WO2006118029A1 - Systeme de traitement d’informations, dispositif de terminal mobile, et programme - Google Patents

Systeme de traitement d’informations, dispositif de terminal mobile, et programme Download PDF

Info

Publication number
WO2006118029A1
WO2006118029A1 PCT/JP2006/308174 JP2006308174W WO2006118029A1 WO 2006118029 A1 WO2006118029 A1 WO 2006118029A1 JP 2006308174 W JP2006308174 W JP 2006308174W WO 2006118029 A1 WO2006118029 A1 WO 2006118029A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
terminal device
unit
personal information
update completion
Prior art date
Application number
PCT/JP2006/308174
Other languages
English (en)
Japanese (ja)
Inventor
Kengo Shinohara
Original Assignee
Ixi Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ixi Co., Ltd. filed Critical Ixi Co., Ltd.
Publication of WO2006118029A1 publication Critical patent/WO2006118029A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities

Definitions

  • the present invention relates to an information processing system and the like for protecting personal information.
  • a request for authentication information and information data protection is sent from the information data protection requesting device via the network. Sent to the device.
  • the communication means of the communication terminal device receives the request regarding the protection of the information data and the authentication information and sends them to the information data processing means of the communication terminal device.
  • the information data processing means of the communication terminal device sends authentication information to the authentication means and requests authentication of the information data protection requesting device.
  • the authentication means authenticates the information data protection requesting device and sends the result to the information processing means.
  • the information data processing means that has received the result erases the information data stored in the information data storage means in accordance with the information data protection request, and Is protected from reading (see, for example, Patent Document 1).
  • Patent Document 1 Japanese Unexamined Patent Publication No. 2003-114828 (Page 1, Fig. 1 etc.)
  • the user of the communication terminal device has the power to determine whether the information is present or how much information is present. For example, if the information data is phonebook data, the user of the communication terminal device has no power to determine how many people have been registered. For example, until the data that has been knocked up is obtained, It was difficult to contact Moreover, in order to acquire data, it was necessary to back up without force, and the load of the server device to be knocked up was generated.
  • An information processing system is an information processing system including an operation terminal device, a control server device, and a mobile terminal device, wherein the operation terminal device includes the mobile terminal device.
  • the control server device is identified by mobile terminal identification information included in the control command receiving unit that receives the control command and the control command received by the control command receiving unit.
  • a protection command transmission unit that transmits a protection command, which is a command for protecting personal information, to the mobile terminal device, and the mobile terminal device stores a personal information class in which personal information is stored.
  • a protection command receiving unit that receives the protection command, and overwriting a predetermined character string on the personal information stored in the personal information storage unit,
  • An information processing system comprising: an update unit that updates information.
  • the information processing system relates to the fact that when the updating unit updates the personal information, the mobile terminal device updates the personal information.
  • An update completion information transmitting unit that transmits update completion information that is information to the control server device, the control server device receiving a third update completion information receiving unit that receives the update completion information;
  • a third update completion information transmitting unit that transmits the update completion information received by the third update completion information receiving unit to the operation terminal device, wherein the operation terminal device receives the update completion information.
  • An information processing system further comprising: an update completion information receiving unit; and a first update completion information output unit that outputs the update completion information.
  • the information processing system of the third invention is an information processing system including an operation terminal device, an authentication server device, a control server device, and a mobile terminal device, wherein the operation terminal device Is the operation terminal device identification information that is information for identifying the operation terminal device.
  • the authentication server device includes a second operation terminal device identification information reception unit that receives the operation terminal device identification information, a second control command reception unit that receives the control command, (Ii) an authentication unit that authenticates the operation terminal device based on the operation terminal device identification information received by the operation terminal device identification information reception unit, and an authentication result in the authentication unit is authentication permission.
  • a second control command transmission unit that transmits the control command to the control server device, wherein the control server device receives the control command, and the control command reception unit receives the control command.
  • a protection command transmitting unit that transmits a protection command that is a command for protecting personal information to the mobile terminal device identified by the mobile terminal identification information included in the control command, the mobile terminal device comprising: A personal information storage unit storing personal information, a protection command receiving unit receiving the protection command, and overwriting a predetermined character string on the personal information stored in the personal information storage unit.
  • An information processing system comprising an update unit for updating.
  • This powerful configuration can further authenticate the operation terminal device and prevent malicious third parties from manipulating personal information.
  • the information processing system provides information indicating that the mobile terminal device has been updated when the update unit has updated the personal information.
  • An update completion information transmitting unit that transmits certain update completion information to the control server device, the control server device receiving a third update completion information receiving unit that receives the update completion information, and the third update.
  • a third update completion information transmitting unit for transmitting the update completion information received by the completion information receiving unit to the authentication server device, wherein the authentication server device receives the update completion information.
