Mobile communication device, mobile communication device control program, and mobile communication device control method
First Claim
1. A mobile communication device comprising:
- a contactless IC card that stores information for authentication and a flag for a lock of the stored information, communicates with an information processing device by wireless communication via a reader/writer, authenticates first information received by the contactless IC card by the stored information, and carries out the lock of the stored information by setting the flag to ON when the authenticating of the first information is a failure and satisfies a predetermined lock condition;
a user authentication information obtaining section that monitors the contactless IC card, and obtains second information inputted into the mobile communication device by a user after the lock is carried out by the contactless IC card;
a user management server wireless communication section that transmits the second information to a user management server by wireless communication via a mobile communication network, and receives a command from the user management server by wireless communication via the mobile communication network when the command is transmitted from the user management server, wherein the user management server receives the second information from the mobile communication device, authenticates the second information by information registered with the user management server in advance, and transmits to the mobile communication device the command instructing release of the lock when the authenticating of the second information is a success; and
a lock release section that releases the lock by setting the flag to OFF when the command is received from the user management server.
2 Assignments
0 Petitions
Accused Products
Abstract
There is provided a mobile communication device having a function capable of releasing lock on an IC card function by an authentication key other then a PIN if the IC card function is locked by a PIN authentication error in a mobile phone having a contactless IC card built in. When a PIN is locked in a mobile phone 1 having a contactless IC card built in, an IC application 11 is started up to transmit a second password other than a PIN to an authentication server 3. The authentication server 3 compares the second password received from the mobile phone 1 with another second password stored in a database 31. If both second passwords agree with each other, a PIN lock release command is transmitted to the mobile phone 1. Further, the mobile phone 1 switches the lock flag of the contactless IC card 13 to OFF from ON by the command received. The PIN lock of the IC card function is thereby released.
36 Citations
21 Claims
-
1. A mobile communication device comprising:
-
a contactless IC card that stores information for authentication and a flag for a lock of the stored information, communicates with an information processing device by wireless communication via a reader/writer, authenticates first information received by the contactless IC card by the stored information, and carries out the lock of the stored information by setting the flag to ON when the authenticating of the first information is a failure and satisfies a predetermined lock condition; a user authentication information obtaining section that monitors the contactless IC card, and obtains second information inputted into the mobile communication device by a user after the lock is carried out by the contactless IC card; a user management server wireless communication section that transmits the second information to a user management server by wireless communication via a mobile communication network, and receives a command from the user management server by wireless communication via the mobile communication network when the command is transmitted from the user management server, wherein the user management server receives the second information from the mobile communication device, authenticates the second information by information registered with the user management server in advance, and transmits to the mobile communication device the command instructing release of the lock when the authenticating of the second information is a success; and a lock release section that releases the lock by setting the flag to OFF when the command is received from the user management server. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer-readable storage medium storing a program that makes a computer of a mobile communication device execute a process for control of the mobile communication device, the process comprising:
-
monitoring a contactless IC card included in the mobile communication device, the contactless IC card being configured to store information for authentication and a flag for a lock of the stored information, communicate with an information processing device by wireless communication via a reader/writer, authenticate first information received by the contactless IC card by the stored information, and carry out the lock of the stored information by setting the flag to ON when the authenticating of the first information is a failure and satisfies a predetermined lock condition; obtaining second information inputted into the computer by a user after the lock is carried out by the contactless IC card; transmitting the second information to a user management server by wireless communication via a mobile communication network, wherein the user management server receives the second information from the computer, authenticates the second information by information registered with the user management server in advance, and transmits to the computer a command instructing release of the lock when the authenticating of the second information is a success; receiving the command from the user management server by wireless communication via the mobile communication network when the command is transmitted from the user management server; and releasing the lock by setting the flag to OFF when the command is received from the user management server.
