WO2013099403A1 - 携帯端末、セキュリティ管理方法およびプログラム - Google Patents
携帯端末、セキュリティ管理方法およびプログラム Download PDFInfo
- Publication number
- WO2013099403A1 WO2013099403A1 PCT/JP2012/076292 JP2012076292W WO2013099403A1 WO 2013099403 A1 WO2013099403 A1 WO 2013099403A1 JP 2012076292 W JP2012076292 W JP 2012076292W WO 2013099403 A1 WO2013099403 A1 WO 2013099403A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access point
- mobile terminal
- attribute
- state
- security function
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72412—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72415—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/06—Details of telephonic subscriber devices including a wireless LAN interface
Definitions
- the present invention relates to a mobile terminal having a security function that restricts use.
- Some mobile terminals such as mobile phone terminals and portable information terminals have a security function that restricts input operations and the like in order to prevent unauthorized use by a third party other than the user.
- the security function when a specific setting operation is performed, the security function is enabled and usage is restricted. After that, when a specific release operation such as entering a PIN is performed, the security function is disabled. , The mobile phone can be used normally.
- the user performs a release operation to use the mobile terminal when the security function is enabled even in a place where the possibility of unauthorized use is low, such as at home.
- the security function when going out from home, the security function must be re-enabled, which is troublesome.
- the user goes out of the house without setting the security mode by mistake, and the effect of preventing unauthorized use may not be obtained.
- Patent Document 1 wireless communication is possible with both a private base station that is an indoor base station and a public base station that is an outdoor base station.
- a portable terminal device that enables a security function when a signal cannot be received is described. According to this portable terminal device, since the security function is effective only when the user is outdoors, there is no need to perform a release operation indoors or a setting operation when going out.
- Patent Document 1 since private base stations are used not only at home but also in various facilities such as businesses and hospitals, the mobile terminal device described in Patent Document 1 has an unspecified number of people around it. Even in the environment, there is a possibility that the security function becomes invalid and unauthorized use is performed by a third party.
- An object of the present invention is to provide a mobile terminal, a security management method, and a program that can more reliably prevent unauthorized use while reducing labor.
- a mobile terminal shows a communication unit that connects to an access point and communicates via the access point, and an attribute set for the access point for each access point to which the communication unit can be connected.
- a storage unit that stores a table, and a control that uses the table to identify an attribute of an access point connected to the communication unit as a current attribute, and controls a security function that restricts use according to the current attribute Part.
- the security management method is a security management method by a mobile terminal that connects to an access point and communicates via the access point. For each access point to which the mobile terminal can be connected, the access point A table indicating attributes set for the mobile terminal is stored, the attribute of the access point connected to the mobile terminal is specified as the current attribute using the table, and the use is restricted according to the current attribute Control security functions.
- the program according to the present invention is connected to an access point, and for each access point to which the communication unit can be connected to a computer connected to a communication unit that communicates via the access point, A procedure for storing a table showing set attributes, a procedure for specifying an attribute of an access point connected to the mobile terminal as a current attribute using the table, and a use restriction according to the current attribute And a procedure for controlling the security function to be executed.
- FIG. 1 is a block diagram showing a configuration of a mobile terminal according to an embodiment of the present invention.
- the mobile terminal 10 includes a communication unit 1, a storage unit 2, a state monitoring unit 3, and a control unit 4.
- the communication unit 1 performs communication via an AP (Access Point). More specifically, the communication unit 1 wirelessly connects to an AP included in a wireless communication range in which wireless communication is possible, and performs communication via the connected AP. Devices such as a home server, a proxy server, and a TV (Television set) may be connected to the AP. In FIG. 1, the communication unit 1 is connected to the AP 20, and the AP 20 is connected to the TV 30.
- NW Network
- an internal NW having an AP and a device connected to the AP as a node.
- the storage unit 2 stores a control table for controlling a security function that restricts use of the mobile terminal 10. Specifically, in the control table, an attribute set for an AP (Access Point) that can be connected to the communication unit 1 and a device identifier for specifying a predetermined device are shown for each identifier for specifying the AP. Has been.
- the device identifier and the identifier are, for example, ESSID, BSSID, or NetBIOS name.
