WO2007083469A1 - Terminal with false use notification function, its method, and program - Google Patents

Terminal with false use notification function, its method, and program Download PDF

Info

Publication number
WO2007083469A1
WO2007083469A1 PCT/JP2006/325191 JP2006325191W WO2007083469A1 WO 2007083469 A1 WO2007083469 A1 WO 2007083469A1 JP 2006325191 W JP2006325191 W JP 2006325191W WO 2007083469 A1 WO2007083469 A1 WO 2007083469A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
unauthorized use
operation input
unit
use notification
Prior art date
Application number
PCT/JP2006/325191
Other languages
French (fr)
Japanese (ja)
Inventor
Hiroo Ikeda
Original Assignee
Nec Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nec Corporation filed Critical Nec Corporation
Publication of WO2007083469A1 publication Critical patent/WO2007083469A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • H04M1/673Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/082Access security using revocation of authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W68/00User notification, e.g. alerting and paging, for incoming communication, change of service or the like
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support

Definitions

  • the present invention relates to a terminal device having a function of notifying unauthorized use when unauthorized use is made, and a method and program thereof, and more particularly to a terminal device and method and program capable of notifying unauthorized use status. About.
  • a terminal device with an unauthorized use notification function, a method thereof, and a program have been used to identify an unauthorized user, to identify an unauthorized use place, and to prevent unauthorized use.
  • Patent Document 1 Japanese Patent Laid-Open No. 2005-136.
  • the terminal device described in Patent Document 1 can prevent abuse by a third party.
  • an abnormal operation is registered in advance.
  • the terminal device detects the occurrence of the abnormal operation and prompts the user to input a release code. If the entered release code does not match the official release code set in advance, the terminal device is locked and the location information of the terminal device is acquired. The acquired location information is also notified to the owner by e-mail via the server device power.
  • the location information of the terminal device is notified to the owner by e-mail.
  • Patent Document 1 Japanese Patent Laid-Open No. 2005-136920
  • the first problem is that the terminal device described in Patent Document 1 cannot notify all unauthorized use performed after the lock state is set. The reason is that even if an unauthorized use operation is performed before the release code is entered by the user in the locked state, the unauthorized use operation will continue until the user enters an incorrect release code. Because you are not notified.
  • the reason is that even if an unauthorized use operation is performed before the release code is entered by the user in the locked state, the unauthorized use operation will continue until the user enters an incorrect release code. Because you are not notified.
  • An object of the present invention is to provide a terminal device with an unauthorized use notification function capable of notifying unauthorized use even if the terminal device is used illegally before incorrect unlocking information is input in a locked state. There is to do.
  • the terminal device with an unauthorized use notification function of the present invention has a function of notifying that when unauthorized use is made and sets a mouth state that restricts a predetermined operation.
  • a terminal device with a function of notifying unauthorized use wherein a release information storage unit for storing unlock information for releasing the locked state, and an operation procedure memory for storing an operation procedure for inputting the unlock information
  • a lock release processing unit that determines whether an operation input received by the receiving unit in the locked state corresponds to an operation procedure stored in the operation procedure storage unit,
  • the collation unit for determining whether the operation input received by the reception unit in the locked state is unlocking information stored in the release information storage unit, and the lock release processing unit When it is determined that the operation procedure is not supported, and when the collation unit determines that
  • the unauthorized use notification method of the present invention has a function of notifying that when unauthorized use is made and can set a lock state that restricts a predetermined operation.
  • An unauthorized use notification method performed by a terminal device with an unauthorized use notification function that stores unlock information for releasing a state, an operation procedure for inputting the unlock information, and a transmission destination of an unauthorized use notification.
  • a determination step for determining whether or not the received operation procedure is supported, and a verification step for determining whether or not the operation input received in the locked state is the stored unlock information.
  • the terminal device with an unauthorized use notification function further includes a voice conversion unit that converts the status information into voice information, the transmission destination is a telephone number, and the communication unit includes the telephone number. It is possible to transmit the voice information converted by the voice converter to a phone having
  • the terminal device with an unauthorized use notification function activates the transmission information acquisition unit at a predetermined time interval after the communication unit transmits the unauthorized use notification, and sends it to the transmission destination storage unit. It is desirable to further include a periodic activation unit that acquires the stored transmission destination and the status information acquired by the acquisition unit.
  • the program for a terminal device with an unauthorized use notification function of the present invention has a function of notifying that when unauthorized use is made, and is capable of setting a lock state that restricts a predetermined operation.
  • the lock release information for releasing the lock state, the operation procedure for inputting the lock release information, and the transmission destination of the unauthorized use notification are stored.
  • This is a program that executes the notification process, and accepts a user's operation input, an acquisition process that obtains status information indicating a situation when the operation input is accepted, and accepts the operation input in the locked state.
  • a determination process for determining whether or not the received operation input corresponds to the stored operation procedure, and the operation input received in the locked state is the stored unlock information.
  • the status information is sent to the transmission destination as the unauthorized use notification.
  • the terminal device is caused to execute an unauthorized use notification process.
  • the present invention it is possible to notify unauthorized use even if the terminal device is used illegally without inputting unlock information. The reason is that unauthorized use is notified even when the operation input that is not the unlock information does not correspond to the operation procedure for entering the unlock information.
  • FIG. 1 is a block diagram showing a configuration of a first exemplary embodiment of the present invention.
  • FIG. 2 is a flowchart showing the operation of the first embodiment of the present invention.
  • FIG. 3 is a block diagram showing a configuration of a second embodiment of the present invention.
  • FIG. 4 is a flowchart showing the operation of the second embodiment of the present invention.
  • FIG. 5 is a flowchart showing the operation of the second embodiment of the present invention.
  • FIG. 6 is a block diagram showing a configuration of the third exemplary embodiment of the present invention.
  • FIG. 7 is a flowchart showing the operation of the third exemplary embodiment of the present invention.
  • FIG. 8 is a block diagram showing a configuration of the fourth exemplary embodiment of the present invention.
  • FIG. 1 is a block diagram showing a terminal device according to the first embodiment of the present invention.
  • the terminal device can set a lock state that restricts a predetermined operation (for example, an operation executed by a predetermined application) that can be executed by the terminal device. .
  • a predetermined operation for example, an operation executed by a predetermined application
  • the terminal device of the first embodiment includes an operation acquisition unit 1, a data processing device 2, a storage device 3, a lock release unit 4, a time acquisition unit 5, a position acquisition unit 6, and a voice acquisition unit. 7, an image / video acquisition unit 8, and a communication unit 9.
  • the operation acquisition unit 1 is an example of a reception unit, and receives and acquires a user's operation input to the terminal device via an operation unit (not shown) such as an operation key connected to the terminal device, for example. .
  • the data processing device 2 operates under program control.
  • the storage device 3 stores information.
  • the lock release unit 4 releases the lock state of the terminal device.
  • Each of the time acquisition unit 5, the position acquisition unit 6, the sound acquisition unit 7, and the image / moving image acquisition unit 8 is an example of an acquisition unit.
  • the acquisition unit acquires status information indicating the status of the terminal device when the operation acquisition unit 1 receives an operation input.
  • the time acquisition unit 5 acquires time from, for example, a clock unit (not shown) in the terminal device.
  • the position acquisition unit 6 uses the GPS function to acquire the position of the terminal device or the presence range of the terminal device from the communicating base station.
  • the sound acquisition unit 7 acquires sound from, for example, a microphone (not shown) connected to the terminal device.
  • the image / moving image acquisition unit 8 acquires an image or a moving image from a camera (not shown) connected to the terminal device.
  • the communication unit 9 transmits the information acquired by the data processing device 2 to the registered transmission destination.
  • the storage device 3 includes an unlock operation list storage unit (hereinafter simply referred to as “storage unit”) 31, an unlock information storage unit (hereinafter simply referred to as “storage unit”) 32, and registration.
  • An unlock information storage unit (hereinafter simply referred to as “storage unit”) 33 and a registered transmission destination storage unit (hereinafter simply referred to as “storage unit”) 34 are provided.
  • the storage unit 31 is an example of an operation procedure storage unit, and stores the correct operation type / operation procedure (operation procedure for inputting correct / unlock information) as a list.
  • the storage unit 32 temporarily stores unlock information (operation input) acquired from the operation acquisition unit 1.
  • the storage unit 33 is an example of a release information storage unit, and stores the lock release information.
  • the correct unlock information is checked against the acquired unlock information, and if they match, the lock state is released.
  • the storage unit 34 is an example of a transmission destination storage unit, and stores an electronic mail address that is a transmission destination of an unauthorized use notification.
  • the data processing device 2 includes an unlock processing unit (hereinafter simply referred to as “processing unit”) 21 and a lock.
  • processing unit an unlock processing unit
  • column unit a release information collation unit
  • acquisition unit a transmission information acquisition unit
  • the processing unit 21 refers to the storage unit 31 and determines whether the operation input from the operation acquisition unit 1 is a correct unlocking operation (operation procedure).
  • the processing unit 21 determines whether the operation input is unlock information, and if the operation input is unlock information, the processing unit 21 stores the operation input in the storage unit 32. Memorize the input.
  • the processing unit 21 determines whether the unlocking operation has been completed based on the list stored in the storage unit 31 and the operation input. When the operation input is not the end of the unlocking operation, the processing unit 21 waits for the operation input from the operation acquisition unit 1.
  • the verification unit 22 stores the unlock information (operation input) stored in the storage unit 32 and the storage unit 33. Then, check the lock release information. When the two unlock information matches, the collation unit 22 causes the unlock unit 4 to unlock the terminal device.
  • the acquisition unit 23 also includes the following when the processing unit 21 determines that the operation input is not a correct unlocking operation only when the verification unit 22 determines that the two unlock information do not match. Perform the operation.
  • the acquisition unit 23 receives the unauthorized use time from the time acquisition unit 4, the location information of the terminal device that is the unauthorized use location from the position acquisition unit 6, and the voice of the unauthorized use status from the voice acquisition unit 7.
  • the image acquisition unit 8 obtains the image of the illegal use status 'moving image'
  • the storage unit 34 obtains the e-mail address that is the destination of the unauthorized use notification
  • the communication unit 9 receives the registered transmission destination (e-mail address that is the destination). The acquired information is transmitted to.
  • FIG. 2 is a flowchart for explaining the operation of the first embodiment.
  • the present invention is based on the premise that the terminal device is in a locked state. Therefore, if the terminal device is not locked, the terminal device performs normal operation (step Sl).
  • the operation acquisition unit 1 acquires an operation input (step S2).
  • the processing unit 21 checks whether the operation input acquired by the operation acquisition unit 1 is correct or not by comparing the operation input with the operation type in the storage unit 31 and a list of operation procedures. (Step S3).
  • step S3 If it is determined in step S3 that the operation input is a correct unlocking operation, the processing unit 21 determines whether or not the acquired operation input is the unlock information power based on the list of operation procedures in the storage unit 31. (Step S4).
  • step S4 If it is determined in step S4 that the operation input is unlock information, the processing unit 21 stores the acquired operation input in the storage unit 32 (step S5). If the operation input is not determined to be unlock information, the processing unit 21 does not store the acquired operation input in the storage unit 32.
  • the processing unit 21 refers to the list of operation procedures in the storage unit 31 and determines whether the operation input is the end of the unlocking operation. If the operation input is not completed, the processing unit 21 returns the process to step S2 and waits for an operation input from the operation acquisition unit 1 (step S6).
  • step S6 If it is determined in step S6 that the operation input is the end of the unlocking operation, the collation unit 22 registers the unlocking information that is the operation input stored in the storage unit 32 and the storage unit 33. The lock release information is collated (step S7).
  • the unlock information is not particularly limited as long as it can be collated information such as a release code (pin code), ecological information (face, fingerprint, vein, voice print, iris, etc.), handwriting, and the like.
  • a release code pin code
  • ecological information face, fingerprint, vein, voice print, iris, etc.
  • handwriting and the like.
  • collation unit 22 causes unlocking unit 4 to unlock the terminal device (step S8).
  • the acquisition unit 23 determines that the operation input is correct in step S3 and is not determined to be an unlock operation, or if the two unlock information does not match in step S7, the operation input is illegally used. It is determined that
  • the obtaining unit 23 obtains the unauthorized use time from the time obtaining unit 5, and obtains the location of the terminal device or the existence range of the terminal device from the location obtaining unit 6 and the unauthorized use location. , Obtain audio information under unauthorized use from the audio acquisition unit 7, obtain image / moving image information under unauthorized use from the image / moving image acquisition unit 8, The e-mail address of the registered transmission destination is acquired from the storage unit 34 (step S9).
  • the communication unit 9 transmits each piece of information acquired in step S 9 to the registered transmission destination e-mail address acquired in step S 9 in the form of a text file and an attached file using binary data. After the transmission, the processing of the terminal device returns to step S2 and waits for an operation input from the operation acquisition unit 1 (step S10).
  • step S2 The operation from step S2 to step S6 will be described in detail with a specific example.
