function” from the policy information in the storage unit 133, and Send to 136.
- the comparison unit 135 of the mobile terminal 103b compares the current policy ID stored in the storage unit 133 with the extracted policy ID "05h" (# 114). At this time, since the mobile terminal 103b has the camera function turned off, the current policy ID is "05h”. Therefore, the comparing unit 135 determines that the extracted policy ID child “05h” is the same as the current policy ID “05h”. The comparing unit 135 transmits a comparison result indicating that they are the same to the control unit 136. Upon receiving the comparison result, control section 136 maintains the state of mobile terminal 103b.
- the control policy specifying system according to the present embodiment can be applied even when the RFID tags 105a to 105c are active tags.
- the control policy specifying system according to the present embodiment can be applied to a plurality of RFID tags 105a to 105c and a plurality of mobile terminals 103a to (!.
- the mobile terminals 103a to 103d according to the present embodiment The mobile terminal 103a- (!) Can control its own terminal according to the determined control policy within the area, so that the user of the mobile terminal 103a- (!) Can follow the control policy determined within the specific area without violating the determined social order. it can.
- FIG. 12 is a configuration diagram of a control policy specifying system according to the third embodiment.
- the plurality of RFID tags 202a to (! are arranged as shown in FIG. 12 in consideration of the receivable area.
- the mobile terminal 201 is provided with the receivable area of the plurality of RFID tags 202a to 202d.
- the receivable area refers to an area in which the mobile terminal 201 can receive data transmitted by the RFID tags 202a to 202d. Data can be received from all of the tags 202a to 202d, and for simplicity of explanation, an example in which only one mobile terminal is located at the point where the receivable areas of multiple RFID tags 202a to 202d overlap is used. To take.
- the transported data received by the RFID tags 202a to 202d is received. It is assumed that the tag is a passive tag that converts the wave into electric power and transmits the ID.
- the mobile terminal 201 includes a reception unit, a transmission unit, a storage unit, a determination unit, a comparison unit, a control unit, and a communication unit.
- the receiving unit receives data including the policy code from the RFID tags 202a to 202d.
- the transmitting unit transmits a request for transmitting a policy code including a policy ID to the RFID tags 202a to 202d at an arbitrary timing when a predetermined event occurs in its own terminal. Then, the transmitting unit transmits a carrier for supplying power to the RFID tags 202a to 202d. In the present embodiment, the transmitting unit transmits a policy code transmission request, and continuously transmits a carrier for an arbitrary period.
- the storage unit stores the policy information.
- the policy information stores a control policy for controlling the mobile terminal and a policy ID for identifying the control policy as one record.
- the storage unit stores the current control policy in a distinguishable manner.
- the flag indicates which of the policy information is a record of the current control policy. In the present embodiment, for example, a flag is used as a method of determining the current control policy. The position of the flag changes with the change of the current control policy.
- the determination unit determines whether any of the policy identifiers stored in the storage unit is included in the received data of the RFID tags 202a to 202d. Further, each time the receiving unit receives the data, the determining unit determines whether any of the policy IDs stored in the storage unit is included in the newly received data. Then, the determining unit transmits the determination result to the comparing unit and the control unit.
- the comparing unit stores the newly received policy ID and the stored data in the storage unit.
- the current policy ID to determine whether they match.
- the comparison unit transmits the comparison result to the control unit and the storage unit. For example, if the comparison result is a mismatch, the storage unit changes the position of the flag indicating the current policy ID.
- the control unit controls its own terminal based on the policy ID received by the reception unit. Also force Each time the control policy indicated by the Rent Policy ID is changed, the control unit controls its own terminal based on the updated current control policy.
- the communication unit performs communication with another communication terminal.
- Each RFID tag 202a-d stores a policy code.
- the type of information in each policy code is the same as in FIG. 2 of the first embodiment. That is, each policy code includes a policy ID, a corresponding device code, and a sequence number.
- the policy ID identifies the control policy in the area where the RFID tags 202a-d are located.
- the corresponding device code indicates the device for which the control policy is to be enforced.
- the sequence number is unique information for identifying each of the RFID tags 202a to 202d.
