WO2008038515A1 - Dispositif de terminal mobile, procédé de verrouillage d'opération de touche et programme - Google Patents
Dispositif de terminal mobile, procédé de verrouillage d'opération de touche et programme Download PDFInfo
- Publication number
- WO2008038515A1 WO2008038515A1 PCT/JP2007/067681 JP2007067681W WO2008038515A1 WO 2008038515 A1 WO2008038515 A1 WO 2008038515A1 JP 2007067681 W JP2007067681 W JP 2007067681W WO 2008038515 A1 WO2008038515 A1 WO 2008038515A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key operation
- lock
- terminal device
- control means
- satisfied
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
Definitions
- Portable terminal device Key operation locking method and program in portable terminal device
- the present invention relates to a mobile terminal device such as a mobile phone device having a key operation lock function and a PHS (Personal Handy Phone System), and in particular, depending on the state of the mobile terminal device when a lock instruction force S is generated.
- the present invention relates to a mobile terminal device that is improved in usability by enabling the user to immediately control whether or not to enable a key operation lock function.
- the conventional general mobile terminal device having the key operation lock function enables the key operation lock function when the user performs a special key operation for enabling the key operation lock function.
- the mobile terminal device that activates the key operation lock function for example, see Patent Documents 1 and 2
- the key operation is not performed.
- a mobile terminal device that activates the key operation lock function when a predetermined time has elapsed for example, see Patent Document 3
- a mobile device that activates the key operation lock function after a predetermined time from the start of music playback processing has also been known.
- Patent Document 1 JP-A-9 266502
- Patent Document 2 Japanese Patent Laid-Open No. 2001-217924
- Patent Document 3 Japanese Patent Laid-Open No. 2001-320477
- Patent Document 4 Japanese Patent Laid-Open No. 2005-167455
- the key operation lock function can be validated without the user performing a special key operation. Forgetting to set can be reduced or eliminated.
- the mobile terminal device described in Patent Documents 1 and 2 immediately locks the key operation when an event (lock instruction) for enabling the key operation lock function occurs, such as folding the mobile terminal device.
- the mobile terminal device described in Patent Document 3 activates the function, and an event (lock) for enabling the key operation lock function that a predetermined time elapses after no key operation is performed.
- the key operation lock function is immediately enabled, and the mobile terminal device described in Patent Document 4 enables the key operation lock that a predetermined time has passed since the music playback process started.
- the key operation lock is activated. That is, the conventional portable terminal device unconditionally activates the key operation lock function when a lock instruction is issued.
- an object of the present invention is to provide a user-friendly mobile terminal device that can control whether or not to immediately enable the key operation lock function according to the state of the mobile terminal device when a lock instruction occurs. There is to do.
- a first portable terminal device includes:
- a lock instruction When a lock instruction is issued, it is determined whether the state of the terminal satisfies the predetermined condition! /, And if it does, the key operation lock function is immediately enabled. And a lock control means for enabling the key operation lock function after waiting for the predetermined condition to be satisfied.
- a second portable terminal device is the first portable terminal device
- the predetermined condition is that a specific application program is not started. It is characterized by that.
- a third portable terminal device is the first portable terminal device
- the key operation lock function S is a function that limits the events that can be accepted.
- a fourth portable terminal device is the first portable terminal device
- a lock instructing means for generating the lock instruction to the lock control means when a key operation is not performed for a certain period of time is provided.
- a fifth portable terminal device is the first portable terminal device
- the portable terminal device further comprises a lock instruction means for generating the lock instruction to the lock control means when the casing of the portable terminal device is closed.
- a sixth portable terminal device is the first portable terminal device
- An unlock key provided on the side of the housing
- An authentication unit that performs an authentication process when the lock release key is operated, and when the authentication process is successful, an authentication unit that instructs the lock control unit to release the key operation lock function.
- the key operation locking method in the first portable terminal device according to the present invention is:
- a key operation locking method in the second portable terminal device according to the present invention is the key operation locking method in the first portable terminal device.
- the predetermined condition is that a specific application program is not activated.
- the first program that works on the present invention is:
- a lock instruction When a lock instruction is issued, it is determined whether or not the state of the mobile terminal device satisfies a predetermined condition, and if so, the key operation lock function is immediately enabled and satisfied. In the case of V, Na! /, When the predetermined condition is satisfied, it is made to function as a lock control means for enabling the key operation lock function.