  • the clear key is pressed in the storage unit 31, and then four numeric unlock codes (unlock information) are input and the clear key is pressed.
  • a list of operation types' operation procedures in which the operation input ends the unlock operation is stored.
  • Step S2 when Tariaki is input as an operation input in Step S2, this operation input is corrected and unlocked in Step S3 from the operation type of Tariaki and the operation procedure of starting the unlocking operation. The operation is determined and step S4 is executed.
  • step S4 it is determined from the operation procedure that the clear key and!, And the operation input are not unlock information, and step S6 is executed.
  • step S6 it is determined from the operation procedure that the operation input of the clear key is not the end of the unlocking operation, and the processing power S returns to step S2 and waits for the operation input.
  • this operation input is correct.
  • step S4 is executed.
  • step S4 it is determined from the operation procedure that this operation input is unlock information.
  • Step S5 is executed.
  • step S5 the number that is the operation input is stored in the storage unit 32 as the first unlock information, and then step S6 is executed.
  • step S6 it is determined from the operation procedure that this operation input is not the end of the unlocking operation, and the process returns to step S2 and waits for the operation input.
  • step S6 Through the same procedure, after that, when three numbers are input and the processing is executed up to step S6, the pressing force of the clear key is also the fourth operation input. It is determined that the unlocking operation has ended, and step S7 is executed.
  • step S3 If, in the above step, a numeric key input is entered and a clear key is entered, in step S3, the operation input is based on the operation type of the clear key and the operation procedure of starting the unlocking operation. It is determined that the unlocking operation is correct, and step S4 is executed. At the same time, the operating procedure returns. In other words, the operator must enter the release code from the beginning.
  • the unlock information is a number, but it may be ecological information or the like.
  • step S2 when the unlock information is ecological information will be described in detail using a specific example.
  • the clear key is pressed to start the unlocking operation in the storage unit 31, and after 2 seconds, face information (unlocking information) by face shooting is input and the first operation after pressing the clear key Assume that a list of operation types' operation procedures in which the operation input ends the unlocking operation is stored.
  • Step S2 when Tariaki is input as an operation input in Step S2, this operation input is corrected and unlocked in Step S3 from the operation type of Tariaki and the operation procedure of starting the unlocking operation. The operation is determined and step S4 is executed.
  • step S4 it is determined from the operation procedure that the clear key and!, And the operation input are not unlock information, and step S6 is executed.
  • step S6 it is determined from the operation procedure that the operation input of the clear key is not the end of the unlocking operation, and the processing power S returns to step S2 and waits for the operation input.
  • step S2 when face information obtained by photographing a face after 2 seconds is input as an operation input, from the operation type of face information and the operation procedure of the first operation input from the clear key, The operation input is correct and it is determined that the operation is an unlock operation, and step S4 is executed.
  • step S4 it is determined from the operation procedure that this operation input is unlock information, and step S5 is executed.
  • step S5 face information as an operation input is stored in the storage unit 32 as unlock information, and then step S6 is executed.
  • step S6 from the operation procedure, the operation input, which is face information, ends the unlock operation. And step S7 is executed.
  • steps S2 to S6 can correspond to various operation inputs.
  • face information is used as an operation input by key input or face photography after n seconds, but is generated by a trigger signal generated by lifting the terminal device or by opening / closing the terminal device.
  • Various operation inputs such as a trigger signal may be used.
  • a display (instruction) for prompting a collation operation or the like may be performed at the time of the next operation input of the clear key.
  • the operation input is constantly monitored, and the unauthorized use notification is transmitted even when the operation input that is performed only when the operation input cannot be verified is not a correct unlocking operation.
  • the terminal device when the terminal device is stolen, the user misplaces the terminal device, or the user drops the terminal device, the terminal device becomes inoperable.
  • the user can specify the unauthorized user and the location of unauthorized use from the information on unauthorized use notification.
  • the user can obtain information on the lost terminal device from the information on the unauthorized use notification, and can search for the terminal device.
  • unauthorized information such as unauthorized use time information, terminal device position information, audio information, and image / moving image information is included in the information sent as an unauthorized use notification.
  • unauthorized information such as unauthorized use time information, terminal device position information, audio information, and image / moving image information is included in the information sent as an unauthorized use notification.
  • unlock information is acquired based on operation input monitoring, operation type, and operation procedure. For this reason, in this embodiment, there is no indication of the unlock information verification operation! It can also be used with / ⁇ terminal devices.
  • FIG. 3 is a block diagram illustrating a terminal device according to the second embodiment.
  • the same components as those shown in FIG. 3 are identical to FIG. 3, the same components as those shown in FIG.
  • the terminal device of the second embodiment is that the data processing device 300 has the configuration of the data processing device 2 shown in FIG. Is different.
  • the periodic activation unit 24 starts the operation when receiving the operation start trigger from the acquisition unit 23, and sends the activation trigger to the acquisition unit 23 at a predetermined time interval.
  • the acquisition unit 23 operates in the same manner as the acquisition unit 23 shown in FIG. 1, and also performs the same operation when an activation trigger is received from the periodic activation unit 24. Furthermore, after the acquisition unit 23 transmits the acquisition information from the communication unit 9 to the registered transmission destination, the acquisition unit 23 determines whether the periodic activation unit 24 has started operation, and if the periodic activation unit 24 has not started operation, Then, an operation start trigger is sent to the periodic start unit 24.
  • FIG. 4 the same processes as those shown in FIG. 2 are denoted by the same reference numerals.
  • the operation of the second embodiment is the same as the operation of the first embodiment in that it includes step S11, step S12, step S13, and step S14 in addition to the operation of the first embodiment shown in FIG. Different.
  • the other steps are the same as those in the first embodiment, and a description thereof will be omitted.
  • step S10 of the first embodiment after sending the fraud notification, step S2 is executed, and the processing state of the terminal device waits for an operation input from the operation acquisition unit 1, but in the second embodiment, After sending the fraud notification, step S11 is executed.
  • the acquisition unit 23 determines whether or not the periodic activation unit 24 has started operation after sending the fraud notification. If the periodic activation unit 24 has started operation, step S2 is executed and the terminal device Is waiting for an operation input from the operation acquisition unit 1 (step S11).
  • the acquisition unit 23 sends an operation start trigger to the periodic activation unit 24 to operate the periodic activation unit 24 when the periodic activation unit 24 has not started operation. Thereafter, step S2 is executed, and the processing state of the terminal device waits for an operation input from the operation acquisition unit 1 (step S12).
  • the periodic activation unit 24 Upon receiving the operation start trigger from the acquisition unit 23, the periodic activation unit 24 starts operation and sends the activation trigger to the acquisition unit 23 at a set time interval.
  • the acquisition unit 23 Upon receiving the activation trigger, the acquisition unit 23 acquires the unauthorized use time from the time acquisition unit 5, acquires the location information indicating the unauthorized use location from the location acquisition unit 6, and acquires the audio information from the audio acquisition unit 7. Is acquired, the image / moving image information is acquired from the image / moving image acquisition unit 8, and the registered transmission destination e-mail address is acquired from the storage unit 34 (step S13). There may be a plurality of registered destinations. In that case, the acquired information is transmitted to a plurality of registered transmission destinations at a time.
  • the communication unit 9 transmits each piece of information acquired in step S13 to the registered transmission destination e-mail address acquired in step S13 in the form of a text file and an attached file using binary data (step S14). .
  • FIG. 6 is a block diagram showing a terminal device according to the third embodiment.
  • the same components as those shown in FIG. 6 are identical to FIG. 6, the same components as those shown in FIG.
  • the terminal device of the third embodiment is the first in that the data processing device 301 includes a voice conversion unit 25 in addition to the configuration of the data processing device 2 shown in FIG. Different from the embodiment.
  • the voice conversion unit 25 uses the time information and position information acquired by the acquisition unit 23 as a sound. Convert voice information that can be understood by voice. In addition, if the image “moving image information can identify the object or the feature of the object by object recognition or the like, the sound converting unit 25 converts the image moving image information into sound information. For example, when the name of a person in the image can be specified by face recognition and the character in the image can be specified by character recognition, the voice conversion unit 25 converts them into voice information.
  • the storage unit 34 stores a telephone number instead of an e-mail address as a transmission destination of the unauthorized use notification.
  • the acquisition unit 23 operates in the same manner as the acquisition unit 23 shown in FIG. 1. Further, the audio conversion unit 25 converts time information, position information, and image / moving image information that are not audio information into audio information. Let In addition, the acquisition unit 23 acquires the transmission destination of the unauthorized use notification from the storage unit 34 as a telephone number, and the communication unit 9 announces all the voice ⁇ blueprints to the telephone of the telephone number that is the registered transmission destination. To do.
  • FIG. 7 is a flowchart for explaining the operation of the third embodiment.
  • the same processes as those shown in FIG. 2 are denoted by the same reference numerals.
  • the operation of the third embodiment is different from the operation of the first embodiment in that the operation force of the first embodiment shown in FIG.
  • the other steps are the same as those in the first embodiment, and a description thereof will be omitted.
  • step S9 of the first embodiment the acquiring unit 23 acquires the e-mail address as the registered transmission destination from the storage unit 34, and acquires the telephone number here.
  • the acquisition unit 23 converts the time information, position information, and image'moving image information acquired in step S9 into audio information that the user can understand by voice (step S15).
  • the communication unit 9 announces all the audio information acquired in step S9 and step S15 to the telephone of the registered transmission destination telephone number acquired in step S9. After the announcement, step S2 is executed, and the processing state of the terminal device waits for an operation input from the operation acquisition unit 1 (step S16). If the phone is connected, the communicator 9 may retry the announcement several times at certain time intervals and announce the voice information! / ⁇ .
  • the terminal apparatus capable of receiving the electronic mail is used, and the unauthorized use notification is sent to the telephone. Can be received.
  • the periodic activation unit 24 of the second embodiment may be added to the third embodiment, and the acquisition unit 23 may further operate in the same manner as in the second embodiment.
  • FIG. 8 is a block diagram showing a terminal device according to the fourth embodiment.
  • the same components as those shown in FIG. 1 are denoted by the same reference numerals.
  • a storage device 3 having an image / moving image acquisition unit 8, a communication unit 9, a storage unit 31, a storage unit 32, a storage unit 33, and a storage unit 34 is connected to the computer 200.
  • a computer-readable recording medium 101 that stores a terminal program 100 with an unauthorized use notification function is connected to the computer 200.
  • the computer-readable recording medium 101 is configured by a magnetic disk, a semiconductor memory, or the like, and the terminal program 100 with an unauthorized use notification function stored therein is read by the computer 200 when the computer 200 is started up.
  • the computer 200 is caused to function as the respective units 21, 22, 23 in the data processing device 2 in the first embodiment described above, and the computer 200 is shown in FIG. Allow processing to occur.
  • the terminal device with an unauthorized use notification function according to the first embodiment is realized by a computer and a program.
  • the terminal device with an unauthorized use notification function according to the second and third embodiments is used. May be realized by a computer and a program.
  • the microphone from which the voice acquisition unit 7 acquires voice may be provided in the terminal device, and the camera from which the image 'moving image acquisition unit 8 acquires a moving image' is connected to the terminal device. It may be provided.
  • the present invention can be applied to applications such as a terminal device that notifies an unauthorized use status at the time of unauthorized use, and a program for realizing a terminal device that notifies an unauthorized use status in a computer.
  • the present invention is installed in a terminal device such as a mobile phone, a personal computer, a mobile device, or a network device having a function of notifying unauthorized use status
  • a terminal device such as a mobile phone, a personal computer, a mobile device, or a network device having a function of notifying unauthorized use status
  • the user who has stolen the terminal device will be If the user has misplaced or dropped the terminal device and the user is away from the terminal device, the present invention will identify the unauthorized user from the notification of the unauthorized use status due to unauthorized use by a third party, It can also be used for identification purposes, and for capturing unauthorized users and searching for equipment.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)

Abstract

A terminal having a function of notifying a false use if made and a false use notification function capable of setting a locked state to limit a predetermined action comprises a storage unit (33) for storing unlocking information for canceling a locked state, a storage unit (31) for storing the operation procedures to input unlocking information, a storage unit (34) for storing the address to which a false use notification is sent, a receiving section (1) for receiving an operation input by the user, acquiring sections (5 to 8) for acquiring situation information representing the situation of when the receiving section (1) receives an operation input, an unlocking processing section (21) for judging whether or not the operation input received by the receiving section (1) in a locked state corresponds to the operation procedures stored in the storage unit (31), a checking section (22) for judging whether or not the operation input is the unlocking information stored in the storage unit (33), a transmission information acquiring section (23) for acquiring the transmission address stored in the storage section (34) and the situation information acquired by the acquiring sections (5 to 8) when the unlocking processing section (21) judges that the operation input does not correspond to the operation procedures and when the checking section (22) judges that the operation input is not the unlocking information, and a communication section (9) for transmitting the situation information acquired by the transmission information acquiring section (23) as a false use notification to the transmission address acquired by the transmission information acquiring section (23).

