Mobile terminal, method of controlling the same, and computer program of the same

ABSTRACT

A mobile telephone ( 1 ), when being folded, is set in a lock state by an opening/closing detection and lock mechanism ( 50 ), and then a control circuit ( 30 ) stops supply of an electric power to a fingerprint authentication unit ( 60 ). In this state, upon detection of an incoming call from an external apparatus, the control circuit ( 30 ) restarts the supply of the electric power to the fingerprint authentication unit ( 60 ), and when a user is authenticated as a legitimate user by the fingerprint authentication unit ( 60 ), instructs the opening/closing detection and lock mechanism ( 50 ) to carry out an unlocking operation.

FIELD OF THE INVENTION

The present invention relates to a technical field of a mobile terminalsuch as a mobile telephone. In particular, the present invention relatesto a technical field of a mobile telephone having a lock function.

BACKGROUND OF THE INVENTION

In recent years, various kinds of security products for preventing amain body of a personal computer (hereinafter referred to as “PC”) frombeing stolen and for protecting data preserved in a PC have been on themarket. As for such security products, for example, there are known:

-   -   an authentication key for controlling log-in and log-out of a PC        by being inserted in and removed from a universal serial bus        (UBS) port,    -   a data encryption key for carrying out encryption and decryption        in accordance with insertion and removal of the data encryption        key in and out the USB port, and a PC card for detecting shocks        and vibrations accompanying a movement of a PC with an        acceleration sensor to judge whether or not the PC is stolen.

In mobile communication terminals such as a mobile telephone and mobileelectronic apparatuses such as a personal digital assistant (PDA),during log-in and an access to important data, whether or not a user isa legitimate user is authenticated using a password -(personalidentification number). Those electronic apparatuses preserve thereinimportant data such as personal information of a user similarly to thecase of the PC. Thus, it is necessary to take measures against burglaryof a main body of an electronic apparatus and shoulder hack of data.

From this viewpoint, a conventional mobile telephone has a functioncalled a dial lock (keylock) for making a key input electronicallyinvalid. However, recognition of the dial lock function (keylockfunction) to users is low. In addition, a series of manipulations forsetting a dial lock state and for releasing a setting state inrestarting use of the mobile telephone using this function aretroublesome for a user. Thus, the number of users who usually utilizesuch a dial lock function is not so many. Moreover, the apparatusconfiguration for requiring a user to input a password (personalidentification number) when the user accesses important data istroublesome for a legitimate user.

Then, in recent years, a folding mobile telephone including a mechanicallock mechanism and a fingerprint authentication unit has come onto themarket. In this folding mobile telephone, when chassis are folded, thelock is automatically engaged in a state where the chassis are folded,and the chassis can not be returned back to an open state unless thelockstate is released. Therefore, the folding mobile telephone can beprevented from being unlawfully used.

Now, in the mobile telephone for which the mobile property is regardedas important, since a battery (rechargeable battery) which is installedfor the operation is also miniature, there is a limit to a power supplycapacity. Thus, in general, the mobile telephone is required to reducethe power consumption during the operation as much as possible.Consequently, in the mobile telephone having the lock mechanism asdescribed above, the supply of an electric power is desirably stoppedfor each functional portion which is inhibited from being used in thelock state.

However, the supply of the electric power to the fingerprintauthentication unit used to release the lock state can not be stopped(turn-OFF of a power supply) even in the lock state because thefingerprint authentication for a legitimate user must be speedilycarried out. On the other hand, in the case of the apparatusconfiguration adapted to stop the supply of the electric power to thefingerprint authentication unit in order to reduce the powerconsumption, there is required a mechanism for restarting the supply ofthe electric power (turn-ON of the power supply) to the fingerprintauthentication unit by some means or other.

Then, JP2002-368870A proposes an apparatus configuration adapted tocarry out fingerprint authentication when a user manipulates anauthentication start key in order to release such a lock state.