- the predetermined device is a device that is assumed to be connected to the AP.
- FIG. 2 is an explanatory diagram for explaining an example of the control table.
- the control table 200 includes an NW name 201 that is an example of an attribute, a device identifier 202, and an identifier 203.
- Each record of the control table 200 is registered in the storage unit 2 when, for example, a wireless LAN is set so that the mobile terminal 10 can be connected to an AP.
- a device identifier that identifies a device connected to the AP at the time of wireless LAN setting is registered as the device identifier 202.
- the NW name 201 can be set by the user, and FIG. 2 shows the installation location (“house”, “office”) where the AP is installed.
- a device identifier 202 that identifies the device may be added to the control table.
- the state monitoring unit 3 is a monitoring unit that monitors the state of the mobile terminal 10.
- the state monitoring unit 3 includes an acceleration sensor (not shown), and monitors the acceleration of the mobile terminal 10 that is an output value of the acceleration sensor as the state of the mobile terminal 10.
- the state monitoring unit 3 may monitor a charging state indicating whether or not a secondary battery (not shown) provided in the mobile terminal 10 is being charged as the state of the mobile terminal 10. At this time, the state monitoring unit 3 may monitor whether or not the secondary battery is actually being charged, and a charger (not shown) for charging the secondary battery such as a cradle may be a portable terminal. 10, it is determined that charging is being performed when the charger is connected to the portable terminal 10, and charging is not performed when the charger is not connected to the portable terminal 10. May be.
- the state monitoring unit 3 may have a position positioning function for positioning a position such as a GPS (Global Positioning System) function, and may monitor the position measured by the position positioning function as the state of the mobile terminal 10. .
- a position positioning function for positioning a position such as a GPS (Global Positioning System) function
- the acceleration of the portable terminal 10, the charging state of the portable terminal 10, and the position of the portable terminal 10 were illustrated here as the state of the portable terminal 10, the state of the portable terminal 10 may be a combination thereof. Other states are possible.
- the control unit 4 uses the table stored in the storage unit 2 to identify the attribute information of the AP 20 connected to the communication unit 1 as the current attribute information, and monitors the current attribute information and the state monitoring unit 3
- the security function that restricts the use of the mobile terminal 10 is controlled according to the state of the mobile terminal 10 as a result and the configuration information acquired by the NW configuration management unit 5.
- control unit 4 includes an NW configuration management unit 5 and a security lock unit 6, and each unit executes the following processing.
- the NW configuration management unit 5 obtains an identifier that identifies the AP 20 from the AP 20 that is actually connected to the communication unit 1, and obtains a device identifier that identifies the TV 30 from the TV 30 that is a device connected to the AP 20. get.
- the acquired identifier and device identifier serve as configuration information indicating the configuration of the internal NW.
- the security lock unit 6 performs security according to the table stored in the storage unit 2, the state of the mobile terminal 10 that is the monitoring result of the state monitoring unit 3, and the configuration information acquired by the NW configuration management unit 5. Control the function.
- the security lock unit 6 specifies the attribute corresponding to the identifier in the configuration information as the current attribute in the table stored in the storage unit 2, and the current attribute matches the predetermined attribute. Judge whether to do.
- the predetermined attribute may be set in advance in the storage unit 2 or the security lock unit 6 or may be set by the user of the mobile terminal 10. In the following, it is assumed that the predetermined attribute indicates “house”.
- the security lock unit 6 determines whether the device identifier corresponding to the identifier in the configuration information satisfies a predetermined device condition in the table stored in the storage unit 2. to decide.
- the device condition includes a device identifier corresponding to the identifier in the configuration information (hereinafter referred to as an assumed device identifier) and an identifier in the configuration information (hereinafter referred to as an actual device identifier).
- This device condition corresponds to the device assumed to be connected to the AP 20 being matched with the device actually connected to the AP 20.
- the device condition may be that any of the assumed device identifiers matches any of the actual device identifiers, or all of the assumed device identifiers match any of the actual device identifiers. It may be that.
- the security lock unit 6 determines whether or not the state of the mobile terminal 10 that is the monitoring result of the state monitoring unit 3 satisfies a predetermined state condition.
- the state condition for example, at least one of the acceleration being equal to or less than a predetermined threshold, the power receiving state indicating charging, and the position of the mobile terminal 10 being included in a predetermined setting range including.
- the setting range is represented by a circle around the user's home or a certain place in the home.
- the state of the mobile terminal 10 satisfies such a condition, the possibility that the mobile terminal 10 is being used in the house increases.
- the state condition is that the acceleration is equal to or less than the threshold value, it indicates that the mobile terminal 10 is not moving or the moving speed is low, and thus the mobile terminal 10 may be used in the house. Becomes higher.
- the security lock unit 6 switches between enabling and disabling the security function.
- the security lock unit 6 activates the security function or Keep disabled.
- the security lock unit 6 performs the security function. To enable.
- FIG. 3 is a flowchart for explaining an example of the operation of the mobile terminal 10. It is assumed that the security function is enabled as an initial state.
- the NW configuration management unit 5 acquires the identifier of the AP 20 from the AP 20 via the communication unit 1.
- the device identifier of the TV 30 is acquired from the TV 30 connected to the AP 20 via the communication unit 1 and the AP 20.
- the NW configuration management unit 5 notifies the security lock unit 6 of configuration information including the acquired identifier and device identifier (step S302).
- the security lock unit 6 Upon receiving the configuration information, the security lock unit 6 specifies an attribute corresponding to the identifier in the configuration information as a current attribute in the table stored in the storage unit 2 and acquires the current attribute from the storage unit 2 ( Step S303).
- the security lock unit 6 determines whether or not the current attribute indicates “house” (step S304).
- the security lock unit 6 acquires a device identifier corresponding to the identifier in the configuration information from the storage unit 2 as an assumed device identifier, and the assumed device identifier and the device identifier in the configuration information. It is determined whether or not the actual device identifier matches (step S305).
- the security lock unit 6 acquires the state of the mobile terminal 10 from the state monitoring unit 3 (step S306).
- the security lock unit 6 determines whether or not the state of the mobile terminal 10 satisfies the state condition (step S307).
- the security lock unit 6 switches between enabling and disabling the security function (step S308).
- step S304 If the current attribute does not indicate “house” in step S304, if the assumed device identifier does not match the actual device identifier in step S305, if the state of the mobile terminal 10 does not satisfy the state condition in step S307, the security lock The unit 6 ends the process while maintaining the validity or invalidity of the security function.
- the security function is controlled according to the current attribute set for the access point that is actually connected. It becomes possible to disable the security function only when the user is in the office, and it is possible to more reliably prevent unauthorized use while reducing labor.
- the security function is switched between enabled and disabled. Even if the access point attribute is tampered with, the unauthorized use can be prevented.
- the security function when the state of the mobile terminal 10 satisfies the state condition, the security function is switched between enabled and disabled, so that the access point identifier is disguised or the access point attribute is tampered with. It also becomes possible to prevent unauthorized use.
- functions other than the security function include the table stored in the storage unit 2, the state of the mobile terminal 10 that is the monitoring result of the state monitoring unit 3, and the configuration information acquired by the NW configuration management unit 5. It may be controlled accordingly.
- functions other than the security function include a function for executing an application such as a screen saver.
- setting items related to the security function may be displayed, and settings related to the security function may be performed by the user.
- the setting related to the security function includes, for example, “invalidate the security function when connected to the connected AP next time”.
- the functions of the mobile terminal 10 described above are recorded on a computer-readable recording medium, and the program recorded on the recording medium is read and executed by the computer. That may be realized.