  • the operation terminal device receives the first update completion information for receiving the update completion information.
  • a first update completion information output unit that outputs the update completion information.
  • the mobile terminal device updates the personal information.
  • a personal information transmitting unit that transmits information to the control server device, wherein the control server device receives a personal information received by the third personal information receiving unit and a third personal information receiving unit that receives the personal information;
  • An information processing system further comprising a personal information output unit for outputting information.
  • the information processing system of the present invention it is possible to protect personal information stored in a terminal such as a mobile phone, and the user knows that personal information exists even after processing personal information. be able to.
  • FIG. 1 is a conceptual diagram of the information processing system in the present embodiment.
  • the information processing system includes an operation terminal device 11, a control server device 12, and a mobile terminal device 13.
  • the operation terminal device 11 is a terminal that receives a control command that is a command for protecting personal information and transmits the control command to the control server device 12.
  • the control server device 12 is a device that receives a control command and transmits the control command to the mobile terminal device 13.
  • the mobile terminal device 13 is, for example, a mobile terminal in which phone book information is stored, and is a mobile terminal having a function of updating the phone book information and preventing personal information from leaking if theft is lost. .
  • the mobile terminal device 13 is, for example, a mobile phone, a PDA, or a portable personal computer. Etc.
  • the operation terminal device 11 and the control server device 12 are connected by, for example, the Internet or LAN.
  • the control server device 12 and the mobile terminal device 13 perform transmission / reception of information by, for example, peer-to-peer (P2P) communication.
  • Peer-to-peer (P2P) communication is, for example, communication using a short message service (SMS).
  • SMS short message service
  • FIG. 2 is a block diagram of the information processing system in the present embodiment.
  • the operation terminal device 11 includes a reception unit 1101, a control command transmission unit 1102, a first update completion information reception unit 1103, and a first update completion information output unit 1104.
  • Control server device 12 includes control command receiving unit 1201, protection command transmitting unit 1202, third update completion information receiving unit 1203, third update completion information transmitting unit 1204, third personal information receiving unit 12 05, personal information An output unit 1206 is provided.
  • the mobile terminal device 13 includes a personal information storage unit 1301, a protection command reception unit 1302, an update unit 1303, an update completion information transmission unit 1304, and a personal information transmission unit 1305.
  • the receiving unit 1101 is information having mobile terminal identification information that is information for identifying the mobile terminal device 13, and receives a control command that is a command for protecting personal information that is information related to an individual.
  • the personal information is information related to individuals, for example, phone book information that is phone book information, address book information that is address book information, and a customer database in which information such as customer addresses is stored.
  • the mobile terminal identification information is, for example, a telephone number, an IP address, an IP address and port number, a nickname.
  • the data structure of the control instruction does not matter.
  • the control command may be composed only of mobile terminal identification information.
  • “acceptance” includes acceptance by manual input, reception of an external device, reading from a recording medium, and the like.
  • the control command input means may be anything such as a numeric keypad, keyboard, mouse or menu screen.
  • the accepting unit 1101 can be realized by a device driver for input means such as a numeric keypad or a keyboard, or control software for a menu screen.
  • the control command transmission unit 1102 transmits the control command received by the reception unit 1101 to the control server device 12.
  • the timing and trigger at which the control command transmission unit 1102 transmits the control command does not matter. For example, when the reception unit 1101 receives a control command, the control command transmission unit 1102 immediately transmits the control command.
  • Control command transmitter 1102 is usually wireless or wireless. Alternatively, it may be realized by a broadcasting means that is realized by a wired communication means.
  • First update completion information receiving section 1103 receives update completion information.
  • the update completion information is information indicating that the update is performed when the update unit 1303 of the mobile terminal device 13 updates the personal information.
  • the data structure and contents of the update completion information are not limited.
  • the update completion information may include information for identifying the updated personal information, or may be information only indicating that the update has been completed.
  • First update completion information receiving section 1103 is usually realized by a wireless or wired communication means, but may be realized by a means for receiving a broadcast.
  • the first update completion information output unit 1104 outputs update completion information.
  • output is a concept including display on a display, printing on a printer, sound output, transmission to an external device, storage on a recording medium, and the like.
  • the first update completion information output unit 1104 may or may not include an output device such as a display or a speaker.
  • the first update completion information output unit 1104 can be implemented by output device driver software, or output device driver software and an output device.
  • the control command receiving unit 1201 receives a control command from the operation terminal device 11.
  • the control command receiving unit 1201 may receive the control command indirectly from the operation terminal device 11 or may directly receive the control command.
  • the control command receiving unit 1201 is usually realized by a wireless or wired communication means, but may be realized by a means for receiving a broadcast.
  • the protection command transmission unit 1202 is a protection command that is a command for protecting personal information to the mobile terminal device 13 identified by the mobile terminal identification information included in the control command received by the control command receiving unit 1201. Send.
  • the protection command transmission unit 1202 usually also performs processing for forming a protection command from a control command.
  • the protection command transmission unit 1202 is usually realized by a wireless or wired communication means, but may be realized by a broadcasting means.
