WO2008053870A1 - Appareil électronique et procédé permettant de commander l'appareil électronique - Google Patents

Appareil électronique et procédé permettant de commander l'appareil électronique Download PDF

Info

Publication number
WO2008053870A1
WO2008053870A1 PCT/JP2007/071081 JP2007071081W WO2008053870A1 WO 2008053870 A1 WO2008053870 A1 WO 2008053870A1 JP 2007071081 W JP2007071081 W JP 2007071081W WO 2008053870 A1 WO2008053870 A1 WO 2008053870A1
Authority
WO
WIPO (PCT)
Prior art keywords
unit
predetermined
operations
numerical value
operation content
Prior art date
Application number
PCT/JP2007/071081
Other languages
English (en)
Japanese (ja)
Inventor
Yuki Wada
Original Assignee
Kyocera Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kyocera Corporation filed Critical Kyocera Corporation
Publication of WO2008053870A1 publication Critical patent/WO2008053870A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Definitions

  • the present invention relates to an electronic device that permits a predetermined operation based on a predetermined operation, and a control method for the electronic device.
  • the most general force for example, a lock using a predetermined operation content consisting of a predetermined number of operations on the operation unit such as a password set with 4 to 8 digits.
  • this security function does not execute the functions of the mobile phone unless the lock is released by entering a preset password!
  • Patent Document 1 JP-A-8-30364
  • An object of the present invention is to provide an electronic device and a control method therefor that can conceal not only the operation content but also the number of combinations of operations from a third party. Means for solving the problem
  • An electronic device includes an operation unit, a storage unit that stores a predetermined operation content including a combination of a predetermined number of operations for the operation unit, and the predetermined number of operations for the operation unit. If the operation content based on the operation matches the predetermined operation content stored in the storage unit, a predetermined operation is permitted, and the operation content based on the operation on the operation unit is stored in the storage unit.
  • a control unit that performs control to issue a predetermined warning when a numerical value different from the predetermined number matches the number of operations on the operation unit.
  • control unit when the operation content based on an operation on the operation unit does not correspond to the predetermined operation content stored in the storage unit, the control unit is equal to or greater than the number of the operations. Control is performed to issue a predetermined warning when a numerical value in a smaller range matches the number of operations on the operation unit.
  • control unit determines whether the operation content based on the operation corresponds to the predetermined operation content stored in the storage unit for each operation on the operation unit, When the operation content based on the operation on the operation unit does not correspond to the predetermined operation content stored in the storage unit, a value different from the predetermined number and the number of operations on the operation unit match A control for issuing a predetermined warning is performed.
  • the numerical value different from the predetermined number is a numerical value acquired by random number processing or a numerical value stored in the storage unit.
  • a control method in an electronic device stores predetermined operation content including a combination of operation constants for an operation unit, and operation content based on the operation for the operation unit. Is permitted to correspond to the predetermined operation content, and the operation content based on the operation does not correspond to the predetermined operation content! A predetermined warning is issued when the number of operations does not match. To do.
  • FIG. 1 is a block diagram showing a configuration example of a signal processing system of an electronic device according to an embodiment of the present invention.
  • FIG. 2 is a functional block diagram showing a configuration example of the control unit shown in FIG.
  • FIG. 3 is a perspective view showing an external configuration example of a mobile phone as a mobile terminal device according to an embodiment of the present invention.
  • FIG. 4 is a flowchart for explaining an operation and a control method of the electronic device according to the embodiment of the present invention.
  • 11 Communication unit, 12 ⁇ Operation unit, 13 ⁇ Display unit, 14 ⁇ Storage unit, 15 ⁇ Control unit, 16 ⁇ Sound processing unit, 17 ⁇ Speaker, 18 ⁇ Microphone, 151 ⁇ Operation content acquisition unit, 152 ⁇ Operation count management unit, 153 ⁇ Random number generation unit, 154 ⁇ First determination unit, 155 ⁇ Function execution unit 156... Random number acquisition unit, 157 second determination unit, 158 warning generation unit.
  • FIG. 1 is a block diagram illustrating a configuration example of a signal processing system of an electronic device according to an embodiment of the present invention.
