JPH08251660A - Subsystem for preventing illicit use of radio portable terminal in radio portble terminal system - Google Patents
Subsystem for preventing illicit use of radio portable terminal in radio portble terminal systemInfo
- Publication number
- JPH08251660A JPH08251660A JP7052454A JP5245495A JPH08251660A JP H08251660 A JPH08251660 A JP H08251660A JP 7052454 A JP7052454 A JP 7052454A JP 5245495 A JP5245495 A JP 5245495A JP H08251660 A JPH08251660 A JP H08251660A
- Authority
- JP
- Japan
- Prior art keywords
- terminal
- portable terminal
- information center
- radio
- wireless
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012790 confirmation Methods 0.000 claims description 4
- 230000002265 prevention Effects 0.000 claims description 4
- 238000013500 data storage Methods 0.000 abstract description 6
- 238000010586 diagram Methods 0.000 description 7
- 238000000034 method Methods 0.000 description 3
- 101150065817 ROM2 gene Proteins 0.000 description 1
Landscapes
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
【0001】[0001]
【産業上の利用分野】本発明は、無線携帯端末における
不正使用に対するネットワークを介した防止方法に関す
る。BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a method for preventing unauthorized use in a wireless portable terminal via a network.
【0002】[0002]
【従来の技術】近年携帯端末が世の中に普及しつつある
が、携帯端末のセキュリティ確保についてはまだまだ発
展途上段階にある。2. Description of the Related Art In recent years, mobile terminals have become popular, but the security of mobile terminals is still in the developing stage.
【0003】従来の携帯端末の中には紛失したり盗難に
あった場合のセキュリティを確保するために、パスワー
ドを設定して起動時に入力させるようになっているもの
もある。[0003] In some conventional portable terminals, in order to ensure security in the event of loss or theft, a password is set and input at the time of startup.
【0004】また特開平5−94225号公報は、パー
ソナルコンピュータに取り外し可能なICカード等の不
揮発性記憶装置を設け、カードが実装されていないとコ
ンピュータそのものが起動しないようにすることによっ
てセキュリティを保つ方法が記載している。Japanese Patent Application Laid-Open No. Hei 5-94225 discloses that a personal computer is provided with a removable non-volatile storage device such as an IC card, and the security of the computer is maintained by preventing the computer from starting unless the card is mounted. The method is described.
【0005】また特開平5−145483号公報は、起
動時に所有者名を表示し、セキュリティコードと呼ばれ
るコードを入力しない限り所有者名の登録変更を禁止す
るという手段を有した無線端末を記載している。Japanese Patent Application Laid-Open No. 5-145483 describes a wireless terminal having a means for displaying an owner name at the time of startup and prohibiting registration change of the owner name unless a code called a security code is input. ing.
【0006】[0006]
【発明が解決しようとする課題】無線携帯端末を紛失ま
たは盗難され、その端末を第三者が取得して不正に使用
した場合、パスワード機能がなければ自由に無線ネット
ワークへのアクセスや住所録などの内部データの参照が
可能である。またパスワード機能があっても、なんらか
の手段によってパスワードを解読されれば、不正使用を
防止することはできない。When a wireless portable terminal is lost or stolen, and the terminal is obtained and used illegally by a third party, if there is no password function, access to a wireless network, an address book, etc. can be freely performed. Internal data can be referred to. Even if it has a password function, it cannot prevent illegal use if the password is decrypted by some means.
【0007】本発明の目的は、盗難・紛失した無線携帯
端末が第三者によって不正使用されることを防止して、
セキュリティの向上を図ることにある。An object of the present invention is to prevent a stolen or lost wireless portable terminal from being illegally used by a third party,
The goal is to improve security.