- the second program that focuses on the present invention is the first program
- the predetermined condition is that a specific application program is not activated.
- the lock control means determines whether the state of the terminal at that time satisfies a predetermined condition. Determine whether. As the predetermined condition, a specific application program is not operating, the state of the mobile terminal device is not a predetermined state, or the like can be set. If the state of the terminal satisfies the predetermined condition, the key operation lock function is immediately enabled. If the terminal does not satisfy the predetermined condition, the key operation lock function is enabled after the predetermined condition is satisfied. To. When the key operation lock function is enabled, it limits the events that can be accepted.
- the present invention it is possible to obtain the effect that the usability of the mobile terminal device can be improved.
- the reason for this is that when a lock instruction is issued, it is determined whether or not the state of the terminal satisfies a predetermined condition. If the condition is satisfied, the key operation lock function is immediately enabled and satisfied. If not, it is provided with lock control means for enabling the key operation lock function after waiting for the predetermined condition to be satisfied. For example, if the application program for music playback operates as the above predetermined condition and! /, NA! /,! /, And ⁇ conditions are set, the application program will issue a lock instruction during music playback. Even if it occurs, the key operation lock function does not become effective, so the user can adjust the volume and the like, and the usability is improved.
- FIG. 1 is an external view of an example of a cellular phone device 1 having a folded shape structure to which the present invention is applied.
- the mobile phone device 1 includes a first casing 100 and a second casing 200, both of which are rotatably connected by a hinge part 300.
- the first casing 100 is provided with an antenna 101, a receiving section 102, and a display section 103 constituted by an LCD.
- the second casing 200 has a front key operation section 201 including a numeric keypad. And a transmitting section 202 are provided.
- the side surface of the second casing 200 is provided with a side key operation unit 203 (see FIG. 2) including a lock release key and the like.
- FIG. 2 is a block diagram illustrating a configuration example of the mobile phone device 1, and includes an antenna 101 and a receiving unit.
- the cellular phone device 1 includes a control unit 2 realized by a CPU, a wireless processing unit 3 that performs modulation / demodulation processing, an audio processing unit 4 that performs processing on audio, a camera 5, and processing on data.
- the data processing unit 11 that performs the operation, the open / close detection unit 6 that detects the open / closed state of the casings 100 and 200, and outputs the detection result to the control unit 2, the storage unit 7, and the operating voltage to each unit of the device
- a power supply unit 8 for supplying data and a reader / writer 9 for reading and writing data to and from the contactless IC card 10 are provided.
- the contactless IC card 10 is registered with a user ID for authenticating the user of the mobile phone device 1.
- FIG. 3 is a diagram illustrating an example of the contents of the storage unit 7.
- the storage unit 7 is provided with a main condition storage unit 71, a sub condition storage unit 72, and an event storage unit 73 that can be received during locking.
- the main condition storage unit 71 registers a main condition that is a condition for determining whether or not a lock instruction has been issued. Referring to FIG. 3, in the main condition storage unit 71, a plurality of main conditions and a valid flag (valid when ON) indicating whether or not to validate the main condition are registered. In the case of the example in Fig. 3, both the effective flag for the main condition "Case is closed" and the effective flag for the main condition "No key operation time is 5 minutes or more" are ON. If either one of the two main conditions is met, it is determined that a lock instruction has been issued. The valid flag can be changed by the user.
- the main flag “no key operation time is 5 minutes or more” is set. Enable flag for condition It can also be turned off. In this case, it is determined that the lock instruction has been issued only when the main condition “the casing is closed” is satisfied. Further, the key non-operation time can be changed by the user.
- a sub condition which is a condition for determining whether or not the state of the mobile phone device 1 is in a state where the key operation lock function may be enabled. It is. Referring to FIG. 3, a plurality of sub conditions “music player (application program) not operating”, “video player (application program) not operating”,... Only when all of the above are established, it is determined that the state of the cellular phone device 1 is in a state where the key operation lock function may be enabled. Note that the contents of the sub condition storage unit 72 are not limited to the example of FIG. 3. For example, “not in call state”, “not in call state”, etc. may be registered as sub conditions. When such sub-conditions are registered, the key operation lock function is effective until the mobile phone device 1 reaches the “standby” state even if a lock instruction occurs in the incoming call state or call state. Don't be.