  • a mobile phone is exemplified as the electronic device.
  • the electronic device (cellular phone) 10 includes a communication unit 11, an operation unit 12, a display unit 13, a storage unit 14, a control unit 15, and an audio processing unit 16. And a speaker (SP) 17 and a microphone port phone (MIC) 18.
  • SP speaker
  • MIC microphone port phone
  • the communication unit 11 performs wireless communication with a base station (not shown) connected to a communication network. For example, the communication unit 11 performs predetermined modulation processing on the transmission data input from the control unit 15 to convert it into a radio signal, and sends the converted radio signal via the antenna 111. In addition, the communication unit 11 performs predetermined demodulation processing on the radio signal received from the base station received by the antenna 111 to convert it into reception data, and outputs the reception data to the control unit 15.
  • the operation unit 12 has keys to which various operation contents are assigned, such as a power key, a call key, a numeric key, a character key, a selection key, and a determination key.
  • the operation unit 12 when a numeric key is operated by the user, the operation unit 12 generates a signal corresponding to the operation content and outputs the signal to the control unit 15.
  • the operation unit 12 may be configured by a touch sensor. In this case, a signal corresponding to the touch operation is generated, and the generated signal is output to the control unit 15.
  • the display unit 13 is configured using a display device such as a liquid crystal display panel or an organic EL (Electro-Luminescence) panel, and displays an image corresponding to a video signal generated by the control unit 15. .
  • a display device such as a liquid crystal display panel or an organic EL (Electro-Luminescence) panel, and displays an image corresponding to a video signal generated by the control unit 15. .
  • the display unit 13 displays, for example, various information and images such as telephone numbers of incoming / outgoing calls, contents of received mail and outgoing mail, date, time, remaining battery level, and standby screen when a voice call is made / received.
  • the storage unit 14 includes, for example, a non-volatile storage device (non-volatile semiconductor memory, hard disk device, optical disk device, etc.), a randomly accessible storage device (eg, SRAM, DRAM), etc.
  • the controller 15 holds various data used for processing.
  • the storage unit 14 includes, for example, a computer program provided in the control unit 15, an address book for managing personal information such as a telephone number and an email address of a communication partner, an audio file for playing a ring tone and an alarm sound, a standby It holds screen image files, various setting data, and temporary data used in the program processing.
  • a computer program provided in the control unit 15, an address book for managing personal information such as a telephone number and an email address of a communication partner, an audio file for playing a ring tone and an alarm sound, a standby It holds screen image files, various setting data, and temporary data used in the program processing.
  • the storage unit 14 further stores a predetermined operation content that is set in advance and includes a predetermined number of combinations of operations performed by the operation unit 12.
  • operation refers to either a security code or unlock operation
  • “combinations of a predetermined number of operations” refers to the number of digits of the security code or the number of operations for unlocking operation. Say. Details of both will be described later.
  • the control unit 15 comprehensively controls the overall operation of the mobile phone (electronic device). That is, the control unit 15 performs various processes of the mobile phone (voice calls performed via a circuit switching network, creation and transmission / reception of e-mail, browsing of the Internet Web (World Wide Web) site, etc.). The operation of each block described above (transmission / reception of a signal in the communication unit 11, display of an image on the display unit 13, etc.) is controlled so as to be executed in an appropriate procedure according to key input via the.
  • the control unit 15 includes a computer (microprocessor) that executes processing based on a program (OS, application thin manager, application program, etc.) stored in the storage unit 14. The above process is executed according to the procedure described. That is, the control unit 15 sequentially reads instruction codes from the program stored in the storage unit 14 and executes processing.
  • a computer microprocessor
  • the control unit 15 executes some of the various processes described above by an application program that operates under a predetermined execution environment (platform).
  • control unit 15 executes processing related to security such as browsing of an Internet Web site, display of an image in a standby mode, or access restriction by an application program.