- the sequence numbers of the RFID tags 202a to 202d are respectively set to “00”, “01”, “10”, and “11”.
- Each of the RFID tags 202a to 202d includes a generation unit that generates a slot for transmitting a policy code based on each sequence number.
- Each of the RFID tags 202a to 202d includes a transmission unit for sequentially transmitting the policy code in a time-division manner using the slot generated by the generation unit.
- each of the RFID tags 202a to 202d sets the waiting time from the reception of the policy code transmission request to the transmission of the policy code based on the sequence number. For example, in the RFID tag 202a, based on the sequence number "00", the standby time from the reception of the policy code transmission request to the transmission of the policy code is set to "0" slot.
- each RFID tag 202a-d sets the transmission period so that it does not overlap with the period during which other RFID tags are transmitting the policy code.
- FIG. 13 is a timing chart showing an operation of transmitting and receiving a mobile terminal 201 and a plurality of RFID tags 202a to (!) According to the third embodiment.
- the mobile terminal 201 transmits a request for transmitting a policy code, and continues transmitting a carrier wave.
- the RFID tag 202a transmits the policy code without waiting.
- the RFID tag 202b waits one slot before transmitting the policy code.
- R FID tag 202c waits two slots before transmitting the policy code.
- the RFID tag 202d waits three slots and then transmits the policy code.
- the mobile terminal 201 sequentially receives the respective policy codes of the RFID tags 202a to 202d.
- the mobile terminal 201 searches and compares the policy ID from each received policy code, and controls its own terminal according to the control policy corresponding to each policy ID.
- the RFID tags 202a to (! Sequentially transmit the policy code, and the mobile terminal 201 receives the policy code. This prevents collision between the policy codes transmitted by the RFID tags 202a to (! can do.
- a plurality of mobile terminals may be located in the reception function area of the force RFID tags 202a to (!) Described in the case of one mobile terminal.
- the RFID tags 202a to (! are also applicable to active tags assuming passive tags.
- the mobile terminal 202 can transmit without transmitting a transmission request and a carrier.
- the RFID tags 202a to 202d which are active tags, are connected via a communication interface for communicating with each of the RFID tags 202a to 202d.
- the RFID tag 202a-d always determines the timing for transmitting the policy code via the communication interface and generates a slot for transmitting the policy code based on the determined timing. Time-division transmission is performed in the slot in which the is generated.
- the RFID tags 202a to 202d according to the present embodiment can also be applied to semi-passive tags.
- RFID tags 202a-d which are semi-passive tags Receives the transmission request from the mobile terminal 202, transmits the policy code in a time-division manner using the built-in power supply.
- the mobile terminal 201 transmits a request for transmitting a policy code.
- the RFID tags 202a to 202d that have received the request for transmitting a policy code from the mobile terminal 201 transmit the policy code in a time-division manner.
- the receiving unit receives the policy code from at least one of the RFID tags 202a to 202d
- the determining unit stops the request for transmitting the policy code by the transmitting unit.
- 201 Upon receiving the policy code transmitted first, 201 does not receive the policy code transmitted thereafter, and the transmission request may be a carrier.
- the mobile terminal 201 does not need to search and receive the same policy code. 201 power consumption can be suppressed.
- the system described above is also suitable for a case where a plurality of mobile terminals are located in the same area.
- the time when each mobile terminal receives the policy code is "one slot”.
- the time required for each mobile terminal to receive the policy code is shorter than the time required for receiving all the policy codes from the RFID tags 202a to (!). The probability is low, so collisions between transmission requests can be avoided.
- FIG. 14 is a configuration diagram of a control policy identification system according to the fourth embodiment.
- the fourth embodiment is an example in which the control policy specifying system 301 of the present invention is used for, for example, a mobile terminal 303 for a company and a fixed telephone 305 in a company.
- the company office 302 includes a mobile terminal 303, an office PBX (Private Branch eXchange) 304, a fixed telephone 305, a base station 306, and an RFID tag 307.
- the in-house PBX 304 is an in-house telephone exchange that connects to the company's internal telephone lines and public lines.
- In-house PBX 304 has landline 305 and mobile A base station 306 that communicates with the mobile terminal 303 is connected.