- the lockable receivable event storage unit 73 events that can be accepted when the key operation lock function is enabled are registered for each state of the mobile phone device 1.
- the events that can be accepted after the key operation lock function is enabled are limited compared to those before the key operation lock function is enabled.
- the state power of the mobile phone device 1 is limited.
- the events that can be accepted are limited to “Incoming”, and when the state of the mobile phone device 1 is “Incoming”, only the event power that can be accepted is “Call key operation”.
- the events that can be accepted are limited to “speaker switching operation” and “end key operation”.
- the content of the event storage unit 73 that can be received during locking is not limited to the example of FIG. 3.
- “mail reception” can be registered as an event that can be received in the “standby state”. For example, even when the key operation lock function is enabled, it is possible to receive the mail. In addition, mail viewing can be prohibited unless “mail viewing operation” is registered as an acceptable event.
- “Alarm Notification” is registered as an event that can be accepted in each status, it will be at the specified time. When this happens, it is possible to display an alarm. If “GPS position acquisition operation” is registered as an event that can be accepted in each state, the current position can be acquired without being restricted by the key operation lock function.
- events that can be accepted when the key operation lock is not enabled are registered in the storage unit 7 for each state of the mobile phone device 1.
- An event storage unit that can be received during non-locking and a user ID storage unit in which a user ID is registered are also provided!
- FIG. 4 is a block diagram illustrating a configuration example of the control unit 2, and includes a key operation detection unit 21 and a timer.
- the key operation detecting means 21 controls the code corresponding to the operated key when detecting that the keys provided in the front key operating section 201 and the side key operating section 203 are operated. It has a function to output to 25. Further, the key operation detection means 21 has a function of outputting a reset signal to the timer 22 and the lock control means 23 every time a key operation is detected, and a lock release key provided in the side key operation unit 203. It has a function of instructing the authentication means 24 to start the authentication process when it is detected that it has been operated.
- the timer 22 is reset every time a reset signal is input from the key operation detection means 21, and the measurement time is the time registered in the main condition storage unit 71 (5 minutes in the example of FIG. 3). Then, a timeout signal is output to the lock control means 23. That is, the timer 22 outputs a time-out signal in order to instruct the lock control means 23 to start the lock when the key non-operation time becomes the time that is registered in the main condition storage unit 71.
- the reader / writer 9 is used to read the user ID from the non-contact IC card 10 possessed by the user, The read user ID and the user ID registered in the storage unit 7 are compared to authenticate the user. If the authentication is OK, an unlock instruction is output to the lock control means 23.
- the lock control means 23 has the following functions.
- a time-out signal is output from the timer 22, and the valid flag corresponding to the main condition “no key operation lock operation time of 5 minutes or longer” registered in the main condition storage unit 71 is ON.
- the detection result from the open / close detection unit 6 indicates that the case is closed, and the valid flag for “case closed” registered in the main condition storage unit 71 A function to determine that a lock instruction has occurred when! Is turned on! /.
- the control means 25 is a period from when the key operation lock activation signal is input from the lock control means 23 to when the key operation lock release signal is input, that is, while the key operation lock function is in effect.
- Each time an event occurs it refers to the event storage unit 73 that can be accepted during locking, and determines whether or not the event that has occurred can be accepted. If it is determined that the event can be accepted, the event is accepted and the state transition is made as necessary.
- the control unit 2 can be realized by a computer (CPU). When the control unit 2 is realized by a computer, for example, 7 fires are used. Prepare a disk, semiconductor memory, or other recording medium that records the program that causes the computer to function as the key operation detection means 21, timer 22, lock control means 23, authentication means 24, and control means 25. Have the program read. The computer controls its own operation according to the read program, and realizes the key operation detection means 21, timer 22, lock control means 23, authentication means 24, and control means 25 on its own computer.
- the lock control means 23 in the control unit 2 receives a time-out signal from the timer 22 when the user of the cellular phone device 1 does not perform any key operation for a predetermined time (5 minutes in the example of FIG. 3). The user can also When the is closed, a detection result indicating that the housing has been closed is input from the open / close detection unit 6.