  • control unit 15 activates a predetermined application program corresponding to the event and executes a specific process.
  • control unit 15 determines whether or not it matches the predetermined operation content stored in the operation content storage unit 14 based on a predetermined number of operations performed on the operation unit 12. If the operation content based on the operation on the operation unit 12 does not correspond to the predetermined operation content stored in the storage unit 14, the number of operations performed by the operation unit 12 and random number processing It has a function to determine whether or not it matches the arbitrary numerical value acquired by the above, and to issue a predetermined warning when the number of operations matches the arbitrary numerical value acquired. Details will be described later.
  • the audio processing unit 16 processes an audio signal output from the speaker 17 and an audio signal input to the microphone 18.
  • the audio processing unit 16 amplifies the audio input from the microphone 18 and Log Performs digital conversion, performs signal processing such as encoding, converts it into digital audio data, and outputs it to the control unit 15.
  • the audio processing unit 16 performs signal processing such as decoding, digital-analog conversion, and amplification on the audio data output from the control unit 15, converts the audio data into an analog audio signal, and outputs the analog audio signal to the speaker 17.
  • the mobile phone described above is composed of a CPU and a peripheral LSI including a memory, and the function of the control unit 15 serving as a control center is that the CPU sequentially reads a program recorded in the memory, It is realized by executing.
  • the functions of the communication unit 11, the operation unit 12, the display unit 13, and the audio processing unit 16 are as follows.
  • peripheral LSI that is programmable controlled by U, and connected to a CPU that realizes the functions of the control unit 15 through an input / output port (not shown).
  • the storage unit 14 is allocated to and stored in a memory.
  • FIG. 2 is a functional block diagram showing a configuration example of the control unit 15 shown in FIG.
  • control unit 15 includes an operation content acquisition unit 151, an operation number management unit 152,
  • the random number generation unit 153, the first determination unit 154, the function execution unit 155, the random number acquisition unit 156, the second determination unit 157, and the warning generation unit 158 are configured.
  • the operation content acquisition unit 151 acquires the operation content operated on the operation unit 12 and outputs the operation content to the first determination unit 154.
  • the first determination unit 154 receives a predetermined operation content including a predetermined number of combinations of operations performed on the operation unit 12 from the storage unit 14.
  • the operation number management unit 152 counts the number operated by the operation unit 12 and counts the second determination unit 15.
  • the random number generation unit 153 generates a random number and outputs it to the random number acquisition unit 156.
  • the random number acquisition unit 156 includes a predetermined predetermined number of combinations of the operation content that the first determination unit 154 operates on the operation unit 12 and a predetermined number of operations read from the storage unit 14. A comparison with the operation content is performed, and when it is determined that it does not correspond, a random number generated by the random number generation unit 153 is acquired, and the numerical value is output to the second determination unit 157.
  • the number of operations counted by the operation number management unit 152 is determined. If it is determined that the numerical value acquired by the random number acquisition unit 156 matches the number of operations counted by the operation number management unit 152, the warning generation unit 158 is Start and control the voice processing unit 16.
  • the first determination unit 154 is also connected to the function execution unit 155, and the first determination unit 154 includes an operation content operated on the operation unit 12 and an operation read from the storage unit 14.
  • the function execution unit 155 is allowed to execute the application when it is determined that the contents match with a predetermined operation content set in advance, which includes a predetermined number of combinations.
  • FIG. 3 is a perspective view showing an external configuration example of a mobile phone as an electronic apparatus according to an embodiment of the present invention.
  • the key layout is mainly shown.
  • the electronic device 10A is configured as a so-called foldable mobile phone, and is a transmitter case 2 that is rotatably connected between an open state and a closed state.
  • the transmitting case 20 and the receiving case 30 are connected to each other by a connecting portion 40 that is the center of the relative opening / closing operation of each other, thereby forming a case of the entire portable terminal device.
