[go: up one dir, main page]

JPH08251660A - Subsystem for preventing illicit use of radio portable terminal in radio portble terminal system - Google Patents

Subsystem for preventing illicit use of radio portable terminal in radio portble terminal system

Info

Publication number
JPH08251660A
JPH08251660A JP7052454A JP5245495A JPH08251660A JP H08251660 A JPH08251660 A JP H08251660A JP 7052454 A JP7052454 A JP 7052454A JP 5245495 A JP5245495 A JP 5245495A JP H08251660 A JPH08251660 A JP H08251660A
Authority
JP
Japan
Prior art keywords
terminal
portable terminal
information center
radio
wireless
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP7052454A
Other languages
Japanese (ja)
Other versions
JP2661582B2 (en
Inventor
Kenichi Ariga
健一 有賀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Priority to JP7052454A priority Critical patent/JP2661582B2/en
Publication of JPH08251660A publication Critical patent/JPH08251660A/en
Application granted granted Critical
Publication of JP2661582B2 publication Critical patent/JP2661582B2/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

PURPOSE: To disable the use of a stolen portable terminal by outputting a system lock request from a network to the terminal based upon information from an owner of the terminal and allowing the terminal to delete its all internal data. CONSTITUTION: An owner of a stolen radio portable terminal 11 transmits information to which the terminal ID of the terminal 11 to an information center 14 through another radio portable terminal 12 or a wired terminal 13. The center 14 transmits an ID check request command to which the terminal ID of the terminal 11 is added through a radio base station 15. When a respose is returned from the terminal 11, the center 14 transmits a system lock command to the terminal 11. Thereby the terminal 11 erases all the contents of an owner's personal data storage RAM backed up by a battery and then returns a system lock completion response to the center 14. The center 14 returns system lock completion information to the owner of the terminal 11.

Description

【発明の詳細な説明】Detailed Description of the Invention

【0001】[0001]

【産業上の利用分野】本発明は、無線携帯端末における
不正使用に対するネットワークを介した防止方法に関す
る。
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a method for preventing unauthorized use in a wireless portable terminal via a network.

【0002】[0002]

【従来の技術】近年携帯端末が世の中に普及しつつある
が、携帯端末のセキュリティ確保についてはまだまだ発
展途上段階にある。
2. Description of the Related Art In recent years, mobile terminals have become popular, but the security of mobile terminals is still in the developing stage.

【0003】従来の携帯端末の中には紛失したり盗難に
あった場合のセキュリティを確保するために、パスワー
ドを設定して起動時に入力させるようになっているもの
もある。
[0003] In some conventional portable terminals, in order to ensure security in the event of loss or theft, a password is set and input at the time of startup.

【0004】また特開平5−94225号公報は、パー
ソナルコンピュータに取り外し可能なICカード等の不
揮発性記憶装置を設け、カードが実装されていないとコ
ンピュータそのものが起動しないようにすることによっ
てセキュリティを保つ方法が記載している。
Japanese Patent Application Laid-Open No. Hei 5-94225 discloses that a personal computer is provided with a removable non-volatile storage device such as an IC card, and the security of the computer is maintained by preventing the computer from starting unless the card is mounted. The method is described.

【0005】また特開平5−145483号公報は、起
動時に所有者名を表示し、セキュリティコードと呼ばれ
るコードを入力しない限り所有者名の登録変更を禁止す
るという手段を有した無線端末を記載している。
Japanese Patent Application Laid-Open No. 5-145483 describes a wireless terminal having a means for displaying an owner name at the time of startup and prohibiting registration change of the owner name unless a code called a security code is input. ing.