- the lock control unit 23 When a time-out signal is input from the timer 22 and when a detection result indicating that the casing is closed is input from the open / close detection unit 6, the lock control unit 23 inputs to the main condition storage unit 71. If the corresponding valid flag registered is ON, it is determined that the main condition is satisfied (the lock instruction is generated) (step S51 in FIG. 5). When the contents of the main condition storage unit 7 1 are as shown in FIG. 3, the lock control means 23 is closed by the open / close detection unit 6 even when a time-out signal is input from the timer 22. It is also determined that the main condition is satisfied even when a detection result indicating that is input.
- the lock control means 23 determines whether or not the sub condition is satisfied (step S52). More specifically, the sub-condition storage unit 72 is referred to, and if all the sub-conditions registered therein are satisfied, it is determined that the sub-condition is satisfied. For example, if the contents of the sub-condition storage unit 72 are as shown in FIG. 3, the application program “music player” is inactive and the application program “action player” is inactive. It is determined that the sub condition is satisfied.
- step S52 If it is determined that the sub-condition is satisfied (YES in step S52), the lock control means 23 outputs a key operation lock activation signal to the control means 25 (step S53).
- step S52 if it is determined that the sub-condition is not satisfied (step S52 is NO), a key operation lock holding process is performed. In the key operation lock hold processing, the process waits for the sub condition to be satisfied. When the sub condition is satisfied (YES in step S54), a key operation lock start signal is output to the control means 25 (step S53). If the main condition is not satisfied before the sub condition is satisfied (YES in step S55), the process returns to step S51 and waits for the main condition to be satisfied. Note that the failure of the main condition can be detected based on a reset signal input from the key operation detection means 21.
- Control means 2 5 when the power of the mobile phone device 1 is turned on, the processing shown in the flowchart of FIG. 6 is started and the state transits to the initial state (standby state) (step S61).
- step S62 the control means 25 determines whether or not the event can be accepted (step S63).
- the control means 25 refers to the event storage unit 73 that can be received during lock to determine whether the event can be received, and the key operation lock function is enabled. If not, the non-locking receivable event storage unit (not shown) is referred to determine whether or not the event can be accepted.
- step S63 If it is determined that the event can be accepted (YES in step S63), the event is accepted, state transition is performed as necessary (step S64), and the process returns to step S62 to generate a new event. Wait for. On the other hand, if it is determined that it cannot be accepted (NO in step S63), the process returns to step S62 and waits for the occurrence of a new event.
- the operation when the key operation lock function is released will be described.
- the user brings the non-contact IC card 10 in which his / her user ID is recorded closer to the mobile phone device 1 and then the unlock key provided in the side key operation unit 203.
- the key operation detection means 21 in the control unit 2 instructs the authentication means 24 to start the authentication process when detecting that the lock release key has been operated.
- the authentication means 24 uses the reader / writer 9 to input the user ID from the non-contact IC card 10 (step S71), and the input user ID. Is compared with the user ID registered in the storage unit 7 to authenticate the user (step S72). If the authentication is OK (step S73 is YES), a key operation unlock signal is output to the control means 25 (step S74) . If the authentication is NG (step S73 is NO), the process is performed. finish.
- the camera 11 displays the face image of the user. It is possible to shoot and register this face image in advance in the storage unit 7! /, Based on the user's face image! /, And to authenticate the person! /.
- the operation of the present embodiment will be described with a specific example.
- a music player which is an application program for playing music
- the key operation detecting means 21 When the user performs a key operation for starting the music player at time tl, this is detected by the key operation detecting means 21 and a reset signal is applied to the timer 22.
- the timer 22 starts counting when a reset signal is applied.
- the measurement time reaches the time (5 minutes) registered in the main condition storage unit 71 at time t2
- the timer 22 outputs a timeout signal to the lock control means 23.
- lock control means 23 determines whether or not the main condition is satisfied as shown in the flowchart of FIG. 5 (step S51). . Now, assuming that the corresponding valid flag in the main condition storage unit 71 is ON, the lock control means 23 determines that the main condition is satisfied. Thereafter, the lock control means 23 refers to the sub condition storage unit 72 and determines whether or not the sub condition is satisfied (step S52). Now, assuming that the sub condition “music player inactive” is registered in the sub condition storage unit 72, the lock control means 23 determines that the sub condition is not satisfied (NO in step S52), and Key operation lock hold processing is performed (steps S54 and S55). Therefore, at this time, the key operation lock function has not been activated yet.