  • Third update completion information receiving section 1203 receives update completion information from mobile terminal device 13.
  • the third update completion information receiving unit 1203 may receive update completion information indirectly from the mobile terminal device 13.
  • the third update completion information receiving unit 1203 is usually realized by a wireless or wired communication means, but may be realized by a means for receiving a broadcast.
  • the third update completion information transmission unit 1204 transmits the update completion information received by the third update completion information reception unit 1203 to the operation terminal device 11.
  • the third update completion information transmission unit 1204 Usually, it is realized by wireless or wired communication means, but may be realized by broadcasting means.
  • the third personal information receiving unit 1205 receives personal information from the mobile terminal device 13.
  • Third personal information receiving section 1205 may receive personal information indirectly from mobile terminal device 13.
  • the third personal information receiving unit 1205 may be realized by means for receiving power broadcasting, which is usually realized by wireless or wired communication means.
  • the personal information output unit 1206 outputs the personal information received by the third personal information receiving unit 1205.
  • Output is a concept that includes display on a display, printing on a printer, transmission to an external device, storage on a recording medium, and the like.
  • the output is preferably stored in a recording medium.
  • the personal information output unit 1206 may or may not include an output device such as a recording medium.
  • the personal information output unit 1206 can be realized by output device driver software, or output device driver software and an output device.
  • the personal information storage unit 1301 stores one or more pieces of personal information.
  • the one or more pieces of personal information are, for example, phone book information and customer DB.
  • the personal information storage unit 1301 is preferably a non-volatile recording medium, but can also be realized by a volatile recording medium.
  • the personal information stored in the personal information storage unit 1301 is, for example, information manually input by the user of the mobile terminal device 13.
  • the personal information stored in the personal information storage unit 1301 is information received from an external device, for example.
  • the protection command receiving unit 1302 receives a protection command from the control server device 12.
  • the protection command receiving unit 1302 may receive the protection command indirectly from the control server device 12.
  • the protection command receiving unit 1302 is usually realized by a wireless or wired communication means, but may be realized by a means for receiving a broadcast.
  • the update unit 1303 In response to receiving the protection command, the update unit 1303 overwrites a predetermined character string on the personal information stored in the personal information storage unit 1301 and updates the personal information.
  • the updating unit 1303 overwrites the location of the phone number with a predetermined character string, for example.
  • the update unit 1303 may overwrite the numeric character string of the telephone number with a predetermined character (such as X) by the character string length of the number of digits of the numeric character string.
  • the updating unit 1303 may generate a code with a random number or the like and overwrite the character string of the name and the telephone number with the character of the code.
  • the update unit 1303 For example, the telephone number of the original personal information may be acquired, a predetermined calculation may be performed using the telephone number as a parameter, and the calculation result may be overwritten as a new telephone number (numerical string). If a new phone number is generated and overwritten, a person who has stolen or picked up the mobile terminal device 13 has obtained information such as a different phone number and is aware that the information is incorrect. There is an advantage that it is not.
  • the updating unit 1303 selects personal information based on the information for identifying personal information, and updates the selected personal information.
  • the update unit 1303 can also implement an MPU, memory, or the like.
  • the processing procedure of the update unit 1303 is usually realized by software, and the software is recorded on a recording medium such as a ROM. However, it may be realized by hardware (dedicated circuit).
  • the update completion information transmission unit 1304 transmits update completion information, which is information indicating that the update has been performed, to the control server device 12.
  • the update completion information transmission unit 1304 is usually realized by a wireless communication means, but may be realized by a wired communication means or a broadcast means.
  • the personal information transmitting unit 1305 transmits the personal information to the control server device 12 before the updating unit 1303 updates the personal information.
  • the personal information transmission unit 1305 is usually realized by a wireless communication unit, but may be realized by a wired communication unit or a broadcasting unit.
  • the reception unit 1101 of the operation terminal device 11 receives a control command, and the control command transmission unit 1102 transmits the control command received by the reception unit 1101 to the control server device 12. Then, the first update completion information receiving unit 1103 of the operation terminal device 11 receives the update completion information, and the first update completion information output unit 1104 outputs the update completion information.
  • control server device 12 Next, the operation of the control server device 12 will be described using the flowchart of FIG.
  • Step S301 The control command receiving unit 1201 determines whether or not it has received the control command. If a control command is received, go to step S302, and if no control command is received, go to step S305.
  • Step S302 The protection command transmission unit 1202 receives the control command received in Step S301.
  • the mobile terminal identification information it has is acquired.
  • the protection command transmission unit 1202 constitutes a protection command.
  • the protection command transmission unit 1202 normally configures a protection command based on the control command received in step S301.
  • Step S304 The protection command transmitting unit 1202 transmits the protection command configured in Step S303 to the mobile terminal device 13 specified by the mobile terminal identification information acquired in Step S302. Return to step S301.
  • Step S 305 Third update completion information receiving section 1203 determines whether or not update completion information has been received from mobile terminal device 13. If update completion information is received, the process goes to step S306, and if update completion information is not received, the process goes to step S307.
  • Step S306 The third update completion information transmitting unit 1204 transmits the update completion information received in step S305 to the operation terminal device 11. Return to step S301.