Description

明 細 書  Specification
不正使用通知機能つき端末装置及びその方法ならびにプログラム 技術分野  Technical field of terminal device and method and program with unauthorized use notification function
[0001] 本発明は、不正な使用がなされたときに不正使用を通知する機能を備える端末装 置及びその方法ならびにプログラムに関し、特に、不正使用の状況を通知できる端 末装置及びその方法ならびにプログラムに関する。  TECHNICAL FIELD [0001] The present invention relates to a terminal device having a function of notifying unauthorized use when unauthorized use is made, and a method and program thereof, and more particularly to a terminal device and method and program capable of notifying unauthorized use status. About.
背景技術  Background art
[0002] 従来、不正使用通知機能つき端末装置及びその方法ならびにプログラムは、不正 使用者を特定するため、不正使用場所を特定するため、および、不正使用を防止す るために用いられている。  Conventionally, a terminal device with an unauthorized use notification function, a method thereof, and a program have been used to identify an unauthorized user, to identify an unauthorized use place, and to prevent unauthorized use.
[0003] 従来の不正使用通知機能つき端末装置の一例が、特許文献 1 (特開 2005— 136An example of a conventional terminal device with an unauthorized use notification function is disclosed in Patent Document 1 (Japanese Patent Laid-Open No. 2005-136).
920号公報)に記載されている。特許文献 1に記載された端末装置は、第三者による 悪用を防止できる。 920). The terminal device described in Patent Document 1 can prevent abuse by a third party.
[0004] この端末装置では、まず、予め異常操作が登録される。登録された異常操作が行 われた場合、端末装置は、異常操作の発生を検出し、解除コードの入力を促す。入 力された解除コードが予め設定された正式の解除コードと不一致であった場合、端 末装置にロックがかかり、端末装置の位置情報が取得される。取得された位置情報 は、端末装置力もサーバを経由し、電子メールにて所有者に通知される。  In this terminal device, first, an abnormal operation is registered in advance. When the registered abnormal operation is performed, the terminal device detects the occurrence of the abnormal operation and prompts the user to input a release code. If the entered release code does not match the official release code set in advance, the terminal device is locked and the location information of the terminal device is acquired. The acquired location information is also notified to the owner by e-mail via the server device power.
[0005] また、ロック状態が設定された後に入力された解除コードが、正式の解除コードと異 なると、端末装置の位置情報が、電子メールにて所有者に通知される。  [0005] If the release code entered after the lock state is set is different from the official release code, the location information of the terminal device is notified to the owner by e-mail.
特許文献 1 :特開 2005— 136920号公報  Patent Document 1: Japanese Patent Laid-Open No. 2005-136920
発明の開示  Disclosure of the invention
発明が解決しょうとする課題  Problems to be solved by the invention
[0006] 第 1の問題点は、特許文献 1に記載された端末装置は、ロック状態が設定された後 に行われる全ての不正使用を通知できないことである。その理由は、ロック状態にお いて、利用者にて解除コードが入力される前に不正使用操作が行われても、その不 正使用操作は、利用者が誤った解除コードを入力するまで、通知されないためであ る。 [0006] The first problem is that the terminal device described in Patent Document 1 cannot notify all unauthorized use performed after the lock state is set. The reason is that even if an unauthorized use operation is performed before the release code is entered by the user in the locked state, the unauthorized use operation will continue until the user enters an incorrect release code. Because you are not notified. The
[0007] 本発明の目的は、ロック状態で、誤ったロック解除情報が入力される以前に端末装 置が不正に使用されても、その不正使用を通知できる不正使用通知機能つき端末 装置を提供することにある。  [0007] An object of the present invention is to provide a terminal device with an unauthorized use notification function capable of notifying unauthorized use even if the terminal device is used illegally before incorrect unlocking information is input in a locked state. There is to do.
課題を解決するための手段  Means for solving the problem
[0008] 上記目的を達成するため、本発明の不正使用通知機能つき端末装置は、不正な 使用がなされたときにその旨を通知する機能を備えるとともに所定動作を制限する口 ック状態を設定可能な不正使用通知機能つき端末装置であって、前記ロック状態を 解除するためのロック解除情報を記憶する解除情報記憶部と、前記ロック解除情報 を入力するための操作手順を記憶する操作手順記憶部と、不正使用通知の送信先 を記憶する送信先記憶部と、利用者の操作入力を受け付ける受付部と、前記受付部 が前記操作入力を受け付けたときの状況を示す状況情報を取得する取得部と、前記 ロック状態のときに前記受付部が受け付けた操作入力が、前記操作手順記憶部に記 憶された操作手順に対応するか否かを判定するロック解除処理部と、前記ロック状態 のときに前記受付部が受け付けた操作入力が、前記解除情報記憶部に記憶された ロック解除情報である力否かを判定する照合部と、前記ロック解除処理部が前記操 作入力は前記操作手順に対応しないと判定した場合、および、前記照合部が前記 操作入力は前記ロック解除情報でないと判定した場合に、前記送信先記憶部に記 憶された送信先と、前記取得部が取得した状況情報と、を取得する送信情報取得部 と、前記送信情報取得部が取得した送信先に、該送信情報取得部が取得した状況 情報を前記不正使用通知として送信する通信部とを備える。  [0008] In order to achieve the above object, the terminal device with an unauthorized use notification function of the present invention has a function of notifying that when unauthorized use is made and sets a mouth state that restricts a predetermined operation. A terminal device with a function of notifying unauthorized use, wherein a release information storage unit for storing unlock information for releasing the locked state, and an operation procedure memory for storing an operation procedure for inputting the unlock information A transmission destination storage unit for storing a transmission destination of an unauthorized use notification, a reception unit that receives a user's operation input, and acquisition that acquires status information indicating a situation when the reception unit receives the operation input A lock release processing unit that determines whether an operation input received by the receiving unit in the locked state corresponds to an operation procedure stored in the operation procedure storage unit, The collation unit for determining whether the operation input received by the reception unit in the locked state is unlocking information stored in the release information storage unit, and the lock release processing unit When it is determined that the operation procedure is not supported, and when the collation unit determines that the operation input is not the unlock information, the transmission destination stored in the transmission destination storage unit and the acquisition unit A transmission information acquisition unit that acquires the status information acquired; and a communication unit that transmits the status information acquired by the transmission information acquisition unit to the transmission destination acquired by the transmission information acquisition unit as the unauthorized use notification. .
[0009] また、本発明の不正使用の通知方法は、不正な使用がなされたときにその旨を通 知する機能を備えるとともに所定動作を制限するロック状態を設定可能であり、また、 該ロック状態を解除するためのロック解除情報、前記ロック解除情報を入力するため の操作手順、および、不正使用通知の送信先、を記憶する、不正使用通知機能つき 端末装置が行う不正使用の通知方法であって、利用者の操作入力を受け付ける受 付ステップと、前記操作入力を受け付けたときの状況を示す状況情報を取得する取 得ステップと、前記ロック状態のときに受け付けられた前記操作入力が、前記記憶さ れた操作手順に対応するか否かを判定する判定ステップと、前記ロック状態のときに 受け付けられた前記操作入力が、前記記憶されたロック解除情報である力否かを判 定する照合ステップと、前記操作入力が前記操作手順に対応しない場合、および、 前記操作入力が前記ロック解除情報でない場合に、前記送信先に前記不正使用通 知として前記状況情報を送信する送信ステップとを備える。 In addition, the unauthorized use notification method of the present invention has a function of notifying that when unauthorized use is made and can set a lock state that restricts a predetermined operation. An unauthorized use notification method performed by a terminal device with an unauthorized use notification function that stores unlock information for releasing a state, an operation procedure for inputting the unlock information, and a transmission destination of an unauthorized use notification. A receiving step for receiving a user's operation input; an acquisition step for acquiring status information indicating a status when the operation input is received; and the operation input received in the locked state. Remembered A determination step for determining whether or not the received operation procedure is supported, and a verification step for determining whether or not the operation input received in the locked state is the stored unlock information. A transmission step of transmitting the status information as the unauthorized use notification to the transmission destination when the operation input does not correspond to the operation procedure, and when the operation input is not the unlock information.
[0010] 上記発明によれば、操作入力がロック解除情報でない場合だけでなぐ操作入力 力 ック解除情報を入力するための操作手順に対応しない場合にも、不正使用が通 知される。このため、ロック解除情報が入力されずに、端末装置が不正に使用されて も、不正使用を通知することが可能となる。  [0010] According to the above invention, unauthorized use is notified even when the operation input does not correspond to the operation procedure for inputting the operation input lock release information only when the operation input is not the lock release information. For this reason, even if the terminal device is used illegally without entering the unlock information, it is possible to notify the unauthorized use.
[0011] なお、上記不正使用通知機能つき端末装置は、前記状況情報を音声情報に変換 する音声変換部をさらに備え、前記送信先は、電話番号であり、前記通信部は、前 記電話番号を有する電話に、前記音声変換部にて変換された音声情報を送信する ことが可能である。  [0011] Note that the terminal device with an unauthorized use notification function further includes a voice conversion unit that converts the status information into voice information, the transmission destination is a telephone number, and the communication unit includes the telephone number. It is possible to transmit the voice information converted by the voice converter to a phone having
[0012] 上記発明によれば、例えば、メールアドレスを持たな 、携帯電話等の端末装置へ 不正使用通知を送信することが可能になる。  [0012] According to the above invention, for example, it is possible to transmit an unauthorized use notification to a terminal device such as a mobile phone without having a mail address.
[0013] また、上記不正使用通知機能つき端末装置は、前記通信部が前記不正使用通知 を送信した後、所定時間間隔で、前記送信情報取得部を起動して、前記送信先記 憶部に記憶された送信先と、前記取得部が取得した状況情報と、を取得させる定期 起動部をさらに備えることが望ましい。  [0013] In addition, the terminal device with an unauthorized use notification function activates the transmission information acquisition unit at a predetermined time interval after the communication unit transmits the unauthorized use notification, and sends it to the transmission destination storage unit. It is desirable to further include a periodic activation unit that acquires the stored transmission destination and the status information acquired by the acquisition unit.
[0014] 上記発明によれば、不正使用に関する情報を、所定時間間隔で取得することが可 能となり、例えば、不正使用者または不正使用場所を特定しやすくなる。  [0014] According to the above invention, it is possible to acquire information related to unauthorized use at predetermined time intervals, and for example, it is easy to specify an unauthorized user or an unauthorized use location.
[0015] また、本発明の不正使用通知機能つき端末装置用プログラムは、不正な使用がな されたときにその旨を通知する機能を備えるとともに所定動作を制限するロック状態 を設定可能であり、また、該ロック状態を解除するためのロック解除情報、前記ロック 解除情報を入力するための操作手順、および、不正使用通知の送信先、を記憶する 、不正使用通知機能つき端末装置に、不正使用の通知処理を実行させるプログラム であって、利用者の操作入力を受け付ける受付処理と、前記操作入力を受け付けた ときの状況を示す状況情報を取得する取得処理と、前記ロック状態のときに受け付け られた前記操作入力が、前記記憶された操作手順に対応するか否かを判定する判 定処理と、前記ロック状態のときに受け付けられた前記操作入力が、前記記憶された ロック解除情報である力否かを判定する照合処理と、前記操作入力が前記操作手順 に対応しない場合、および、前記操作入力が前記ロック解除情報でない場合に、前 記送信先に前記不正使用通知として前記状況情報を送信する送信処理と、を備える 不正使用の通知処理を、前記端末装置に実行させる。 [0015] Further, the program for a terminal device with an unauthorized use notification function of the present invention has a function of notifying that when unauthorized use is made, and is capable of setting a lock state that restricts a predetermined operation. Further, the lock release information for releasing the lock state, the operation procedure for inputting the lock release information, and the transmission destination of the unauthorized use notification are stored. This is a program that executes the notification process, and accepts a user's operation input, an acquisition process that obtains status information indicating a situation when the operation input is accepted, and accepts the operation input in the locked state. A determination process for determining whether or not the received operation input corresponds to the stored operation procedure, and the operation input received in the locked state is the stored unlock information. When the operation input does not correspond to the operation procedure and when the operation input is not the unlock information, the status information is sent to the transmission destination as the unauthorized use notification. The terminal device is caused to execute an unauthorized use notification process.