- step S55 is NO
- step S55 is NO
- step S55 is NO
- step S54 the lock control means 23 determines that the sub condition is not satisfied
- step S55 the key operation lock hold processing
- lock control means 2 3 determines that the sub-condition is satisfied (YES in step S54), and outputs a key operation lock signal to the control means 25 (step S53). After this, the key operation lock function is enabled.
- the timer 22 force S count operation is started at time ti l, an incoming call is received at time tl2 one minute later, and the user operates the call key at time tl3 one minute later.
- the key operation detecting means 21 detects this and outputs a reset signal to the timer 22.
- the timer 22 starts counting, and at the time tl4, when the measured time is registered in the main condition storage unit 71 and becomes the time (5 minutes), the lock control means 23 is Output a timeout signal.
- step S51 the lock control means 23 determines whether or not the main condition is satisfied as shown in the flowchart of FIG. 5 (step S51). Now, assuming that the corresponding valid flag in the main condition storage unit 71 is ON, the lock control means 23 determines that the main condition is satisfied. Thereafter, the lock control means 23 refers to the sub condition storage unit 72 and determines whether or not the sub condition is satisfied (step S52).
- step S52 determines that the sub-condition is not satisfied (step S52 is NO), key operation lock hold processing is performed (steps S54, S55). Therefore, at this time, the key operation lock function has not been activated yet.
- step S54 the lock control means 23 determines that the sub-condition is satisfied (YES in step S54), and outputs a key operation lock start signal to the control means 25.
- Step S53 the state of the mobile phone device 1 becomes a standby state.
- step S62 in FIG. 6 the key operation lock function is enabled and the status is "standby status"
- step S63 the control means 25 refers to the event storage unit 73 that can be received during lock and determines whether or not the reception of the event “incoming” is permitted (step S63). ).
- the control means 25 receives the event “incoming call” and receives the “incoming call state”.
- the present embodiment it is possible to obtain an effect that the usability of the mobile phone device can be improved.
- the reason is that when a lock instruction is issued, it is determined whether the state of the terminal satisfies a predetermined condition, and if it is satisfied, the key operation lock function is immediately enabled and is not satisfied. This is because the lock control means 23 for enabling the key operation lock function after waiting for the predetermined condition to be satisfied is provided. For example, if the condition that the application program for music playback is not running is set as the predetermined condition, the key operation lock function will be effective even if a lock instruction occurs during music playback. Therefore, the user can adjust the volume and improve usability.
- the lock control means when no key operation is performed for a certain time, the lock control means
- the lock instruction means (timer 22) for generating a lock instruction for 23 is provided, it is possible to obtain an effect that it is possible to eliminate forgetting to apply the lock.
- the authentication process is performed.
- the key operation lock function is released. Since the authentication means 24 for instructing the lock control means 23 is provided, the key operation lock function can be released with the casing closed, and the operability is improved.
- the present invention can be applied to a mobile terminal device having a key operation lock function, a mobile terminal device such as a PHS, and the convenience of the mobile terminal device can be improved by applying the present invention.
- This application (claimed September 28, 2006), claiming priority based on Japanese Patent Application No. 2006-263925 filed here, the entire disclosure of which is incorporated herein.
- FIG. 1 is an external view of an example of a cellular phone device 1 having a folded shape structure to which the present invention is applied.
- FIG. 2 is a block diagram showing a configuration example of the mobile phone device 1.
- FIG. 3 is a diagram showing an example of the contents of a storage unit 7.
- FIG. 4 is a diagram illustrating a configuration example of a control unit 2.
- FIG. 5 is a flowchart showing a processing example of lock control means 23.
- FIG. 6 is a flowchart showing a processing example of the control means 25.
- FIG. 7 is a flowchart showing a processing example of the authentication means 24.
- FIG. 8 is a diagram for explaining the operation when a lock instruction occurs during music playback (timer 22 times out).