Abstract
Description
2 格納部
3 状態監視部
4 制御部
5 NW構成部
6 セキュリティロック部
10 携帯端末
20 AP
30 TV
Claims (11)
- アクセスポイントと接続し、当該アクセスポイントを介して通信を行う通信部と、
前記通信部が接続可能なアクセスポイントごとに、当該アクセスポイントに対して設定された属性を示すテーブルを格納する格納部と、
前記テーブルを用いて、前記通信部と接続されているアクセスポイントの属性を現属性として特定し、前記現属性に応じて、使用を制限するセキュリティ機能を制御する制御部と、を有する携帯端末。 - 前記制御部は、前記現属性が所定の属性の場合、前記セキュリティ機能の有効と無効とを切り替える、請求項1に記載の携帯端末。
- 前記テーブルは、前記接続可能なアクセスポイントごとに、所定の機器を特定する機器識別子をさらに示し、
前記制御部は、前記現属性が所定の属性の場合、前記通信部と接続されているアクセスポイントに対応する機器識別子が予め定められた機器条件を満たすと、前記セキュリティ機能の有効と無効とを切り替える、請求項2に記載の携帯端末。 - 当該携帯端末の状態を監視する監視部をさらに有し、
前記制御部は、前記現属性が前記所定の属性の場合、前記状態が予め定められた状態条件を満たすと、前記セキュリティ機能の有効と無効とを切り替える、請求項2に記載の携帯端末。 - 当該携帯端末の状態を監視する監視部をさらに有し、
前記制御部は、前記現属性が所定の属性の場合、前記通信部と接続されているアクセスポイントに対応する機器識別子が前記機器条件を満たし、かつ、前記状態が予め定められた状態条件を満たすと、前記セキュリティ機能の有効と無効とを切り替える、請求項3に記載の携帯端末。 - 前記状態は、前記携帯端末の加速度を含む、請求項4または5に記載の携帯端末。
- 前記状態は、前記携帯端末の充電状態を含む、請求項4ないし6のいずれか1項に記載の携帯端末。
- 前記状態は、前記携帯端末の位置を含む、請求項4ないし7のいずれか1項に記載の携帯端末。
- 前記制御部は、前記セキュリティ機能が無効とされた状態で、前記通信部と前記アクセスポイントとの接続が切断されると、前記セキュリティ機能を有効にする、請求項2ないし8のいずれか1項に記載の携帯端末。
- アクセスポイントと接続し、当該アクセスポイントを介して通信を行う携帯端末によるセキュリティ管理方法であって、
前記携帯端末が接続可能なアクセスポイントごとに、当該アクセスポイントに対して設定された属性を示すテーブルを格納し、
前記テーブルを用いて、前記携帯端末と接続されているアクセスポイントの属性を現属性として特定し、
前記現属性に応じて、使用を制限するセキュリティ機能を制御する、セキュリティ管理方法。 - アクセスポイントと接続し、当該アクセスポイントを介して通信を行う通信部と接続されたコンピュータに、
前記通信部が接続可能なアクセスポイントごとに、当該アクセスポイントに対して設定された属性を示すテーブルを格納する手順と、
前記テーブルを用いて、前記携帯端末と接続されているアクセスポイントの属性を現属性として特定する手順と、
前記現属性に応じて、使用を制限するセキュリティ機能を制御する手順と、を実行させるプログラム。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2011285817 | 2011-12-27 | ||
JP2011-285817 | 2011-12-27 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013099403A1 true WO2013099403A1 (ja) | 2013-07-04 |
Family
ID=48696908
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2012/076292 WO2013099403A1 (ja) | 2011-12-27 | 2012-10-11 | 携帯端末、セキュリティ管理方法およびプログラム |
Country Status (2)
Country | Link |
---|---|
JP (1) | JPWO2013099403A1 (ja) |
WO (1) | WO2013099403A1 (ja) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007142905A (ja) * | 2005-11-21 | 2007-06-07 | Mitsubishi Electric Corp | 携帯通信端末、携帯通信端末制御方法および携帯通信端末制御プログラム |
JP2007318245A (ja) * | 2006-05-23 | 2007-12-06 | Nec Corp | 携帯電話システム、携帯電話端末、個人情報保護方法、個人情報保護プログラムおよびプログラム記録媒体 |
JP2009224876A (ja) * | 2008-03-13 | 2009-10-01 | Nec Corp | 携帯端末装置、そのアクセス方法、およびプログラム |
JP2009284095A (ja) * | 2008-05-20 | 2009-12-03 | Sony Ericsson Mobilecommunications Japan Inc | 通信端末装置及び情報の防護方法 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006211562A (ja) * | 2005-01-31 | 2006-08-10 | Advanced Telecommunication Research Institute International | 音声メモシステム |
JP2006303747A (ja) * | 2005-04-19 | 2006-11-02 | Nec Saitama Ltd | 携帯電話機及び機能制御方法 |
JP2008124684A (ja) * | 2006-11-10 | 2008-05-29 | Toshiba Corp | 携帯端末 |
JP2008104231A (ja) * | 2007-12-07 | 2008-05-01 | Faith Inc | 携帯端末 |
JP2009146193A (ja) * | 2007-12-14 | 2009-07-02 | Funai Electric Co Ltd | 無線通信端末、無線通信端末のデータを保護する方法、データを無線通信端末に保護させるためのプログラム、および当該プログラムを格納した記録媒体 |
-
2012