[0016] 上記発明によれば、上記不正使用の通知方法をコンピュータに行わせることが可 能となる。  [0016] According to the above invention, it is possible to cause a computer to perform the unauthorized use notification method.
発明の効果  The invention's effect
[0017] 本発明によれば、ロック解除情報が入力されずに、端末装置が不正に使用されても 、不正使用を通知することが可能となる。その理由は、操作入力がロック解除情報で ない場合だけでなぐ操作入力がロック解除情報を入力するための操作手順に対応 しない場合にも、不正使用が通知されるからである。  [0017] According to the present invention, it is possible to notify unauthorized use even if the terminal device is used illegally without inputting unlock information. The reason is that unauthorized use is notified even when the operation input that is not the unlock information does not correspond to the operation procedure for entering the unlock information.
図面の簡単な説明  Brief Description of Drawings
[0018] [図 1]図 1は、本発明の第 1実施形態の構成を示すブロック図である。 [0018] FIG. 1 is a block diagram showing a configuration of a first exemplary embodiment of the present invention.
[図 2]図 2は、本発明の第 1実施形態の動作を示すフローチャートである。  FIG. 2 is a flowchart showing the operation of the first embodiment of the present invention.
[図 3]図 3は、本発明の第 2実施形態の構成を示すブロック図である。  FIG. 3 is a block diagram showing a configuration of a second embodiment of the present invention.
[図 4]図 4は、本発明の第 2実施形態の動作を示すフローチャートである。  FIG. 4 is a flowchart showing the operation of the second embodiment of the present invention.
[図 5]図 5は、本発明の第 2実施形態の動作を示すフローチャートである。  FIG. 5 is a flowchart showing the operation of the second embodiment of the present invention.
[図 6]図 6は、本発明の第 3実施形態の構成を示すブロック図である。  FIG. 6 is a block diagram showing a configuration of the third exemplary embodiment of the present invention.
[図 7]図 7は、本発明の第 3実施形態の動作を示すフローチャートである。  FIG. 7 is a flowchart showing the operation of the third exemplary embodiment of the present invention.
[図 8]図 8は、本発明の第 4実施形態の構成を示すブロック図である。  FIG. 8 is a block diagram showing a configuration of the fourth exemplary embodiment of the present invention.
符号の説明  Explanation of symbols
[0019] 1 操作取得部 [0019] 1 Operation acquisition unit
2 データ処理装置  2 Data processing equipment
3 記憶装置  3 Storage device
4 ロック解除咅  4 Unlocking
5 時刻取得部 6 位置取得部 5 Time acquisition unit 6 Position acquisition unit
7 音声取得部  7 Voice acquisition unit
8 画像,動画像取得部  8 Image and video acquisition unit
9 通信部  9 Communications department
21 ロック解除処理部  21 Unlock processing section
22 ロック解除情報照合部  22 Unlock information verification part
23 送信情報取得部  23 Transmission information acquisition unit
24 定期起動部  24 Periodic startup section
25 音声変換部  25 Voice converter
31 ロック解除操作リスト記憶部  31 Unlock operation list storage
32 ロック解除情報記憶部  32 Unlock information storage
33 登録ロック解除情報記憶部  33 Registration lock release information storage
34 登録送信先記憶部  34 Registered transmission destination storage
100 不正使用通知機能つき端末用プログラム  100 Program for terminal with unauthorized use notification function
101 コンピュータ可読記録媒体  101 Computer-readable recording medium
200 コンピュータ  200 computers
300 データ処理装置  300 data processor
301 データ処理装置  301 Data processor
発明を実施するための最良の形態  BEST MODE FOR CARRYING OUT THE INVENTION
[0020] 次に、本発明を実施するための最良の形態について図面を参照して詳細に説明 する。  Next, the best mode for carrying out the present invention will be described in detail with reference to the drawings.
[0021] 図 1は、本発明の第 1実施形態の端末装置を示したブロック図である。  FIG. 1 is a block diagram showing a terminal device according to the first embodiment of the present invention.
[0022] 図 1を参照すると、第 1実施形態の端末装置は、端末装置が実行可能な所定動作 ( 例えば、所定のアプリケーションにて実行される動作)を制限するロック状態を設定可 能である。  Referring to FIG. 1, the terminal device according to the first embodiment can set a lock state that restricts a predetermined operation (for example, an operation executed by a predetermined application) that can be executed by the terminal device. .
[0023] 第 1実施形態の端末装置は、操作取得部 1と、データ処理装置 2と、記憶装置 3と、 ロック解除部 4と、時刻取得部 5と、位置取得部 6と、音声取得部 7と、画像,動画像取 得部 8と、通信部 9とを含む。 [0024] 操作取得部 1は、受付部の一例であり、例えば端末装置に接続された操作キー等 の操作部 (不図示)を介して、端末装置に対する利用者の操作入力を受け付けて取 得する。 The terminal device of the first embodiment includes an operation acquisition unit 1, a data processing device 2, a storage device 3, a lock release unit 4, a time acquisition unit 5, a position acquisition unit 6, and a voice acquisition unit. 7, an image / video acquisition unit 8, and a communication unit 9. [0024] The operation acquisition unit 1 is an example of a reception unit, and receives and acquires a user's operation input to the terminal device via an operation unit (not shown) such as an operation key connected to the terminal device, for example. .
[0025] データ処理装置 2は、プログラム制御により動作する。記憶装置 3は、情報を記憶す る。ロック解除部 4は、端末装置のロック状態を解除する。  [0025] The data processing device 2 operates under program control. The storage device 3 stores information. The lock release unit 4 releases the lock state of the terminal device.
[0026] 時刻取得部 5、位置取得部 6、音声取得部 7および画像 ·動画像取得部 8のそれぞ れは、取得部の一例である。取得部は、操作取得部 1が操作入力を受け付けたとき の端末装置の状況を示す状況情報を取得する。  [0026] Each of the time acquisition unit 5, the position acquisition unit 6, the sound acquisition unit 7, and the image / moving image acquisition unit 8 is an example of an acquisition unit. The acquisition unit acquires status information indicating the status of the terminal device when the operation acquisition unit 1 receives an operation input.
[0027] 時刻取得部 5は、例えば、端末装置内の時計部(不図示)から時刻を取得する。位 置取得部 6は、 GPS機能を用いて端末装置の位置、または、通信を行っている基地 局から端末装置の存在範囲を取得する。音声取得部 7は、例えば、端末装置に接続 されたマイク (不図示)から音声を取得する。画像'動画像取得部 8は、例えば、端末 装置に接続されたカメラ (不図示)カゝら画像または動画像を取得する。  [0027] The time acquisition unit 5 acquires time from, for example, a clock unit (not shown) in the terminal device. The position acquisition unit 6 uses the GPS function to acquire the position of the terminal device or the presence range of the terminal device from the communicating base station. The sound acquisition unit 7 acquires sound from, for example, a microphone (not shown) connected to the terminal device. For example, the image / moving image acquisition unit 8 acquires an image or a moving image from a camera (not shown) connected to the terminal device.
[0028] 通信部 9は、データ処理装置 2が取得した情報を登録送信先に送信する。  The communication unit 9 transmits the information acquired by the data processing device 2 to the registered transmission destination.
[0029] 記憶装置 3は、ロック解除操作リスト記憶部(以下、単に「記憶部」と称する。 ) 31と、 ロック解除情報記憶部 (以下、単に「記憶部」と称する。) 32と、登録ロック解除情報記 憶部(以下、単に「記憶部」と称する。) 33と、登録送信先記憶部(以下、単に「記憶 部」と称する。) 34とを備えている。  The storage device 3 includes an unlock operation list storage unit (hereinafter simply referred to as “storage unit”) 31, an unlock information storage unit (hereinafter simply referred to as “storage unit”) 32, and registration. An unlock information storage unit (hereinafter simply referred to as “storage unit”) 33 and a registered transmission destination storage unit (hereinafter simply referred to as “storage unit”) 34 are provided.
[0030] 記憶部 31は、操作手順記憶部の一例であり、正 、ロック解除の操作種類 ·操作 手順 (正 、ロック解除情報を入力するための操作手順)をリストとして記憶して 、る。  [0030] The storage unit 31 is an example of an operation procedure storage unit, and stores the correct operation type / operation procedure (operation procedure for inputting correct / unlock information) as a list.
[0031] 記憶部 32は、操作取得部 1から取得したロック解除情報 (操作入力)を、一時的に 記憶している。  The storage unit 32 temporarily stores unlock information (operation input) acquired from the operation acquisition unit 1.
[0032] 記憶部 33は、解除情報記憶部の一例であり、正 、ロック解除情報を記憶して 、る 。正しいロック解除情報は、取得されたロック解除情報と照合され、これらが一致する と、ロック状態が解除される。  The storage unit 33 is an example of a release information storage unit, and stores the lock release information. The correct unlock information is checked against the acquired unlock information, and if they match, the lock state is released.
[0033] 記憶部 34は、送信先記憶部の一例であり、不正使用通知の送信先である電子メー ルアドレスを記憶して 、る。  [0033] The storage unit 34 is an example of a transmission destination storage unit, and stores an electronic mail address that is a transmission destination of an unauthorized use notification.
[0034] データ処理装置 2は、ロック解除処理部(以下、単に「処理部」と称する。) 21と、ロッ ク解除情報照合部 (以下、単に「照合部」と称する。) 22と、送信情報取得部 (以下、 単に「取得部」と称する。) 23とを備えている。 The data processing device 2 includes an unlock processing unit (hereinafter simply referred to as “processing unit”) 21 and a lock. A release information collation unit (hereinafter simply referred to as “collation unit”) 22 and a transmission information acquisition unit (hereinafter simply referred to as “acquisition unit”) 23 are provided.
[0035] 処理部 21は、記憶部 31を参照し、操作取得部 1からの操作入力が正しいロック解 除操作 (操作手順)であるかを判定する。 The processing unit 21 refers to the storage unit 31 and determines whether the operation input from the operation acquisition unit 1 is a correct unlocking operation (operation procedure).
[0036] また、処理部 21は、操作入力が正しいロック解除操作である場合、その操作入力 がロック解除情報かを判定し、その操作入力がロック解除情報なら、記憶部 32に、そ の操作入力を記憶する。 [0036] If the operation input is a correct unlocking operation, the processing unit 21 determines whether the operation input is unlock information, and if the operation input is unlock information, the processing unit 21 stores the operation input in the storage unit 32. Memorize the input.
[0037] さらに、処理部 21は、記憶部 31に記憶されたリストと操作入力とに基づいて、ロック 解除操作が終了したかを判定する。操作入力がロック解除操作の終了でない場合、 処理部 21は、操作取得部 1からの操作入力待ちとなる。 Furthermore, the processing unit 21 determines whether the unlocking operation has been completed based on the list stored in the storage unit 31 and the operation input. When the operation input is not the end of the unlocking operation, the processing unit 21 waits for the operation input from the operation acquisition unit 1.
[0038] 照合部 22は、処理部 21がロック解除操作は終了したと判定した場合に、記憶部 32 に記憶されたロック解除情報 (操作入力)と、記憶部 33に記憶されて 、る正し 、ロック 解除情報とを照合する。 2つのロック解除情報が一致する場合、照合部 22は、ロック 解除部 4に、端末装置のロック状態を解除させる。 [0038] When the processing unit 21 determines that the unlocking operation has been completed, the verification unit 22 stores the unlock information (operation input) stored in the storage unit 32 and the storage unit 33. Then, check the lock release information. When the two unlock information matches, the collation unit 22 causes the unlock unit 4 to unlock the terminal device.
[0039] 取得部 23は、照合部 22が 2つのロック解除情報は一致しな 、と判定した場合だけ でなぐ処理部 21が操作入力は正しいロック解除操作でないと判定した場合にも、以 下の動作を行う。 [0039] The acquisition unit 23 also includes the following when the processing unit 21 determines that the operation input is not a correct unlocking operation only when the verification unit 22 determines that the two unlock information do not match. Perform the operation.