However, in a case where an exclusive manipulation key for switching anoperation state of a fingerprint authentication unit is provided in amobile telephone, the construction of the mobile telephone becomescomplicated. Also, in this case, the labor of a user for releasing thelock state is increased. In particular, the apparatus configurationadapted to force a user to carry out a plurality of manipulations underthe situation where an incoming call sound of a mobile telephone isringing is not preferable.

SUMMARY OF THE INVENTION

The present invention has been made in the light of the above-mentionedproblems, and it is, therefore, an object of the present invention toprovide a mobile terminal which includes a lock function (lock means:that is at least one of a mechanical lock mechanism and an electronickeylock mechanism) and an authentication unit, and which is capable ofprecisely supplying an electric power to the authentication unit to makethe reduction of power consumption and the ensuring of securitycompatible with each other without increasing a burden imposed on a userin terms of manipulations.

In order to attain the above-mentioned object, the features of themobile terminal according to the present invention are as follows.

That is, there is provided a mobile terminal provided with lock meansand an authentication unit, in which any of manipulations for the mobileterminal are inhibited based on lock by the lock means and the lockmeans is unlocked to allow a manipulation for the mobile terminal inresponse to that a user is authenticated as a legitimate user by theauthentication unit, the mobile terminal including:

control means (control circuit 30, CPU 101) for starting supply of anelectric power to the authentication unit (fingerprint authenticationunit 60) in response to an occurrence of a predetermined event in themobile terminal (1) during the lock by the lock means (opening/closingdetection and lock mechanism 50), and for unlocking the lock means whena user is authenticated as a legitimate user by the authentication unit.

Here, the predetermined event is, for example, at least one of anoperation of an incoming call from an external apparatus to the mobileterminal, and an operation of report of preset schedule.

According to a preferred embodiment of the mobile terminal, the controlmeans supplies the electric power to the authentication unit over apredetermined period of time in response to the occurrence of thepredetermined event, and unlocks the lock means when the user isauthenticated as a legitimate user within the predetermined period oftime by the authentication unit.

In the above case, the control means may stop the supply of the electricpower to the authentication unit when the authentication by theauthentication unit is not carried out within the predetermined periodof time.

In addition, preferably, the control means may inform a user that theelectric power is supplied to the authentication unit by utilizing atleast one of a sound, light, and a vibration.

Note that, the above-mentioned object can be attained by a method ofcontrolling the mobile terminal having the configuration describedabove.

In addition, the above-mentioned object can be attained by a computerprogram for realizing the mobile terminal having the configurationdescribed above and the method of controlling the mobile terminal usinga computer, and by a computer readable storage medium having thecomputer program stored therein.

Other features and advantages of the present invention will be apparentfrom the following description taken in conjunction with theaccompanying drawings, in which like reference characters designate thesame or similar parts throughout the figures thereof.

BRIEF DESCRIPTION OF THE DRAWINGS

The above and other objects, features and advantages of the presentinvention will become more apparent from the following detaileddescription when taken in conjunction with the accompanying drawingswherein:

FIG. 1 is a block diagram showing a configuration of a mobile telephoneaccording to an embodiment of the present invention;

FIG. 2 is a flow chart showing a control processing executed in themobile telephone according to the embodiment shown in FIG. 1;

FIG. 3 is a perspective view exemplifying an external construction ofthe mobile telephone according to the embodiment of the presentinvention;

FIG. 4A is a side elevational view showing a state where the mobiletelephone according to the embodiment of the present invention isopened; and

FIG. 4B is a side elevational view showing a state where the mobiletelephone according to the embodiment of the present invention is folded(in a close state).

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Preferred embodiments of the present invention will now be described indetail in accordance with the accompanying drawings.

The present invention will hereinafter be described in detail based onan embodiment applied to a mobile telephone as a typical mobile terminalwith reference to the accompanying drawings.

<Apparatus Configuration of Mobile Telephone 1>

First of all, a hardware configuration of a mobile telephone 1 accordingto an embodiment of the present invention will hereinafter be describedwith reference to FIGS. 1, 3, and 4A and 4B.

