WO2008032374A1 - Portable telephone and unlock method for portable telephone - Google Patents

Portable telephone and unlock method for portable telephone Download PDF

Info

Publication number
WO2008032374A1
WO2008032374A1 PCT/JP2006/318159 JP2006318159W WO2008032374A1 WO 2008032374 A1 WO2008032374 A1 WO 2008032374A1 JP 2006318159 W JP2006318159 W JP 2006318159W WO 2008032374 A1 WO2008032374 A1 WO 2008032374A1
Authority
WO
WIPO (PCT)
Prior art keywords
operation
information
authentication information
mobile phone
user
Prior art date
Application number
PCT/JP2006/318159
Other languages
French (fr)
Japanese (ja)
Inventor
Takurou Yokoyama
Original Assignee
Panasonic Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Panasonic Corporation filed Critical Panasonic Corporation
Priority to PCT/JP2006/318159 priority Critical patent/WO2008032374A1/en
Publication of WO2008032374A1 publication Critical patent/WO2008032374A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0861Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/66Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges with means for preventing unauthorised or fraudulent calling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Abstract

A portable telephone capable of canceling the security for each function of the portable telephone. A portable telephone (100) has an operation section (106) for acquiring operation information representing the content of the operation of the user's portable telephone, a bioinformation read section (107) for reading the user's bioinformation, an authentication information check section (110) for checking whether or not there is any information matching the acquired operation information and the read bioinformation in authentication information (an operation pattern, a biopattern) and an unlock section (111) for unlocking the function specified by the operation pattern of the matched authentication information if there is matching information in the authentication information.

Description

Specification

Unlocking method for a portable telephone and the cellular telephone

Technical field

[0001] The present invention relates to unlocking how the mobile phone and the mobile phone equipped with a biometric authentication function.

BACKGROUND

[0002] The cellular phone equipped with a biometric authentication reader, for example, discloses those described in Patent Document 1. Figure 1 is a diagram showing a configuration of a conventional mobile phone. In Figure 1, the security control unit 11, the security button 23, depending on the operation of the power switch 22, and controls the fingerprint reading unit 12, the fingerprint registering unit 13, the fingerprint collation comparison unit 15, the fingerprint temporary Symbol 憶部 14, registration fingerprint matching to perform the, and to switch the security status and security release state. Then, the mobile phone 10, after the security button 23 is pressed, the fingerprint reading unit 12 reads the fingerprint, the fingerprint collation comparator unit 1 5, a fingerprint read, the fingerprint registered in the fingerprint registering unit 13 carry out the verification. If the collation result that guard Itasu the security is released, it is possible to use the mobile phone. This prevents the use of other than the user when dropped mobile phone. Patent Document 1: JP-5-72192 JP (page 7, FIG. 1)

Disclosure of the Invention

Problems that the Invention is to you'll solve

[0003] However, in the conventional mobile telephone, the mobile telephone itself because that is a security release target, for example, can not be applied to one of the mobile telephone ward Betsushite security possible Z unusable used for each function of. That is, there is a problem that convenience has Tokui spoon security for the entire operation of the mobile phone is limited.

[0004] An object of the present invention is to provide a lock release process of the mobile phone and the mobile phone can be canceled security for each function of the mobile phone.

Means for Solving the Problems

[0005] the mobile phone of the present invention includes an operation pattern indicates a predetermined operation content, the biological pattern indicating the contents of the given biological information consists Detase Tsu bets associating the function identified from the operation pattern authentication storage means for storing information, and operation information acquisition means for acquiring operation information shows the operation contents of the mobile phone of the user, and live body information reading means for reading the biometric information of the user, the obtained operation If there is one information and the read biometric information that matches the match in the authentication information collation means and the authentication information to determine the force whether that is in the authentication information, the matching authentication taking a canceling means for canceling the locking of the functions specific to the operation pattern of the information, a configuration having a.