【0008】[0008]
【課題を解決するための手段】本発明は、紛失または盗
難された無線携帯端末をロック状態(使用不可能な状
態)とすることによって、ネットワークへの不正なアク
セスや内部データの参照を防止する。このため本発明の
無線携帯端末不正使用防止方法においては、第三者によ
って取得された無線携帯端末を、不正使用される前に所
有者から無線ネットワークを通じて携帯端末にその旨を
通知する手段により、携帯端末をロック状態にすること
で上記目的を達成している。The present invention prevents unauthorized access to a network and reference of internal data by placing a lost or stolen wireless mobile terminal in a locked state (unusable state). . Therefore, in the method for preventing unauthorized use of the wireless mobile terminal of the present invention, the wireless mobile terminal acquired by a third party is notified from the owner to the mobile terminal through a wireless network before being illegally used, The above-mentioned object is achieved by locking the mobile terminal.
【0009】[0009]
【作用】情報センタに盗難にあったことが通知される
と、情報センタから盗難端末を探して、相手を確認した
後に内部のデータを消去する要求を携帯端末に送信する
ことによって、システムロックさせる。これによって盗
難された携帯端末の不正使用を防止することができる。When the information center is notified of the theft, the information center searches for a stolen terminal, confirms the other party, and then sends a request to erase the internal data to the mobile terminal, thereby locking the system. . This can prevent unauthorized use of the stolen mobile terminal.
【0010】[0010]
【実施例】以下、本発明の実施例について図面を参照し
て説明する。Embodiments of the present invention will be described below with reference to the drawings.
【0011】図1は本発明の無線携帯端末不正使用防止
サブシステムが収容される。説明する無線携帯端末シス
テムのシステムの構成図であり、図2は本システムにお
ける無線携帯端末のブロック図であり、図3は無線携帯
端末と情報センタとの通信のシーケンスを示す図であ
る。FIG. 1 accommodates the wireless mobile terminal unauthorized use prevention subsystem of the present invention. FIG. 2 is a block diagram of the wireless portable terminal in the present system, and FIG. 3 is a diagram showing a communication sequence between the wireless portable terminal and an information center.
【0012】まず無線携帯端末のハードウェア構成を図
2のブロック図を用いて説明する。First, the hardware configuration of the wireless portable terminal will be described with reference to the block diagram of FIG.
【0013】無線携帯端末はシステム全体を制御するC
PU21、制御プログラム等が蓄積されているROM2
4、制御プログラムが使用するワーク用RAM22、住
所録やスケジュールなどの個人データを蓄積がされてい
るデータ蓄積用RAM23、情報や操作を表示するため
の表示器25、データを入力するための入力装置26、
無線の制御を行う無線モジュール27で構成されてい
る。The wireless portable terminal controls the entire system C
PU21, ROM2 in which control programs and the like are stored
4. A work RAM 22 used by the control program, a data storage RAM 23 storing personal data such as an address book and a schedule, a display 25 for displaying information and operations, and an input device for inputting data 26,
It is composed of a wireless module 27 that controls wireless communication.
【0014】入力装置26で入力されたデータはデータ
蓄積用RAM23に蓄積される。The data input by the input device 26 is stored in the data storage RAM 23.
【0015】一般的にデータ蓄積用RAM23は電池で
バックアップされているために、電源を落としても消去
されることはない。無線でデータの送信を行う場合に
は、RAM22,23、ROM24からシステムバスを
通じて、無線モジュール27にデータを送ることにより
行う。Since the data storage RAM 23 is generally backed up by a battery, it is not erased even when the power is turned off. When data is transmitted wirelessly, the data is transmitted from the RAMs 22 and 23 and the ROM 24 to the wireless module 27 via the system bus.
【0016】次に本システムの構成を図1を用いて説明
する。無線携帯端末A(11)、B(12)は情報セン
タ14に登録されているものである。また有線端末C
(13)は情報センタ14にアクセス可能な端末であ
る。無線基地局15と情報センタ14は有線のネットワ
ーク16で接続されている。Next, the configuration of this system will be described with reference to FIG. The wireless portable terminals A (11) and B (12) are registered in the information center 14. Wired terminal C
(13) is a terminal that can access the information center 14. The wireless base station 15 and the information center 14 are connected by a wired network 16.