  • the transmission case 20 is provided with an operation input unit 12 on which various keys exposed on the front surface are arranged.
  • the receiving case 30 is provided with a display unit 13.
  • a numeric keypad 12a for example, a numeric keypad 12a, a cursor key 12b, a function key 12c, and the like are arranged as various keys.
  • Each of the numeric keypads 12a is assigned a plurality of characters related to kanji, alphanumerics, kana, and symbols.
  • FIG. 4 is a flowchart cited for explaining the operation and control method of the electronic device according to the embodiment of the present invention.
  • the user operates a predetermined key on the operation unit 12 to release the access restriction. Then, it is determined whether or not access restriction cancellation is requested (S101), and the same determination is repeated until a predetermined key operation is performed.
  • control unit 15 displays a password input screen on the display unit 13 (S102).
  • the control unit 15 determines whether or not the user has entered the personal identification number by operating the operation unit 12 in accordance with the personal identification number input screen displayed on the display unit 13 (S103). The determination process is repeatedly performed until the password is input by operating the operation unit 12 .
  • the operation number management unit 152 of the control unit 15 then inputs the password.
  • the operation content acquisition unit 151 of the control unit 15 acquires the input content of the n-th password (S105), and outputs the acquired password to the first determination unit 154.
  • the first determination unit 154 obtains the n-digit personal identification number from the normal personal identification number registered as a user from the storage unit 14 (S106). Then, the first determination unit 154 compares and collates the n-th code number output from the operation content acquisition unit 151 with the n-th code number of the regular password acquired from the storage unit 14 (S 1 07), it is determined whether or not they match (S108). That is, the control unit 15 determines whether or not the operation content based on the operation performed by the user on the operation unit 12 corresponds to the regular password stored in the storage unit 14! /.
  • the control unit 15 determines that the corresponding number of digits n counted by the operation number management unit 152 is the number of digits N (predetermined number) of the regular password registered by the user. A force that matches (here, for example, 4 to 8 digits) is determined (S109).
  • the control unit 15 permits execution of a predetermined function when the operation content based on N operations on the operation unit 12 by the user matches the regular password stored in the storage unit 14.
  • predetermined function permitted to be executed here is not limited to the calling function of the mobile phone, but may be other functions!
  • step S109 if the number of digits n counted by the operation number management unit 152 does not match the number of digits N of the legitimate password registered with the user, step S is again performed. 10 Return to 3 and repeat the same procedure as above.
  • n 1 and the number N of digits of the regular password is 4 to 8. Therefore, they do not match and return to step S103 again and repeat the same procedure as above.
  • step S109 the n-digit PIN number output from the operation content acquisition unit 151 is compared with the PIN number of the corresponding digit number n of the normal PIN code acquired from the storage unit 14, If they do not match, the first determination unit 154 then activates the random number acquisition unit 156, acquires the random number generated by the random number generation unit 153 at that time (S111), and performs the second determination Part 1 Outputs to 57.
  • the second determination unit 157 acquires information on the number of operations n of the operation unit 12 counted by the operation number management unit 152 in step S104, and the random number generated by the random number generation unit 153 It is determined whether or not the number of corresponding digits n counted by the operation number management unit 152 matches (S112).
  • control unit 15 confirms whether or not the user has not entered a personal identification number (S113), and whenever it is entered, the operation number management unit 152 applies the corresponding identification number. The number of digits n is counted (S 114).
  • the control unit 15 then returns to step S112, and again by the second determination unit 157. Then, it is determined whether or not the random number generated by the random number generation unit 153 matches the number of digits n counted by the operation number management unit 152.
  • step S112 the random number generated by the random number generation unit 153 and the operation number management unit
  • the warning generation unit 158 is activated and a warning such as ⁇ Incorrect PIN '' is displayed on the display unit 13.
  • the speaker 17 is driven via the audio processing unit 16 to output a warning sound indicating that the password has been entered incorrectly (S115).