【0006】[0006]

【発明が解決しようとする課題】無線携帯端末を紛失ま
たは盗難され、その端末を第三者が取得して不正に使用
した場合、パスワード機能がなければ自由に無線ネット
ワークへのアクセスや住所録などの内部データの参照が
可能である。またパスワード機能があっても、なんらか
の手段によってパスワードを解読されれば、不正使用を
防止することはできない。
When a wireless portable terminal is lost or stolen, and the terminal is obtained and used illegally by a third party, if there is no password function, access to a wireless network, an address book, etc. can be freely performed. Internal data can be referred to. Even if it has a password function, it cannot prevent illegal use if the password is decrypted by some means.

【0007】本発明の目的は、盗難・紛失した無線携帯
端末が第三者によって不正使用されることを防止して、
セキュリティの向上を図ることにある。
An object of the present invention is to prevent a stolen or lost wireless portable terminal from being illegally used by a third party,
The goal is to improve security.

【0008】[0008]

【課題を解決するための手段】本発明は、紛失または盗
難された無線携帯端末をロック状態(使用不可能な状
態)とすることによって、ネットワークへの不正なアク
セスや内部データの参照を防止する。このため本発明の
無線携帯端末不正使用防止方法においては、第三者によ
って取得された無線携帯端末を、不正使用される前に所
有者から無線ネットワークを通じて携帯端末にその旨を
通知する手段により、携帯端末をロック状態にすること
で上記目的を達成している。
The present invention prevents unauthorized access to a network and reference of internal data by placing a lost or stolen wireless mobile terminal in a locked state (unusable state). . Therefore, in the method for preventing unauthorized use of the wireless mobile terminal of the present invention, the wireless mobile terminal acquired by a third party is notified from the owner to the mobile terminal through a wireless network before being illegally used, The above-mentioned object is achieved by locking the mobile terminal.

【0009】[0009]

【作用】情報センタに盗難にあったことが通知される
と、情報センタから盗難端末を探して、相手を確認した
後に内部のデータを消去する要求を携帯端末に送信する
ことによって、システムロックさせる。これによって盗
難された携帯端末の不正使用を防止することができる。
When the information center is notified of the theft, the information center searches for a stolen terminal, confirms the other party, and then sends a request to erase the internal data to the mobile terminal, thereby locking the system. . This can prevent unauthorized use of the stolen mobile terminal.

【0010】[0010]

【実施例】以下、本発明の実施例について図面を参照し
て説明する。
Embodiments of the present invention will be described below with reference to the drawings.

【0011】図1は本発明の無線携帯端末不正使用防止
サブシステムが収容される。説明する無線携帯端末シス
テムのシステムの構成図であり、図2は本システムにお
ける無線携帯端末のブロック図であり、図3は無線携帯
端末と情報センタとの通信のシーケンスを示す図であ
る。
FIG. 1 accommodates the wireless mobile terminal unauthorized use prevention subsystem of the present invention. FIG. 2 is a block diagram of the wireless portable terminal in the present system, and FIG. 3 is a diagram showing a communication sequence between the wireless portable terminal and an information center.

【0012】まず無線携帯端末のハードウェア構成を図
2のブロック図を用いて説明する。
First, the hardware configuration of the wireless portable terminal will be described with reference to the block diagram of FIG.

【0013】無線携帯端末はシステム全体を制御するC
PU21、制御プログラム等が蓄積されているROM2
4、制御プログラムが使用するワーク用RAM22、住
所録やスケジュールなどの個人データを蓄積がされてい
るデータ蓄積用RAM23、情報や操作を表示するため
の表示器25、データを入力するための入力装置26、
無線の制御を行う無線モジュール27で構成されてい
る。
The wireless portable terminal controls the entire system C
PU21, ROM2 in which control programs and the like are stored
4. A work RAM 22 used by the control program, a data storage RAM 23 storing personal data such as an address book and a schedule, a display 25 for displaying information and operations, and an input device for inputting data 26,
It is composed of a wireless module 27 that controls wireless communication.

【0014】入力装置26で入力されたデータはデータ
蓄積用RAM23に蓄積される。
The data input by the input device 26 is stored in the data storage RAM 23.