FIG. 1 is a block diagram showing a configuration of a mobile telephoneaccording to an embodiment of the present invention. The mobiletelephone (folding mobile telephone) 1 according to this embodiment, asshown in FIG. 1, includes a radio circuit 10, an antenna 11, a soundsignal processing unit 20, a speaker 21, a microphone 22, a control unit30, a memory 31, a timer 32, a display device 41, a manipulation device42, a buzzer 43, a lamp 44, an opening/closing detection and lockmechanism 50, a fingerprint authentication unit 60, a power supply unit90, and a power source control unit 91.

More specifically, in a state where the mobile telephone 1 is wirelesslyconnected to an external base station through the antenna 11 inaccordance with an instruction issued from the control circuit 30, theradio circuit 10 carries out a voice communication or a datacommunication with an external apparatus.

The sound signal processing circuit 20 is connected to the radio circuit10 and serves to process a transmission sound signal and a receptionsound signal during the voice communication with an external apparatusin accordance with an instruction issued from the control circuit 30.Then, the speaker 21 outputs the reception sound signal in the form of avoice (sound). A voice which becomes a source of such a transmissionsound signal is inputted to the microphone 22 by a user.

The memory 31 is a nonvolatile storage device, and serves to storetherein a software program to be executed by a central processing unit(CPU) 101 of the control circuit 30, various kinds of parameters, anduser data such as telephone numbers and e-mails.

The timer 32 executes a time processing in accordance with aninstruction issued from the control circuit 30. Then, the timer 32informs the control circuit 30 of the termination of timing (time-out)for a predetermined period of time.

The display device 41 includes a display unit such as a liquid crystaldisplay unit for visually displaying thereon characters, numericalcharacters, and graphic forms. Thus, the display device 41 displaysthereon information which is received from an external apparatus throughthe radio circuit 10, and information corresponding to characters andnumerical characters which a user inputs by manipulating themanipulation device 42 in accordance with the control made by thecontrol circuit 30.

The manipulation device 42 includes a plurality of input switches(including keys and buttons) such as a ten key, and a pointing devicecapable of moving a cursor in an arbitrary direction. Thus, themanipulation device 42 is used to input a manipulation instruction froma user.

The buzzer 43 generates a ringing tone to inform a user of apredetermined state in accordance with the, control made by the controlcircuit 30.

The lamp (lamp group) 44 includes a plurality of light emission devicessuch as light emitting diodes (LEDs). Thus, the lamp 44 emits light toinform a user of a predetermined state in accordance with the controlmade by the control circuit 30.

The opening/closing detection and lock mechanism 50 detects anopen/close state .(folded state) of the chassis of the mobile telephone1 and informs the control circuit 30 of the detection results. Moreover,the opening/closing detection and lock mechanism 50 locks and unlocksthe user's manipulation for physically opening/closing the foldingchassis in accordance with the control by the control circuit 30.Consequently, the lock function of the opening/closing detection andlock mechanism 50 includes a mechanical lock mechanism adapted tooperate in accordance with the control by the control circuit 30.

The fingerprint authentication unit 60 includes a fingerprint sensor 601for reading a fingerprint of a human being. The fingerprintauthentication unit 60 compares a newly read fingerprint (fingerprintdata) with a legitimate user's fingerprint (fingerprint data) which isregistered in advance, thereby authenticating whether or not a user is alegitimate user.

That is, a fingerprint (fingerprint data: in this case, fingerprint dataof a plurality of fingers is desirable) of a legitimate user isregistered in the fingerprint authentication unit 60 in advance. Theregistration of a fingerprint, for example, is carried out as follows. Auser manipulates a suitably allocated switch of the manipulation device42, thereby requesting the control circuit 30 to register fingerprintdata of the user.

In this embodiment, in order to reduce the power consumption of theoverall mobile telephone 1, no electric power is supplied to thefingerprint authentication unit 60 except for a case of a predeterminedoperation state. Whether or not the electric power supply is performedis controlled by a switch 911. The control unit 30 controls a powersupply control circuit 91, thereby supplying an electric power from thepower supply circuit 90 to the fingerprint authentication unit 60. Thefingerprint authentication unit 60 suitably registers the data(fingerprint data) representing a fingerprint which has been read withthe fingerprint sensor 601 in a memory.