  • Step S 307 Third personal information receiver 1205 determines whether or not personal information has been received from mobile terminal device 13. If personal information is received, the process goes to step S308, and if no personal information is received, the process returns to step S301.
  • Step S308 The personal information output unit 1206 outputs the personal information received in step S307. Return to step S301.
  • control server device 12 performs an authentication process for authenticating whether or not the operation terminal device 11 is a valid terminal. As a result of the authentication process, the authentication is permitted. Only the protection command may be sent to the mobile terminal device 13!
  • Step S 401 Protection command receiving section 1302 determines whether or not a protection command has been received from control server device 12. If a protection command is received, the process proceeds to step S402. If a protection command is not received, the process returns to step S401.
  • the personal information transmission unit 1305 converts the personal information to be updated into a personal information class. Acquired from the department 1301. If personal information storage unit 1301 stores two or more personal information and the protection order has information specifying one or more personal information of the two or more personal information, personal information transmission unit 1305 Selects and obtains one or more personal information.
  • Step S403 The personal information transmitting unit 1305 transmits the personal information acquired in step S402 to the control server device 12.
  • Step S404 In response to the reception of the protection command, the update unit 1303 overwrites the predetermined character string on the personal information stored in the personal information storage unit 1301, and updates the personal information. Details of the update process will be described with reference to the flowchart of FIG.
  • Step S405 When the update unit 1303 updates personal information, the update completion information transmission unit 1304 configures update completion information that is information indicating that the update has been performed.
  • the configuration of the update completion information may be a process of reading update completion information stored in advance.
  • the update completion information transmitting unit 1304 may constitute update completion information having information for specifying the updated personal information.
  • Step S406 The update completion information transmission unit 1304 transmits the update completion information configured in step S405 to the control server device 12. Return to step S401.
  • Step S501 The updating unit 1303 substitutes 1 for the counter i.
  • Step S502 The update unit 1303 determines whether or not the i-th data exists in the personal information to be updated. If the i-th data exists, the process goes to step S503. If the i-th data does not exist, the process returns to the upper function.
  • Step S503 The updating unit 1303 obtains the i-th data in the personal information to be updated.
  • Step S504 The updating unit 1303 processes the i-th data acquired in step S503 by a predetermined process.
  • the predetermined process is, for example, an encryption process.
  • the predetermined process is, for example, to execute an operation f “f (i-th data)” on the i-th data.
  • the i-th data is, for example, a numeric string of telephone numbers, and f is It is a predetermined arithmetic expression.
  • F is preferably reversible.
  • Step S505 The updating unit 1303 overwrites and updates the i-th data in the personal information to be updated with the data obtained by checking in step S504.
  • Step S506 The updating unit 1303 increments the counter i by 1. Return to step S502.
  • step S504 the i-th data is covered and updated using the checked data.
  • a predetermined character string for example, "09012345678"
  • FIG. 1 A conceptual diagram of the information processing system is shown in FIG. 1
  • the personal information storage unit 1301 of the mobile terminal device 13 stores the phone book information shown in FIG.
  • the phone book information has one or more records having attributes such as “ID”, “name”, “affiliation”, and “phone number”. “ID” is information for identifying the record and exists for record management in the table.
  • the user of the mobile terminal device 13 loses the mobile terminal device 13, calls the operator of the operation terminal device 11, and personal information of the mobile terminal device 13 (here Now, let's say that you have requested that the phone book information be hidden from the third party. Then, it is assumed that the operator hears the telephone number “09011223456” of the mobile terminal device 13 from the user of the mobile terminal device 13 and inputs the telephone number on the screen shown in FIG.
  • control command transmission unit 1102 of the operation terminal device 11 configures the control command shown in FIG. 8 based on the information input by the operator of FIG.
  • the control command includes a command “update”, a type of personal information “phone book” to be updated, and mobile terminal identification information “09011223456” of the mobile terminal device 13.
  • control command transmission unit 1102 transmits the control command in FIG. 8 to the control server device 12.
  • the control command transmission unit 1102 holds information for communicating with the control server device 12 (IP address, e-mail address, telephone number, etc. of the control server device 12).
  • control command receiving unit 1201 of the control server device 12 receives the control command of FIG.
  • protection command transmission unit 1202 of the control server device 12 acquires the mobile terminal identification information “09011223456” with the control command power of FIG.
  • the protection command transmission unit 1202 of the control server device 12 configures the protection command of FIG. 9 from the control command of FIG.
  • the protection command transmission unit 1202 transmits the protection command of FIG. 9 to the mobile terminal device 13 that can be identified by the mobile terminal identification information “09011223456”.
  • the protection command receiving unit 1302 of the mobile terminal device 13 receives the protection command of FIG.
  • the personal information transmission unit 1305 of the mobile terminal device 13 acquires the phone book information of FIG. 6 from the personal information storage unit 1301 for backup of the phone book information. Then, the personal information transmission unit 1305 transmits the telephone directory information of FIG. 6 to the control server device 12.
  • the third personal information receiving unit 1205 of the control server device 12 receives the phone book information of FIG. Then, the personal information output unit 1206 accumulates the received phone book information.
  • the phone book information is usually stored in a pair with the mobile terminal identification information “09011223456” of the mobile terminal device 13.
  • the stored phone book information is transmitted by a predetermined process.
  • the predetermined processing is, for example, a request from a person having a legitimate authority and transmission corresponding to the request.