【0015】一般的にデータ蓄積用RAM23は電池で
バックアップされているために、電源を落としても消去
されることはない。無線でデータの送信を行う場合に
は、RAM22,23、ROM24からシステムバスを
通じて、無線モジュール27にデータを送ることにより
行う。
Since the data storage RAM 23 is generally backed up by a battery, it is not erased even when the power is turned off. When data is transmitted wirelessly, the data is transmitted from the RAMs 22 and 23 and the ROM 24 to the wireless module 27 via the system bus.

【0016】次に本システムの構成を図1を用いて説明
する。無線携帯端末A(11)、B(12)は情報セン
タ14に登録されているものである。また有線端末C
(13)は情報センタ14にアクセス可能な端末であ
る。無線基地局15と情報センタ14は有線のネットワ
ーク16で接続されている。
Next, the configuration of this system will be described with reference to FIG. The wireless portable terminals A (11) and B (12) are registered in the information center 14. Wired terminal C
(13) is a terminal that can access the information center 14. The wireless base station 15 and the information center 14 are connected by a wired network 16.

【0017】いまある人が無線携帯端末A(11)を所
有していて、盗難にあったと仮定する。無線携帯端末A
(11)の所有者は盗難のあったことを情報センタ14
に通知するために、他の人の無線携帯端末B(12)ま
たは有線の端末C(13)を通じて情報センタ14にア
クセスする。有線端末C(13)でアクセスを行う場合
を図3の通知シーケンス図を用いて説明する。
It is assumed that a person now owns the wireless portable terminal A (11) and has been stolen. Wireless mobile terminal A
The owner of (11) informs the information center 14 of the theft.
In order to notify the information center, the information center 14 is accessed through another person's wireless mobile terminal B (12) or wired terminal C (13). The case where access is performed by the wired terminal C (13) will be described with reference to the notification sequence diagram of FIG.

【0018】有線端末C(13)からID、電話番号、
パスワードを付加した接続要求を送信し、情報センタ1
4が受け付けると接続完了レスポンスを返す(図中30
1)。
From the wired terminal C (13), ID, telephone number,
Send a connection request with a password, and send it to the information center 1
When 4 receives, a connection completion response is returned (30 in the figure)
1).

【0019】情報センタ14に接続完了後、無線携帯端
末A(11)の端末IDを付加した盗難通知を情報セン
タ14に送信する(図中302)。盗難通知を受信した
情報センタ14ではコマンド確認レスポンスを有線端末
C(13)に返した後、無線基地局15を通じて盗難端
末が通信可能状態(受け待ち状態)にあるかどうかを確
認するために盗難端末のIDを付加したID確認要求コ
マンドを送信する(図中303)。もし盗難端末A(1
1)が通信可能状態であればID通知レスポンスを返
す。
After the connection to the information center 14 is completed, the theft notification with the terminal ID of the wireless mobile terminal A (11) is transmitted to the information center 14 (302 in the figure). After receiving the theft notification, the information center 14 returns a command confirmation response to the wired terminal C (13), and then the theft terminal confirms whether the stolen terminal is in the communicable state (waiting state) through the wireless base station 15. An ID confirmation request command with the terminal ID added is transmitted (303 in the figure). If the stolen terminal A (1
If 1) is in a communicable state, an ID notification response is returned.

【0020】ID通知レスポンスを確認した情報センタ
14では、盗難端末A(11)が特定できたため、シス
テムロック要求コマンドを送信する(図中304)。こ
のコマンドを受信した盗難端末A(11)では、データ
蓄積用RAM23の内容を消去した後、システムロック
完了レスポンスを情報センタ14に送信する。
In the information center 14 which has confirmed the ID notification response, the stolen terminal A (11) has been identified, and therefore a system lock request command is transmitted (304 in the figure). Upon receiving this command, the stolen terminal A (11) deletes the contents of the data storage RAM 23, and then transmits a system lock completion response to the information center 14.