Effect of the invention

According to [0006] the present invention, to unlock the operation information and the user of the function based on biological information the cellular phone, can be unlocked for each function of the mobile phone.

BRIEF DESCRIPTION OF THE DRAWINGS

[0007] [FIG. 1] functional block diagram showing a configuration of a conventional mobile phone

Schematic diagram showing the opened state of the cellular phone according to the embodiment of FIG. 2 the invention

Schematic diagram illustrating a closed state of the cellular phone according to the embodiment of FIG. 3 the invention

[4] functional block diagram showing a configuration of a mobile phone according to an embodiment of the present invention

Diagram for explaining an example of FIG. 5 authentication information generated by the mobile phone according to an embodiment of the present invention

[6] is a flow chart illustrating an authentication information generating operation of the mobile phone according to an embodiment of the present invention

[7] Best Mode for Carrying Out the flowchart invention showing an authentication operation of the mobile phone according to an embodiment of the present invention

[0008] Hereinafter, embodiments of the present invention will be described with reference to the drawings. 2 and 3 are schematic diagrams showing a mobile telephone 100 according to the first embodiment of the present invention. Figure 2 shows the open state of the folding-type cellular phone 100, FIG. 3 shows a 閉状 state of the foldable mobile phone 100. In this embodiment, the folding type mobile phone to proceed Mel the described example, Nag in the present invention is not limited to this shape example, a flip-type, slide-type, but the present invention is applicable in revolver-type mobile phone it is.

[0009] the mobile phone 100 shown in FIGS. 2 and 3, the upper housing 101 and lower housing 102 are openably connected by a hinge portion (not shown). The side surface of the lower housing 10 2 shown in FIGS. 2A and 3A are disposed the biometric reader 103 to authenticate the fingerprint of the user, by matching the fingertip to the biometric reader, a fingerprint of the user is read .

[0010] in FIG. 2B and the portable telephone 100 on the opposite side of the side biometric reader of the lower housing 102 is arranged as shown in FIG. 3B, for example, service Idobotan 104 to perform functions such as contactless payment function There has been arranged. By the side button is pressed, for example, contactless payment function is activated, it is executed. Also, one-push open button 105 for opening the upper housing and the lower housing of the portable telephone 100 is arranged on the side of the upper housing 101. Incidentally, biometric reader 103, side buttons 104, the arrangement position of the one-push open button 105, upper housing 101 or lower housing 102 or the hinge portion of which is not shown! /, At the position of the shift? /,.

[0011] Next, the configuration of the mobile phone 100 described above. Figure 4 is a functional block diagram showing a configuration of a mobile phone 100 according to this embodiment.

[0012] the mobile phone 100 shown in FIG. 4, an operation unit 106, a biometric information reading unit 107, an authentication information generating unit 108, an authentication information storage unit 109, an authentication information collation unit 110, a lock release portion 111 , an external communication unit 112, a data storage unit 113, a mobile phone function unit 114, a control unit 115, a display unit 116, mainly composed.

[0013] Operation unit 106 is, for example, the key is composed of buttons and switches and the like, in particular, when generating the authentication information necessary for the security release, and, when performing security release, optionally in the mobile phone 100 by a user Doing operation, outputs operation information indicating the operation content to the control unit 115. For example, the user, when performing the opening and closing of the mobile phone 100 by pressing the one-push button, the operation unit 106, the operation information indicating the opening and closing, contactless payments by depressing the side buttons of the portable phone 100 when you run the function, and outputs the operation information indicating the execution of this non-contact payment function to the control unit 115.

[0014] Here, the operation information is, for example, information indicating the operation to perform the function of the information and the mobile telephone indicating the operation of changing the state of the housing of the mobile phone 100. For example, operation for the upper casing of the operation and the slide type mobile phone to open and close the folding type portable telephone for the lower housing slides, an operation of changing the state of the housing of the mobile phone, shortening of contactless payment function operations of pressing the side button disposed on the housing side to enable execution, an operation to perform the function of the mobile phone.