【0017】いまある人が無線携帯端末A(11)を所
有していて、盗難にあったと仮定する。無線携帯端末A
(11)の所有者は盗難のあったことを情報センタ14
に通知するために、他の人の無線携帯端末B(12)ま
たは有線の端末C(13)を通じて情報センタ14にア
クセスする。有線端末C(13)でアクセスを行う場合
を図3の通知シーケンス図を用いて説明する。It is assumed that a person now owns the wireless portable terminal A (11) and has been stolen. Wireless mobile terminal A
The owner of (11) informs the information center 14 of the theft.
In order to notify the information center, the information center 14 is accessed through another person's wireless mobile terminal B (12) or wired terminal C (13). The case where access is performed by the wired terminal C (13) will be described with reference to the notification sequence diagram of FIG.
【0018】有線端末C(13)からID、電話番号、
パスワードを付加した接続要求を送信し、情報センタ1
4が受け付けると接続完了レスポンスを返す(図中30
1)。From the wired terminal C (13), ID, telephone number,
Send a connection request with a password, and send it to the information center 1
When 4 receives, a connection completion response is returned (30 in the figure)
1).
【0019】情報センタ14に接続完了後、無線携帯端
末A(11)の端末IDを付加した盗難通知を情報セン
タ14に送信する(図中302)。盗難通知を受信した
情報センタ14ではコマンド確認レスポンスを有線端末
C(13)に返した後、無線基地局15を通じて盗難端
末が通信可能状態(受け待ち状態)にあるかどうかを確
認するために盗難端末のIDを付加したID確認要求コ
マンドを送信する(図中303)。もし盗難端末A(1
1)が通信可能状態であればID通知レスポンスを返
す。After the connection to the information center 14 is completed, the theft notification with the terminal ID of the wireless mobile terminal A (11) is transmitted to the information center 14 (302 in the figure). After receiving the theft notification, the information center 14 returns a command confirmation response to the wired terminal C (13), and then the theft terminal confirms whether the stolen terminal is in the communicable state (waiting state) through the wireless base station 15. An ID confirmation request command with the terminal ID added is transmitted (303 in the figure). If the stolen terminal A (1
If 1) is in a communicable state, an ID notification response is returned.
【0020】ID通知レスポンスを確認した情報センタ
14では、盗難端末A(11)が特定できたため、シス
テムロック要求コマンドを送信する(図中304)。こ
のコマンドを受信した盗難端末A(11)では、データ
蓄積用RAM23の内容を消去した後、システムロック
完了レスポンスを情報センタ14に送信する。In the information center 14 which has confirmed the ID notification response, the stolen terminal A (11) has been identified, and therefore a system lock request command is transmitted (304 in the figure). Upon receiving this command, the stolen terminal A (11) deletes the contents of the data storage RAM 23, and then transmits a system lock completion response to the information center 14.
【0021】端末のシステムロックを確認した情報セン
タ14では、その旨をシステムロック完了通知により有
線端末C(13)に端末がロック状態になったことを通
知する(図中305)。ここで、盗難端末A(11)の
内部データは消去されたために端末のセキュリティが保
たれることになる。The information center 14 which has confirmed the system lock of the terminal notifies the wired terminal C (13) that the terminal has been locked by the system lock completion notification (305 in the figure). Here, since the internal data of the stolen terminal A (11) has been deleted, the security of the terminal is maintained.
【0022】[0022]
【発明の効果】以上説明したように本発明の無線携帯端
末不正使用防止サブシステムは、第三者によって取得さ
れた無線携帯端末を不正使用される前に所有者から無線
ネットワークを通じてコマンドを送ることによって端末
をロック状態にするために、携帯端末を紛失したり盗難
にあった後に第三者が無線ネットワークへのアクセスや
住所録などの内部データの参照することができなくな
る。このため端末のセキュリティが保たれる。As described above, the wireless mobile terminal unauthorized use prevention subsystem of the present invention sends a command from the owner through the wireless network before the wireless mobile terminal acquired by a third party is illegally used. In order to lock the terminal, the third party cannot access the wireless network or refer to the internal data such as the address book after the portable terminal is lost or stolen. For this reason, the security of the terminal is maintained.