-
-
8. A method of controlling a mobile communication device, comprising:
-
monitoring, using a computer of the mobile communication device, a contactless IC card included in the mobile communication device, the contactless IC card being configured to store information for authentication and a flag for a lock of the stored information, communicate with an information processing device by wireless communication via a reader/writer, authenticate first information received by the contactless IC card by the stored information, and carry out the lock of the stored information by setting the flag to ON when the authenticating of the first information is a failure and satisfies a predetermined lock condition; obtaining, using the computer, second information inputted into the computer by a user after the lock is carried out by the contactless IC card; transmitting, using the computer, the second information to a user management server by wireless communication via a mobile communication network using the computer; receiving, using the user management server, the second information from the computer; authenticating, using the user management server, the second information by information registered with the user management server in advance; transmitting, using the user management server, to the computer a command instructing release of the lock when the authenticating of the second information is a success; receiving, using the computer, the command from the user management server by wireless communication via the mobile communication network when the command is transmitted from the user management server; and releasing, using the computer, the lock by setting the flag to OFF when the command is received from the user management server. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A mobile communication device comprising:
-
a contactless IC card that stores information for authentication and a flag for a lock of the stored information, communicates with an information processing device by wireless communication via a reader/writer, authenticates first information received by the contactless IC card by the stored information, and carries out the lock of the stored information by setting the flag to ON when the authenticating of the first information is a failure and satisfies a predetermined lock condition; a user authentication information obtaining section that monitors the contactless IC card, obtains third information inputted into the mobile communication device by a user after the lock is carried out by the contactless IC card, and authenticates the third information by information registered with the mobile communication device in advance; a user management server wireless communication section that transmits a result of the authenticating of the third information to a user management server by wireless communication via a mobile communication network, and receives a command from the user management server by wireless communication via the mobile communication network when the command is transmitted from the user management server, wherein the user management server receives the result from the mobile communication device, and transmits the command instructing release of the lock when the result indicates that the authenticating of the third information is a success; and a lock release section that releases the lock by setting the flag to OFF when the command is received from the server. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A non-transitory computer-readable storage medium storing a program that makes a computer of a mobile communication device execute a process for control of the mobile communication device, the process comprising:
-
monitoring a contactless IC card included in the mobile communication device, the contactless IC card being configured to store information for authentication and a flag for a lock of the stored information, communicate with an information processing device by wireless communication via a reader/writer, authenticate first information received by the contactless IC card by the stored information, and carry out the lock of the stored information by setting the flag to ON when the authenticating of the first information is a failure and satisfies a predetermined lock condition; obtaining third information inputted into the computer by a user after the lock is carried out by the contactless IC card; authenticating the third information by information registered with the computer in advance; transmitting a result of the authenticating of the third information to a user management server by wireless communication via a mobile communication network, wherein the user management server receives the result from the computer, and transmits a command instructing release of the lock when the result indicates that the authenticating of the third information is a success; receiving the command from the user management server by wireless communication via the mobile communication network when the command is transmitted from the user management server; and releasing the lock by setting the flag to OFF when the command is received from the user management server.
-
-
19. A method of controlling a mobile communication device, comprising:
-
monitoring, using a computer of the mobile communication device, a contactless IC card included in the mobile communication device, the contactless IC card being configured to store information for authentication and a flag for a lock of the stored information, communicate with an information processing device by wireless communication via a reader/writer, authenticate first information received by the contactless IC card by the stored information, and carry out the lock of the stored information by setting the flag to ON when the authenticating of the first information is a failure and satisfies a predetermined lock condition; obtaining, using the computer, third information inputted into the computer by a user after the lock is carried out by the contactless IC card; authenticating, using the computer, the third information by information registered with the computer in advance; transmitting, using the computer, a result of the authenticating of the third information to a user management server by wireless communication via a mobile communication network; receiving, using the user management server, the result from the computer; transmitting, using the user management server, to the computer a command instructing release of the lock when the result indicates that the authenticating of third information is a success; receiving, using the computer, the command from the user management server by wireless communication via the mobile communication network when the command is transmitted from the user management server; and releasing, using the computer, the lock by setting the flag to OFF when the command is received from the user management server. - View Dependent Claims (20, 21)
-
Specification