【0021】端末のシステムロックを確認した情報セン
タ14では、その旨をシステムロック完了通知により有
線端末C(13)に端末がロック状態になったことを通
知する(図中305)。ここで、盗難端末A(11)の
内部データは消去されたために端末のセキュリティが保
たれることになる。
The information center 14 which has confirmed the system lock of the terminal notifies the wired terminal C (13) that the terminal has been locked by the system lock completion notification (305 in the figure). Here, since the internal data of the stolen terminal A (11) has been deleted, the security of the terminal is maintained.

【0022】[0022]

【発明の効果】以上説明したように本発明の無線携帯端
末不正使用防止サブシステムは、第三者によって取得さ
れた無線携帯端末を不正使用される前に所有者から無線
ネットワークを通じてコマンドを送ることによって端末
をロック状態にするために、携帯端末を紛失したり盗難
にあった後に第三者が無線ネットワークへのアクセスや
住所録などの内部データの参照することができなくな
る。このため端末のセキュリティが保たれる。
As described above, the wireless mobile terminal unauthorized use prevention subsystem of the present invention sends a command from the owner through the wireless network before the wireless mobile terminal acquired by a third party is illegally used. In order to lock the terminal, the third party cannot access the wireless network or refer to the internal data such as the address book after the portable terminal is lost or stolen. For this reason, the security of the terminal is maintained.

【図面の簡単な説明】[Brief description of drawings]

【図1】本発明の実施例のシステム構成図である。FIG. 1 is a system configuration diagram of an embodiment of the present invention.

【図2】本発明の実施例の端末のブロック図である。FIG. 2 is a block diagram of a terminal according to an embodiment of the present invention.

【図3】本発明の実施例の動作を示すシーケンス図であ
る。
FIG. 3 is a sequence diagram showing an operation of the exemplary embodiment of the present invention.

【符号の説明】[Explanation of symbols]

11 盗難端末A 12 無線端末B 13 有線端末C 14 情報センタ 15 無線基地局 16 有線ネットワーク 21 CPU 22 ワーク用RAM 23 データ蓄積用RAM 24 ROM 25 表示器 26 入力装置 27 無線モジュール Reference Signs List 11 stolen terminal A 12 wireless terminal B 13 wired terminal C 14 information center 15 wireless base station 16 wired network 21 CPU 22 work RAM 23 data storage RAM 24 ROM 25 display 26 input device 27 wireless module

Claims (2)

【特許請求の範囲】[Claims] 【請求項1】 情報センタに登録されサービスを受けて
いる無線携帯端末システムにおける無線携帯端末不正使
用防止サブシステムであり、 前記情報センタは携帯端末の盗難通知に応答して、 前記携帯端末に対して内部データを消去する指示を送る
手段を備え、 前記携帯端末は、前記情報センタからの消去指示に基づ
いて、その内部データを消去する手段と、 該内部データを消去完了した旨を情報センタに通知する
手段とを備え、 前記情報センタは、前記携帯端末からの通知内容を盗難
通知を発した端末に返す手段をさらに備えることを特徴
とする無線携帯端末不正使用防止サブシステム。
1. A wireless portable terminal unauthorized use prevention subsystem in a wireless portable terminal system registered and receiving a service in an information center, wherein said information center responds to a notification of the theft of the portable terminal, and Means for sending an instruction to erase internal data by means of the portable terminal, based on an erase instruction from the information center, means for erasing the internal data, and a notice to the effect that the internal data has been erased to the information center. Means for notifying, the information center further comprising means for returning the contents of the notification from the mobile terminal to the terminal that issued the theft notification, the wireless mobile terminal unauthorized use prevention subsystem.
【請求項2】 前記情報センタは前記携帯端末のID確
認要求を送信する手段をさらに含み、 前記携帯端末はこのID確認要求に応答してIDを情報
センタに通知する手段をさらに含むことを特徴とする請
求項1記載の無線携帯端末不正使用防止サブシステム。
2. The information center further comprises means for transmitting an ID confirmation request of the portable terminal, and the portable terminal further comprises means for notifying an ID to the information center in response to the ID confirmation request. The subsystem for preventing unauthorized use of a wireless portable terminal according to claim 1.
JP7052454A 1995-03-13 1995-03-13 Subsystem for preventing unauthorized use of wireless mobile terminal in wireless mobile terminal system Expired - Lifetime JP2661582B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP7052454A JP2661582B2 (en) 1995-03-13 1995-03-13 Subsystem for preventing unauthorized use of wireless mobile terminal in wireless mobile terminal system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP7052454A JP2661582B2 (en) 1995-03-13 1995-03-13 Subsystem for preventing unauthorized use of wireless mobile terminal in wireless mobile terminal system