Note that the fingerprint data of a legitimate user may be stored in amemory built in the fingerprint authentication unit 60, or may be storedin an external memory such as the memory 31.

The power supply unit 90 has a rechargeable battery (not shown) andserves to supply an electric power to each unit provided within themobile telephone 1.

The power supply control circuit 91 includes a plurality of switches(switching elements) for controlling the supply of an electric power toeach unit within the mobile telephone 1. In this embodiment, suchswitches are operated in correspondence to various kinds of modes suchas an incoming call wait mode in accordance with the control by thecontrol circuit 30. In particular, the switch 911 is turned ON or OFF tocontrol the supply of the electric power from the power supply unit 90to the fingerprint authentication unit 60.

The control circuit 30 includes the CPU 101 for managing the overalloperation of the mobile telephone land other hardware (not shown) andvarious kinds of software programs to be executed by the CPU 101.

The control circuit 30 operates in accordance with the software programsstored in the memory 31 in advance, thereby controlling the operationsof the units within the mobile telephone 1. As the software programsdirectly related to this embodiment, as shown in FIG. 1, there are anincoming call detection function 301 and a lock processing function 302.The incoming call detection function 301 is a program for analyzing asignal received at the radio circuit 10 and for detecting an incomingcall of a voice communication or an incoming call of an e-mail. The lockprocessing function 302 is a program for controlling the lock settingand the lock release made by the opening/closing detection and lockmechanism 50.

Note that the memory 31, the timer 32, the sound signal processingcircuit 20, the power supply control circuit 91, and the like may besuitably mounted in a state of being included in the control circuit 30for convenience of a design.

In addition, at the present time, a general technique can be adopted forthe operations themselves for the data transmission/receptionprocessing, the sound processing, and the like which are executedbetween an external apparatus and the mobile telephone 1 with theabove-mentioned apparatus configuration. Hence, its detailed descriptionis omitted in this embodiment.

FIG. 3 is a perspective view showing an external construction example ofthe mobile telephone 1 according to this embodiment of the presentinvention. FIG. 4A is a side elevational view showing an open state ofthe mobile telephone 1 according to this embodiment of the presentinvention. FIG. 4B is a side elevational view showing a folded state(close state) of the mobile telephone 1 according to this embodiment ofthe present invention.

The mobile telephone 1 according to this embodiment has a foldingconstruction in which as shown in FIG. 3, an upper side chassis 2 and alower side chassis 4 are coupled to each other through a hinge 3 so asto be opened and closed. With such a folding construction, the mobiletelephone 1 can adopt a close state where the upper side chassis 2 andthe lower side chassis 4 are closed (refer to FIG. 4B) and an open statewhere the upper side chassis 2 and the lower side chassis 4 are opened(refer to FIG. 4A) in correspondence to the manipulation made by a user.

The upper side chassis 2 and the lower side chassis 4 are provided withthe opening/closing detection and lock mechanism 50 in positions whichface each other in the close state. The opening/closing detection andlock mechanism 50 detects whether the upper side chassis 2 and the lowerside chassis 4 are in the open state (refer to FIG. 4A) or in the closestate (refer to FIG. 4B). Moreover, the opening/closing detection andlock mechanism 50 mechanically locks the upper side chassis 2 and thelower side chassis 4 in correspondence to the detection of such a closestate, thereby regulating the upper side chassis 2 and the lower sidechassis 4 so that a user can not open the upper side chassis 2 and thelower side chassis 4 unless the opening/closing detection and lockmechanism 50 is unlocked after the lock. Here, such an unlockingoperation is carried out in accordance with the control by the controlcircuit 30 only when the authentication results from the fingerprintauthentication unit 60 show that a user is a legitimate user (itsdetails will be described later).

Note that, in this embodiment, the description has been given by givingas an example the specific case where an opening/closing detectionmechanism and a lock mechanism are integrated into the opening/closingdetection and lock mechanism 50. However, the present invention is notintended to be limited to this specific case. That is, there may beadopted such a construction that the opening/closing detection mechanismand the lock mechanism are separately provided in the mobile telephone1. In addition, since the well known technique can be suitably adoptedfor the opening/closing detection mechanism and the lock mechanism, itsdetailed description is omitted in this embodiment.