  • step S115 When the warning notification is made in step S115, the access restriction release request generated in S101 is canceled and the original standby state is restored.
  • a warning is output and the timing of the warning is set to the random number acquired by the random number acquisition unit 156 unless the correct personal identification number is correctly input to the end. Based on this, it changes every time an unlock is attempted.
  • control unit 15 The operation of the control unit 15 described above is as follows from the viewpoint of a malicious third party. That is, it is assumed that there is a mobile phone that can set a 4- to 8-digit password, and “12345” is set and registered in the storage unit 14 as a regular password.
  • control unit 15 obtains a random number (the control unit 15 always obtains random numbers 4 to 8 in order). Generated and output).
  • a warning is issued when a third party inputs up to 7 digits.
  • a warning message is displayed on the display unit 13 stating that the PIN is different. You should think that the number is set to 7 digits.
  • the “operation content” can be similarly applied even to a force key action that exemplifies the numerical value of the password.
  • the key action refers to a continuous operation such as two times to the right and three times to the left that is performed to release the lock using a touch sensor.
  • the operation “right” described above and below will mean the operation of the right touch sensor with respect to the display direction of the sub-display, and the operation “left” will be the left touch sensor with respect to the display direction of the display. Means operation. In addition, the same effect can be obtained by operating the side key regardless of the touch sensor.
  • a fixed number of digits other than the number of digits of the normal PIN may be acquired from the storage unit 14 and used.
  • the timing for acquiring the random number has been described as the time when the second determination unit 157 determines that there is a mismatch, but in addition, the operation start time, the time when a predetermined number of digits are input Any time other than after the input of the PIN corresponding to all the digits is completed, such as when an erroneous input is detected.
  • operation content gives specific examples in the case of unlocking operation with a personal identification number, and in the case of unlocking operation with continuous operations such as 2 times on the right and 3 times on the left, respectively. This will be described as an example.
  • the regular password stored in the storage unit 14 is set to 5 digits of “12345”, and the password entered through the operation unit 12 and acquired by the control unit 15 is set to “120009”.
  • the warning is given when up to the number of digits corresponding to the numerical value acquired by the random number acquisition unit 156 is input.
  • the timing force at which the warning is issued is the timing at which the third digit "0" is input or the timing at which the sixth digit "9" is input.
  • the number of digits that make up the number, here “5”, is not known, so it is highly secure.
  • the random number acquired by the random number acquisition unit 156 accidentally becomes “5”, and a warning may be issued when the fifth digit “0” is input.
  • the acquired random number is always “5”. Therefore, it is understood that “5”, which is the number of digits that constitutes a legitimate password, is not known to a third party.
  • the random number may be acquired at any time when the operation is started, when a predetermined number of digits are input, or when an erroneous input is detected.
  • the above-described operation contents include not only the unlocking operation of the certification number but also the unlocking operation by continuous operations such as 2 times to the right and 3 times to the left.
  • the regular password stored in the storage unit 14 is 5 digits of “12345”, and the password entered through the operation unit 12 and acquired by the control unit 15 is “120009”.
  • the warning is given when the number of digits stored in the storage unit 14 is input (always constant). For example, if the number of digits stored in the storage unit 14 is “3”, a warning is issued when “0” in the third digit is input.
  • the malicious third party thinks that the personal identification number is 3 digits in the former case, and that the personal identification number is 6 digits in the latter case.
  • the legitimate number of digits is not interpreted by the three parties, thus improving safety.
  • Operation input content “Right, Right, Right, Left, Right, Left”
  • the regular operation content stored in the storage unit 14 is set to five operations “right, left, right, left, right”, and is input via the operation unit 12 (touch sensor).
  • the acquired operation input content is “right, right, right, left, right, left”.
  • the warning is performed when the number of operations corresponding to the numerical value acquired by the random number acquisition unit 156 is performed.
  • Operation input content “Right, Right, Right, Left, Right, Left”