Publications (2)

Publication Number Publication Date
JPH08251660A true JPH08251660A (en) 1996-09-27
JP2661582B2 JP2661582B2 (en) 1997-10-08

Family

ID=12915173

Family Applications (1)

Application Number Title Priority Date Filing Date
JP7052454A Expired - Lifetime JP2661582B2 (en) 1995-03-13 1995-03-13 Subsystem for preventing unauthorized use of wireless mobile terminal in wireless mobile terminal system

Country Status (1)

Country Link
JP (1) JP2661582B2 (en)

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002057976A1 (en) * 2001-01-12 2002-07-25 Secom Co.,Ltd. Search supporting apparatus, search supporting system, operation instructing terminal, search supporting method, and operation instructing system
WO2002071291A1 (en) * 2001-03-01 2002-09-12 Fujitsu Limited Portable device control method, ic card false use preventive method, portable device setting altering program, ic card false use preventive program
JP2002374564A (en) * 2001-06-12 2002-12-26 Koji Yamamoto Security system with respect to recorded contents of mobile phone
KR100414219B1 (en) * 2001-04-10 2004-01-07 주식회사 팬택앤큐리텔 Method of mobile station control for using telephone/mobile station
WO2004104799A1 (en) * 2003-05-21 2004-12-02 Fujitsu Limited Information processing system, information processing method, and information processing device
JP2005524184A (en) * 2002-04-28 2005-08-11 ペイクール インターナショナル リミテッド System for enabling a financial transaction service for a telecommunications carrier and method for performing such a transaction
US7159120B2 (en) * 2001-11-19 2007-01-02 Good Technology, Inc. Method and system for protecting data within portable electronic devices
US7200220B1 (en) 1999-03-17 2007-04-03 Fujitsu Limited Portable telephone maintenance service system and maintenance service method
WO2008129701A1 (en) * 2007-04-10 2008-10-30 Hitachi Software Engineering Co., Ltd. File management system and method, and mobile terminal
US7640005B2 (en) 2005-04-19 2009-12-29 Sharp Kabushiki Kaisha Information protection system for mobile terminal device, information protection method for mobile terminal device, control program, computer-readable medium and electronic information device
JP2010244538A (en) * 2009-03-31 2010-10-28 Intel Corp Theft management system and method
US8326264B2 (en) 2006-09-15 2012-12-04 Ntt Docomo, Inc. Mobile communication network system and locking method of a mobile terminal apparatus
JP2013110475A (en) * 2011-11-17 2013-06-06 Toshiba Corp Electronic apparatus, electronic apparatus control method, and electronic apparatus control program
US8495704B2 (en) 2008-09-24 2013-07-23 Fujitsu Limited Information processing apparatus and computer product
US8862868B2 (en) 2012-12-06 2014-10-14 Airwatch, Llc Systems and methods for controlling email access
US8978110B2 (en) 2012-12-06 2015-03-10 Airwatch Llc Systems and methods for controlling email access
US8978156B2 (en) 2011-04-19 2015-03-10 Panasonic Intellectual Property Management Co., Ltd. Information terminal and information leakage prevention method
US9021037B2 (en) 2012-12-06 2015-04-28 Airwatch Llc Systems and methods for controlling email access
JP2015197857A (en) * 2014-04-02 2015-11-09 能美防災株式会社 Inspection support device and inspection support system
US9195811B2 (en) 2013-07-03 2015-11-24 Airwatch Llc Functionality watermarking and management
US9202025B2 (en) 2013-07-03 2015-12-01 Airwatch Llc Enterprise-specific functionality watermarking and management
US9258301B2 (en) 2013-10-29 2016-02-09 Airwatch Llc Advanced authentication techniques
US9325713B2 (en) 2012-12-06 2016-04-26 Airwatch Llc Systems and methods for controlling email access
US9450921B2 (en) 2012-12-06 2016-09-20 Airwatch Llc Systems and methods for controlling email access
US9516005B2 (en) 2013-08-20 2016-12-06 Airwatch Llc Individual-specific content management
US9544306B2 (en) 2013-10-29 2017-01-10 Airwatch Llc Attempted security breach remediation
US9552463B2 (en) 2013-07-03 2017-01-24 Airwatch Llc Functionality watermarking and management
US9584437B2 (en) 2013-06-02 2017-02-28 Airwatch Llc Resource watermarking and management
US9665723B2 (en) 2013-08-15 2017-05-30 Airwatch, Llc Watermarking detection and management
US9787686B2 (en) 2013-04-12 2017-10-10 Airwatch Llc On-demand security policy activation
US9900261B2 (en) 2013-06-02 2018-02-20 Airwatch Llc Shared resource watermarking and management
US10951541B2 (en) 2012-02-14 2021-03-16 Airwatch, Llc Controlling distribution of resources on a network
US11082355B2 (en) 2012-02-14 2021-08-03 Airwatch, Llc Controllng distribution of resources in a network
US11824644B2 (en) 2013-03-14 2023-11-21 Airwatch, Llc Controlling electronically communicated resources