[0015] biometric information reading unit 107 reads the biometric information of a user by a sensor such as a camera, and outputs the control section 115. For example, the biometric information reading unit 107, consists of a sensor such as a CCD camera, and outputs a residual fingerprint of a user pressed against the fingerprint reading window to the controller 115 as the biometric information. Incidentally, biometric information, in addition to the fingerprint information, for example, a user's face, retinal, vascular, or a voice and handwriting, and the like.

[0016] Function credential generating unit 108, the operation information and the biometric information input from the control unit 115 and operation patterns and the biological pattern, specified from the operation pattern, that is, the unlock object operation pattern generates authentication information with biometric pattern data sets, and outputs the authentication information storage unit 109. Authentication information storage unit 109 stores the authentication information input from the authentication information generating section 108. Note that authentication information will be described with later.

[0017] authentication information comparing unit 110 that matches the biometric information associated with the operation information and the operation information inputted from the control unit 115, authentication information (operation pattern stored in the authentication information storage unit 109 collates force not force that is in a living body pattern), and outputs the verification result to the lock release portion 111.

[0018] the releasing member 111, in accordance with the verification result of the authentication information collation unit 110, an external communication unit 112, releases the lock function is set in the data storage unit 113 and the mobile phone function unit 114. External communication unit 112, for example, such as when a non-contact electronic payment consists of a non-contact communications functions of the mobile phone outside the unlocking of the lock release portion 111, the function is executed. Data storage unit 113 is, for example, stores the phonebook data, classifies personal data such as mail data and photographic data, the unlocking of the lock release portion 111, the data is viewable. The mobile phone function unit 114 is composed of a configurable cellular phone 10 in 0 feature a security lock, be executed by the unlocking of the lock release portion 111.

[0019] The control unit 115 controls each unit of the portable telephone 100. In particular, if for generating authentication information, control unit 115 outputs the operation information input from the operation unit 106 to the authentication information generating section 108, authentication biometric information input from the biometric information reading unit 107 information and it outputs the generator 108. Also, when collating the authentication information, the control unit 115 includes an operation information input from the operation unit 106, the verification instructions in this operation information, and outputs the authentication information collation unit 110, the biometric information reading unit 107 a biometric information input from the verification instructions in this biological information, and outputs the authentication information collation unit 110.

[0020] Display unit 116 includes, for example, a LCD display, an operation result of the operation unit 106, the verification result of the authentication information collation unit 110 displays various data read from the data storage unit 113.

[0021] Next, with reference to FIG. 5, described credentials. Figure 5 is generated by the authentication information generating section 108, is a diagram illustrating an example of authentication information stored in the authentication information storage unit 109.

[0022] authentication information 500 shown in FIG. 5, an operation pattern 501, a lock release target 502, a biological pattern 503 is a one data set associated. Then, one or more data sets are stored in the authentication information storage unit 109.

[0023] Operation pattern 501, for example, opening and closing of the mobile phone by pressing the one-push button is information indicating the execution of the function of the mobile phone by pressing the side button, this operation Pas Tan 501 unlocked object function be specific. Further, the operation information, and biological information, the operation pattern 501, by that Itasu biometric pattern 503 gar, locking features shown in unlocked object 502 that will be identified from the operation pattern 501 is canceled.

[0024] Here, the operation information includes a folding type portable telephone is also the operation content such as the sliding operation of the housing of the operating or slide type mobile phone to the closed state to an open state. The operation information can be the same button, as in the conventional pressing, pressed longer than the usual pressing, in the case of pushing so-called length, it is also possible to different operation information .

[0025] Further, not provided with the open Z closed state detecting means, by not taking into account the open Z closed state, is also applicable to a straight type mobile phone without need to consider the open Z 閉状 state.

