MOBILE TERMINAL APPARATUS
20170208164 ยท 2017-07-20
Inventors
Cpc classification
H04M1/72436
ELECTRICITY
H04M1/66
ELECTRICITY
H04W12/02
ELECTRICITY
H04L63/0861
ELECTRICITY
International classification
Abstract
A mobile terminal apparatus checks if a user is a proper user based on the operation of the user and, if the result of authentication is negative, uploads predetermined data, which is part of data stored in a memory, to a predetermined server. After the transmission is completed, the mobile terminal apparatus erases the uploaded data from the memory. It is also possible to instruct the mobile terminal apparatus to upload and erase data from an external source using an electronic mail or a telephone tone signal sequence. This may protect data contained in mobile terminal apparatus that has been lost, from a person who improperly attempts to access the data.
Claims
1. A mobile communication apparatus comprising: a communication circuit configured to perform wireless communication with another communication apparatus; and circuitry configured to: perform authentication processing based on an operation by a user, in a case where the authentication processing has a negative result, perform a feedback using at least one of a message, a light, a sound, and a vibration, receive an instruction from outside of the mobile communication apparatus via the wireless communication, and disable at least one operation of the mobile communication apparatus in response to the received instruction, wherein when an operation corresponding to the received instruction message has been completed, a message is sent to a mail address associated with a proper user of the mobile communication apparatus.
2. The mobile communication apparatus of claim 1, wherein the circuitry is configured to download data to the mobile communication apparatus when a predetermined condition is satisfied, and the downloaded data was previously uploaded by the mobile communication apparatus in response to the received instruction.
3. The mobile communication apparatus of claim 2, wherein the downloaded data was previously deleted from the mobile communication apparatus after being uploaded by the mobile communication apparatus in response to reception of the received instruction.
4. The mobile communication apparatus of claim 1, wherein the instruction is an email message.
5. The mobile communication apparatus of claim 1, wherein the instruction is a telephonic message.
6. The mobile communication apparatus of claim 1, wherein the circuitry is further configured to, upon receiving the instruction, check if a predetermined condition is satisfied, and to only perform said disabling of the at least one operation of the mobile communication apparatus in response to the received instruction message in a case where the predetermined condition is satisfied.
7. The mobile communication apparatus of claim 6, wherein the instruction is an email message, and the predetermined condition includes that information in the instruction matches information registered in advance in the mobile communication apparatus.
8. The mobile communication apparatus of claim 7, wherein the information in the instruction includes a character string in a header of the instruction.
9. The mobile communication apparatus of claim 7, wherein the information in the instruction includes an address of a sender of the instruction.
10. The mobile communication apparatus of claim 6, wherein the instruction is a telephonic message and the predetermined condition is that information in the instruction matches information registered in advance in the mobile communication apparatus.
11. The mobile communication apparatus of claim 10, wherein the information in the instruction includes a tonal series.
12. The mobile communication apparatus of claim 1, wherein the operation by the user includes the user of the mobile communication apparatus instructing the mobile communication apparatus to browse to a webpage registered in advance in the mobile communication apparatus.
13. The mobile communication apparatus of claim 1, wherein the circuitry is configured to download data to the mobile communication apparatus when a predetermined condition is satisfied, and the downloaded data was previously uploaded by another mobile communication apparatus.
14. The mobile communication apparatus of claim 1, wherein the circuitry is configured to download data to the mobile communication apparatus when a predetermined condition is satisfied, and the downloaded data was previously uploaded by the mobile communication apparatus in response to a failed authentication attempt.
15. The mobile communication apparatus of claim 1, wherein the circuitry is configured to download data to the mobile communication apparatus when a predetermined condition is satisfied, and the downloaded data was previously uploaded by the mobile communication apparatus in response to a user attempting to access the data.
16. The mobile communication apparatus of claim 1, wherein the at least one operation of the mobile communication apparatus that is disabled in response to the received instruction includes a user input operation.
17. The mobile communication apparatus of claim 1, wherein the operation corresponding to the received instruction includes an uploading of predetermined data.
18. The mobile communication apparatus of claim 1, wherein the circuitry is configured to download data to the mobile communication apparatus when a predetermined condition is satisfied, the downloaded data was previously uploaded by the mobile communication apparatus in response to the received instruction, and the operation corresponding to the received instruction includes uploading of the data.
19. The mobile communication apparatus of claim 1, wherein the operation corresponding to the received instruction includes a deleting of predetermined data.