Cited By (57)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7200220B1 (en) 1999-03-17 2007-04-03 Fujitsu Limited Portable telephone maintenance service system and maintenance service method
KR100847774B1 (en) * 2001-01-12 2008-07-23 세콤 가부시키가이샤 Search support device, search support system, work order terminal, search support method and work order system
WO2002057976A1 (en) * 2001-01-12 2002-07-25 Secom Co.,Ltd. Search supporting apparatus, search supporting system, operation instructing terminal, search supporting method, and operation instructing system
CN1313946C (en) * 2001-01-12 2007-05-02 西科姆株式会社 Search support device, search support system, operation command terminal, search support method, and operation command system
WO2002071291A1 (en) * 2001-03-01 2002-09-12 Fujitsu Limited Portable device control method, ic card false use preventive method, portable device setting altering program, ic card false use preventive program
JP2002259869A (en) * 2001-03-01 2002-09-13 Fujitsu Ltd Method for controlling portable device, method for preventing unauthorized use of IC card, program for changing setting of portable device, and program for preventing unauthorized use of IC card
US7174160B2 (en) 2001-03-01 2007-02-06 Fujitsu Limited Mobile device controlling method, IC card unauthorized use preventing method, program for changing settings of mobile device, and program for preventing IC card from unauthorized use
KR100747971B1 (en) * 2001-03-01 2007-08-08 후지쯔 가부시끼가이샤 Method for preventing illegal use of IC card, recording medium recording program for changing the settings of portable device, and recording medium for recording program for preventing illegal use of IC card
KR100414219B1 (en) * 2001-04-10 2004-01-07 주식회사 팬택앤큐리텔 Method of mobile station control for using telephone/mobile station
JP2002374564A (en) * 2001-06-12 2002-12-26 Koji Yamamoto Security system with respect to recorded contents of mobile phone
US7159120B2 (en) * 2001-11-19 2007-01-02 Good Technology, Inc. Method and system for protecting data within portable electronic devices
JP2005524184A (en) * 2002-04-28 2005-08-11 ペイクール インターナショナル リミテッド System for enabling a financial transaction service for a telecommunications carrier and method for performing such a transaction
WO2004104799A1 (en) * 2003-05-21 2004-12-02 Fujitsu Limited Information processing system, information processing method, and information processing device
US8151367B2 (en) 2003-05-21 2012-04-03 Fujitsu Limited Information processing system
US7640005B2 (en) 2005-04-19 2009-12-29 Sharp Kabushiki Kaisha Information protection system for mobile terminal device, information protection method for mobile terminal device, control program, computer-readable medium and electronic information device
US8326264B2 (en) 2006-09-15 2012-12-04 Ntt Docomo, Inc. Mobile communication network system and locking method of a mobile terminal apparatus
WO2008129701A1 (en) * 2007-04-10 2008-10-30 Hitachi Software Engineering Co., Ltd. File management system and method, and mobile terminal
JP4938011B2 (en) * 2007-04-10 2012-05-23 株式会社日立ソリューションズ File management system and method, and portable terminal device
US8495704B2 (en) 2008-09-24 2013-07-23 Fujitsu Limited Information processing apparatus and computer product
JP2010244538A (en) * 2009-03-31 2010-10-28 Intel Corp Theft management system and method
US8429759B2 (en) 2009-03-31 2013-04-23 Intel Corporation Theft management system and method
US8978156B2 (en) 2011-04-19 2015-03-10 Panasonic Intellectual Property Management Co., Ltd. Information terminal and information leakage prevention method