- FIG. 9 is a diagram for explaining the operation when there is an incoming call when the key operation lock function is enabled.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Description
Claims
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2008536326A JPWO2008038515A1 (ja) | 2006-09-28 | 2007-09-11 | 携帯端末装置及び携帯端末装置におけるキー操作ロック方法並びにプログラム |
| US12/443,009 US20090267731A1 (en) | 2006-09-28 | 2007-09-11 | Portable terminal device, key operation lock method and program thereof |
| EP20070807090 EP2068540A4 (en) | 2006-09-28 | 2007-09-11 | MOBILE TERMINAL, KEY CONTROL LOCKING METHOD IN THE MOBILE TERMINAL AND PROGRAM |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2006263925 | 2006-09-28 | ||
| JP2006-263925 | 2006-09-28 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2008038515A1 true WO2008038515A1 (fr) | 2008-04-03 |
Family
ID=39229954
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2007/067681 Ceased WO2008038515A1 (fr) | 2006-09-28 | 2007-09-11 | Dispositif de terminal mobile, procédé de verrouillage d'opération de touche et programme |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US20090267731A1 (ja) |
| EP (1) | EP2068540A4 (ja) |
| JP (4) | JPWO2008038515A1 (ja) |
| CN (2) | CN104333642A (ja) |
| WO (1) | WO2008038515A1 (ja) |
Families Citing this family (29)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8544084B2 (en) | 2002-08-19 | 2013-09-24 | Blackberry Limited | System and method for secure control of resources of wireless mobile communication devices |
| US7400878B2 (en) | 2004-02-26 | 2008-07-15 | Research In Motion Limited | Computing device with environment aware features |
| EP1741225B1 (en) | 2004-04-30 | 2011-03-02 | Research In Motion Limited | System and method for filtering data transfers within a mobile device |
| US7614082B2 (en) | 2005-06-29 | 2009-11-03 | Research In Motion Limited | System and method for privilege management and revocation |
| US9147085B2 (en) | 2010-09-24 | 2015-09-29 | Blackberry Limited | Method for establishing a plurality of modes of operation on a mobile device |
| WO2012037657A2 (en) | 2010-09-24 | 2012-03-29 | Research In Motion Limited | Method and apparatus for differentiated access control |
| EP2619704B1 (en) | 2010-09-24 | 2018-01-10 | BlackBerry Limited | Method and apparatus for differentiated access control |
| EP2453631B1 (en) | 2010-11-15 | 2016-06-22 | BlackBerry Limited | Data source based application sandboxing |
| JP2012222612A (ja) * | 2011-04-08 | 2012-11-12 | Nec Saitama Ltd | 携帯端末 |
| US20130039266A1 (en) | 2011-08-08 | 2013-02-14 | Research In Motion Limited | System and method to increase link adaptation performance with multi-level feedback |
| US9161226B2 (en) | 2011-10-17 | 2015-10-13 | Blackberry Limited | Associating services to perimeters |
| US9497220B2 (en) | 2011-10-17 | 2016-11-15 | Blackberry Limited | Dynamically generating perimeters |
| US9613219B2 (en) | 2011-11-10 | 2017-04-04 | Blackberry Limited | Managing cross perimeter access |
| US8799227B2 (en) | 2011-11-11 | 2014-08-05 | Blackberry Limited | Presenting metadata from multiple perimeters |
| US9262604B2 (en) | 2012-02-01 | 2016-02-16 | Blackberry Limited | Method and system for locking an electronic device |
| US9698975B2 (en) | 2012-02-15 | 2017-07-04 | Blackberry Limited | Key management on device for perimeters |
| US9306948B2 (en) | 2012-02-16 | 2016-04-05 | Blackberry Limited | Method and apparatus for separation of connection data by perimeter type |