【図1】本発明の実施例のシステム構成図である。FIG. 1 is a system configuration diagram of an embodiment of the present invention.
【図2】本発明の実施例の端末のブロック図である。FIG. 2 is a block diagram of a terminal according to an embodiment of the present invention.
【図3】本発明の実施例の動作を示すシーケンス図であ
る。FIG. 3 is a sequence diagram showing an operation of the exemplary embodiment of the present invention.
11 盗難端末A 12 無線端末B 13 有線端末C 14 情報センタ 15 無線基地局 16 有線ネットワーク 21 CPU 22 ワーク用RAM 23 データ蓄積用RAM 24 ROM 25 表示器 26 入力装置 27 無線モジュール Reference Signs List 11 stolen terminal A 12 wireless terminal B 13 wired terminal C 14 information center 15 wireless base station 16 wired network 21 CPU 22 work RAM 23 data storage RAM 24 ROM 25 display 26 input device 27 wireless module
Claims (2)
いる無線携帯端末システムにおける無線携帯端末不正使
用防止サブシステムであり、 前記情報センタは携帯端末の盗難通知に応答して、 前記携帯端末に対して内部データを消去する指示を送る
手段を備え、 前記携帯端末は、前記情報センタからの消去指示に基づ
いて、その内部データを消去する手段と、 該内部データを消去完了した旨を情報センタに通知する
手段とを備え、 前記情報センタは、前記携帯端末からの通知内容を盗難
通知を発した端末に返す手段をさらに備えることを特徴
とする無線携帯端末不正使用防止サブシステム。1. A wireless portable terminal unauthorized use prevention subsystem in a wireless portable terminal system registered and receiving a service in an information center, wherein said information center responds to a notification of the theft of the portable terminal, and Means for sending an instruction to erase internal data by means of the portable terminal, based on an erase instruction from the information center, means for erasing the internal data, and a notice to the effect that the internal data has been erased to the information center. Means for notifying, the information center further comprising means for returning the contents of the notification from the mobile terminal to the terminal that issued the theft notification, the wireless mobile terminal unauthorized use prevention subsystem.
認要求を送信する手段をさらに含み、 前記携帯端末はこのID確認要求に応答してIDを情報
センタに通知する手段をさらに含むことを特徴とする請
求項1記載の無線携帯端末不正使用防止サブシステム。2. The information center further comprises means for transmitting an ID confirmation request of the portable terminal, and the portable terminal further comprises means for notifying an ID to the information center in response to the ID confirmation request. The subsystem for preventing unauthorized use of a wireless portable terminal according to claim 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP7052454A JP2661582B2 (en) | 1995-03-13 | 1995-03-13 | Subsystem for preventing unauthorized use of wireless mobile terminal in wireless mobile terminal system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP7052454A JP2661582B2 (en) | 1995-03-13 | 1995-03-13 | Subsystem for preventing unauthorized use of wireless mobile terminal in wireless mobile terminal system |
Publications (2)
Publication Number | Publication Date |
---|---|
JPH08251660A true JPH08251660A (en) | 1996-09-27 |
JP2661582B2 JP2661582B2 (en) | 1997-10-08 |
Family
ID=12915173
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP7052454A Expired - Lifetime JP2661582B2 (en) | 1995-03-13 | 1995-03-13 | Subsystem for preventing unauthorized use of wireless mobile terminal in wireless mobile terminal system |
Country Status (1)
Country | Link |
---|---|
JP (1) | JP2661582B2 (en) |
Cited By (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002057976A1 (en) * | 2001-01-12 | 2002-07-25 | Secom Co.,Ltd. | Search supporting apparatus, search supporting system, operation instructing terminal, search supporting method, and operation instructing system |
WO2002071291A1 (en) * | 2001-03-01 | 2002-09-12 | Fujitsu Limited | Portable device control method, ic card false use preventive method, portable device setting altering program, ic card false use preventive program |
JP2002374564A (en) * | 2001-06-12 | 2002-12-26 | Koji Yamamoto | Security system with respect to recorded contents of mobile phone |