[0026] In addition, the operation pattern may be a combination of a plurality of operation. For example, as shown by the set 2 of FIG. 5, the operation and you the mobile phone according to one push button is pressed in the closed state power open state, operations and pressing a button A, it may be combined. Further, when combining the plurality of operations, even taking into account the order of the operations.

[0027] Unlock target 502 indicates the function of the mobile phone having a lock function is specified by the operation pattern 5 01. Here, during the authentication information 500, the same lock release target 502, that is, it is possible to set a plurality of identical function. Further, in the same lock release target 502, for example, it may be also configured to enable only a portion of the function.

[0028] biometric pattern 503 is, for example, information of the user's fingerprint. The biological pattern 503, for example, fingerprints or the right hand index finger of the user A shown in set 1 of FIG. 5, even different biometric information of the same user as the right thumb of the user A fingerprint as shown in Set 2 good.

[0029] Thus, for example, in the case the mobile phone is in an open state and a closed state, as holding method of a user of the portable phone is different, to be a fingerprint of a finger in accordance with the holding method and biometric information it can. That is, by registered biometric information corresponding to the holding method and operation of the mobile phone, because the it is possible to incorporate reading operation of the biometric information in a series of operations, it may feel user hassle Absent.

[0030] In FIG. 5, an operation pattern 501, a lock release target 502, an example of storing the three information of the biological pattern 503 as one set, data as to manage in association with 3 pieces of information if the format may be in any form.

[0031] Next, the operation of the cellular phone 100 of this embodiment having the above configuration. First, the authentication information generation processing will be described with reference to FIG.

[0032] FIG. 6 is a flow diagram illustrating an authentication information generating operation of the mobile phone 100 according to this embodiment.

[0033] First, in step S601, the operation unit 106 by the operation of the user to select a target function for releasing the security lock. Here, for example, a non-contact payment functions as a release target of the security lock has been selected.

[0034] Next, in step S602, the line ,, operation unit 106 any action the user to the mobile phone 100 outputs operation information indicating the operation to the control unit 115. Here, for example, as an optional operation, it is assumed that the side buttons for displaying the unlocking menu contactless payment function is pressed.

[0035] Next, in step S603, the biometric information reading unit 107 reads the biometric information of a user, and outputs it to the control unit 115. Here, for example, fingerprint information of the right hand index finger of the user is read as biological information.

[0036] Next, in step S604, the authentication information generation unit 108 acquires operation information of the user performed in step S602 from the control unit 115.

[0037] Next, in step S605, the authentication information generation unit 108 acquires user's biometric information read in step S604 from the control unit 115.

[0038] Next, in step S606, the authenticating information generation unit 108, the acquired operation information in step S604 and the operation pattern, the acquired biometric information in step S605 and the biological pattern, operation Pas Tan, biological patterns and step S601 in association with the selected lock release target to generate authentication information. Thus, the operation pattern force also unlock object function is specified. The authentication information generation unit 108 generates the authentication information storing authentication information storage unit 109 〖This was, terminates the authentication information generation process.

[0039] The generation and registration operation of the authentication information, to the nag to be limited from the step S601 described above in the order of steps S60 6 unlocked object (function), associated with the operation information and the live body information if generation and registration operation of the authentication information, the present invention is applicability ability.

[0040] In addition, the display of the setting completion of the security lock released after completion of processing of step S606, the sound, it is also possible to notify the user by vibration. Further, by repeating the process of Sutetsu flop S606 from step S602, for the same security lock release target, it may be set the operation pattern and the biological pattern that different time. Further, in order to avoid setting of overlapping credentials, for example, performs processing of data sets to be duplicated after the processing of step S605 in the authentication information storage section 109 confirms whether or not present, the results Viewing, sound, it may be notified to the user by vibration.

[0041] Thus, in this embodiment, Nag the than setting its own security button only to perform security functions like a conventional already the buttons or the like arbitrary disposed in the mobile phone it can be assigned to the security button. That is, when using a desired function, in accordance with the holding method and operation of the mobile phone, it is possible to generate the authentication information.