| CA2805960C (en) | 2012-02-16 | 2016-07-26 | Research In Motion Limited | Method and apparatus for management of multiple grouped resources on device |
| US9077622B2 (en) | 2012-02-16 | 2015-07-07 | Blackberry Limited | Method and apparatus for automatic VPN login on interface selection |
| EP2629480B1 (en) | 2012-02-17 | 2019-04-03 | BlackBerry Limited | Designation Of Classes For Certificates And Keys |
| EP2629479B1 (en) | 2012-02-17 | 2020-04-22 | BlackBerry Limited | Certificate management method based on connectivity and policy |
| US9369466B2 (en) | 2012-06-21 | 2016-06-14 | Blackberry Limited | Managing use of network resources |
| US8972762B2 (en) | 2012-07-11 | 2015-03-03 | Blackberry Limited | Computing devices and methods for resetting inactivity timers on computing devices |
| US8656016B1 (en) | 2012-10-24 | 2014-02-18 | Blackberry Limited | Managing application execution and data access on a device |
| US9075955B2 (en) | 2012-10-24 | 2015-07-07 | Blackberry Limited | Managing permission settings applied to applications |
| US9386451B2 (en) | 2013-01-29 | 2016-07-05 | Blackberry Limited | Managing application access to certificates and keys |
| US9980020B1 (en) * | 2016-12-29 | 2018-05-22 | Snap-On Incorporated | Remote locking system architecture and user interface |
| JP2018196017A (ja) * | 2017-05-18 | 2018-12-06 | 株式会社Nttドコモ | 通信端末および通信システム |
| CN113205673A (zh) * | 2021-04-23 | 2021-08-03 | 珠海格力电器股份有限公司 | 遥控装置的控制方法和装置、遥控装置和存储介质 |
Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH09266502A (ja) | 1996-03-28 | 1997-10-07 | Sanyo Electric Co Ltd | 携帯電話装置 |
| JP2001217924A (ja) | 2000-01-31 | 2001-08-10 | Sanyo Electric Co Ltd | 折畳式携帯電話装置 |
| JP2001320477A (ja) | 2000-05-10 | 2001-11-16 | Kenwood Corp | 携帯端末装置 |
| JP2005167455A (ja) | 2003-12-01 | 2005-06-23 | Sony Ericsson Mobilecommunications Japan Inc | 携帯電話端末 |
| JP2005203913A (ja) * | 2004-01-14 | 2005-07-28 | Nec Access Technica Ltd | 携帯電子機器及び携帯電子機器の個人認証方法 |
| JP2005268983A (ja) * | 2004-03-17 | 2005-09-29 | Hitachi Ltd | 携帯端末及び自動ダイヤルロック解除機能付き携帯端末システム |
| JP2006222567A (ja) * | 2005-02-08 | 2006-08-24 | Toshiba Corp | 情報処理装置 |
| JP2006263925A (ja) | 2005-03-22 | 2006-10-05 | Heian Corp | 被加工板の加工装置 |
Family Cites Families (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5812954A (en) * | 1995-11-27 | 1998-09-22 | Nokia Mobile Phones Ltd. | Mobile telephone power key lock function |
| JP2000184050A (ja) * | 1998-12-14 | 2000-06-30 | Kyocera Corp | 携帯テレビ電話端末 |
| US20030117316A1 (en) * | 2001-12-21 | 2003-06-26 | Steve Tischer | Systems and methods for locating and tracking a wireless device |
| JP2004159022A (ja) * | 2002-11-06 | 2004-06-03 | Nec Saitama Ltd | 携帯電話機及びそれに用いるダイヤルロック解除方法並びにそのプログラム |
| JP4131229B2 (ja) * | 2003-11-25 | 2008-08-13 | 日本電気株式会社 | 折り畳み式携帯電話機及び折り畳み式携帯電話機のロック解除方法 |
| JPWO2005069590A1 (ja) * | 2004-01-15 | 2007-07-26 | 三菱電機株式会社 | 鍵システム、鍵装置及び情報機器 |
| CN1277440C (zh) * | 2004-06-29 | 2006-09-27 | 航天兰天达科技有限公司 | 防止移动通信终端被非法使用的方法和装置 |
| TWI249326B (en) * | 2004-09-01 | 2006-02-11 | Asia Optical Co Inc | Smart type automatic unlocking of keyboard and method thereof |
| JP4127842B2 (ja) * | 2006-06-05 | 2008-07-30 | 株式会社東芝 | 情報処理装置 |
-
2007
- 2007-09-11 CN CN201410490605.3A patent/CN104333642A/zh active Pending
- 2007-09-11 EP EP20070807090 patent/EP2068540A4/en not_active Ceased
- 2007-09-11 WO PCT/JP2007/067681 patent/WO2008038515A1/ja not_active Ceased
