BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a flowchart for explaining a privacy protection method according to one embodiment of the present invention;
FIG. 2 is an external view of a portable telephone implementing the privacy protection method according to the one embodiment of the present invention; and
FIG. 3 is a block diagram showing the configuration of a privacy protection terminal device according to another embodiment of the present invention.