  • the regular operation content stored in the storage unit 14 is set to five operation times “right, left, right, left, right” and is input via the operation unit 12 (touch sensor).
  • the operation input content acquired by the control unit 15 is “right, right, right, left, right, left”.
  • the warning is issued when the number of operations corresponding to the numerical value (always constant) acquired from the storage unit 14 is performed.
  • Example 4 a malicious third party believes that the number of operations is 3 according to the former, and that the number of operations is 6 according to the latter. Since the number of operations, 5 times, is not deciphered, safety is improved.
  • the regular password stored in the storage unit 14 is 5 digits of “12345”, the password entered via the operation unit 12 and acquired by the control unit 15 is “1200”.
  • the warning is issued when a numerical value acquired by the random number acquisition unit 156 or a number of digits corresponding to a certain number acquired from the storage unit 14 is input.
  • the number of digits acquired at this time is less than the normal number of digits “5” and more than the number of digits already entered when acquiring the numerical value (second predetermined number). And in other words, the number of digits greater than “5” is set not to be acquired.
  • the numerical value acquired by the random number acquisition unit 15 6 is “4”, which is the number of digits less than “5”. "Is issued at the timing when""is input.
  • a malicious third party assumes that the personal identification number is less than 5 digits, and therefore tries to determine the personal identification number within the range of this small number of digits.
  • the personal identification number is less than 5 digits, and therefore tries to determine the personal identification number within the range of this small number of digits.
  • Operation input content “Right, Right, Right, Left”
  • the regular operation content stored in the storage unit 14 is set to five operations “right, left, right, left, right”, and is input via the operation unit 12 (touch sensor).
  • the acquired operation input content is “right, right, right, left”.
  • the warning is issued when the number of operations corresponding to the numerical value acquired by the random number acquisition unit 156 is performed.
  • the number of operations acquired at this time is less than the regular number of times “5” and more than the number of input operations (second predetermined number) when the numerical value is acquired.
  • the number of digits of “5” or more is set not to be acquired.
  • the numerical value acquired by the random number acquisition unit 156 is “4”, which is less than “5”.
  • a warning is issued at the timing when the fourth operation “left” is input.
  • a malicious third party assumes that the number of operations is four times less than the normal number of operations, and therefore, allocates the normal operation contents within the range of the small number of operations. Try to go out.
  • the normal operation details up to that small number of times are accidentally determined, the next operation is required for the next operation, so there is a high possibility that confusion will occur and input of the operation details will be given up.
  • the regular password stored in the storage unit 14 is set to 5 digits of “12345”, and the password entered through the operation unit 12 and acquired by the control unit 15 is set to “120009”.
  • the control unit 15 acquires a random number from the random number acquisition unit 156 or acquires a certain number from the storage unit 14 when an erroneous input is detected.
  • a random number or a constant value is acquired.
  • a warning is given when a random number or up to a certain number of digits corresponding to a certain value is entered.
  • Example 7 According to Example 7 described above, a malicious third party assumes that the PIN is 4 digits in the former case, and assumes that the PIN is 6 digits in the latter case. A third party with a wrong number of digits (5 digits) is not deciphered and is therefore highly secure. In addition, when a legitimate user inputs a legitimate password, it is not necessary to obtain a random number for determining the warning timing or a constant numerical value stored in the storage unit 14, so that Simplification is realized.
  • the regular operation content stored in the storage unit 14 is set to five operations “right, left, right, left, right”, and is input via the operation unit 12 (touch sensor). Acquired
  • the operation input content is “right, right, right, left, right, left”.
  • control unit 15 acquires a random number from the random number acquisition unit 156 or detects a certain number from the storage unit 14 when an erroneous input is detected.
  • a random number or a constant value is acquired.
  • a warning is issued when a random number or a number corresponding to a certain value is manipulated.