  • the update unit 1303 of the mobile terminal device 13 overwrites and updates the telephone directory information in accordance with the protection instruction of FIG.
  • the updating unit 1303 overwrites and updates the phone book information according to the following rules.
  • the rule is that the two characters of the name are encrypted and converted to the other two characters.
  • the rule calculates (f) a telephone number number string as a parameter, acquires another number string, and overwrites the acquired number string.
  • the numbers from the first digit to the third digit are not changed, and the numbers from the fourth digit to the eleventh digit are changed. It is an operation to be performed.
  • the encrypted two characters of the name and the computed number string are reversible, and if decompressed, the correct name can be obtained, and the number string of the original telephone number is obtained by performing the ⁇ 1 operation. It can be done.
  • the updating unit 1303 changes the phone book information in FIG. 6 to the phone book information as shown in FIG. 10 and rewrites it.
  • the update completion information transmission unit 1304 of the mobile terminal device 13 configures update completion information, which is information indicating that the update of the phone book information is completed, and transmits it to the control server device 12.
  • the third update completion information receiving unit 1203 of the control server device 12 receives the update completion information.
  • the third update completion information transmission unit 1204 transmits the update completion information to the operation terminal device 11.
  • the first update completion information receiving unit 1103 receives update completion information.
  • first update completion information output section 1104 outputs update completion information as shown in FIG.
  • the update completion information includes mobile terminal identification information.
  • personal information stored in a terminal such as a mobile phone can be protected, and the user can imagine the existence of personal information even after processing the personal information.
  • a part of personal information is rewritten, so that the user can easily know what kind of information exists and is convenient.
  • meaningless information remains, and protection of personal information can be ensured.
  • the phone book information of the mobile terminal device 13 is partially changed, but may be changed entirely.
  • the phone book information is changed so that the phone book information can be restored.
  • the phone book information may not be restored.
  • only information acquired from the original personal information such as the number of phone book information may be left.
  • the processing in the present embodiment may be realized by software.
  • This software may be distributed by software download or the like.
  • this software may be recorded and distributed on a recording medium such as a CD-ROM. Note that this is This also applies to other embodiments in the book.
  • the software that realizes the mobile terminal device in the present embodiment is the following program. In other words, this program overwrites a predetermined character string with respect to the stored personal information in response to the protection command receiving step for receiving the protection command and the reception of the protection command. And a program for executing an update step for updating the personal information.
  • the program causes the computer to further execute an update completion information transmission step of transmitting update completion information that is information indicating that the personal information has been updated. It can be a program.
  • the program may be a program for causing a computer to further execute a personal information transmission step of transmitting the personal information before updating the personal information in the updating step.
  • the information processing system in the present embodiment is characterized in that the information processing system in the first embodiment further includes an authentication server device to authenticate the operation terminal device.
  • FIG. 12 is a conceptual diagram of the information processing system in the present embodiment.
  • the information processing system includes an operation terminal device 121, an authentication server device 122, a control server device 123, and a mobile terminal device 13.
  • FIG. 13 is a block diagram of the information processing system in the present embodiment.
  • the operation terminal device 121 includes an operation terminal device identification information storage unit 12101, a reception unit 1101, a first operation terminal device identification information transmission unit 12102, a control command transmission unit 1102, a first update completion information reception unit 1103, a first An update completion information output unit 1104 is provided.
  • the authentication server device 122 includes a second operation terminal device identification information receiving unit 12201, a second control command receiving unit 12202, an authentication unit 12203, and a second control command transmitting unit 12204.
  • the control server device 123 includes a control command receiving unit 12301, a protection command transmitting unit 1202, a third update completion information receiving unit 1203, a third update completion information transmitting unit 12304, a third personal information receiving unit 1205, and a personal information output. Part 1206.
  • the operation terminal device identification information storage unit 12101 stores operation terminal device identification information that is information for identifying the operation terminal device 121.
  • the operation terminal device identification information is, for example, an IP address of the operation terminal device 121, a MAC address of the operation terminal device 121, a pair of an ID and password of an operator who operates the operation terminal device 121, and the like.
  • the operation terminal device identification information may be information that indirectly identifies the operation terminal device 121.
  • the information for indirectly identifying the operation terminal device 121 is information for identifying the user (operator) of the operation terminal device 121, for example.
  • the operation terminal device identification information may be information stored in advance or information input by an operator.
  • the operation terminal device identification information storage unit 12 101 is preferably a nonvolatile recording medium, but can also be realized by a volatile recording medium.
  • the first operation terminal device identification information transmission unit 12102 transmits the operation terminal device identification information in the operation terminal device identification information storage unit 12 101 to the authentication server device 122.
  • First operation terminal device identification information transmitting section 12102 is usually realized by a wireless or wired communication means, but may be realized by a broadcasting means.
  • Second operation terminal device identification information receiving section 12201 receives operation terminal device identification information from operation terminal device 121.