JP2013110475A (en) * 2011-11-17 2013-06-06 Toshiba Corp Electronic apparatus, electronic apparatus control method, and electronic apparatus control program
US10951541B2 (en) 2012-02-14 2021-03-16 Airwatch, Llc Controlling distribution of resources on a network
US12081452B2 (en) 2012-02-14 2024-09-03 Airwatch Llc Controlling distribution of resources in a network
US11082355B2 (en) 2012-02-14 2021-08-03 Airwatch, Llc Controllng distribution of resources in a network
US11483252B2 (en) 2012-02-14 2022-10-25 Airwatch, Llc Controlling distribution of resources on a network
US10681017B2 (en) 2012-12-06 2020-06-09 Airwatch, Llc Systems and methods for controlling email access
US11050719B2 (en) 2012-12-06 2021-06-29 Airwatch, Llc Systems and methods for controlling email access
US12120077B2 (en) 2012-12-06 2024-10-15 Omnissa, Llc Systems and methods for controlling email access
US9325713B2 (en) 2012-12-06 2016-04-26 Airwatch Llc Systems and methods for controlling email access
US8862868B2 (en) 2012-12-06 2014-10-14 Airwatch, Llc Systems and methods for controlling email access
US9021037B2 (en) 2012-12-06 2015-04-28 Airwatch Llc Systems and methods for controlling email access
US9450921B2 (en) 2012-12-06 2016-09-20 Airwatch Llc Systems and methods for controlling email access
US9813390B2 (en) 2012-12-06 2017-11-07 Airwatch Llc Systems and methods for controlling email access
US8978110B2 (en) 2012-12-06 2015-03-10 Airwatch Llc Systems and methods for controlling email access
US9426129B2 (en) 2012-12-06 2016-08-23 Airwatch Llc Systems and methods for controlling email access
US10666591B2 (en) 2012-12-06 2020-05-26 Airwatch Llc Systems and methods for controlling email access
US10243932B2 (en) 2012-12-06 2019-03-26 Airwatch, Llc Systems and methods for controlling email access
US9882850B2 (en) 2012-12-06 2018-01-30 Airwatch Llc Systems and methods for controlling email access
US11824644B2 (en) 2013-03-14 2023-11-21 Airwatch, Llc Controlling electronically communicated resources
US10116662B2 (en) 2013-04-12 2018-10-30 Airwatch Llc On-demand security policy activation
US9787686B2 (en) 2013-04-12 2017-10-10 Airwatch Llc On-demand security policy activation
US10785228B2 (en) 2013-04-12 2020-09-22 Airwatch, Llc On-demand security policy activation
US11902281B2 (en) 2013-04-12 2024-02-13 Airwatch Llc On-demand security policy activation
US9900261B2 (en) 2013-06-02 2018-02-20 Airwatch Llc Shared resource watermarking and management
US9584437B2 (en) 2013-06-02 2017-02-28 Airwatch Llc Resource watermarking and management
US11962510B2 (en) 2013-06-02 2024-04-16 Vmware, Inc. Resource watermarking and management
US9202025B2 (en) 2013-07-03 2015-12-01 Airwatch Llc Enterprise-specific functionality watermarking and management
US9699193B2 (en) 2013-07-03 2017-07-04 Airwatch, Llc Enterprise-specific functionality watermarking and management
US9552463B2 (en) 2013-07-03 2017-01-24 Airwatch Llc Functionality watermarking and management
US9195811B2 (en) 2013-07-03 2015-11-24 Airwatch Llc Functionality watermarking and management
US9665723B2 (en) 2013-08-15 2017-05-30 Airwatch, Llc Watermarking detection and management
US9516005B2 (en) 2013-08-20 2016-12-06 Airwatch Llc Individual-specific content management
US9258301B2 (en) 2013-10-29 2016-02-09 Airwatch Llc Advanced authentication techniques
US9544306B2 (en) 2013-10-29 2017-01-10 Airwatch Llc Attempted security breach remediation
JP2015197857A (en) * 2014-04-02 2015-11-09 能美防災株式会社 Inspection support device and inspection support system