  • Example 8 since a malicious third party assumes that the number of operations is 3 in the former case, and assumes that the number of operations is 6 in the latter case, The number of legitimate operations (5) is not deciphered by a malicious third party and is therefore highly secure. In addition, when a legitimate user inputs a legitimate password, it is not necessary to obtain a random number for determining the warning timing or a constant numerical value stored in the storage unit 14, so that Simplification is realized.
  • the control unit 15 matches the operation force S performed by the operation unit 12 and the predetermined operation content stored in the storage unit 14. If they do match, the predetermined operation is permitted.If they do not match, it is further determined whether or not the number of operations performed by the operation unit 12 matches with any obtained numerical value. Since a predetermined warning is issued when they match, a malicious third party cannot read not only the predetermined operation contents but also the number of combinations of operations, and safety is improved. On the other hand, conventionally, since a warning is issued when a predetermined number of operations are performed, it is easy to interpret the predetermined number.
  • control unit 15 generates a random number within a predetermined number range, acquires the generated random number, or acquires a certain numerical value different from the predetermined number from the storage unit 14. Since a warning is issued when the number of operations different from the predetermined number is performed, it becomes difficult for a malicious third party to know the predetermined number of digits or the number of operations.
  • control unit 15 has a second power less than the predetermined number of operations performed by the operation unit 12.
  • the predetermined number is determined to determine whether the operation performed by the operation unit 12 matches the predetermined operation content stored in the storage unit 14, and if not, the second predetermined number or more is determined.
  • a malicious third party has the power to determine the verification number within the range of the small number of digits or the number of operations. , It is necessary to enter the PIN or operation details for the next number of digits, thus creating confusion and making it impossible to predict how many digits the PIN number is or how many times the operation is performed. There is a high possibility of giving up the number or operation details. On the other hand, it may be possible to issue a warning with more digits than the regular password, but in this case, it may happen that the regular password is accidentally assigned before confusion occurs. Therefore, it is safer to issue a warning with fewer digits than the normal number of digits.
  • control unit 15 determines whether or not a predetermined number of combinations of the operated operations match a predetermined operation content stored in the storage unit 14. However, by determining that they do not match and acquiring an arbitrary numerical value at the timing, it is possible to simplify the control without the need to acquire the numerical value in advance.
  • FIG. 4 also shows each process (step) included in the security management method in the electronic device of the present invention.
  • the security management method in the electronic device of the present invention is performed by the operation unit 12, the storage unit 14 that stores predetermined regular operation content performed by the operation unit 12, and the operation unit 12.
  • a control unit 15 that performs security management of the operation content, and the control unit 15 determines whether or not the operation on the operation unit 12 matches the predetermined operation content stored in the storage unit 14. If it is determined that the step (S108) matches the first step (S108), the execution of the predetermined function is permitted (S107), and if not, the operation performed by the operation unit 12 is further performed.
  • a third step (S115) for issuing a notification for issuing a notification.
  • the security management method for an electronic device of the present invention it is possible to increase the security by concealing the number of combinations of operations as well as the contents of operations for a malicious third party, and It can be used more safely.
  • the power s exemplified as a mobile phone as the electronic device in addition to PDA (Personal Digital Assistants), PC (Personal Computer), The same effect can be obtained when applied to a game machine.
  • PDA Personal Digital Assistants
  • PC Personal Computer
  • the functions of the constituent blocks of the electronic device of the present invention may be realized entirely by software, or at least a part of them may be realized by hardware.
  • the processing in the control unit 15 and the data processing in the communication unit 11 and the audio processing unit 16 may be realized on a computer by one or more programs, and at least a part of the processing is performed by hardware. It can be realized.
  • a security function is installed. It can be applied to electronic devices such as mobile phones.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Input From Keyboards Or The Like (AREA)
  • Telephone Function (AREA)