- 2012-10-11 WO PCT/JP2012/076292 patent/WO2013099403A1/ja active Application Filing
- 2012-10-11 JP JP2013551515A patent/JPWO2013099403A1/ja active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007142905A (ja) * | 2005-11-21 | 2007-06-07 | Mitsubishi Electric Corp | 携帯通信端末、携帯通信端末制御方法および携帯通信端末制御プログラム |
JP2007318245A (ja) * | 2006-05-23 | 2007-12-06 | Nec Corp | 携帯電話システム、携帯電話端末、個人情報保護方法、個人情報保護プログラムおよびプログラム記録媒体 |
JP2009224876A (ja) * | 2008-03-13 | 2009-10-01 | Nec Corp | 携帯端末装置、そのアクセス方法、およびプログラム |
JP2009284095A (ja) * | 2008-05-20 | 2009-12-03 | Sony Ericsson Mobilecommunications Japan Inc | 通信端末装置及び情報の防護方法 |
Also Published As
Publication number | Publication date |
---|---|
JPWO2013099403A1 (ja) | 2015-04-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104349423B (zh) | 自动连接无线局域网的方法、系统及装置 | |
EP3270619B1 (en) | Network connection control method and system for mobile terminal | |
EP4199432A1 (en) | Household device control method and device | |
CN109819493A (zh) | 控制方法和投屏方法及装置、存储介质、电子设备 | |
EP2649859B1 (en) | Automatically enabling wireless communication | |
US20160323826A1 (en) | Multimode and power-saving method of multimedia transmission and system thereof | |
KR20120054929A (ko) | 휴대용 단말기에서 억세스 포인터 연결을 위한 장치 및 방법 | |
EP3238467B1 (en) | Controlling a modality of a dockee in a wireless docking system | |
US10594090B2 (en) | Contraband detection through smart power components | |
CN104066129A (zh) | 网络切换方法和系统 | |
CN107465662A (zh) | 移动终端策略管理方法、移动终端及计算机可读存储介质 | |
JP6425392B2 (ja) | モバイルアクセスポイントを通した外部のデータネットワークの使用を制御する方法及びデバイス | |
US20140179346A1 (en) | Portable communication device | |
US20140085061A1 (en) | Remote control system, relay device, mobile communication termiinal device, and relay method | |
JP6308931B2 (ja) | 携帯通信端末、制御システム、制御方法及び制御プログラム | |
US9088982B2 (en) | Beacon frame data transmission rate adjustment | |
US20140024355A1 (en) | Electronic device capable of controlling functionality depending on location | |
JP2008193272A (ja) | 無線通信装置 | |
US20140094158A1 (en) | Terminal apparatus and method for changing setting thereof | |
JP2016523054A (ja) | ユーザ通知方法、ユーザ通知装置、プログラム及び記録媒体 | |
WO2013099403A1 (ja) | 携帯端末、セキュリティ管理方法およびプログラム | |
EP3082376B1 (en) | Network device discovery method and network device discovery system | |
US20150106493A1 (en) | Communication Device, Communication-Purpose Identification Information Management Server, Communication-Purpose Identification Information Acquisition Method, Communication-Purpose Identification Information Providing Method, and Recording Medium | |
KR101379296B1 (ko) | 이벤트 서비스 방법 및 이를 수행하는 이벤트 서비스 서버 | |
CN104540183A (zh) | 一种无线热点的控制方法和装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12861478 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2013551515 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 12861478 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 12861478 Country of ref document: EP Kind code of ref document: A1 |