KR100414219B1 (en) * | 2001-04-10 | 2004-01-07 | 주식회사 팬택앤큐리텔 | Method of mobile station control for using telephone/mobile station |
WO2004104799A1 (en) * | 2003-05-21 | 2004-12-02 | Fujitsu Limited | Information processing system, information processing method, and information processing device |
JP2005524184A (en) * | 2002-04-28 | 2005-08-11 | ペイクール インターナショナル リミテッド | System for enabling a financial transaction service for a telecommunications carrier and method for performing such a transaction |
US7159120B2 (en) * | 2001-11-19 | 2007-01-02 | Good Technology, Inc. | Method and system for protecting data within portable electronic devices |
US7200220B1 (en) | 1999-03-17 | 2007-04-03 | Fujitsu Limited | Portable telephone maintenance service system and maintenance service method |
WO2008129701A1 (en) * | 2007-04-10 | 2008-10-30 | Hitachi Software Engineering Co., Ltd. | File management system and method, and mobile terminal |
US7640005B2 (en) | 2005-04-19 | 2009-12-29 | Sharp Kabushiki Kaisha | Information protection system for mobile terminal device, information protection method for mobile terminal device, control program, computer-readable medium and electronic information device |
JP2010244538A (en) * | 2009-03-31 | 2010-10-28 | Intel Corp | Theft management system and method |
US8326264B2 (en) | 2006-09-15 | 2012-12-04 | Ntt Docomo, Inc. | Mobile communication network system and locking method of a mobile terminal apparatus |
JP2013110475A (en) * | 2011-11-17 | 2013-06-06 | Toshiba Corp | Electronic apparatus, electronic apparatus control method, and electronic apparatus control program |
US8495704B2 (en) | 2008-09-24 | 2013-07-23 | Fujitsu Limited | Information processing apparatus and computer product |
US8862868B2 (en) | 2012-12-06 | 2014-10-14 | Airwatch, Llc | Systems and methods for controlling email access |
US8978110B2 (en) | 2012-12-06 | 2015-03-10 | Airwatch Llc | Systems and methods for controlling email access |
US8978156B2 (en) | 2011-04-19 | 2015-03-10 | Panasonic Intellectual Property Management Co., Ltd. | Information terminal and information leakage prevention method |
US9021037B2 (en) | 2012-12-06 | 2015-04-28 | Airwatch Llc | Systems and methods for controlling email access |
JP2015197857A (en) * | 2014-04-02 | 2015-11-09 | 能美防災株式会社 | Inspection support device and inspection support system |
US9195811B2 (en) | 2013-07-03 | 2015-11-24 | Airwatch Llc | Functionality watermarking and management |
US9202025B2 (en) | 2013-07-03 | 2015-12-01 | Airwatch Llc | Enterprise-specific functionality watermarking and management |
US9258301B2 (en) | 2013-10-29 | 2016-02-09 | Airwatch Llc | Advanced authentication techniques |
US9325713B2 (en) | 2012-12-06 | 2016-04-26 | Airwatch Llc | Systems and methods for controlling email access |
US9450921B2 (en) | 2012-12-06 | 2016-09-20 | Airwatch Llc | Systems and methods for controlling email access |
US9516005B2 (en) | 2013-08-20 | 2016-12-06 | Airwatch Llc | Individual-specific content management |
US9544306B2 (en) | 2013-10-29 | 2017-01-10 | Airwatch Llc | Attempted security breach remediation |
US9552463B2 (en) | 2013-07-03 | 2017-01-24 | Airwatch Llc | Functionality watermarking and management |
US9584437B2 (en) | 2013-06-02 | 2017-02-28 | Airwatch Llc | Resource watermarking and management |
US9665723B2 (en) | 2013-08-15 | 2017-05-30 | Airwatch, Llc | Watermarking detection and management |
US9787686B2 (en) | 2013-04-12 | 2017-10-10 | Airwatch Llc | On-demand security policy activation |
US9900261B2 (en) | 2013-06-02 | 2018-02-20 | Airwatch Llc | Shared resource watermarking and management |
US10951541B2 (en) | 2012-02-14 | 2021-03-16 | Airwatch, Llc | Controlling distribution of resources on a network |