20. The mobile communication apparatus of claim 1, wherein the circuitry is configured to download data to the mobile communication apparatus when a predetermined condition is satisfied, the downloaded data was previously uploaded by the mobile communication apparatus in response to the received instruction and subsequently deleted from the mobile communication apparatus, and wherein the operation corresponding to the received instruction includes the deleting of the data.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0024] The above and other features and advantages of the present invention will become more apparent from the following description of the presently exemplary preferred embodiment of the present invention taken in conjunction with the accompanying drawings, in which:
[0025]
[0026]
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
DESCRIPTION OF THE PREFERRED EMBODIMENTS OF THE INVENTION
[0034] Preferred embodiments of the present invention will be described in detail as follows, with reference to the accompanying drawings.
[0035]
[0036]
[0037]
[0038]
[0039] The operation of this embodiment of the present invention will be described below. In principle, data is uploaded in this embodiment from the mobile terminal apparatus 100 to the server to send the data according to a predetermined condition and then the data in the mobile terminal apparatus is erased. Uploading in this embodiment means saving of data. The following describes three examples each of which showing different factors that may trigger uploading.
[0040] Data to be uploaded in this embodiment may be predetermined data in the data holding unit or a folder (including a mailbox) of data. In addition to or instead of such data, data to be uploaded may be any user-specified data or folder. Data to be uploaded is called specified data in this specification.
[0041]
[0042] When the first upload processing is used, it is supposed that at least authentication is performed when data to be uploaded is accessed. That is, even if authentication is not set initially for data that is accessed for browsing, authentication is automatically set when the data, specified as data to be uploaded, is accessed for uploading. Authentication, which confirms whether the user is authorized to access data, is usually performed on a cellular phone by receiving a password and checking its validity. It has to be noted that the authentication method is not limited to a password authentication method.
[0043] Referring to
[0044] The processing described above causes the server to pump up the specified data upon detecting an authentication error when a user who does not know a password attempts to improperly access/browse the specified data, thus preventing the user from improperly accessing the specified data. As it will be described later, a proper user can download this pumped up data back at a later time to the recovered mobile terminal apparatus or to a separate new terminal.
[0045] The first example of upload processing shown in
[0046] The second example of upload processing is started by a proper user sending a specific electronic mail (also called simply an email in this specification) to a mobile terminal apparatus from which data is to be uploaded. To allow the user to do so, a predetermined keyword is included in the header information of the email. For example, a mail is sent to the mail address of the mobile terminal apparatus, for example, with a character string such as *upload in the Subject area of the email. The Message area of the mail may be left blank or may contain a fixed sentence in advance. A mail like this may be prepared in advance in the mobile terminal apparatus. The proper user is supposed to set the keyword in the mobile terminal apparatus, in advance.
[0047] Referring to
[0048] If the predetermined condition is not satisfied, control is passed to step S611 to perform usual mail processing. If the predetermined condition is satisfied, the key operation is disabled, in step S605. Then, the mobile terminal apparatus accesses the network and transmits the specified data to the server, in step S606. After the transmission is finished, (Yes in S607), the specified data is erased, in step S608. Then, a response mail indicating that the specified data has been uploaded and erased is returned to the sender of the upload instruction mail, in step S609. Such a return mail may also be prepared in advance in the mobile terminal apparatus as the template. After that, the disabled key operation is enabled, in step S610 and the processing is ended.
[0049] As described above, the second data upload processing allows the user to upload the specified data stored in the mobile terminal apparatus and then erase it by sending an upload instruction mail from outside the mobile terminal apparatus.
[0050] Next, a third example of data upload processing according to a preferred embodiment of the present invention will be described with reference to
[0051] More specifically, a mobile terminal apparatus such as a state-of the-art cellular phone has a function that places the mobile terminal apparatus in the message memo (answer phone) mode if a call is not answered within a predetermined number of call rings. During this response time, the input of the tone signal is accepted and, when the specified tone signal sequence is received, the terminal can move to this processing. Alternatively, after accepting a message memo, the terminal enters the automatic response mode to accept the input. In some cases, a malicious third party answers the call, in which case, the terminal cannot enter the automatic response mode. However, this third data upload processing is still useful when combined with other data upload processing described above.
[0052] Referring to
[0053] If the authentication is successful (Yes in S704), the mobile terminal apparatus accepts the command, in step S705). If this command does not match the pre-registered command instructing to upload data (Yes in S706), the line is disconnected, in step S713, and the processing is ended. Several retries may be attempted before the line is disconnected. Preferably, the command is a numeric string registered in advance by the terminal user.
[0054] If the commands match (Yes in S706), the line is disconnected, in step S707, and the data upload processing is started. That is, the key operation is disabled, in step S708, and the specified data is transmitted to the server, in step S709. When the transmission is ended (Yes in S710), the specified data in the terminal is erased, in step S711. After that, the disabled key operation is enabled, in step S712 and the processing is ended.