[0040] 取得部 23は、時刻取得部 4から不正使用時刻を、位置取得部 6から不正使用場所 である端末装置の位置情報を、音声取得部 7から不正使用状況の音声を、画像'動 画像取得部 8から不正使用状況の画像'動画像を、記憶部 34から不正使用通知の 送信先である電子メールアドレスを取得し、通信部 9から登録送信先 (送信先である 電子メールアドレス)へ、それら取得した情報を送信する。  [0040] The acquisition unit 23 receives the unauthorized use time from the time acquisition unit 4, the location information of the terminal device that is the unauthorized use location from the position acquisition unit 6, and the voice of the unauthorized use status from the voice acquisition unit 7. The image acquisition unit 8 obtains the image of the illegal use status 'moving image', the storage unit 34 obtains the e-mail address that is the destination of the unauthorized use notification, and the communication unit 9 receives the registered transmission destination (e-mail address that is the destination). The acquired information is transmitted to.
[0041] 次に、図 1及び図 2を参照して第 1実施形態の動作について詳細に説明する。なお 、図 2は、第 1実施形態の動作を説明するためのフローチャートである。  Next, the operation of the first embodiment will be described in detail with reference to FIG. 1 and FIG. FIG. 2 is a flowchart for explaining the operation of the first embodiment.
[0042] 本発明は、端末装置がロック状態であることを前提としている。よって、ロック状態で ない場合、端末装置は、通常動作を行う (ステップ Sl)。  [0042] The present invention is based on the premise that the terminal device is in a locked state. Therefore, if the terminal device is not locked, the terminal device performs normal operation (step Sl).
[0043] 端末装置がロック状態のとき、操作取得部 1は、操作入力を取得する (ステップ S2) [0044] 処理部 21は、操作取得部 1にて取得された操作入力が正しいロック解除操作カゝ否 かを、その操作入力と記憶部 31内の操作種類'操作手順のリストとを照らし合わせて 判定する (ステップ S3)。 [0043] When the terminal device is in the locked state, the operation acquisition unit 1 acquires an operation input (step S2). [0044] The processing unit 21 checks whether the operation input acquired by the operation acquisition unit 1 is correct or not by comparing the operation input with the operation type in the storage unit 31 and a list of operation procedures. (Step S3).
[0045] ステップ S3で操作入力が正しいロック解除操作と判定されたならば、処理部 21は、 記憶部 31の操作手順のリストに基づいて、取得した操作入力がロック解除情報力否 かを判定する (ステップ S4)。  [0045] If it is determined in step S3 that the operation input is a correct unlocking operation, the processing unit 21 determines whether or not the acquired operation input is the unlock information power based on the list of operation procedures in the storage unit 31. (Step S4).
[0046] ステップ S4にて操作入力がロック解除情報と判定されたならば、処理部 21は、取 得した操作入力を記憶部 32に記憶する (ステップ S5)。操作入力がロック解除情報と 判定されないと、処理部 21は、取得した操作入力を記憶部 32に記憶しない。  If it is determined in step S4 that the operation input is unlock information, the processing unit 21 stores the acquired operation input in the storage unit 32 (step S5). If the operation input is not determined to be unlock information, the processing unit 21 does not store the acquired operation input in the storage unit 32.
[0047] その後、処理部 21は、記憶部 31の操作手順のリストを参照して、操作入力がロック 解除操作の終了であるかを判定する。操作入力が終了でないならば、処理部 21は、 処理をステップ S 2に戻して、操作取得部 1からの操作入力待ちとなる (ステップ S6)。  Thereafter, the processing unit 21 refers to the list of operation procedures in the storage unit 31 and determines whether the operation input is the end of the unlocking operation. If the operation input is not completed, the processing unit 21 returns the process to step S2 and waits for an operation input from the operation acquisition unit 1 (step S6).
[0048] ステップ S6で操作入力がロック解除操作の終了であると判定されたならば、照合部 22は、記憶部 32に記憶された、操作入力であるロック解除情報と、記憶部 33に登録 してお 、たロック解除情報と、を照合する (ステップ S7)。  [0048] If it is determined in step S6 that the operation input is the end of the unlocking operation, the collation unit 22 registers the unlocking information that is the operation input stored in the storage unit 32 and the storage unit 33. The lock release information is collated (step S7).
[0049] ロック解除情報は、解除コード (ピンコード)、生態情報 (顔、指紋、静脈、声紋、虹 彩等)、筆跡、等、照合可能な情報であれば、特に制限されない。  [0049] The unlock information is not particularly limited as long as it can be collated information such as a release code (pin code), ecological information (face, fingerprint, vein, voice print, iris, etc.), handwriting, and the like.
[0050] 照合部 22は、ステップ S7でそれら 2つのロック解除情報が一致するならば、ロック 解除部 4に、端末装置のロック状態を解除させる (ステップ S8)。  [0050] If the two unlock information matches in step S7, collation unit 22 causes unlocking unit 4 to unlock the terminal device (step S8).
[0051] 取得部 23は、ステップ S3で操作入力が正 、ロック解除操作と判定されな 、、もし くは、ステップ S 7で 2つのロック解除情報が一致しないならば、その操作入力は不正 使用を示すと判定する。  [0051] The acquisition unit 23 determines that the operation input is correct in step S3 and is not determined to be an unlock operation, or if the two unlock information does not match in step S7, the operation input is illegally used. It is determined that
[0052] 操作入力が不正使用を示す場合、取得部 23は、時刻取得部 5から不正使用時刻 を取得し、位置取得部 6から端末装置の位置または端末装置の存在範囲と 、う不正 使用場所を示す位置情報を取得し、音声取得部 7から不正使用状況下での音声情 報を取得し、画像 ·動画像取得部 8から不正使用状況下での画像 ·動画像情報を取 得し、記憶部 34から登録送信先の電子メールアドレスを取得する (ステップ S9)。  [0052] When the operation input indicates unauthorized use, the obtaining unit 23 obtains the unauthorized use time from the time obtaining unit 5, and obtains the location of the terminal device or the existence range of the terminal device from the location obtaining unit 6 and the unauthorized use location. , Obtain audio information under unauthorized use from the audio acquisition unit 7, obtain image / moving image information under unauthorized use from the image / moving image acquisition unit 8, The e-mail address of the registered transmission destination is acquired from the storage unit 34 (step S9).
[0053] 登録送信先は、複数であってもよい。その場合、一度に複数の登録送信先へ、取 得された情報が送信される。 There may be a plurality of registered transmission destinations. In that case, send to multiple registered destinations at once. The obtained information is transmitted.
[0054] 通信部 9は、ステップ S 9で取得した登録送信先の電子メールアドレスに、ステップ S 9で取得した各情報を、テキストファイルとバイナリデータによる添付ファイルの形で送 信する。送信後、端末装置の処理は、ステップ S2へ戻って、操作取得部 1からの操 作入力待ちとなる (ステップ S 10)。  The communication unit 9 transmits each piece of information acquired in step S 9 to the registered transmission destination e-mail address acquired in step S 9 in the form of a text file and an attached file using binary data. After the transmission, the processing of the terminal device returns to step S2 and waits for an operation input from the operation acquisition unit 1 (step S10).
[0055] ステップ S2からステップ S6の動作を、具体的な例を挙げて詳細に説明する。 [0055] The operation from step S2 to step S6 will be described in detail with a specific example.
[0056] 例えば、記憶部 31に、ロック解除操作の開始はクリアキーが押され、次に 4つの数 字の解除コード (ロック解除情報)が操作入力され、クリアキーの押下力 4つ目の操 作入力がロック解除操作の終了となる、という操作種類'操作手順のリストが記憶され ていたとする。 [0056] For example, when the unlocking operation is started, the clear key is pressed in the storage unit 31, and then four numeric unlock codes (unlock information) are input and the clear key is pressed. Suppose that a list of operation types' operation procedures in which the operation input ends the unlock operation is stored.
[0057] まず、ステップ S2で操作入力としてタリアキ一が入力されると、ステップ S3では、タリ アキ一という操作種類と、ロック解除操作の開始という操作手順から、この操作入力は 正し 、ロック解除操作であると判定され、ステップ S4が実行される。  [0057] First, when Tariaki is input as an operation input in Step S2, this operation input is corrected and unlocked in Step S3 from the operation type of Tariaki and the operation procedure of starting the unlocking operation. The operation is determined and step S4 is executed.
[0058] ステップ S4では、操作手順から、クリアキーと!、う操作入力はロック解除情報でな ヽ と判定され、ステップ S6が実行される。 [0058] In step S4, it is determined from the operation procedure that the clear key and!, And the operation input are not unlock information, and step S6 is executed.
[0059] ステップ S6では、操作手順から、クリアキーという操作入力はロック解除操作の終了 でないと判定され、処理力 Sステップ S 2に戻り、操作入力待ちとなる。 [0059] In step S6, it is determined from the operation procedure that the operation input of the clear key is not the end of the unlocking operation, and the processing power S returns to step S2 and waits for the operation input.
[0060] さらに、ステップ S2で、操作入力として数字が入力されると、数字という操作種類と[0060] Furthermore, when a number is input as an operation input in step S2, the operation type of number and
、クリアキーの押下から 1つ目の操作入力という操作手順から、この操作入力は正しFrom the operation procedure of the first operation input after pressing the clear key, this operation input is correct.
V、ロック解除操作であると判定され、ステップ S4が実行される。 V, it is determined that the operation is unlocking, and step S4 is executed.
[0061] ステップ S4では、操作手順から、この操作入力はロック解除情報であると判定され[0061] In step S4, it is determined from the operation procedure that this operation input is unlock information.
、ステップ S5が実行される。 Step S5 is executed.
[0062] ステップ S5では、操作入力である数字が、記憶部 32に 1つ目のロック解除情報とし て記憶され、その後、ステップ S6が実行される。 [0062] In step S5, the number that is the operation input is stored in the storage unit 32 as the first unlock information, and then step S6 is executed.
[0063] ステップ S6では、操作手順から、この操作入力はロック解除操作の終了でな ヽと判 定され、処理が、ステップ S2に戻り、操作入力待ちとなる。 [0063] In step S6, it is determined from the operation procedure that this operation input is not the end of the unlocking operation, and the process returns to step S2 and waits for the operation input.
[0064] 同様の手順を経て、その後に 3つの数字が入力され、ステップ S6まで処理が実行さ れると、クリアキーの押下力も 4つ目の操作入力という操作手順から、この操作入力は ロック解除操作の終了であると判定され、ステップ S7が実行される。 [0064] Through the same procedure, after that, when three numbers are input and the processing is executed up to step S6, the pressing force of the clear key is also the fourth operation input. It is determined that the unlocking operation has ended, and step S7 is executed.
[0065] もし、上記ステップにおいて、数字の操作入力を入れるところで、クリアキーが入力 されたとすると、ステップ S3では、クリアキーという操作種類と、ロック解除操作の開始 という操作手順から、この操作入力は正しいロック解除操作であると判定され、ステツ プ S4が実行されると同時に、操作手順が元に戻る。つまり、操作者は、解除コードを 最初から入れなくてはならない。 [0065] If, in the above step, a numeric key input is entered and a clear key is entered, in step S3, the operation input is based on the operation type of the clear key and the operation procedure of starting the unlocking operation. It is determined that the unlocking operation is correct, and step S4 is executed. At the same time, the operating procedure returns. In other words, the operator must enter the release code from the beginning.
[0066] 上記では、ロック解除情報を数字としたが、生態情報等にしてもよい。 In the above description, the unlock information is a number, but it may be ecological information or the like.
[0067] 次に、ロック解除情報が生態情報の場合のステップ S2からステップ S6の動作を具 体的な例に挙げて詳細に説明する。 [0067] Next, the operation from step S2 to step S6 when the unlock information is ecological information will be described in detail using a specific example.
[0068] 例えば、記憶部 31に、ロック解除操作の開始はクリアキーが押され、その 2秒後に 顔撮影による顔情報 (ロック解除情報)が操作入力され、クリアキーの押下から 1つ目 の操作入力がロック解除操作の終了となる、という操作種類'操作手順のリストが記憶 されていたとする。 [0068] For example, the clear key is pressed to start the unlocking operation in the storage unit 31, and after 2 seconds, face information (unlocking information) by face shooting is input and the first operation after pressing the clear key Assume that a list of operation types' operation procedures in which the operation input ends the unlocking operation is stored.
[0069] まず、ステップ S2で操作入力としてタリアキ一が入力されると、ステップ S3では、タリ アキ一という操作種類と、ロック解除操作の開始という操作手順から、この操作入力は 正し 、ロック解除操作であると判定され、ステップ S4が実行される。  [0069] First, when Tariaki is input as an operation input in Step S2, this operation input is corrected and unlocked in Step S3 from the operation type of Tariaki and the operation procedure of starting the unlocking operation. The operation is determined and step S4 is executed.
[0070] ステップ S4では、操作手順から、クリアキーと!、う操作入力はロック解除情報でな ヽ と判定され、ステップ S6が実行される。  [0070] In step S4, it is determined from the operation procedure that the clear key and!, And the operation input are not unlock information, and step S6 is executed.
[0071] ステップ S6では、操作手順から、クリアキーという操作入力はロック解除操作の終了 でないと判定され、処理力 Sステップ S 2に戻り、操作入力待ちとなる。  In step S6, it is determined from the operation procedure that the operation input of the clear key is not the end of the unlocking operation, and the processing power S returns to step S2 and waits for the operation input.
[0072] さらに、ステップ S2で、操作入力として 2秒後の顔撮影による顔情報が入力されると 、顔情報という操作種類と、クリアキーから 1つ目の操作入力という操作手順から、こ の操作入力は正し 、ロック解除操作であると判定され、ステップ S4が実行される。  [0072] Furthermore, in step S2, when face information obtained by photographing a face after 2 seconds is input as an operation input, from the operation type of face information and the operation procedure of the first operation input from the clear key, The operation input is correct and it is determined that the operation is an unlock operation, and step S4 is executed.
[0073] ステップ S4では、操作手順から、この操作入力はロック解除情報であると判定され 、ステップ S5が実行される。  [0073] In step S4, it is determined from the operation procedure that this operation input is unlock information, and step S5 is executed.
[0074] ステップ S5では、操作入力である顔情報が、記憶部 32にロック解除情報として記 憶され、その後、ステップ S6が実行される。  In step S5, face information as an operation input is stored in the storage unit 32 as unlock information, and then step S6 is executed.
[0075] ステップ S6では、操作手順から、顔情報である操作入力がロック解除操作の終了 であると判定され、ステップ S7が実行される。 [0075] In step S6, from the operation procedure, the operation input, which is face information, ends the unlock operation. And step S7 is executed.
[0076] 上記のように、ステップ S2からステップ S6は、様々な操作入力に対応できる。 [0076] As described above, steps S2 to S6 can correspond to various operation inputs.
[0077] ここでは、操作入力として、キー入力または n秒後の顔撮影による顔情報が使用さ れたが、端末装置を持ち上げることにより発生するトリガ信号、または、端末装置の開 閉により発生するトリガ信号など、様々な操作入力が用いられてもよい。 Here, face information is used as an operation input by key input or face photography after n seconds, but is generated by a trigger signal generated by lifting the terminal device or by opening / closing the terminal device. Various operation inputs such as a trigger signal may be used.
[0078] また、上記のクリアキーの次の操作入力時に、照合操作等を促す表示 (指示)が行 われてもよい。 [0078] Further, a display (instruction) for prompting a collation operation or the like may be performed at the time of the next operation input of the clear key.
[0079] 次に、本実施形態の効果について説明する。  Next, the effect of this embodiment will be described.
[0080] 本実施形態では、操作入力が常にモニタリングされ、操作入力が照合できない時 だけでなぐ操作入力が正しいロック解除操作でない時も、不正使用通知が送信され る。  [0080] In this embodiment, the operation input is constantly monitored, and the unauthorized use notification is transmitted even when the operation input that is performed only when the operation input cannot be verified is not a correct unlocking operation.
[0081] よって、悪意ある第三者が、ロック解除操作と異なる操作 (不正使用)を行った後、口 ック解除情報の照合操作の指示が現れたり、照合操作に気づいたりして、操作をや めたとしても、不正使用状況が通知される。  [0081] Therefore, after a malicious third party performs an operation (unauthorized use) that is different from the unlocking operation, an instruction for collation operation of the unlocking information appears or the collation operation is noticed. Even if you quit, you will be notified of unauthorized use.
[0082] このため、端末装置が盗まれたり、利用者が端末装置を置き忘れたり、利用者が端 末装置を落としたりして、利用者が端末装置から離れていた場合に、端末装置が不 正利用されると、利用者は、不正使用通知の情報から、不正使用者の特定及び不正 使用場所の特定を行うことが可能となる。  [0082] For this reason, when the terminal device is stolen, the user misplaces the terminal device, or the user drops the terminal device, the terminal device becomes inoperable. When properly used, the user can specify the unauthorized user and the location of unauthorized use from the information on unauthorized use notification.
[0083] また、利用者が、端末装置を置き忘れたり、端末装置を落としたりした場合、善意あ る第三者が、端末装置を少し操作してロック解除操作と異なる操作 (不正使用)を行 つてくれるだけで、不正使用状況が通知される。  [0083] Also, if the user misplaces the terminal device or drops the terminal device, a bona fide third party operates the terminal device slightly to perform an operation (unauthorized use) that is different from the unlocking operation. Just tell me and you will be notified of unauthorized use.
[0084] このため、利用者は、不正使用通知の情報から、失われた端末装置に関する情報 を得ることができ、端末装置を探し出すことが可能となる。  Therefore, the user can obtain information on the lost terminal device from the information on the unauthorized use notification, and can search for the terminal device.
[0085] また、本実施形態では、不正使用通知として送られてくる情報の中に、不正使用時 刻情報、端末装置の位置情報、音声情報、及び、画像 ·動画像情報という、不正使 用者'不正使用場所を特定できる有効な情報が存在する。よって、利用者は、不正 使用通知の情報から、より不正使用者'不正使用場所の特定を行いやすくなる。この ため、不正使用者を捕まえることができたり、失われた端末装置を取り戻すことができ たりする。 [0085] In the present embodiment, unauthorized information such as unauthorized use time information, terminal device position information, audio information, and image / moving image information is included in the information sent as an unauthorized use notification. There is valid information that can identify the unauthorized use place. Therefore, it becomes easier for the user to identify the unauthorized user's unauthorized use location from the information on the unauthorized use notification. For this reason, it is possible to catch unauthorized users and recover lost terminal devices. Or
[0086] さらに、本実施形態では、ロック解除情報が、操作入力のモニタリングと操作種類と 操作手順とに基づいて取得される。このため、本実施形態は、ロック解除情報の照合 操作の指示が現れな!/ヽ端末装置にも対応できる。  Furthermore, in this embodiment, unlock information is acquired based on operation input monitoring, operation type, and operation procedure. For this reason, in this embodiment, there is no indication of the unlock information verification operation! It can also be used with / ヽ terminal devices.
[0087] 次に、本発明の第 2実施形態について図面を参照して詳細に説明する。 Next, a second embodiment of the present invention will be described in detail with reference to the drawings.
[0088] 図 3は、第 2実施形態の端末装置を示したブロック図である。なお、図 3において、 図 1に示したものと同一のものには同一符号を付してある。 FIG. 3 is a block diagram illustrating a terminal device according to the second embodiment. In FIG. 3, the same components as those shown in FIG.
[0089] 図 3を参照すると、第 2実施形態の端末装置は、データ処理装置 300が、図 1に示 されたデータ処理装置 2の構成と定期起動部 24を有する点が、第 1実施形態と異な る。 Referring to FIG. 3, the terminal device of the second embodiment is that the data processing device 300 has the configuration of the data processing device 2 shown in FIG. Is different.
[0090] 定期起動部 24は、取得部 23から動作開始トリガを受け付けると動作を開始し、ある 設定された時間間隔で、取得部 23に起動トリガを送る。  [0090] The periodic activation unit 24 starts the operation when receiving the operation start trigger from the acquisition unit 23, and sends the activation trigger to the acquisition unit 23 at a predetermined time interval.
[0091] 取得部 23は、図 1に示された取得部 23と同様に動作し、さらに、定期起動部 24か ら起動トリガを受け付けた場合にも、同様の動作を行う。さらに、取得部 23は、通信部 9から登録送信先へ取得情報を送信した後、定期起動部 24が動作を開始しているか を判定し、定期起動部 24が動作を開始していない場合は、定期起動部 24へ動作開 始トリガを送る。  The acquisition unit 23 operates in the same manner as the acquisition unit 23 shown in FIG. 1, and also performs the same operation when an activation trigger is received from the periodic activation unit 24. Furthermore, after the acquisition unit 23 transmits the acquisition information from the communication unit 9 to the registered transmission destination, the acquisition unit 23 determines whether the periodic activation unit 24 has started operation, and if the periodic activation unit 24 has not started operation, Then, an operation start trigger is sent to the periodic start unit 24.
[0092] 次に、図 3、図 4及び図 5を参照して第 2実施形態の動作について詳細に説明する 。なお、図 4及び 5は、第 2実施形態の動作を説明するためのフローチャートである。 また、図 4において、図 2に示した処理と同一の処理には同一符号を付してある。  Next, the operation of the second embodiment will be described in detail with reference to FIG. 3, FIG. 4, and FIG. 4 and 5 are flowcharts for explaining the operation of the second embodiment. In FIG. 4, the same processes as those shown in FIG. 2 are denoted by the same reference numerals.
[0093] 第 2実施形態の動作は、図 2に示された第 1実施形態の動作に加え、ステップ S11 、ステップ S12、ステップ S13、ステップ S 14を有する点で、第 1実施形態の動作と異 なる。他のステップは、第 1実施形態の動作と同一のため、説明は省略する。  [0093] The operation of the second embodiment is the same as the operation of the first embodiment in that it includes step S11, step S12, step S13, and step S14 in addition to the operation of the first embodiment shown in FIG. Different. The other steps are the same as those in the first embodiment, and a description thereof will be omitted.
[0094] 第 1実施形態のステップ S 10では、不正通知送信後、ステップ S2が実行され、端末 装置の処理状態が操作取得部 1からの操作入力待ちとなったが、第 2実施形態では 、不正通知送信後、ステップ S 11が実行される。  [0094] In step S10 of the first embodiment, after sending the fraud notification, step S2 is executed, and the processing state of the terminal device waits for an operation input from the operation acquisition unit 1, but in the second embodiment, After sending the fraud notification, step S11 is executed.
[0095] 取得部 23は、不正通知送信後、定期起動部 24が動作を開始しているかを判定す る。定期起動部 24が動作を開始している場合は、ステップ S2が実行され、端末装置 の処理状態が操作取得部 1からの操作入力待ちとなる (ステップ S11)。 The acquisition unit 23 determines whether or not the periodic activation unit 24 has started operation after sending the fraud notification. If the periodic activation unit 24 has started operation, step S2 is executed and the terminal device Is waiting for an operation input from the operation acquisition unit 1 (step S11).
[0096] 取得部 23は、定期起動部 24が動作を開始していない場合、定期起動部 24へ動 作開始トリガを送り、定期起動部 24を動作させる。その後、ステップ S2が実行され、 端末装置の処理状態が操作取得部 1からの操作入力待ちとなる (ステップ S12)。  The acquisition unit 23 sends an operation start trigger to the periodic activation unit 24 to operate the periodic activation unit 24 when the periodic activation unit 24 has not started operation. Thereafter, step S2 is executed, and the processing state of the terminal device waits for an operation input from the operation acquisition unit 1 (step S12).
[0097] 定期起動部 24は、取得部 23から動作開始トリガを受け付けると、動作を開始し、あ る設定された時間間隔で、取得部 23に起動トリガを送る。  [0097] Upon receiving the operation start trigger from the acquisition unit 23, the periodic activation unit 24 starts operation and sends the activation trigger to the acquisition unit 23 at a set time interval.
[0098] 取得部 23は、起動トリガを受けると、時刻取得部 5から不正使用時刻を取得し、位 置取得部 6から不正使用場所を示す位置情報を取得し、音声取得部 7から音声情報 を取得し、画像 ·動画像取得部 8から画像 ·動画像情報を取得し、記憶部 34から登録 送信先の電子メールアドレスを取得する (ステップ S13)。登録送信先は、複数であつ てもよい。その場合、取得された情報が、一度に複数の登録送信先へ送信される。  [0098] Upon receiving the activation trigger, the acquisition unit 23 acquires the unauthorized use time from the time acquisition unit 5, acquires the location information indicating the unauthorized use location from the location acquisition unit 6, and acquires the audio information from the audio acquisition unit 7. Is acquired, the image / moving image information is acquired from the image / moving image acquisition unit 8, and the registered transmission destination e-mail address is acquired from the storage unit 34 (step S13). There may be a plurality of registered destinations. In that case, the acquired information is transmitted to a plurality of registered transmission destinations at a time.
[0099] 通信部 9は、ステップ S 13で取得した登録送信先の電子メールアドレスに、ステップ S13で取得した各情報を、テキストファイルとバイナリデータによる添付ファイルの形 で送信する (ステップ S 14)。  [0099] The communication unit 9 transmits each piece of information acquired in step S13 to the registered transmission destination e-mail address acquired in step S13 in the form of a text file and an attached file using binary data (step S14). .
[0100] 定期起動部 24は、端末装置がロック状態を解除した段階で、手動または自動で、 動作が終了される。  [0100] The operation of the periodic activation unit 24 is terminated manually or automatically when the terminal device releases the locked state.
[0101] 次に、本実施形態の効果について説明する。  Next, the effect of this embodiment will be described.
[0102] 本実施の形態は、定期起動部 24を有することにより、定期的に不正使用状況の情 報を取得し、登録送信先へその取得した情報を送信することができる。よって、不正 使用時以降の状況を取得することができる。このため、不正使用者'不正使用場所の 特定を行う情報を増やすことができ、その特定の可能性を向上できる。  [0102] In the present embodiment, by having the periodic activation unit 24, it is possible to periodically acquire information on unauthorized use status and transmit the acquired information to a registered transmission destination. Therefore, it is possible to obtain the status after unauthorized use. For this reason, it is possible to increase information for identifying an unauthorized user's unauthorized use location, and to improve the possibility of the identification.
[0103] 次に、本発明の第 3実施形態について図面を参照して詳細に説明する。  [0103] Next, a third embodiment of the present invention will be described in detail with reference to the drawings.
[0104] 図 6は、第 3実施形態の端末装置を示したブロック図である。なお、図 6において、 図 1に示したものと同一のものには同一符号を付してある。  FIG. 6 is a block diagram showing a terminal device according to the third embodiment. In FIG. 6, the same components as those shown in FIG.
[0105] 図 6を参照すると、第 3実施形態の端末装置は、データ処理装置 301が、図 1に示 されたデータ処理装置 2の構成に加え、音声変換部 25を有する点で、第 1実施形態 と異なる。  [0105] Referring to FIG. 6, the terminal device of the third embodiment is the first in that the data processing device 301 includes a voice conversion unit 25 in addition to the configuration of the data processing device 2 shown in FIG. Different from the embodiment.
[0106] 音声変換部 25は、取得部 23が取得した時刻情報および位置情報を、利用者が音 声で理解できる音声情報へ変換する。また、音声変換部 25は、画像'動画像情報に お 、てオブジェクト認識等で物体または物体の特徴を特定できるのであれば、画像' 動画像情報を音声情報に変換する。例えば、顔認識で画像中の人物の名前が特定 できる、文字認識で画像中の文字が特定できる場合、音声変換部 25は、それらを音 声情報に変換する。 [0106] The voice conversion unit 25 uses the time information and position information acquired by the acquisition unit 23 as a sound. Convert voice information that can be understood by voice. In addition, if the image “moving image information can identify the object or the feature of the object by object recognition or the like, the sound converting unit 25 converts the image moving image information into sound information. For example, when the name of a person in the image can be specified by face recognition and the character in the image can be specified by character recognition, the voice conversion unit 25 converts them into voice information.
[0107] なお、記憶部 34は、不正使用通知の送信先として、電子メールアドレスではなく電 話番号を記憶している。  [0107] Note that the storage unit 34 stores a telephone number instead of an e-mail address as a transmission destination of the unauthorized use notification.
[0108] 取得部 23は、図 1に示された取得部 23と同様に動作し、さらに、音声変換部 25に 、音声情報でない時刻情報、位置情報および画像 ·動画像情報を音声情報へ変換 させる。また、取得部 23は、不正使用通知の送信先を、記憶部 34から電話番号とし て取得し、通信部 9により、登録送信先である電話番号の電話にそれら全ての音声 †青報をアナウンスする。  The acquisition unit 23 operates in the same manner as the acquisition unit 23 shown in FIG. 1. Further, the audio conversion unit 25 converts time information, position information, and image / moving image information that are not audio information into audio information. Let In addition, the acquisition unit 23 acquires the transmission destination of the unauthorized use notification from the storage unit 34 as a telephone number, and the communication unit 9 announces all the voice † blueprints to the telephone of the telephone number that is the registered transmission destination. To do.
[0109] 次に、図 6及び図 7を参照して第 3実施形態の動作について詳細に説明する。なお 、図 7は、第 3実施形態の動作を説明するためのフローチャートである。また、図 7に おいて、図 2に示した処理と同一の処理には同一符号を付してある。  Next, the operation of the third embodiment will be described in detail with reference to FIG. 6 and FIG. FIG. 7 is a flowchart for explaining the operation of the third embodiment. In FIG. 7, the same processes as those shown in FIG. 2 are denoted by the same reference numerals.
[0110] 第 3実施形態の動作は、図 2に示された第 1実施形態の動作力もステップ S10を除 き、ステップ S15およびステップ S16を追加する点で第 1実施形態の動作と異なる。 他のステップは、第 1実施形態の動作と同一のため、説明は省略する。  [0110] The operation of the third embodiment is different from the operation of the first embodiment in that the operation force of the first embodiment shown in FIG. The other steps are the same as those in the first embodiment, and a description thereof will be omitted.
[0111] 第 1の実施形態のステップ S9では、取得部 23は、記憶部 34から登録送信先として 電子メールアドレスを取得した力 ここでは電話番号を取得する。  [0111] In step S9 of the first embodiment, the acquiring unit 23 acquires the e-mail address as the registered transmission destination from the storage unit 34, and acquires the telephone number here.
[0112] 取得部 23は、ステップ S9で取得した時刻情報、位置情報および画像'動画像情報 を、利用者が音声で理解できる音声情報に変換する (ステップ S15)。  [0112] The acquisition unit 23 converts the time information, position information, and image'moving image information acquired in step S9 into audio information that the user can understand by voice (step S15).
[0113] 通信部 9は、ステップ S9で取得された登録送信先の電話番号の電話に、ステップ S 9、ステップ S 15で取得した全ての音声情報をアナウンスする。アナウンス後、ステツ プ S2が実行され、端末装置の処理状態が操作取得部 1からの操作入力待ちとなる( ステップ S16)。電話が繋がらな力つた場合、通信部 9は、ある時間間隔で複数回リト ライして音声情報をアナウンスしてもよ!/ヽ。  [0113] The communication unit 9 announces all the audio information acquired in step S9 and step S15 to the telephone of the registered transmission destination telephone number acquired in step S9. After the announcement, step S2 is executed, and the processing state of the terminal device waits for an operation input from the operation acquisition unit 1 (step S16). If the phone is connected, the communicator 9 may retry the announcement several times at certain time intervals and announce the voice information! / ヽ.
[0114] 次に、本実施形態の効果について説明する。 [0115] 本実施の形態では、不正使用状況の情報を音声情報として、電子メールではなく 電話を通じてアナウンスできるので、電子メールを受信できる端末装置を持って 、な くても不正使用通知を電話にて受け取ることができる。 Next, the effect of this embodiment will be described. [0115] In the present embodiment, since the information on the unauthorized use status can be announced as voice information through the telephone instead of the electronic mail, the terminal apparatus capable of receiving the electronic mail is used, and the unauthorized use notification is sent to the telephone. Can be received.
[0116] なお、第 3実施形態に、第 2実施形態の定期起動部 24が追加され、取得部 23が、 さらに第 2実施形態と同様に動作してもよい。  [0116] Note that the periodic activation unit 24 of the second embodiment may be added to the third embodiment, and the acquisition unit 23 may further operate in the same manner as in the second embodiment.
[0117] 次に、本発明の第 4実施形態について図面を参照して詳細に説明する。  [0117] Next, a fourth embodiment of the present invention will be described in detail with reference to the drawings.
[0118] 図 8は、第 4実施形態の端末装置を示したブロック図である。なお、図 8において、 図 1に示したものと同一のものには同一符号を付してある。  FIG. 8 is a block diagram showing a terminal device according to the fourth embodiment. In FIG. 8, the same components as those shown in FIG. 1 are denoted by the same reference numerals.
[0119] 図 8を参照すると、第 4実施形態の端末装置では、第 1実施形態と同様な操作取得 部 1、ロック解除部 4、時刻取得部 5、位置取得部 6、音声取得部 7、画像 ·動画像取 得部 8、通信部 9、記憶部 31と記憶部 32と記憶部 33と記憶部 34とを有する記憶装 置 3が、コンピュータ 200に接続されている。また、不正使用通知機能つき端末用プ ログラム 100を記憶するコンピュータ可読記録媒体 101が、コンピュータ 200に接続 されている。  Referring to FIG. 8, in the terminal device of the fourth embodiment, the same operation acquisition unit 1, lock release unit 4, time acquisition unit 5, position acquisition unit 6, voice acquisition unit 7, as in the first embodiment, A storage device 3 having an image / moving image acquisition unit 8, a communication unit 9, a storage unit 31, a storage unit 32, a storage unit 33, and a storage unit 34 is connected to the computer 200. A computer-readable recording medium 101 that stores a terminal program 100 with an unauthorized use notification function is connected to the computer 200.
[0120] コンピュータ可読記録媒体 101は、磁気ディスクまたは半導体メモリ等で構成され、 そこに記憶された不正使用通知機能つき端末用プログラム 100は、コンピュータ 200 の立ち上げ時などに、コンピュータ 200に読み取られ、コンピュータ 200の動作を制 御することにより、コンピュータ 200を、前述した第 1実施形態におけるデータ処理装 置 2内に各部 21、 22、 23として機能させ、また、コンピュータ 200に図 2に示される処 理を行わせる。  [0120] The computer-readable recording medium 101 is configured by a magnetic disk, a semiconductor memory, or the like, and the terminal program 100 with an unauthorized use notification function stored therein is read by the computer 200 when the computer 200 is started up. By controlling the operation of the computer 200, the computer 200 is caused to function as the respective units 21, 22, 23 in the data processing device 2 in the first embodiment described above, and the computer 200 is shown in FIG. Allow processing to occur.
[0121] 本実施形態は、第 1実施形態にかかる不正使用通知機能つき端末装置をコンビュ ータとプログラムとで実現したが、第 2及び第 3実施形態に力かる不正使用通知機能 つき端末装置をコンピュータとプログラムとで実現してもよい。  In this embodiment, the terminal device with an unauthorized use notification function according to the first embodiment is realized by a computer and a program. However, the terminal device with an unauthorized use notification function according to the second and third embodiments is used. May be realized by a computer and a program.
[0122] 以上説明した各実施形態において、図示した構成は単なる一例であって、本発明 はその構成に限定されるものではない。 [0122] In each of the embodiments described above, the illustrated configuration is merely an example, and the present invention is not limited to the configuration.
[0123] 例えば、音声取得部 7が音声を取得するマイクは、端末装置に設けられていてもよ ぐまた、画像'動画像取得部 8が画像'動画像を取得するカメラは、端末装置に設け られていてもよい。 産業上の利用可能性 [0123] For example, the microphone from which the voice acquisition unit 7 acquires voice may be provided in the terminal device, and the camera from which the image 'moving image acquisition unit 8 acquires a moving image' is connected to the terminal device. It may be provided. Industrial applicability
[0124] 本発明は、不正使用時に不正使用状況を通知する端末装置、および、不正使用 状況を通知する端末装置をコンピュータに実現するためのプログラムといった用途に 適応できる。  [0124] The present invention can be applied to applications such as a terminal device that notifies an unauthorized use status at the time of unauthorized use, and a program for realizing a terminal device that notifies an unauthorized use status in a computer.
[0125] また、本発明が、不正使用状況を通知する機能を有する携帯電話、パソコン、モバ ィル機器またはネットワーク機器等の端末装置に搭載されれば、その端末装置が盗 まれた、利用者がその端末装置を置き忘れたまたは落とした、利用者がその端末装 置から離れていた場合、本発明は、第三者の不正利用による不正使用状況の通知 から不正使用者の特定、不正使用場所の特定を行うといった用途、および、不正使 用者を捕まえる、機器を探し出す '取り戻すといった用途にも適用できる。  [0125] Further, if the present invention is installed in a terminal device such as a mobile phone, a personal computer, a mobile device, or a network device having a function of notifying unauthorized use status, the user who has stolen the terminal device will be If the user has misplaced or dropped the terminal device and the user is away from the terminal device, the present invention will identify the unauthorized user from the notification of the unauthorized use status due to unauthorized use by a third party, It can also be used for identification purposes, and for capturing unauthorized users and searching for equipment.