  • the second operation terminal device identification information receiving unit 12201 is usually realized by a wireless or wired communication means, but may be realized by means of receiving a broadcast.
  • the second control command receiving unit 12202 is an operation terminal. A control command is received from the device 121.
  • the second control command receiving unit 12202 can also be realized by a means for receiving power broadcast or a wired communication means for which a wireless communication means is suitable.
  • the authentication unit 12203 authenticates the operation terminal device 121 based on the operation terminal device identification information received by the second operation terminal device identification information receiving unit 12201.
  • the authentication unit 12203 normally holds one or more operation terminal device identification information for identifying the operation terminal device to which authentication is permitted.
  • the authentication unit 12203 normally determines whether or not the held one or more operation terminal device identification information matches the received operation terminal device identification information, and if they match, determines that the authentication is permitted. .
  • the authentication method may be other methods.
  • the authentication of the operation terminal device 121 may be the authentication of the operator of the operation terminal device 121.
  • Authentication unit 122 03 can usually be realized from MPU, memory, etc.
  • the processing procedure of the authentication unit 12203 is usually realized by software, and the software is recorded on a recording medium such as a ROM. However, it may be realized by hardware (dedicated circuit).
  • the second control command transmission unit 12204 transmits the control command received by the second control command reception unit 12202 to the control server device 123 when the authentication result in the authentication unit 12203 is authentication permission.
  • the second control command transmission unit 12204 holds information for communicating with the control server device 123, for example, the IP address of the control server device 123 in advance.
  • the second control command transmission unit 12204 may be realized by a force broadcast unit that is usually realized by a wireless or wired communication unit.
  • the control command receiving unit 12301 receives a control command from the authentication server device 122.
  • the control command received by the control command receiving unit 12301 may have a data structure different from the control command transmitted by the operation terminal device 121.
  • the control command receiving unit 12301 is usually realized by a wireless or wired communication means, but may be realized by a means for receiving a broadcast.
  • the third update completion information transmission unit 12304 transmits the update completion information received by the third update completion information reception unit 1203 to the authentication server device 122.
  • the third update completion information transmission unit 1204 is usually realized by a wireless or wired communication means, but may be realized by a broadcasting means.
  • the reception unit 1101 of the operation terminal device 121 receives a control command, and the control command transmission unit 1102 transmits the control command received by the reception unit 1101 to the authentication server device 122.
  • the first operation terminal device identification information transmission unit 12102 reads the operation terminal device identification information from the operation terminal device identification information storage unit 121 01 and authenticates the operation terminal device identification information.
  • Server device 122 The control command and the operation terminal device identification information may be transmitted in one bucket.
  • the first update completion information receiving unit 1103 of the operation terminal device 121 receives the update completion information, and the first update completion information output unit 1104 outputs the update completion information.
  • Authentication server device 122 The two operation terminal device identification information receiving unit 12201 receives the second operation terminal device identification information from the operation terminal device 121. Then, the second control command receiving unit 12202 receives a control command from the operation terminal device 121. Next, the authentication unit 12203 authenticates the operation terminal device 121 based on the received second operation terminal device identification information. As a result of the authentication process, if the authentication is permitted, the second control command transmission unit 12204 transmits a control command to the control server device 123. On the other hand, if the result of the authentication process is that authentication is not permitted, the second control command transmitter 12204 does not transmit a control command to the control server device 123. Since the authentication process is a known technique, detailed description thereof is omitted.
  • control server device 123 Next, the operation of the control server device 123 will be described.
  • the control command receiving unit 12301 of the control server device 123 receives a control command from the authentication server device 122.
  • the protection command transmission unit 1202 configures a protection command from the control command, and transmits the protection command to the mobile terminal device 13 identified by the mobile terminal identification information included in the control command.
  • the third update completion information receiving unit 1203 receives the update completion information
  • the third update completion information transmitting unit 123 04 receives the update completion information from the authentication server. Transfer to device 122.
  • the third personal information receiving unit 1205 and the personal information output unit 1206 perform the same operations as described above.
  • FIG. 1 A conceptual diagram of the information processing system is shown in FIG. 1
  • the personal information storage unit 1301 of the mobile terminal device 13 stores the phone book information shown in FIG.
  • the user of the mobile terminal device 13 loses the mobile terminal device 13, calls the operator of the operation terminal device 121, and personal information of the mobile terminal device 13 (here Now, let's say that you have requested that the phone book information be hidden from the third party.
  • the mobile terminal device 13 when the “Customer DB Invalidation” tag is selected, the type of personal information constituting the control command is “Customer DB”. Then, the mobile terminal device 13 overwrites and updates the customer DB.
  • control command transmission unit 1102 of the operation terminal device 121 configures the control command shown in FIG. 15 based on the information input by the operator of FIG. Further, the first operation terminal device identification information transmission unit 12102 configures the operation terminal device identification information shown in FIG. 15 based on the information input by the operator of FIG. Then, the operation terminal device 121 transmits information shown in FIG. 15 to the authentication server device 122.