[0042] For example, if the unlock setting of the non-contact approval feature, the user depresses a side button to select a menu for setting the unlocking of the contactless payment function (operation information) shed right index finger on the biometric information reading unit 107 such as a fingerprint reader (biometric information). The operation information is the operation pattern, the biological information is a biological pattern, associated with the operation pattern and the biological pattern, authentication information functions the operation pattern force also identified the contactless payment function (mouth click release target) It is generated and registered. In other words, this authentication information is, the kind of finger based on the way of holding the interest for the user to actually use, place the way and position, and the like, because it has become the user's specific ones, to get the authentication biometric information at the time of unlocking If, it becomes possible that the user performs an authentication process in normal use, the authentication information is based on user-specific methods and operations using the Te, can be enhanced because authentication accuracy.

[0043] In addition, since it is possible to plural sets stored authentication information of the same unlocked object, For example, the operation pattern showing different operation contents in an open state and a closed state of the cellular phone, this operation pattern each association is a biological pattern of the same lock release target (i.e., the same functions) by associating to, can be a cancel setting of different security lock for the same function. Further, 〖possible to register the different biometric information for each user as biometric pattern Koyori, even if the same operation pattern and the same lock release target, because that can distinguish determines user by collating biometric information, it is also possible to share the mobile phone.

[0044] Next, the authentication process of the portable telephone 100 according to the present embodiment will be described with reference to FIG. Figure 7 is a flow diagram showing an authentication process operations of the mobile phone 100 according to this embodiment.

[0045] First, in step S701, the line ,, operation unit 106 any action by the user, and outputs operation information indicating the content of the operation to the control unit 115. Then, the control unit 115 outputs the operation information to the authentication information collation unit 110, and outputs the verification indication of the operation information.

[0046] Next, in step S702, the authentication information collation unit 110, a match for operation information input from the control unit 115, operation is stored in the authentication information storage unit 109 Ru credentials Bruno " to detect whether or not there is in the tongue. Here, when the operation information is more than one authentication information collation unit 110 detects a match between the combination of the operation information. Then, if there is a matching operation pattern (Step S703: Yes), the process proceeds to step S704, if there is no operation pattern matching (step S703: No), the process returns to step S 701. [0047] Then, if there is an operation pattern match in step S703, in step S704, BIOLOGICAL information reading unit 107 reads the biometric information of a user, and outputs to the control unit 115, the control unit 115, the biological and it outputs the information to the authentication information collation unit 110.

[0048] Next, in step S705, the authentication information collation unit 110, a biometric pattern corresponding to the authentication pattern detected in step S702, and compares the biometric information read in step S704, and unlock the collation result and it outputs the section 111. Here, if the verification result is a match (step S706: Yes), the process proceeds to the step S707, the if the comparison result does not match (step S707: No), the process proceeds to step S 708.

[0049] When the verification result at step S706 matches, in step S707, the lock release portion 111, to unlock the operation pattern force specified functionality, the process ends. Thus, it is possible to release the security lock only functions Nag operated Patanka ゝ et particular possible to release the security locking of the entire mobile phone.

[0050] On the other hand, the verification result is Do matched in step S706, the case, in step S 708, the authentication information collation unit 110 in the authentication information stored in the authentication information storage unit 109, detected in step S702 operation pattern matching the operation information is determined whether no other. Here, if the matching operation pattern is in the other (step S 708: Yes), the process returns to step S705, the case matching operation pattern is not in the other (step S 708: No), the process ends.

[0051] Note that the matching operation of the authentication information, For example Nag limited to the above sequence may be collated together and operation information and the biological information. In addition, Te your ヽ in step S705, be collated together multiple authentication information Yo,.