US11082355B2 (en) | 2012-02-14 | 2021-08-03 | Airwatch, Llc | Controllng distribution of resources in a network |
US11824644B2 (en) | 2013-03-14 | 2023-11-21 | Airwatch, Llc | Controlling electronically communicated resources |
-
1995
- 1995-03-13 JP JP7052454A patent/JP2661582B2/en not_active Expired - Lifetime
Cited By (57)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7200220B1 (en) | 1999-03-17 | 2007-04-03 | Fujitsu Limited | Portable telephone maintenance service system and maintenance service method |
KR100847774B1 (en) * | 2001-01-12 | 2008-07-23 | 세콤 가부시키가이샤 | Search support device, search support system, work order terminal, search support method and work order system |
WO2002057976A1 (en) * | 2001-01-12 | 2002-07-25 | Secom Co.,Ltd. | Search supporting apparatus, search supporting system, operation instructing terminal, search supporting method, and operation instructing system |
CN1313946C (en) * | 2001-01-12 | 2007-05-02 | 西科姆株式会社 | Search support device, search support system, operation command terminal, search support method, and operation command system |
WO2002071291A1 (en) * | 2001-03-01 | 2002-09-12 | Fujitsu Limited | Portable device control method, ic card false use preventive method, portable device setting altering program, ic card false use preventive program |
JP2002259869A (en) * | 2001-03-01 | 2002-09-13 | Fujitsu Ltd | Method for controlling portable device, method for preventing unauthorized use of IC card, program for changing setting of portable device, and program for preventing unauthorized use of IC card |
US7174160B2 (en) | 2001-03-01 | 2007-02-06 | Fujitsu Limited | Mobile device controlling method, IC card unauthorized use preventing method, program for changing settings of mobile device, and program for preventing IC card from unauthorized use |
KR100747971B1 (en) * | 2001-03-01 | 2007-08-08 | 후지쯔 가부시끼가이샤 | Method for preventing illegal use of IC card, recording medium recording program for changing the settings of portable device, and recording medium for recording program for preventing illegal use of IC card |
KR100414219B1 (en) * | 2001-04-10 | 2004-01-07 | 주식회사 팬택앤큐리텔 | Method of mobile station control for using telephone/mobile station |
JP2002374564A (en) * | 2001-06-12 | 2002-12-26 | Koji Yamamoto | Security system with respect to recorded contents of mobile phone |
US7159120B2 (en) * | 2001-11-19 | 2007-01-02 | Good Technology, Inc. | Method and system for protecting data within portable electronic devices |
JP2005524184A (en) * | 2002-04-28 | 2005-08-11 | ペイクール インターナショナル リミテッド | System for enabling a financial transaction service for a telecommunications carrier and method for performing such a transaction |
WO2004104799A1 (en) * | 2003-05-21 | 2004-12-02 | Fujitsu Limited | Information processing system, information processing method, and information processing device |
US8151367B2 (en) | 2003-05-21 | 2012-04-03 | Fujitsu Limited | Information processing system |
US7640005B2 (en) | 2005-04-19 | 2009-12-29 | Sharp Kabushiki Kaisha | Information protection system for mobile terminal device, information protection method for mobile terminal device, control program, computer-readable medium and electronic information device |
US8326264B2 (en) | 2006-09-15 | 2012-12-04 | Ntt Docomo, Inc. | Mobile communication network system and locking method of a mobile terminal apparatus |
WO2008129701A1 (en) * | 2007-04-10 | 2008-10-30 | Hitachi Software Engineering Co., Ltd. | File management system and method, and mobile terminal |
JP4938011B2 (en) * | 2007-04-10 | 2012-05-23 | 株式会社日立ソリューションズ | File management system and method, and portable terminal device |
US8495704B2 (en) | 2008-09-24 | 2013-07-23 | Fujitsu Limited | Information processing apparatus and computer product |
JP2010244538A (en) * | 2009-03-31 | 2010-10-28 | Intel Corp | Theft management system and method |
US8429759B2 (en) | 2009-03-31 | 2013-04-23 | Intel Corporation | Theft management system and method |
US8978156B2 (en) | 2011-04-19 | 2015-03-10 | Panasonic Intellectual Property Management Co., Ltd. | Information terminal and information leakage prevention method |
JP2013110475A (en) * | 2011-11-17 | 2013-06-06 | Toshiba Corp | Electronic apparatus, electronic apparatus control method, and electronic apparatus control program |
US10951541B2 (en) | 2012-02-14 | 2021-03-16 | Airwatch, Llc | Controlling distribution of resources on a network |
US12081452B2 (en) | 2012-02-14 | 2024-09-03 | Airwatch Llc | Controlling distribution of resources in a network |
US11082355B2 (en) | 2012-02-14 | 2021-08-03 | Airwatch, Llc | Controllng distribution of resources in a network |
US11483252B2 (en) | 2012-02-14 | 2022-10-25 | Airwatch, Llc | Controlling distribution of resources on a network |
US10681017B2 (en) | 2012-12-06 | 2020-06-09 | Airwatch, Llc | Systems and methods for controlling email access |
US11050719B2 (en) | 2012-12-06 | 2021-06-29 | Airwatch, Llc | Systems and methods for controlling email access |
US12120077B2 (en) | 2012-12-06 | 2024-10-15 | Omnissa, Llc | Systems and methods for controlling email access |
US9325713B2 (en) | 2012-12-06 | 2016-04-26 | Airwatch Llc | Systems and methods for controlling email access |
US8862868B2 (en) | 2012-12-06 | 2014-10-14 | Airwatch, Llc | Systems and methods for controlling email access |
US9021037B2 (en) | 2012-12-06 | 2015-04-28 | Airwatch Llc | Systems and methods for controlling email access |
US9450921B2 (en) | 2012-12-06 | 2016-09-20 | Airwatch Llc | Systems and methods for controlling email access |
US9813390B2 (en) | 2012-12-06 | 2017-11-07 | Airwatch Llc | Systems and methods for controlling email access |
US8978110B2 (en) | 2012-12-06 | 2015-03-10 | Airwatch Llc | Systems and methods for controlling email access |
US9426129B2 (en) | 2012-12-06 | 2016-08-23 | Airwatch Llc | Systems and methods for controlling email access |
US10666591B2 (en) | 2012-12-06 | 2020-05-26 | Airwatch Llc | Systems and methods for controlling email access |
US10243932B2 (en) | 2012-12-06 | 2019-03-26 | Airwatch, Llc | Systems and methods for controlling email access |
US9882850B2 (en) | 2012-12-06 | 2018-01-30 | Airwatch Llc | Systems and methods for controlling email access |
US11824644B2 (en) | 2013-03-14 | 2023-11-21 | Airwatch, Llc | Controlling electronically communicated resources |
US10116662B2 (en) | 2013-04-12 | 2018-10-30 | Airwatch Llc | On-demand security policy activation |
US9787686B2 (en) | 2013-04-12 | 2017-10-10 | Airwatch Llc | On-demand security policy activation |
US10785228B2 (en) | 2013-04-12 | 2020-09-22 | Airwatch, Llc | On-demand security policy activation |
US11902281B2 (en) | 2013-04-12 | 2024-02-13 | Airwatch Llc | On-demand security policy activation |
US9900261B2 (en) | 2013-06-02 | 2018-02-20 | Airwatch Llc | Shared resource watermarking and management |
US9584437B2 (en) | 2013-06-02 | 2017-02-28 | Airwatch Llc | Resource watermarking and management |
US11962510B2 (en) | 2013-06-02 | 2024-04-16 | Vmware, Inc. | Resource watermarking and management |
US9202025B2 (en) | 2013-07-03 | 2015-12-01 | Airwatch Llc | Enterprise-specific functionality watermarking and management |
US9699193B2 (en) | 2013-07-03 | 2017-07-04 | Airwatch, Llc | Enterprise-specific functionality watermarking and management |
US9552463B2 (en) | 2013-07-03 | 2017-01-24 | Airwatch Llc | Functionality watermarking and management |
US9195811B2 (en) | 2013-07-03 | 2015-11-24 | Airwatch Llc | Functionality watermarking and management |
US9665723B2 (en) | 2013-08-15 | 2017-05-30 | Airwatch, Llc | Watermarking detection and management |
US9516005B2 (en) | 2013-08-20 | 2016-12-06 | Airwatch Llc | Individual-specific content management |
US9258301B2 (en) | 2013-10-29 | 2016-02-09 | Airwatch Llc | Advanced authentication techniques |
US9544306B2 (en) | 2013-10-29 | 2017-01-10 | Airwatch Llc | Attempted security breach remediation |
JP2015197857A (en) * | 2014-04-02 | 2015-11-09 | 能美防災株式会社 | Inspection support device and inspection support system |
Also Published As
Publication number | Publication date |
---|---|
JP2661582B2 (en) | 1997-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP2661582B2 (en) | Subsystem for preventing unauthorized use of wireless mobile terminal in wireless mobile terminal system | |
US6480096B1 (en) | Method and apparatus for theft deterrence and secure data retrieval in a communication device | |
US5940764A (en) | PHS terminal disabling system | |
EP3249571B1 (en) | A method, a computer program product and an apparatus for locating, tracking and/or recovering a wireless communication device | |
US8897831B2 (en) | Wireless device content information theft protection system | |
US20040046638A1 (en) | Terminal lock system comprising key device carried by user and terminal-associated device incorporated in terminal device | |
JP2009225475A (en) | Cell phone feature | |
US20060252411A1 (en) | Proximity based security protocol for processor-based systems | |
JP4695040B2 (en) | Remote lock system and communication terminal | |
JP2002300254A (en) | Portable telephone set using subscriber card | |
US20040006655A1 (en) | Method for protecting nomad devices against theft, corresponding device and installation | |
JP2937820B2 (en) | Dial lock system for mobile phones | |
KR20010094958A (en) | Method and apparatus for communicating with network from communication terminal | |
JPH08272742A (en) | Data leakage prevention system | |
US6370402B1 (en) | Portable radio terminal | |
JP2003319453A (en) | Method for controlling portable communication terminal, portable communication terminal, server device, program and recording medium | |
JPH08314805A (en) | System for preventing portable radio terminal from being illegally used and method for executing the same | |
US20060281450A1 (en) | Methods and apparatuses for safeguarding data | |
JP2009027505A (en) | Control device, communication device, control system, control method, and control program | |
JP2000253457A (en) | Portable terminal equipment with personal information protection function | |
JP4240962B2 (en) | Information terminal management system | |
JP2003345659A (en) | Electronic device security system | |
JP4935120B2 (en) | Information processing device, device use function control system, and device use function control program | |
JP2008276367A (en) | Mobile terminal and control program | |
JP2008172701A (en) | System for preventing mobile terminal from being illegally used |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 19970513 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20080613 Year of fee payment: 11 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20090613 Year of fee payment: 12 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20100613 Year of fee payment: 13 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20100613 Year of fee payment: 13 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20110613 Year of fee payment: 14 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20110613 Year of fee payment: 14 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20120613 Year of fee payment: 15 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20120613 Year of fee payment: 15 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20130613 Year of fee payment: 16 |
|
EXPY | Cancellation because of completion of term |