Also Published As

Publication number Publication date
JP2661582B2 (en) 1997-10-08

Similar Documents

Publication Publication Date Title
JP2661582B2 (en) Subsystem for preventing unauthorized use of wireless mobile terminal in wireless mobile terminal system
US6480096B1 (en) Method and apparatus for theft deterrence and secure data retrieval in a communication device
US5940764A (en) PHS terminal disabling system
EP3249571B1 (en) A method, a computer program product and an apparatus for locating, tracking and/or recovering a wireless communication device
US8897831B2 (en) Wireless device content information theft protection system
US20040046638A1 (en) Terminal lock system comprising key device carried by user and terminal-associated device incorporated in terminal device
JP2009225475A (en) Cell phone feature
US20060252411A1 (en) Proximity based security protocol for processor-based systems
JP4695040B2 (en) Remote lock system and communication terminal
JP2002300254A (en) Portable telephone set using subscriber card
US20040006655A1 (en) Method for protecting nomad devices against theft, corresponding device and installation
JP2937820B2 (en) Dial lock system for mobile phones
KR20010094958A (en) Method and apparatus for communicating with network from communication terminal
JPH08272742A (en) Data leakage prevention system
US6370402B1 (en) Portable radio terminal
JP2003319453A (en) Method for controlling portable communication terminal, portable communication terminal, server device, program and recording medium
JPH08314805A (en) System for preventing portable radio terminal from being illegally used and method for executing the same
US20060281450A1 (en) Methods and apparatuses for safeguarding data
JP2009027505A (en) Control device, communication device, control system, control method, and control program
JP2000253457A (en) Portable terminal equipment with personal information protection function
JP4240962B2 (en) Information terminal management system
JP2003345659A (en) Electronic device security system
JP4935120B2 (en) Information processing device, device use function control system, and device use function control program
JP2008276367A (en) Mobile terminal and control program
JP2008172701A (en) System for preventing mobile terminal from being illegally used

Legal Events

Date Code Title Description
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 19970513

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20080613

Year of fee payment: 11

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20090613

Year of fee payment: 12

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20100613

Year of fee payment: 13

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20100613

Year of fee payment: 13

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20110613

Year of fee payment: 14

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20110613

Year of fee payment: 14

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20120613

Year of fee payment: 15

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20120613

Year of fee payment: 15

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20130613

Year of fee payment: 16

EXPY Cancellation because of completion of term