- an RFID tag 307 which is a passive tag, is installed in the company 302.
- the RFID tag 307 stores a policy code including a policy ID for identifying a control policy of the company's office 302.
- the policy code stored in the RFID tag 307 stores the control policy “automatically transfer the incoming call of the mobile terminal to the fixed telephone 305” in association with the policy ID “06h”. I do.
- the RFID tag 307 is a passive tag that converts a received carrier into electric power and transmits an ID.
- the mobile terminal 303 Upon receiving the policy code from the RFID tag 307, the mobile terminal 303 specifies the control policy of the in-house 302 of the company based on the received policy code, and controls the own terminal based on the specified control policy.
- the mobile terminal 303a includes a reception unit, a transmission unit, a storage unit, a determination unit, a comparison unit, a control unit, and a communication unit.
- the receiving unit receives data including the policy code from the RFID tag 307.
- the transmitting unit transmits a request for transmitting a policy code including a policy ID to the RFID tag 307 at a timing when an incoming call occurs at the terminal. Then, the transmitting unit transmits a carrier for supplying power to the RFID tag 307.
- the storage unit stores policy information.
- the policy information stores a control policy for controlling the mobile terminal and a policy ID for identifying the control policy as one record.
- FIG. 15 is a conceptual diagram of the policy information according to the present embodiment.
- the policy information in FIG. 15 is added to the correspondence information stored in the storage unit 33 of the second embodiment, and further, the policy ID “06h” is associated with the control policy “automatically transfer incoming calls to a fixed telephone”. I remember.
- the storage unit stores the current control policy in a distinguishable manner.
- a flag is used as a method of determining the current control policy.
- the flag indicates which of the policy information is the record of the current control policy.
- the position of the flag changes as the current control policy changes.
- the determining unit determines whether any of the policy identifiers stored in the storage unit is included in the data received from the RFID tag 307. Further, each time the receiving unit receives the data, the determining unit determines whether any of the policy IDs stored in the storage unit is included in the newly received data. Then, the determination unit transmits the determination result to the comparison unit and the control unit.
- the comparing unit stores the newly received policy ID and the stored in the storage unit. The current policy ID to determine whether they match. Then, the comparison unit transmits the comparison result to the control unit and the storage unit. For example, if the comparison result is a mismatch, the storage unit changes the position of the flag indicating the current policy ID.
- the control unit controls its own terminal based on the policy ID received by the reception unit. Also, each time the control policy indicated by the current policy ID is changed, the control unit controls its own terminal based on the updated current control policy.
- the communication unit performs communication with another communication terminal.
- FIG. 16 is an operation flowchart of the control policy specifying system 301 according to the fourth embodiment.
- the current policy ID and the current control policy of the mobile terminal 303a are "04h” and "enable incoming call", respectively. That is, it is assumed that the current mobile terminal 303 is in a “call-incoming” state.
- the communication unit of the mobile terminal 303 detects the incoming call (# 202). Then, the transmitting unit of the mobile terminal 303 suspends the process of notifying the user of the incoming call, and transmits a request for transmitting the policy code to the RFID tag 307 of the company office 302 (# 203).
- the RFID tag 307 that has received the policy code transmission request from the mobile terminal 303 transmits the policy code (# 204).
- the receiving unit of the mobile terminal 303 receives this (# 205).
- the determination unit of mobile terminal 303 determines whether or not the policy code received by the reception unit includes a policy ID that matches the policy ID in the policy information stored in the storage unit (# 206) ).
- the received policy code has the policy ID "06h”, and matches the policy ID "06h” in the policy information of the storage unit. Therefore, the determination unit of the mobile terminal 303 extracts the control policy “automatically transfer the incoming call to the fixed telephone” indicated by the policy ID “06h” from the policy information in the storage unit, and transmits it to the comparison unit.
- the comparing unit of mobile terminal 303 compares the current policy ID stored in the storage unit with the extracted policy ID "06h" (# 207). Here, since the current policy ID of the mobile terminal 303 is “04h”, the comparing unit determines that the extracted policy ID “06h” is different from the current policy ID “04h”. The comparison unit transmits the comparison result to the storage unit and the control unit. The storage unit changes the position of the flag indicating the current policy ID from the current policy ID “04h” to “06h” based on the comparison result.
- the control unit of the mobile terminal 303 automatically transfers the incoming call from the communication terminal to the in-house fixed telephone 305 based on the control policy "automatically transfer the incoming call to the fixed telephone" corresponding to the policy ID "06h”. (# 208). Then, a connection between the fixed telephone 305 in the company and the communication terminal is established. As a result, a call can be made between the in-house fixed telephone 305 and the communication terminal (# 209, # 210).
- the RFID tag control policy specifying system can be applied to an automatic transfer system to a fixed telephone in the company 302.
- the call charge between the communication terminal such as a fixed telephone or a mobile terminal and the mobile terminal 303 is higher than the call charge between the communication terminal and the fixed telephone.
- the control policy specifying system of the present invention is used as an automatic transfer system to a fixed telephone as in the present embodiment, an incoming call to the mobile terminal 303 is transferred to the fixed telephone 305. Therefore, a call is made between the communication terminal and the fixed telephone 305. Therefore, the communication terminal's call fee is lower than that of a call with the mobile terminal 303.
- the owner of the communication terminal is the owner of the mobile terminal 303, that is, the company, it is possible to reduce various expenses of the company.
- the RFID tag 307 is a passive tag.
- the present invention can be applied to an active tag.
- the mobile terminal 303 transmits from the RFID tag 307 It receives the ID that is always transmitted, performs search and comparison, and controls its own terminal based on the control policy corresponding to the policy ID.
- the mobile terminals 502a and 502b may receive the policy code from the RFID tag 501 using the LBT (Listen Before Talk) method.
- the LBT method uses radio waves to check whether each mobile terminal 502a, b receives a policy code from another mobile terminal's SRFID tag at an arbitrary timing when a predetermined event such as an incoming call occurs. It is a way to do it.
- the mobile terminal 502a transmits a policy code transmission request to the RFID tag 501.
- the mobile terminal 502a may intercept the policy code being received by the other mobile terminal 502b. Then, the mobile terminal 502a determines and compares the policy ID in the intercepted policy code. If the intercepted policy ID is different from the current policy ID, the mobile terminal 502a controls its own terminal based on the control policy indicated by the intercepted policy ID.
- each mobile terminal 502a and b transmits the policy code transmission request to the RF ID tag 501. Do not send all at once. That is, the timings at which the mobile terminals 502a and 502b transmit the policy code transmission request to the RFID tag 501 do not overlap. Therefore, it is possible to avoid collision between transmission requests of the policy codes transmitted by the mobile terminals 502a and b.
- each of the mobile terminals 602 a and 602 b receives the policy code from the RFID tag 601, first, only the “applicable device code” of the policy code may be searched. Then, the determination unit of each mobile terminal 602a, b searches for the corresponding device code from the received policy code, and determines whether the corresponding device code is the device code of the own terminal. Only when the corresponding device code in the received policy code matches the device code of the own terminal, the receiving unit receives the content of the remaining policy code, that is, the policy ID.
- each of the mobile terminals 602a, 602b receives only the policy code from the RFID tag 601 that is intended for itself.
- each mobile terminal 602a, b does not acquire a policy code other than the one for its own terminal, so that the time for each mobile terminal 602a, b to receive the policy code from the RFID tag 601 is reduced. . Therefore, it is possible to avoid overlapping of the times when the plurality of mobile terminals 602a and 602b receive the policy code from the RFID tag 601.
- the mobile terminal 701 cannot receive data such as a policy code including the policy ID from the RFID tag 702.
- a sensor may be embedded in the data receiving portion of the mobile terminal 701. The sensor detects the distance between the data receiving portion and the closest data receiving portion. If the distance detected by the sensor is very short, the control unit of mobile terminal 701 determines that the user is blocking the data receiving portion. Then, the mobile terminal 701 controls its own terminal in, for example, an incoming / received rejection state.
- the method of controlling the own terminal may be a method of prompting the user to release the shielding of the data receiving portion. As a result, it is possible to prevent a case where the user does not follow the policy in the area.
- the present invention can be applied to a mobile terminal such as a mobile phone or a PDA which is easy to carry and can communicate with. Further, the control policy specifying system according to the present invention may be used in an area having a specific policy, such as a hospital / concert hall, a movie theater, a museum, a train, or a company.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Computer Interaction (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/628,752 US20080009313A1 (en) | 2004-06-10 | 2005-06-08 | Mobile Terminal Receiving Data from Rfid Tag and Mobile Terminal Control Policy Identification Method |
JP2006514532A JPWO2005122625A1 (ja) | 2004-06-10 | 2005-06-08 | Rfidタグからデータを受信する移動端末及び移動端末の制御ポリシー特定方法 |
EP05748914A EP1761093A4 (en) | 2004-06-10 | 2005-06-08 | MOBILE TERMINAL RECEIVING DATA FROM A RADIO FREQUENCY IDENTIFICATION LABEL AND METHOD OF IDENTIFYING MOBILE TERMINAL CONTROL POLICY |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004-172133 | 2004-06-10 | ||
JP2004172133 | 2004-06-10 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005122625A1 true WO2005122625A1 (ja) | 2005-12-22 |
Family
ID=35503536
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2005/010462 WO2005122625A1 (ja) | 2004-06-10 | 2005-06-08 | Rfidタグからデータを受信する移動端末及び移動端末の制御ポリシー特定方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20080009313A1 (ja) |
EP (1) | EP1761093A4 (ja) |
JP (1) | JPWO2005122625A1 (ja) |
CN (1) | CN1969579A (ja) |
WO (1) | WO2005122625A1 (ja) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010154049A (ja) * | 2008-12-24 | 2010-07-08 | Renesas Electronics Corp | 携帯端末、icタグ、並びに制御システム及びプログラム |
CN101001426B (zh) * | 2006-01-13 | 2010-12-29 | 三星电子株式会社 | 用于改变双模终端的操作模式的装置及方法 |
US8063888B2 (en) | 2007-02-20 | 2011-11-22 | Microsoft Corporation | Identification of devices on touch-sensitive surface |
JP2016012788A (ja) * | 2014-06-27 | 2016-01-21 | 富士通株式会社 | 携帯端末装置,機能制限方法,プログラム |
JP2017534958A (ja) * | 2014-09-18 | 2017-11-24 | ブーズ−アレン アンド ハミルトン | 位置ベースのセキュリティのためのシステム及び方法 |
US10372923B2 (en) | 2018-01-09 | 2019-08-06 | Booz Allen Hamilton Inc. | System and method for controlling the power states of a mobile computing device |
JP2021510997A (ja) * | 2018-01-15 | 2021-04-30 | 華為技術有限公司Huawei Technologies Co.,Ltd. | Ueのためにポリシーを構成するための方法、装置、及びシステム |
Families Citing this family (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7826835B2 (en) * | 2004-12-16 | 2010-11-02 | Intel Corporation | Mobile phone policy management |
US7643798B2 (en) * | 2005-12-09 | 2010-01-05 | Sony Ericsson Mobile Communications Ab | Passive NFC activation of short distance wireless communication |
KR100785793B1 (ko) * | 2006-09-14 | 2007-12-13 | 한국전자통신연구원 | Rfid 시스템에서 rfid 태그 식별자를 이용한서비스 제공 여부 판단 방법 및 그 장치 |
US7654348B2 (en) | 2006-10-06 | 2010-02-02 | Irobot Corporation | Maneuvering robotic vehicles having a positionable sensor head |
CN101321311B (zh) * | 2007-06-07 | 2013-07-31 | 中国移动通信集团公司 | 信息发布方法及系统 |
US8422944B2 (en) | 2008-08-12 | 2013-04-16 | Sony Corporation | Personal function pad |
US8014721B2 (en) * | 2008-10-20 | 2011-09-06 | Sony Ericsson Mobile Communications Ab | Setting mobile device operating mode using near field communication |
KR101176879B1 (ko) * | 2008-12-18 | 2012-08-24 | 한국전자통신연구원 | Rfid 태그를 구비한 휴대 단말기 및 그의 rfid 태그를 이용한 지역서비스 제공방법 |
KR100911032B1 (ko) | 2009-04-01 | 2009-08-05 | (주)애니쿼터스 | Nfc 칩 모듈과 외부 rf 리더기를 통한 휴대폰 단말기의 벨소리·카메라·통신기능을 제어하는 장치 및 방법 |
US9258408B2 (en) | 2009-06-04 | 2016-02-09 | Nokia Technologies Oy | Method and apparatus for third-party control of device behavior |
EP2468030B1 (en) * | 2009-08-19 | 2016-07-20 | Opanga Networks, Inc. | Enhanced data delivery based on real time analysis of network communications quality and traffic |
WO2011037626A1 (en) * | 2009-09-23 | 2011-03-31 | Telecommunication Systems, Inc. | Carrier based in-network location triggered managed processing of wireless communications |
FR2951299B1 (fr) * | 2009-10-12 | 2015-10-30 | Anthoine Laetitia Caroline Edmee Gazel | Dispositif pour actionner un terminal portable au moyen d'un ensemble d'etiquettes a identifiant unique |
US20110099271A1 (en) * | 2009-10-22 | 2011-04-28 | Park Joo Sang | System and method for enforcing rfid event management policy |
US9072052B2 (en) | 2010-08-09 | 2015-06-30 | Blackberry Limited | Communication system providing context-based mobile wireless communications device power consumption management and related methods |
EP2418780B1 (en) * | 2010-08-09 | 2014-05-21 | BlackBerry Limited | Communication system providing context-based mobile wireless communications device power consumption management and related methods |
US9094532B2 (en) * | 2011-02-14 | 2015-07-28 | Lenovo (Singapore) Pte. Ltd. | Manners reminder |
CN102694933B (zh) * | 2011-03-24 | 2014-12-31 | 鸿富锦精密工业(深圳)有限公司 | 电话转接系统和电话转接方法 |
EP2518982A1 (en) * | 2011-04-28 | 2012-10-31 | Nxp B.V. | Mobile device, transponder, near field communication system and method for configuring a mobile device |
JP2014519786A (ja) * | 2011-06-16 | 2014-08-14 | エイキュウ カンパニー リミテッド | Nfc通信方式の移動通信端末機及び制御方法 |
US9064111B2 (en) * | 2011-08-03 | 2015-06-23 | Samsung Electronics Co., Ltd. | Sandboxing technology for webruntime system |
US8893225B2 (en) | 2011-10-14 | 2014-11-18 | Samsung Electronics Co., Ltd. | Method and apparatus for secure web widget runtime system |
FR2988948A1 (fr) * | 2012-03-30 | 2013-10-04 | France Telecom | Procedes pour l'application de regles de traitement de session en fonction d'une carte de presence de terminaux mobiles dans des zones speciales |
KR101913733B1 (ko) * | 2012-11-01 | 2018-10-31 | 삼성전자주식회사 | 엔에프씨 태그를 이용한 개인 정보 보호 시스템 및 방법 |
US9307492B2 (en) * | 2012-11-12 | 2016-04-05 | Htc Corporation | Operating mode switching method |
CN105432022A (zh) * | 2012-12-27 | 2016-03-23 | 赛奎特实验室 | 近场通信在移动装置管理与安全中的利用及应用 |
CN103067554B (zh) * | 2013-01-29 | 2018-10-30 | 周万荣 | 一种支持快捷操作的终端 |
US9552472B2 (en) * | 2013-05-29 | 2017-01-24 | Blackberry Limited | Associating distinct security modes with distinct wireless authenticators |
CN104243677A (zh) * | 2013-06-22 | 2014-12-24 | 章玺 | 使手机摄像头禁用的方法 |
CN104239817A (zh) * | 2013-06-22 | 2014-12-24 | 章玺 | 使平板电脑摄像头禁用的方法 |
CN109165107A (zh) * | 2018-08-30 | 2019-01-08 | 四川爱创科技有限公司 | 基于浏览器的电子标签数据传输方法 |
GB2619471A (en) * | 2021-02-25 | 2023-12-06 | Booz Allen Hamilton Inc | Controlling power states and operation of mobile computing devices |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0951576A (ja) * | 1995-08-07 | 1997-02-18 | Fujitsu Ltd | 移動通信システムの移動局使用制限方法、基地局装置および移動局装置 |
JPH09322261A (ja) * | 1996-03-29 | 1997-12-12 | Toshiba Corp | 通信制御装置 |
JP2002135838A (ja) * | 2000-10-19 | 2002-05-10 | Ofaa Sekkei Jimusho:Kk | 携帯型電気機器の自動制御システム及び携帯型電気機器及び制御信号発信装置。 |
JP2003152628A (ja) * | 2001-11-14 | 2003-05-23 | Nec Saitama Ltd | 携帯電話機及びその使用制限方法 |
JP2003169381A (ja) * | 2001-12-04 | 2003-06-13 | Sharp Corp | 移動電話システム |
JP2003179683A (ja) * | 2001-12-11 | 2003-06-27 | Hitachi Ltd | 携帯電話装置及び携帯電話への発信機器 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6108563A (en) * | 1996-03-29 | 2000-08-22 | Kabushiki Kaishi Toshiba | Communication control apparatus for providing management and call control of mobile stations in radio communication system |
US7451157B2 (en) * | 2001-10-16 | 2008-11-11 | Microsoft Corporation | Scoped metadata in a markup language |
JP3719659B2 (ja) * | 2001-12-26 | 2005-11-24 | 株式会社日立製作所 | 情報受信システム及び情報受信端末 |
US7123126B2 (en) * | 2002-03-26 | 2006-10-17 | Kabushiki Kaisha Toshiba | Method of and computer program product for monitoring person's movements |
US7551930B2 (en) * | 2002-05-06 | 2009-06-23 | Nokia Corporation | Location-based services for mobile stations using short range wireless technology |
US7107009B2 (en) * | 2002-06-26 | 2006-09-12 | Nokia Corporation | Method, system and computer program product for personalizing the functionality of a personal communication device |
US20040075675A1 (en) * | 2002-10-17 | 2004-04-22 | Tommi Raivisto | Apparatus and method for accessing services via a mobile terminal |
US7154409B2 (en) * | 2004-06-05 | 2006-12-26 | Alcatel | System and method for importing location information and policies as part of a rich presence environment |
-
2005
- 2005-06-08 JP JP2006514532A patent/JPWO2005122625A1/ja not_active Withdrawn
- 2005-06-08 EP EP05748914A patent/EP1761093A4/en not_active Withdrawn
- 2005-06-08 US US11/628,752 patent/US20080009313A1/en not_active Abandoned
- 2005-06-08 WO PCT/JP2005/010462 patent/WO2005122625A1/ja active Application Filing
- 2005-06-08 CN CNA2005800191370A patent/CN1969579A/zh active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0951576A (ja) * | 1995-08-07 | 1997-02-18 | Fujitsu Ltd | 移動通信システムの移動局使用制限方法、基地局装置および移動局装置 |
JPH09322261A (ja) * | 1996-03-29 | 1997-12-12 | Toshiba Corp | 通信制御装置 |
JP2002135838A (ja) * | 2000-10-19 | 2002-05-10 | Ofaa Sekkei Jimusho:Kk | 携帯型電気機器の自動制御システム及び携帯型電気機器及び制御信号発信装置。 |
JP2003152628A (ja) * | 2001-11-14 | 2003-05-23 | Nec Saitama Ltd | 携帯電話機及びその使用制限方法 |
JP2003169381A (ja) * | 2001-12-04 | 2003-06-13 | Sharp Corp | 移動電話システム |
JP2003179683A (ja) * | 2001-12-11 | 2003-06-27 | Hitachi Ltd | 携帯電話装置及び携帯電話への発信機器 |
Non-Patent Citations (1)
Title |
---|
See also references of EP1761093A4 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101001426B (zh) * | 2006-01-13 | 2010-12-29 | 三星电子株式会社 | 用于改变双模终端的操作模式的装置及方法 |
US8063888B2 (en) | 2007-02-20 | 2011-11-22 | Microsoft Corporation | Identification of devices on touch-sensitive surface |
JP2010154049A (ja) * | 2008-12-24 | 2010-07-08 | Renesas Electronics Corp | 携帯端末、icタグ、並びに制御システム及びプログラム |
JP2016012788A (ja) * | 2014-06-27 | 2016-01-21 | 富士通株式会社 | 携帯端末装置,機能制限方法,プログラム |
JP2017534958A (ja) * | 2014-09-18 | 2017-11-24 | ブーズ−アレン アンド ハミルトン | 位置ベースのセキュリティのためのシステム及び方法 |
US10372923B2 (en) | 2018-01-09 | 2019-08-06 | Booz Allen Hamilton Inc. | System and method for controlling the power states of a mobile computing device |
JP2021510997A (ja) * | 2018-01-15 | 2021-04-30 | 華為技術有限公司Huawei Technologies Co.,Ltd. | Ueのためにポリシーを構成するための方法、装置、及びシステム |
JP7184922B2 (ja) | 2018-01-15 | 2022-12-06 | 華為技術有限公司 | Ueのためにポリシーを構成するための方法、装置、及びシステム |
US11647124B2 (en) | 2018-01-15 | 2023-05-09 | Huawei Technologies Co., Ltd. | Method, apparatus, and system for configuring policy for UE |
Also Published As
Publication number | Publication date |
---|---|
EP1761093A1 (en) | 2007-03-07 |
JPWO2005122625A1 (ja) | 2008-04-10 |
US20080009313A1 (en) | 2008-01-10 |
EP1761093A4 (en) | 2009-01-21 |
CN1969579A (zh) | 2007-05-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2005122625A1 (ja) | Rfidタグからデータを受信する移動端末及び移動端末の制御ポリシー特定方法 | |
US8887177B2 (en) | System and method for automated content distribution objects | |
EP1825703B1 (en) | Mobile phone policy management | |
CN101611613B (zh) | 基于位置和公司服务等级约定来限制电子设备功能的使用 | |
KR101350692B1 (ko) | 이동 단말기 및 그의 다이렉트 서비스 제공 방법 | |
US8750841B2 (en) | System and method for automatically leaving an outgoing caller message | |
CN101145812B (zh) | 用于控制在便携终端中的蓝牙的装置与方法 | |
CN109644460A (zh) | 调度侧链路资源的请求方法、装置及存储介质 | |
US20120208460A1 (en) | System and method for controlling a mobile terminal | |
JP2002027554A (ja) | 携帯端末装置及び携帯端末装置の機能制御方法 | |
JP2005531236A (ja) | 高周波識別を使用してワイヤレス装置を経てネットワーク接続を実行するシステム、装置及び方法 | |
CN102342084A (zh) | 用于控制移动站的操作的系统和方法 | |
KR20140118111A (ko) | 전자 장치에서 데이터를 공유하기 위한 방법 | |
CN110910541A (zh) | 门禁控制方法、系统、网络设备及计算机可读存储介质 | |
JP4506603B2 (ja) | 端末自動設定システム、制御エリア情報発信装置、サーバ装置、携帯端末装置、及びプログラム | |
JP2008011296A (ja) | Icタグリーダ付き携帯端末装置及びプログラム | |
KR101379296B1 (ko) | 이벤트 서비스 방법 및 이를 수행하는 이벤트 서비스 서버 | |
KR100643521B1 (ko) | 이동통신단말기의 기능제어 시스템 및 방법 | |
JP3821295B2 (ja) | 移動通信ネットワークシステム及び移動端末機の利用制限制御方法 | |
KR20050024377A (ko) | 무선 주파수 식별을 이용하여 무선 장치들을 통한 네트웍접속을 일으키는 시스템, 기기, 및 방법 | |
KR20100006869A (ko) | 알에프아이디 리더와 유심 카드를 이용한 이동통신단말기의착신모드 제어방법 및 그 제어장치 | |
EP1528771A2 (en) | Apparatus and method for remotely controlling a wireless terminal | |
KR101649363B1 (ko) | 이동 단말 및 이동 단말에서의 전화 수신 방법 | |
JP2005072941A (ja) | 携帯機器 | |
US9060071B1 (en) | Bluetooth location identifier and general information broadcaster |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2005748914 Country of ref document: EP Ref document number: 2006514532 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200580019137.0 Country of ref document: CN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 2005748914 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11628752 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 11628752 Country of ref document: US |