- 2007-09-11 JP JP2008536326A patent/JPWO2008038515A1/ja active Pending
- 2007-09-11 CN CNA2007800362119A patent/CN101523878A/zh active Pending
- 2007-09-11 US US12/443,009 patent/US20090267731A1/en not_active Abandoned
-
2008
- 2008-12-19 JP JP2008324713A patent/JP5047145B2/ja not_active Expired - Fee Related
-
2012
- 2012-06-07 JP JP2012129907A patent/JP2012165478A/ja active Pending
-
2014
- 2014-05-28 JP JP2014110047A patent/JP5862984B2/ja not_active Expired - Fee Related
Patent Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH09266502A (ja) | 1996-03-28 | 1997-10-07 | Sanyo Electric Co Ltd | 携帯電話装置 |
| JP2001217924A (ja) | 2000-01-31 | 2001-08-10 | Sanyo Electric Co Ltd | 折畳式携帯電話装置 |
| JP2001320477A (ja) | 2000-05-10 | 2001-11-16 | Kenwood Corp | 携帯端末装置 |
| JP2005167455A (ja) | 2003-12-01 | 2005-06-23 | Sony Ericsson Mobilecommunications Japan Inc | 携帯電話端末 |
| JP2005203913A (ja) * | 2004-01-14 | 2005-07-28 | Nec Access Technica Ltd | 携帯電子機器及び携帯電子機器の個人認証方法 |
| JP2005268983A (ja) * | 2004-03-17 | 2005-09-29 | Hitachi Ltd | 携帯端末及び自動ダイヤルロック解除機能付き携帯端末システム |
| JP2006222567A (ja) * | 2005-02-08 | 2006-08-24 | Toshiba Corp | 情報処理装置 |
| JP2006263925A (ja) | 2005-03-22 | 2006-10-05 | Heian Corp | 被加工板の加工装置 |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP2068540A4 |
Also Published As
| Publication number | Publication date |
|---|---|
| JP5047145B2 (ja) | 2012-10-10 |
| EP2068540A1 (en) | 2009-06-10 |
| CN104333642A (zh) | 2015-02-04 |
| JPWO2008038515A1 (ja) | 2010-01-28 |
| EP2068540A4 (en) | 2013-07-24 |
| JP5862984B2 (ja) | 2016-02-16 |
| JP2009077441A (ja) | 2009-04-09 |
| JP2014180041A (ja) | 2014-09-25 |
| CN101523878A (zh) | 2009-09-02 |
| JP2012165478A (ja) | 2012-08-30 |
| US20090267731A1 (en) | 2009-10-29 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2008038515A1 (fr) | Dispositif de terminal mobile, procédé de verrouillage d'opération de touche et programme | |
| JP4131229B2 (ja) | 折り畳み式携帯電話機及び折り畳み式携帯電話機のロック解除方法 | |
| JP5450959B2 (ja) | 携帯端末、携帯端末の制御方法、携帯端末の制御プログラム及び記録媒体 | |
| JP3969094B2 (ja) | 情報処理装置 | |
| KR100662326B1 (ko) | 잠금 장치가 구비된 이동 통신 단말기 | |
| JP3707417B2 (ja) | ダイヤルロック機能を有する携帯端末 | |
| CN101577753A (zh) | 移动装置 | |
| WO2005081197A1 (ja) | 情報処理装置および情報処理装置の盗難防止方法 | |
| WO2009084658A1 (ja) | 電子情報装置及びその制御方法 | |
| JP2006113719A (ja) | 携帯型電子機器およびその認証方法、該機器用収容器、通信システム、制御プログラム、および該プログラムを記録した記録媒体 | |
| JP4302600B2 (ja) | 移動体、非接触媒体の起動方法、起動プログラム及び記録媒体 | |
| JP2008092081A (ja) | 携帯端末 | |
| JP2005268983A (ja) | 携帯端末及び自動ダイヤルロック解除機能付き携帯端末システム | |
| JP4467526B2 (ja) | 携帯通信端末 | |
| JP5777436B2 (ja) | 電子機器 | |
| JP2002135372A (ja) | 携帯電話と連携したパソコン | |
| JP4022247B2 (ja) | 携帯端末装置 | |
| JP4874761B2 (ja) | 携帯電子機器およびロック解除方法 | |
| JP2008228236A (ja) | 携帯型情報機器 | |
| JP2012113397A (ja) | 端末用認証システム及び認証方法並びにそのプログラム | |
| JP2004013220A (ja) | 電子機器 | |
| JP4001810B2 (ja) | 携帯端末装置 | |
| JP2001320474A (ja) | 携帯電話装置 | |
| JP2008112331A (ja) | 携帯型電子機器及び認証方法並びにプログラム | |
| JP2010286996A (ja) | 情報処理装置及びプログラム |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 200780036211.9 Country of ref document: CN |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07807090 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2008536326 Country of ref document: JP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2007807090 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 12443009 Country of ref document: US |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |