This application is based upon and claims the benefit of priority from Japanese Patent Application No. 2005-353734, filed Dec. 7, 2005, the entire contents of which are incorporated herein by reference.
1. Field
The invention relates to a terminal apparatus and a data management method it uses. More specifically, the invention is advantageously applied to a terminal apparatus (such as a cellular phone), a personal computer, or the like, and prevents important data and files from being broken or stolen.
2. Description of the Related Art
In recent years, miniaturized semiconductor memories having a large storage capacity have been developed, and a cellular phone comprising or incorporating such a semiconductor memory is commercially available. This type of information processing terminal has to be designed in such a manner as to prevent important data from being stolen from the memory.
As an information processing terminal having a data protection function, a terminal comprising both a detachable communication card and a nonvolatile memory card is known in the art. Unless the communication card is detached from the terminal, the memory card cannot be pulled out of the terminal (see Jpn. Pat. Appln. KOKAI Publication No. 2004-362366).
According to the technology shown in this publication, the data in the memory card is automatically deleted when the communication card is detached.
An object of the invention is to provide a terminal apparatus and a data management method which prevent data from being stolen from a memory and which restore the memory to the original state.
A general architecture that implements the various feature of the invention will now be described with reference to the drawings. The drawings and the associated descriptions are provided to illustrate embodiments of the invention and not to limit the scope of the invention.
Various embodiments according to the invention will be described hereinafter with reference to the accompanying drawings. In general, according to one embodiment of the invention, a terminal apparatus comprises a memory, a communication section, an authentication section configured to execute authentication when a signal requesting access to the memory is received, a save processing section configured to save predetermined data of the memory in a predetermined storage section when the authentication section outputs a negative result, and an erasing section configured to erase the predetermined data from the memory after the predetermined data is saved.
Embodiments of the invention will now be described with reference to the accompanying drawings.
Broadly speaking, the cellular phone 100 includes an antenna 10, a communication section 20, a control section 30 and a user interface 40, as shown in
Referring to
A demodulated signal output from the demodulator is supplied to the controller 30. This controller 30 includes a base band circuit 31 (which is in the form of an LSI), a ROM 301 and a RAM 303. The base band circuit 31 has a microprocessor (CPU), an error-correcting decoder, a speech encoder/decoder and a video encoder/decoder, etc.
The base band circuit 31 separates the demodulated signal into speech data and video data. The speech data is first subject to error-correcting decoding and is then to speech decoding by the speech encoder/decoder. The video data is first subject to error-correcting decoding, and is then demodulated by the video decoder. The speech signal reproduced by these decoding processes is amplified and output from the speaker 403 of a user interface 40. The video signal is supplied to a liquid crystal display (LCD) 402 by way of the display driver circuit (DRY) 401 of the user interface 40, and is displayed there. The received video data is stored in the RAM 303, as needed.
A speech signal uttered by the user and input to the microphone 411 of an input/output section 3, and a video signal produced by a camera (CAM) 422 at the time of photographing is supplied to the base band circuit 31 of the controller 30. In the base band circuit 31, the speech signal and the video signal are encoded by the speech encoder/decoder and the video encoder/decoder, and the encoded signals are subject to error-correcting encoding. Thereafter, the signals are superposed based on a predetermined format. Transmission data obtained by this superposition is supplied to a transmission circuit (TX) of the communication section 20.
The transmission circuit 23 includes a modulator, a frequency converter and a transmission power amplifier. After being digitally modulated, the transmission data is supplied to the frequency converter. The frequency converter mixes the transmission data with a local oscillation signal generated by the frequency synthesizer 24, so that the transmission data is frequency-converted into a radio frequency signal. Where the cellular phone is a PHS terminal, the QPSK scheme is used. Where the cellular phone is a CDMA terminal, QPSK is applied to the primary modulation, and diffusion modulation using diffusion codes is applied to the secondary modulation. A transmission radio frequency signal, thus generated, is amplified to a predetermined transmission level by the transmission power amplifier. Then, the transmission radio frequency signal is supplied to the antenna 10 through the antenna duplexer 21. The transmission radio frequency signal is transmitted from the antenna 11 to the base station 200.
A power supply section 50 includes a battery (such as a lithium ion battery), a charging circuit for charging the battery, and a voltage generating circuit (PS). The voltage generating circuit is, for example, a DC/DC converter, and generates a predetermined power supply voltage Vcc based on the output voltage of the battery.
The microphone 411 and speaker 403 (which jointly constitute a handset), the liquid crystal display 402, and the camera 422 are structural components of the user interface 40. In addition to these, the user interface 40 comprises a key input section (KEY) 405 and a sounder (not shown). The key input section 405 has a dial key and various types of function keys, and the function keys include an off-hook key, an on-hook key and a search key.
The microprocessor of the controller 30 functions as an authentication section 311, a data saving section 312, a data restoration section 313, and a data erasing section 314. The microprocessor also serves as a speech processing section 323 and a video processing section 324.
The speech processing section 323 adjusts the volume of a received speech signal. The video processing section 324 supplies received video data to the liquid crystal display 402 by way of the display driver circuit 401. Image data photographed or acquired by the camera 422 may be compressed before it is stored in a memory or it is transmitted.
The authentication section 311 performs authentication processing to determine whether a request for accessing the RAM 303 is allowed. When the authentication section 311 determines that the access request is not allowed, the data saving section 312 sends predetermined data in the RAM 303 to a predetermined storage area of an external server, for example. Instead of the external server, the predetermined storage area may be prepared as a sub-memory. After the predetermined data is sent and saved, the data erasing section 314 erases the data in the RAM 303. The data restoration section 313 reads the predetermined data from the server through the use of the communication section 20 and writes the read data in the RAM 303.
Upon detection of the memory access request (step SA1), the authentication section 311 starts authentication processing. This authentication processing is performed in a number of steps. To be more specific, authentication processing is performed in step SA2, and a result of this authentication processing is determined in step SA3. If the first-time authentication processing ends in success, another authentication processing is performed in step SA4, and a result of this authentication processing is determined in step SA5. If the second-time authentication processing ends in success, still another authentication processing is performed in step SA6, and a result of this authentication processing is determined in step SA7. If the third-time authentication processing ends in success, still another authentication processing is performed in step SA8, and a result of this authentication processing is determined in step SA9.
When all authentication processing ends in success, a consecutive rejection counter is initialized (step SA10), the access requester is notified that the memory access is enabled (step SA11), and a memory access enabled state is set (step SA12).
If the memory access request is not authenticated in step SA3, SA5, SA7 or SA9, the count of the consecutive rejection counter is incremented in step SA15, and the incremented count N is compared with a predetermined value i in step SA 16. Where N<i, the access requester and the display 402 are notified that the memory access has been rejected (Step SA20), and the control flow returns to step SA2. The notification is supplied to the video processing section 324 and the speech processing section 323, so that the display 402 displays an image and the speaker 403 outputs warning sound.
When N becomes greater than i (N≧i) in step SA16, the data in the memory is saved (step SA17) and then the data in the memory is erased (step SA18). In addition, notification of the data erasure is performed. To be more specific, a message indicating the data erasure is shown on the liquid crystal display 402 so that the user can see the data erasure. Thereafter, the access requester and the display 402 are notified that the memory access has been rejected (step SA20).
The above-mentioned data erasure may be automatically performed in the cellular phone. Alternatively, it may be performed when the cellular phone receives a response signal from a server, indicating that the data has been successfully saved. In addition, the server may be so designed as to issue a data deletion command in response to receipt of data and supply the command to the cellular phone from which the data is received.
In the process described above, important information stored in the memory 303 (such as information on individuals) is not stolen by hacking.
The above description was given, referring to the measures that are taken to prevent information on individuals from being stolen when a cellular phone is used. However, this description in no way restricts the invention. For example, the invention is applicable to the case where the terminal is a personal computer.
The personal computer 600 is provided with a bus 620. A controller 31, ROM 301 and RAM 303 are connected to this bus. A network interface 611 and an input section 613, which receives operation inputs from a keyboard and a mouse, are also connected to the bus 620. Furthermore, a hard disk drive 612 is connected to the bus 620.
As in the cellular phone described in connection with the first embodiment, the controller 31 includes an authentication section 311, a data saving section 312, a data restoration section 313, and a data erasing section 314. These sections operate in a similar manner to that described with reference to
RAM 303 includes an area used for specifying data to be saved. When data to be saved is specified in this area, it is stored in the area or a file name corresponding to it is described in the area. When authorized access is detected, the data or file to be saved is automatically stored in the predetermined address area of the server.
As can be seen from the foregoing, important data is prevented from being stolen from the memory. In addition, predetermined data can be restored by reading it from a storage section in which it is saved.
While certain embodiments of the inventions have been described, these embodiments have been presented by way of example only, and are not intended to limit the scope of the inventions. Indeed, the novel methods and systems described herein may be embodied in a variety of other forms; furthermore, various omissions, substitutions and changes in the form of the methods and systems described herein may be made without departing from the spirit of the inventions. The accompanying claims and their equivalents are intended to cover such forms or modifications as would fall within the scope and spirit of the inventions.
Number | Date | Country | Kind |
---|---|---|---|
2005-353734 | Dec 2005 | JP | national |