Claims

請求の範囲 The scope of the claims
[1] 不正な使用がなされたときにその旨を通知する機能を備えるとともに所定動作を制 限するロック状態を設定可能な不正使用通知機能つき端末装置であって、  [1] A terminal device with an unauthorized use notification function that has a function of notifying that when unauthorized use is made and that can set a lock state that restricts a predetermined operation.
前記ロック状態を解除するためのロック解除情報を記憶する解除情報記憶部と、 前記ロック解除情報を入力するための操作手順を記憶する操作手順記憶部と、 不正使用通知の送信先を記憶する送信先記憶部と、  A release information storage unit that stores unlock information for releasing the lock state, an operation procedure storage unit that stores an operation procedure for inputting the unlock information, and a transmission that stores a transmission destination of an unauthorized use notification A destination storage unit;
利用者の操作入力を受け付ける受付部と、  A reception unit that accepts user operation inputs;
前記受付部が前記操作入力を受け付けたときの状況を示す状況情報を取得する 取得部と、  An acquisition unit for acquiring status information indicating a status when the reception unit receives the operation input;
前記ロック状態のときに前記受付部が受け付けた操作入力が、前記操作手順記憶 部に記憶された操作手順に対応するか否かを判定するロック解除処理部と、 前記ロック状態のときに前記受付部が受け付けた操作入力が、前記解除情報記憶 部に記憶されたロック解除情報であるか否かを判定する照合部と、  An unlock processing unit for determining whether an operation input received by the receiving unit in the locked state corresponds to an operation procedure stored in the operation procedure storing unit; and the reception in the locked state. A collation unit that determines whether or not the operation input received by the unit is unlock information stored in the release information storage unit;
前記ロック解除処理部が前記操作入力は前記操作手順に対応しな!ヽと判定した場 合、および、前記照合部が前記操作入力は前記ロック解除情報でないと判定した場 合に、前記送信先記憶部に記憶された送信先と、前記取得部が取得した状況情報と 、を取得する送信情報取得部と、  When the lock release processing unit determines that the operation input does not correspond to the operation procedure, and when the collation unit determines that the operation input is not the unlock information, the transmission destination A transmission information acquisition unit that acquires the transmission destination stored in the storage unit, and the situation information acquired by the acquisition unit;
前記送信情報取得部が取得した送信先に、該送信情報取得部が取得した状況情 報を前記不正使用通知として送信する通信部と、を備える不正使用通知機能つき端 末装置。  A terminal device with an unauthorized use notification function, comprising: a communication unit that transmits, as the unauthorized use notification, status information acquired by the transmission information acquisition unit to a transmission destination acquired by the transmission information acquisition unit.
[2] 前記状況情報を音声情報に変換する音声変換部をさらに備え、  [2] It further includes a voice conversion unit that converts the status information into voice information,
前記送信先は、電話番号であり、  The destination is a phone number,
前記通信部は、前記電話番号を有する電話に、前記音声変換部にて変換された 音声情報を送信する、請求の範囲 1に記載の不正使用通知機能つき端末装置。  The terminal device with an unauthorized use notification function according to claim 1, wherein the communication unit transmits the voice information converted by the voice conversion unit to a telephone having the telephone number.
[3] 前記通信部が前記不正使用通知を送信した後、所定時間間隔で、前記送信情報 取得部を起動して、前記送信先記憶部に記憶された送信先と、前記取得部が取得し た状況情報と、を取得させる定期起動部をさらに備えた請求の範囲 1または 2に記載 の不正使用通知機能つき端末装置。 [3] After the communication unit transmits the unauthorized use notification, the transmission information acquisition unit is activated at predetermined time intervals, and the transmission destination stored in the transmission destination storage unit and the acquisition unit acquire the transmission destination. The terminal device with an unauthorized use notification function according to claim 1 or 2, further comprising a periodic activation unit for acquiring the status information.
[4] 不正な使用がなされたときにその旨を通知する機能を備えるとともに所定動作を制 限するロック状態を設定可能であり、また、該ロック状態を解除するためのロック解除 情報、前記ロック解除情報を入力するための操作手順、および、不正使用通知の送 信先、を記憶する、不正使用通知機能つき端末装置が行う不正使用の通知方法で あって、 [4] It is possible to set a lock state that has a function of notifying when an unauthorized use is made, and restricts a predetermined operation, and unlock information for releasing the lock state, the lock An unauthorized use notification method performed by a terminal device with an unauthorized use notification function that stores an operation procedure for inputting release information and an unauthorized use notification destination.
利用者の操作入力を受け付ける受付ステップと、  A reception step for accepting user operation input;
前記操作入力を受け付けたときの状況を示す状況情報を取得する取得ステップと 前記ロック状態のときに受け付けられた前記操作入力が、前記記憶された操作手 順に対応するカゝ否かを判定する判定ステップと、  An acquisition step for acquiring status information indicating a status when the operation input is received, and a determination for determining whether or not the operation input received in the locked state corresponds to the stored operation procedure. Steps,
前記ロック状態のときに受け付けられた前記操作入力が、前記記憶されたロック解 除情報であるか否かを判定する照合ステップと、  A collating step for determining whether or not the operation input received in the locked state is the stored unlock information;
前記操作入力が前記操作手順に対応しない場合、および、前記操作入力が前記 ロック解除情報でない場合に、前記送信先に前記不正使用通知として前記状況情 報を送信する送信ステップと、を備える不正使用の通知方法。  A transmission step of transmitting the status information as the unauthorized use notification to the transmission destination when the operation input does not correspond to the operation procedure and when the operation input is not the unlock information. Notification method.
[5] 前記状況情報を音声情報に変換する音声変換ステップをさらに備え、 [5] The method further comprises a voice conversion step for converting the status information into voice information,
前記送信先は、電話番号であり、  The destination is a phone number,
前記送信ステップでは、前記電話番号を有する電話に、前記変換された音声情報 を送信する、請求の範囲 4に記載の不正使用の通知方法。  5. The unauthorized use notification method according to claim 4, wherein, in the transmission step, the converted voice information is transmitted to a telephone having the telephone number.
[6] 前記取得ステップでは、前記不正使用通知が送信された後、所定時間間隔で、前 記状況情報を取得し、 [6] In the obtaining step, the situation information is obtained at predetermined time intervals after the unauthorized use notification is transmitted,
前記送信ステップでは、前記所定時間間隔で取得された状況情報を、前記送信先 に送信する、請求の範囲 4または 5に記載の不正使用の通知方法。  6. The unauthorized use notification method according to claim 4 or 5, wherein in the transmission step, the status information acquired at the predetermined time interval is transmitted to the transmission destination.
[7] 不正な使用がなされたときにその旨を通知する機能を備えるとともに所定動作を制 限するロック状態を設定可能であり、また、該ロック状態を解除するためのロック解除 情報、前記ロック解除情報を入力するための操作手順、および、不正使用通知の送 信先、を記憶する、不正使用通知機能つき端末装置に、不正使用の通知処理を実 行させるプログラムであって、 利用者の操作入力を受け付ける受付処理と、 [7] It is possible to set a lock state that has a function of notifying that when an unauthorized use is made and that restricts a predetermined operation, and unlock information for releasing the lock state, the lock A program for storing an unauthorized use notification process in a terminal device with an unauthorized use notification function for storing an operation procedure for inputting release information and an unauthorized use notification destination. Acceptance processing that accepts user operation input,
前記操作入力を受け付けたときの状況を示す状況情報を取得する取得処理と、 前記ロック状態のときに受け付けられた前記操作入力が、前記記憶された操作手 順に対応するか否かを判定する判定処理と、  An acquisition process for acquiring status information indicating a status when the operation input is received, and a determination for determining whether or not the operation input received in the locked state corresponds to the stored operation procedure. Processing,
前記ロック状態のときに受け付けられた前記操作入力が、前記記憶されたロック解 除情報であるか否かを判定する照合処理と、  A collation process for determining whether or not the operation input received in the locked state is the stored unlock information;
前記操作入力が前記操作手順に対応しない場合、および、前記操作入力が前記 ロック解除情報でない場合に、前記送信先に前記不正使用通知として前記状況情 報を送信する送信処理と、を備える不正使用の通知処理を、前記端末装置に実行さ ·¾:るプログラム。  An unauthorized use comprising: a transmission process that transmits the status information as the unauthorized use notification to the transmission destination when the operation input does not correspond to the operation procedure and when the operation input is not the unlock information. The notification process is executed on the terminal device.
[8] 前記状況情報を音声情報に変換する音声変換処理をさらに備え、  [8] A voice conversion process for converting the status information into voice information is further provided,
前記送信先は、電話番号であり、  The destination is a phone number,
前記送信処理では、前記電話番号を有する電話に、前記変換された音声情報を 送信する、請求の範囲 7に記載のプログラム。  The program according to claim 7, wherein, in the transmission process, the converted voice information is transmitted to a telephone having the telephone number.
[9] 前記取得処理では、前記不正使用通知が送信された後、所定時間間隔で、前記 状況情報を取得し、 [9] In the acquisition process, after the unauthorized use notification is transmitted, the status information is acquired at predetermined time intervals,
前記送信処理では、前記所定時間間隔で取得された状況情報を、前記送信先に 送信する、請求の範囲 7または 8に記載のプログラム。  The program according to claim 7 or 8, wherein, in the transmission process, status information acquired at the predetermined time interval is transmitted to the transmission destination.
PCT/JP2006/325191 2006-01-20 2006-12-18 Terminal with false use notification function, its method, and program WO2007083469A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2006012688 2006-01-20
JP2006-012688 2006-01-20

Publications (1)

Publication Number Publication Date
WO2007083469A1 true WO2007083469A1 (en) 2007-07-26

Family

ID=38287425

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2006/325191 WO2007083469A1 (en) 2006-01-20 2006-12-18 Terminal with false use notification function, its method, and program

Country Status (1)

Country Link
WO (1) WO2007083469A1 (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09247753A (en) * 1996-03-07 1997-09-19 Mitsubishi Denki Bill Techno Service Kk Portable telephone terminal equipment
JP2003091509A (en) * 2001-09-17 2003-03-28 Nec Corp Personal authentication method for portable communication equipment and program describing the same
JP2003101640A (en) * 2001-09-21 2003-04-04 Sharp Corp Portable terminal
JP2004112126A (en) * 2002-09-17 2004-04-08 Nec Engineering Ltd Mobile phone
JP2005123817A (en) * 2003-10-15 2005-05-12 Matsushita Electric Ind Co Ltd Portable communication terminal
JP2005136920A (en) * 2003-10-31 2005-05-26 Dowango:Kk Program, system and method for preventing abuse of mobile communication terminal
JP2005151052A (en) * 2003-11-13 2005-06-09 Mitsubishi Electric Corp Camera-attached portable telephone set

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09247753A (en) * 1996-03-07 1997-09-19 Mitsubishi Denki Bill Techno Service Kk Portable telephone terminal equipment
JP2003091509A (en) * 2001-09-17 2003-03-28 Nec Corp Personal authentication method for portable communication equipment and program describing the same
JP2003101640A (en) * 2001-09-21 2003-04-04 Sharp Corp Portable terminal
JP2004112126A (en) * 2002-09-17 2004-04-08 Nec Engineering Ltd Mobile phone
JP2005123817A (en) * 2003-10-15 2005-05-12 Matsushita Electric Ind Co Ltd Portable communication terminal
JP2005136920A (en) * 2003-10-31 2005-05-26 Dowango:Kk Program, system and method for preventing abuse of mobile communication terminal
JP2005151052A (en) * 2003-11-13 2005-06-09 Mitsubishi Electric Corp Camera-attached portable telephone set

Similar Documents

Publication Publication Date Title
JP2007199984A (en) Communication terminal device
JP2006038955A (en) Voiceprint recognition system
CN102523338B (en) Handheld terminal with unlocking function and unlocking method thereof
JP2005244589A (en) Mobile phone with use-limiting function and method of limiting use thereof
WO2006098053A1 (en) Portable terminal, image information checking method for portable terminal, image information checking program, and recording medium
AU2021282382A1 (en) A Method and System for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen)
JP2002229951A (en) Person identification system
JP2007247346A (en) Electronic lock system, method, program, electronic lock, server, and cellphone
CN108347730B (en) Wireless communication processing method and device
JP2007233609A (en) Authentication device, authentication system, and authentication method
JP2007281861A (en) Terminal authentication method and mobile terminal device
KR102208616B1 (en) Public toilet door lock system and gender recognition method
JP2007295120A (en) Intercom system with camera
JP2003188982A (en) Mobile communication system and mobile wireless terminal
WO2007083469A1 (en) Terminal with false use notification function, its method, and program
JP2006324800A (en) Remote operation method for mobile terminal, remote control system, and mobile terminal
JP2010079669A (en) Radio communication system for security
JP2003163971A (en) Mobile radio communication equipment and method for processing to lock
JP2006168553A (en) Image information authentication system
JPH11262059A (en) Portable terminal for mobile communication and personal identification method
JP2010257058A (en) Information processing apparatus and authentication method
JP5140406B2 (en) COMMUNICATION SYSTEM, COMMUNICATION CONTROL DEVICE, AND COMMUNICATION METHOD
JP2006039728A (en) Authentication system and method
JP4324915B2 (en) Portable terminal device and remote operation method thereof
JP2001144865A (en) Identification system using portable telephone set

Legal Events

Date Code Title Description
DPE2 Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06834903

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: JP