Abstract

L'invention concerne un appareil électronique et un procédé permettant de commander l'appareil électronique, destinés à améliorer la sécurité en chiffrant non seulement le contenu d'une opération mais aussi le nombre de combinaisons d'une opération pour un tiers. Une unité de commande (15) évalue si l'opération exécutée au niveau d'une unité d'opération (12) coïncide avec un contenu d'opération prédéterminé stocké dans une unité de stockage (14), autorise une opération prédéterminée s'ils coïncident l'un avec l'autre sinon évalue si le nombre d'opérations exécutées au niveau de l'unité d'opération (12) coïncide avec une valeur numérique arbitraire acquise et émet une alerte s'ils coïncident l'un avec l'autre.
PCT/JP2007/071081 2006-10-30 2007-10-30 Appareil électronique et procédé permettant de commander l'appareil électronique WO2008053870A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2006-294896 2006-10-30
JP2006294896A JP2008112313A (ja) 2006-10-30 2006-10-30 電子機器および電子機器における制御方法

Publications (1)

Publication Number Publication Date
WO2008053870A1 true WO2008053870A1 (fr) 2008-05-08

Family

ID=39344211

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2007/071081 WO2008053870A1 (fr) 2006-10-30 2007-10-30 Appareil électronique et procédé permettant de commander l'appareil électronique

Country Status (2)

Country Link
JP (1) JP2008112313A (fr)
WO (1) WO2008053870A1 (fr)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001209615A (ja) * 2000-01-28 2001-08-03 Sony Corp 認証装置及び認証方法、プログラム格納媒体並びに情報処理装置
JP2004537116A (ja) * 2001-07-27 2004-12-09 マルティン セルゲーヴィッチ ヌヌパロフ コンピュータデータベースにアクセスする為のパスワードの入力方法およびその装置
JP2006059336A (ja) * 2004-07-21 2006-03-02 Kyocera Mita Corp パスワード認証装置及び認証方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001209615A (ja) * 2000-01-28 2001-08-03 Sony Corp 認証装置及び認証方法、プログラム格納媒体並びに情報処理装置
JP2004537116A (ja) * 2001-07-27 2004-12-09 マルティン セルゲーヴィッチ ヌヌパロフ コンピュータデータベースにアクセスする為のパスワードの入力方法およびその装置
JP2006059336A (ja) * 2004-07-21 2006-03-02 Kyocera Mita Corp パスワード認証装置及び認証方法

Also Published As

Publication number Publication date
JP2008112313A (ja) 2008-05-15

Similar Documents

Publication Publication Date Title
CN102687492B (zh) 当设备被锁定时用于用户交互的方法和装置
JP4131229B2 (ja) 折り畳み式携帯電話機及び折り畳み式携帯電話機のロック解除方法
CN106534570B (zh) 一种隐私保护方法及装置
KR101270379B1 (ko) 잠금 장치를 구비한 휴대용 단말기의 기능실행 방법
CN110651270B (zh) 一种数据访问方法及装置
JP4845057B2 (ja) 携帯電子機器及びプログラム
WO2009125862A1 (fr) Dispositif de traitement d’informations, procédé de commande de blocage et programme de commande de blocage
JP4888320B2 (ja) 電子機器、該電子機器に用いられるロック解除方法及びロック解除制御プログラム
US7975309B2 (en) Systems and methods for securing data in an electronic apparatus
KR101330113B1 (ko) 자릿값 기반의 인증 장치 및 방법
KR101144450B1 (ko) 휴대용 단말의 사용자 어플리케이션 접근 제한 방법
JP5245263B2 (ja) 携帯端末、携帯端末における個人情報の表示制御方法、プログラム及び記録媒体
JP2008148048A (ja) 情報端末、ロック制御方法及びロック制御プログラム
JP2009089279A (ja) 情報処理装置、セキュリティ対策方法、およびコンピュータプログラム
JP2013085053A (ja) 携帯端末、及び、その制御方法とプログラム
JP2007300422A (ja) 移動通信端末装置
JP2014136910A (ja) 携帯端末および電子鍵装置
WO2008053870A1 (fr) Appareil électronique et procédé permettant de commander l'appareil électronique
KR100618267B1 (ko) 잠금 해제를 위한 비밀번호 생성 기능을 가지는무선통신단말기 및 그 방법
WO2014038430A1 (fr) Terminal portable, et procédé et programme pour commander le fonctionnement d'un terminal portable
JP2009265967A (ja) 電子機器およびそのパスワード入力方法
JP2006188844A (ja) 携帯電話及び電気錠システム
JP5082531B2 (ja) 携帯通信端末及びプログラム
JP2003178033A (ja) 認証方法及び認証システム及び認証トークン
JP2019087801A (ja) 情報処理装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07830815

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07830815

Country of ref document: EP

Kind code of ref document: A1