  • authentication server apparatus 122 receives the information of FIG. Then, the authentication unit 12203 determines whether or not the operation terminal device identification information of FIG. 15 is the registered operator ID and password. Here, if the operator ID “1234” and the password “XYZQ” are registered, the authentication unit 12203 obtains a determination that authentication is permitted.
  • the second control command transmission unit 12204 transmits the control command in FIG.
  • control command receiving unit 12301 of the control server device 123 receives the control command of FIG.
  • protection command transmission unit 1202 of the control server device 12 acquires the mobile terminal identification information “09011223456” from the control command of FIG.
  • the protection command transmission unit 1202 of the control server device 12 configures a protection command from the control command of FIG.
  • the protection instruction has information of “invalidation” and “phone book”.
  • the protection command transmission unit 1202 transmits the protection command to the mobile terminal device 13 that can be identified by the mobile terminal identification information “09011223456”.
  • the protection command receiving unit 1302 of the mobile terminal device 13 receives the protection command.
  • the updating unit 1303 of the mobile terminal device 13 overwrites and updates the phone book information in accordance with the received protection command.
  • the updating unit 1303 overwrites and updates the phone book information according to the following rules.
  • the updating unit 1303 converts the phone book information in FIG. 6 into the phone book information as shown in FIG. In addition, rewrite.
  • the update completion information transmission unit 1304 of the mobile terminal device 13 configures update completion information, which is information indicating that the update of the phone book information is completed, and transmits it to the control server device 123.
  • the update completion information is transmitted from the control server device 123 to the operation terminal device 121 via the authentication server device 122.
  • the first update completion information receiving unit 1103 of the operation terminal device 121 receives the update completion information.
  • the first update completion information output unit 1104 outputs the update completion information as shown in FIG.
  • the update completion information includes mobile terminal identification information.
  • personal information stored in a terminal such as a mobile phone can be protected. And even after processing personal information, the user can know that personal information existed. For third parties, meaningless information remains, and protection of personal information can be guaranteed. Further, by authenticating the operation terminal device 121, the personal information of the malicious third party power mobile terminal device 13 can be protected.
  • the method for updating personal information is not limited to the method described above.
  • the configuration of the information processing system, the transmission / reception route of the control command or Z and the operation terminal device identification information, etc. are irrelevant!
  • the configuration of the information processing system may be as shown in FIG.
  • the operation terminal device identification information is transmitted from the operation terminal device to the control server device, and from the control server device to the authentication server device, and authentication processing of the operation terminal device is performed.
  • information related to authentication permission Z non-permission is transmitted to the authentication server device force control server device, and a control command is transmitted to the control server device force mobile terminal device only when authentication is permitted.
  • the mobile terminal device then updates the personal information according to the control command.
  • the mobile terminal device updates the phone book information based on the information of the type of personal information included in the control command.
  • the type of personal information included in the control instruction is “customer DB”
  • the mobile terminal device selects information corresponding to “customer DB” and selects the personal information corresponding to “customer DB”.
  • Update The same applies to other embodiments.
  • the processing in the present embodiment may be realized by software. This software may be distributed by software download or the like. In addition, this software may be recorded and distributed on a recording medium such as a CD-ROM. This also applies to other embodiments in this specification.
  • the software that realizes the mobile terminal device in the present embodiment is the following program. In other words, this program overwrites a predetermined character string with respect to the stored personal information in response to the protection command receiving step for receiving the protection command and the reception of the protection command. And a program for executing an update step for updating the personal information.
  • the program causes the computer to further execute an update completion information transmitting step of transmitting update completion information that is information indicating that the personal information has been updated. Program.
  • the program is a program for causing a computer to further execute a personal information transmission step of transmitting the personal information before updating the personal information in the updating step.
  • each process may be realized by centralized processing by a single apparatus (system) or a plurality of apparatuses. It may be realized by distributed processing by.
  • the transmission step for transmitting information and the reception step for receiving information are performed by hardware, for example, a modem or an interface card in the transmission step. Does not include processing (processing that can only be done with software)! /.
  • the computer that executes the program may be singular or plural. That is, centralized processing or distributed processing may be performed.
  • two or more communication means such as a control command transmission unit
  • two or more communication means existing in one apparatus may be physically realized by one medium.
  • the information processing system and the like according to the present invention can protect personal information stored in a terminal such as a mobile phone, and the user can use the personal information even after processing the personal information. It is useful as an information processing system, etc. that has the effect of being able to know the existence of personal information and protects personal information appropriately.
  • FIG. 1 Conceptual diagram of the information processing system in Embodiment 1
  • FIG. 3 is a flowchart for explaining the operation of the control server device.
  • FIG. 4 is a flowchart for explaining the operation of the mobile terminal device.
  • FIG. 5 is a flowchart for explaining the operation of the mobile terminal device.
  • FIG.11 A diagram showing an output example of the update completion information
  • FIG. 12 A conceptual diagram of an information processing system in Embodiment 2.
  • FIG. 14 is a diagram showing an input screen of the operation terminal device
  • FIG. 15 A diagram showing an example of the data structure of the control instruction, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Storage Device Security (AREA)