[0052] Thus, according to this embodiment, the mobile phone obtains the operation information indicating the details of the operation of the mobile phone of the user, reads the biometric information of the user. The mobile phone, if there is a match with the obtained operation information and the read biometric information against the force not force that is in the authentication information matches in the authentication information, the operation Bata Lanka also to unlock the functions specified. This makes it possible to unlock every function of the mobile phone.

[0053] Namely, the present invention includes an authentication information associated with the biometric information of the operation information and the user indicating the operation of a mobile phone, to register and release of the security for each function specified by the authentication information.

[0054] Thus, for example, in the mobile phone having functions executable either open or closed, the operation information indicating a normal, operate in the open state, respectively operation information indicating an operation usually carried out in a closed state by registering the biometric information associated with the, it is a mobile phone that either condition, it is possible to perform an authentication operation in accordance with a user's operation.

[0055] In addition, by registering different biometric information for each user, even if the same operation information and the same lock release target, so can distinguish determines user by collating biometric information, the mobile phone It can also be shared among multiple users.

Industrial Applicability

[0056] the mobile phone of the present invention has a effect that can be unlocked for each function of the mobile phone, it is useful as a mobile phone having a biometric authentication function.

Claims

The scope of the claims
[1] and the operation pattern indicates a predetermined operation content, the biological pattern indicating the contents of the given biological information
A storage means for storing authentication information comprising a data set associated with a function that is the operation pattern force determination,
A biometric information reading means an operation information acquisition means for acquiring operation information indicating the details of the operation of the mobile phone of the user reading the biometric information of the user,
And authentication information collation means a match with the obtained operation information and the read biometric information to determine whether in the authentication information,
If there is a match in the authentication information, and canceling means for canceling the locking of the function specified in the operation flap down the matching authentication information,
A mobile phone having a.
[2] the operation information, the portable telephone according to claim 1 wherein the information indicating the content to perform the functions of the mobile phone of the housing information and the mobile telephone state indicating the operation contents to change the.
[3] an operation pattern indicates a predetermined operation content, mobile storing biometric pattern showing the content of a predetermined biometric information, the authentication information comprising a data set that associates the functions each operation pattern force specified memory a unlock method in the phone,
A biometric information reading step of operation information acquisition step of acquiring operation information indicating the details of the operation of the mobile phone of the user and reads the biometric information of the user,
And authentication information collation step of a match with the obtained operation information and the read biometric information to determine the force whether that is in the authentication information,
If there is a match in the authentication information, the unlock process with a release step, the to unlock the functions specified in the operation flap down the matching authentication information.
PCT/JP2006/318159 2006-09-13 2006-09-13 Portable telephone and unlock method for portable telephone WO2008032374A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/JP2006/318159 WO2008032374A1 (en) 2006-09-13 2006-09-13 Portable telephone and unlock method for portable telephone

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
PCT/JP2006/318159 WO2008032374A1 (en) 2006-09-13 2006-09-13 Portable telephone and unlock method for portable telephone
JP2008534177A JPWO2008032374A1 (en) 2006-09-13 2006-09-13 Unlocking method for a portable telephone and the cellular telephone

Publications (1)

Publication Number Publication Date
WO2008032374A1 true WO2008032374A1 (en) 2008-03-20

Family

ID=39183448

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2006/318159 WO2008032374A1 (en) 2006-09-13 2006-09-13 Portable telephone and unlock method for portable telephone

Country Status (2)

Country Link
JP (1) JPWO2008032374A1 (en)
WO (1) WO2008032374A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010070724A1 (en) * 2008-12-15 2010-06-24 富士通株式会社 Authentication device, authentication method, and authentication program
WO2010084932A1 (en) * 2009-01-21 2010-07-29 日本電気株式会社 Illumination detection method, flip-type electronic device and program
JP2010273070A (en) * 2009-05-21 2010-12-02 Nec Casio Mobile Communications Ltd Communication terminal and program
JP2012213204A (en) * 2012-06-11 2012-11-01 Fujitsu Mobile Communications Ltd Electronic apparatus
WO2014156693A1 (en) * 2013-03-25 2014-10-02 株式会社Nttドコモ Information terminal, lock disengage method, and lock disengage program