[0055] It is possible that, after entering the automatic response mode and while the line is connected, an audio message created in advance may be generated and sent to the calling party to notify him or her about the operation guide and the operation result in response to the operation performed by the calling party.
[0056] Although the line is once disconnected in step S707 for data communication, the line may be disconnected not in step S707 but after the processing is ended, if sound communication and data communication can be performed at the same time. In that case, an audio message, typically a voice message, may be sent indicating that upload processing has completed. Alternatively, with a mail address (other that the one allocated to the terminal) of the proper user registered in the terminal in advance, the notification message may be sent automatically to the mail address when the upload processing is completed to notify the user about the status.
[0057]
[0058]
[0059] It is supposed that a password for each user (user ID) is set in the server 300 for use in authentication. The mobile terminal apparatus 100 can browse the web page of the server via the base station/control station. The data of the specified web page is saved on the external storage device 302 of the server 300. When a mobile terminal apparatus accesses the specified web page, in step S901, authentication processing is started, in step S902. During authentication processing, the user name and the password are entered, for example, via the operation unit 106 of the mobile terminal apparatus and the received information is sent to the server 300 via the base station/control station. The server authenticates the user by comparing the received information with the password of each user stored in the server in advance. If the received user name is not found or, if found, a password mismatch is found, the server judges that an authentication error occurs (No in S903) and sends a notification to the terminal indicating the error. In response to this notification, the terminal notifies the user about the error, in step S904. Any notification method may be used; for example, a message is displayed on the display unit of the terminal, the LED is lit, a sound is generated, or a vibration is generated.
[0060] If the authentication is successful (Yes in S903), the user is requested to select download items, in step S905. In this case, it is possible to allow the user to select the saving destination of each selection item. If data with the same name as that of a download item is already in the selected saving destination, the data with the same name is overwritten. It is also possible to omit the step of overwrite saving if it is found, as a result of comparison between the two, that the data to be overwritten is identical to the data of a download item. Alternatively, instead of overwrite saving, synchronization may be established between the two so that the old data is changed to the new data. Authentication may be performed, not in the position shown in the flowchart, but after step S905.
[0061] Then, the selected data is downloaded, in step S906. If the uploaded data is fixed data (for example, address book, received mail folder, etc.) and no selection is necessary, step S905 may be omitted and S906 turns simply into a step of downloading data.
[0062] The download is finished when end notification is received from the server (Yes in S907). At this time, a message is displayed, for example, on the display unit to notify the user that the download is finished, in step S908, and then the processing is ended. The server may erase the downloaded data. This erasure may be done either automatically or upon receiving an instruction or agreement from the user.
[0063] Although the present invention has been described through preferred embodiments thereof, it is to be understood that the present invention is not limited to such embodiment but that various changes, modifications, combinations and sub combinations are possible without departing from the scope and spirit of the present invention.
[0064] For example, although a password authentication is used in the authentication method in step S502 in
[0065] When multiple authentication methods are available, the authentication method may be changed according to data that is accessed. Alternatively, multiple authentication methods may be combined. In this case, one of the following actions may be taken: (a) if an error is found in one of the methods, control is passed to step S504; (b) when an authentication error occurs, the authentication method is changed to the one at a higher authentication security level.
[0066] Although erased after being uploaded in the embodiment, data need not always be erased. Alternatively, whether to erase may be predetermined depending upon the type of data. In this case, the type of data to be erased may be either fixed or selected by the user. In either case, if data is not erased, it is preferable that data not be accessed at least for a given length of time (prevents authentication processing). Instead, it is also possible that multiple authentication methods prepared in advance are used beginning with the lowest security level method and, after an authentication error is found, a higher security level method is used. Although data need not be uploaded if not erased, the data may also be uploaded to ensure the data in the terminal after the terminal is lost.
[0067] It is also possible that, with a security level assigned to all data, whether or not the data is specified data, what authentication method is used, and what processing (whether to erase, whether to upload) is to be performed after an authentication error is found are set automatically based on the security level. The user may also specify them manually.
[0068] Although data itself is specified for uploading in the above description, data to be uploaded may also specified at an application level. In this case, data to be uploaded is data related to the application.
[0069] Although whether the received password matches the registered password is used as the match condition for password authentication in the above embodiment, the question and answer authentication method is also possible. That is, whether the user responds with an answer that matches the answer prepared for the user in advance may be used as the condition.
[0070] Although a specified web page is accessed using a user ID, the specified web page (URL) may be provided for each user to eliminate the need for the user to enter the user ID.
[0071] After step S904 in
[0072] After selecting items in step S905, it is also possible to allow the user to browse and edit the selected data. Data can be easily updated (for example, a new item can be added to the address book) by accessing the selected data via some other apparatus, editing the data, and downloading the data from the mobile terminal apparatus to establish synchronization.