Abstract

Le problème à résoudre dans le cadre de cette invention concerne un système de traitement d’informations conventionnel dans lequel les informations personnelles devant être protégées sont effacées, et dont l’existence même n’est pas connue par l’utilisateur. La solution proposée pour résoudre ce problème consiste à créer un dispositif de terminal mobile comprenant : une unité de stockage d’informations personnelles pour stocker des informations personnelles ; une unité de réception de commande de protection pour recevoir une commande de protection destinée à protéger des informations personnelles ; et une unité de mise à jour pour mettre à jour les informations personnelles en écrasant une chaîne de caractères prédéfinie dans les informations personnelles dans l’unité de stockage d’informations personnelles dès réception de la commande de protection. Ceci permet la protection des informations personnelles stockées dans un terminal tel qu’un téléphone mobile et un utilisateur peut être averti de l’existence de ces informations personnelles même après traitement de ces données personnelles.
PCT/JP2006/308174 2005-04-27 2006-04-19 Systeme de traitement d’informations, dispositif de terminal mobile, et programme WO2006118029A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2005-129103 2005-04-27
JP2005129103A JP2006309379A (ja) 2005-04-27 2005-04-27 情報処理システム、移動体端末装置、およびプログラム

Publications (1)

Publication Number Publication Date
WO2006118029A1 true WO2006118029A1 (fr) 2006-11-09

Family

ID=37307830

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2006/308174 WO2006118029A1 (fr) 2005-04-27 2006-04-19 Systeme de traitement d’informations, dispositif de terminal mobile, et programme

Country Status (2)

Country Link
JP (1) JP2006309379A (fr)
WO (1) WO2006118029A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07193865A (ja) * 1993-09-13 1995-07-28 Casio Comput Co Ltd 携帯端末装置およびそのセキュリティ方法
JP2000253457A (ja) * 1999-03-01 2000-09-14 Nec Mobile Commun Ltd 個人情報保護機能付き携帯端末装置
JP2001078255A (ja) * 1999-09-01 2001-03-23 Shozo Hagiwara モバイル端末セキュリティシステム
JP2003070063A (ja) * 2001-08-24 2003-03-07 Seiko Epson Corp 無線通信端末装置のデータ保護装置、無線通信端末装置のデータ保護方法及びそのためのシステム

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07193865A (ja) * 1993-09-13 1995-07-28 Casio Comput Co Ltd 携帯端末装置およびそのセキュリティ方法
JP2000253457A (ja) * 1999-03-01 2000-09-14 Nec Mobile Commun Ltd 個人情報保護機能付き携帯端末装置
JP2001078255A (ja) * 1999-09-01 2001-03-23 Shozo Hagiwara モバイル端末セキュリティシステム
JP2003070063A (ja) * 2001-08-24 2003-03-07 Seiko Epson Corp 無線通信端末装置のデータ保護装置、無線通信端末装置のデータ保護方法及びそのためのシステム

Also Published As

Publication number Publication date
JP2006309379A (ja) 2006-11-09

Similar Documents

Publication Publication Date Title
US9456345B2 (en) Device authentication techniques
JP3610341B2 (ja) ネットワーク機器及び遠隔制御中継サーバ
JP4818639B2 (ja) データバックアップシステム
US7921305B2 (en) Portable information terminal and data protecting method
JP6259536B1 (ja) 認証システム、認証方法及びプログラム
JP2000059440A (ja) 特定idコ―ドに基づくデ―タ転送検証
JP4564829B2 (ja) セキュリティシステム
JP2005340976A (ja) 携帯通信端末及びその情報管理方法
US20070208947A1 (en) Portable telephone and program for sending and receiving electronic mail
JP2009193272A (ja) 認証システム及び携帯端末
JP4730208B2 (ja) 通信端末装置
EP1830296A1 (fr) Téléphone portable et programme pour l'envoi et la réception de courrier électronique crypté
JP2003070063A (ja) 無線通信端末装置のデータ保護装置、無線通信端末装置のデータ保護方法及びそのためのシステム
JP2008148048A (ja) 情報端末、ロック制御方法及びロック制御プログラム
JP4501953B2 (ja) チケット認証システム
WO2006118029A1 (fr) Systeme de traitement d’informations, dispositif de terminal mobile, et programme
JP2008071216A (ja) 情報伝達システム、情報伝達計算機及びプログラム
JP2003330885A (ja) ディレクトリサーバパスワード変更システム、方法、プログラム及びパスワード変更管理サーバ
JP2003219013A (ja) 通信端末用データ管理ソフトウェアプログラム
JP2009003700A (ja) アプリケーション所定処理許可プログラム
JP2008217712A (ja) メールサーバアクセス方法及び電子メールシステム
JP5491050B2 (ja) 携帯端末装置及びプログラム
JP2004178565A (ja) 通信管理用サーバ、通信方法、及び、プログラム
JP4104610B2 (ja) 認証情報提供サーバおよび認証情報提供方法
JP4784929B2 (ja) データ送信用サーバ及びこれを備えたデータ送信システム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

NENP Non-entry into the national phase

Ref country code: RU

122 Ep: pct application non-entry in european phase

Ref document number: 06732081

Country of ref document: EP

Kind code of ref document: A1