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004166158A (en) * 2002-11-15 2004-06-10 Nec Corp Portable mobile terminal
JP2005175555A (en) * 2003-12-08 2005-06-30 Hitachi Ltd Mobile communication apparatus
JP2005323083A (en) * 2004-05-07 2005-11-17 Fuji Photo Film Co Ltd Portable terminal machine

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3896066B2 (en) * 2002-10-18 2007-03-22 埼玉日本電気株式会社 The information terminal apparatus and the function setting control program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004166158A (en) * 2002-11-15 2004-06-10 Nec Corp Portable mobile terminal
JP2005175555A (en) * 2003-12-08 2005-06-30 Hitachi Ltd Mobile communication apparatus
JP2005323083A (en) * 2004-05-07 2005-11-17 Fuji Photo Film Co Ltd Portable terminal machine

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010070724A1 (en) * 2008-12-15 2010-06-24 富士通株式会社 Authentication device, authentication method, and authentication program
WO2010084932A1 (en) * 2009-01-21 2010-07-29 日本電気株式会社 Illumination detection method, flip-type electronic device and program
US8830216B2 (en) 2009-01-21 2014-09-09 Nec Corporation Illuminance detection method, flip-type electronic device and program
JP2010273070A (en) * 2009-05-21 2010-12-02 Nec Casio Mobile Communications Ltd Communication terminal and program
JP2012213204A (en) * 2012-06-11 2012-11-01 Fujitsu Mobile Communications Ltd Electronic apparatus
WO2014156693A1 (en) * 2013-03-25 2014-10-02 株式会社Nttドコモ Information terminal, lock disengage method, and lock disengage program

Also Published As

Publication number Publication date
JPWO2008032374A1 (en) 2010-01-21

Similar Documents

Publication Publication Date Title
US7403765B2 (en) Individual authentication method for portable communication equipment and program product therefor
Jansen Authenticating users on handheld devices
US7647638B2 (en) Apparatus and a method for preventing unauthorized use and a device with a function of preventing unauthorized use
JP3981017B2 (en) Mobile communication terminal equipment
US6298146B1 (en) Instruction and/or identification input unit
US20070265035A1 (en) Mobile electronic apparatus, and battery pack for the apparatus
EP2157552A1 (en) Electromechanical lock
US7664961B2 (en) Wireless handheld device with local biometric authentication
KR101366446B1 (en) Wireless authentication
EP1857954A1 (en) Portable electronic apparatus and recording medium for changing the access permission of an application or file upon user biometric identification
US9342674B2 (en) Man-machine interface for controlling access to electronic devices
US6466781B1 (en) Biometric authentication technology for wireless transceiver activation
EP1507431B1 (en) Biometrical authentication in a communication system
US20040021551A1 (en) Apparatus for controlling articles in custody
US8995960B2 (en) Mobile device authentication
EP2207124A2 (en) Touch entry of password on a mobile device
US20060176146A1 (en) Wireless universal serial bus memory key with fingerprint authentication
EP1775674A1 (en) Press-trigger fingerprint sensor module
CN100542189C (en) Mobile electronic apparatus, function control method and program for the mobile electronic apparatus
JP5423394B2 (en) Terminal device authentication method, terminal device, and program
US20100138914A1 (en) System and method of providing biometric quick launch
US20030115490A1 (en) Secure network and networked devices using biometrics
KR20040067123A (en) Method and Apparatus for user authentication
US20100237991A1 (en) Biometric scanning arrangement and methods thereof
US20090258667A1 (en) Function unlocking system, function unlocking method, and function unlocking program

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 06797909

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2008534177

Country of ref document: JP

ENP Entry into the national phase in:

Ref document number: 2008534177

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06797909

Country of ref document: EP

Kind code of ref document: A1