The upper side chassis 2 is provided with the speaker 21 and the displaydevice (display unit) 41 on its inside face (in a position which ishidden in the close state).

The lower side chassis 4 is provided with the microphone 22 and themanipulation device 42 on its inside face. In addition, the fingerprintsensor 601 of the fingerprint authentication 60, a lamp 441, and aswitch 421 are provided in a side surface of the lower side chassis 4(in a position which is not hidden even in the close state). The lamp441 is one of the lamps 44 described above, and serves to inform a userthat the fingerprint authentication unit 60 is kept charged withelectricity. The switch 421 is a switch for, when the introduction of anelectric current to the fingerprint authentication unit 60 is stopped,charging the fingerprint authentication unit 60 with electricity inaccordance with the manipulation made by a user. That is, upon detectionof a turn-ON state (close state) of the switch 421, the control circuit30 changes an operation state of the switch 911 over to the close state(turn-ON state). As a result, the supply of the electric power to thefingerprint authentication unit 60 is restarted, thereby activating thefingerprint authentication unit 60.

Note that in this embodiment, the layout in which the fingerprint sensor601, the lamp 441, and the switch 421 are provided in the position shownin FIG. 3 (in the side surface of the bottom end of the lower sidechassis 4) is adopted as an example. However, the present invention isnot intended to be limited to such a layout. Those devices may beprovided in any of positions as long as the position is exposed to theoutside in the folded state of the upper side chassis 2 and the lowerside chassis 4.

<Operation Control for Mobile Telephone 1>

Next, a description will be given to characteristic operation controlfor the mobile telephone 1 having the apparatus configuration describedabove with respect to FIG. 2. In the following description, as an eventwhich is to be detected for release of the lock state, a case where anincoming call originated from an external apparatus to the mobiletelephone 1 is given as an example for convenience of the description.

FIG. 2 is a flowchart showing a control processing executed in themobile telephone 1 according to this embodiment. This flow chartrepresents the processing procedure of the software program which theCPU 101 executes in the control circuit 30 shown in FIG. 1. The CPU 101starts this control processing upon turn-ON of a power supply switch(not shown) of the mobile telephone 1 through the manipulation by auser.

First of all, it is supposed that the mobile telephone 1 is in the openstate where the upper side chassis 2 and the lower side chassis 4 are inthe open state (refer to FIG. 4A), and the opening/closing detection andlock mechanism 50 is in the unlocked state. It is also supposed that inthis state, a user can utilize all the functions of the mobile telephone1. Under this condition, it is unnecessary to carry out the fingerprintauthentication. To reduce the power consumption, the CPU 101 turns OFFthe switch 911, thereby stopping the supply of the electric power to thefingerprint authentication 60.

The CPU 101 (the lock processing function 302) judges whether or not theupper side chassis 2 and the lower side chassis 4 are in the close state(refer to FIG. 4B) through the opening/closing detection and lockmechanism 50 (Step S11).

In the open state (refer to FIG. 4A), a user can carry out an operationfor closing the upper side chassis 2 and the lower side chassis 4. Whenthe CPU 101 detects the close state based on the judgment in Step S11,the CPU can judge that a close state setting factor occurs. Then, theCPU 101 instructs the opening/closing detection and lock mechanism 50 tocarry out the lock operation (Step S12). As a result, the upper sidechassis 2 and the lower side chassis 4 are locked while the close stateis held (refer to FIG. 4B).

Note that, in the above-mentioned example, there is adopted such aconstitution that the CPU 101, upon detection of the close state,instructs the opening/closing detection and lock mechanism 50 to carryout the lock operation. However, the present invention is not intendedto be limited to this constitution as long as the opening/closingdetection and lock mechanism 50 can inform the CPU 101 of such a closestate. For example, a mechanism for making mechanically transition tothe lock state by utilizing the operation when the upper side chassis 2and the lower side chassis 4 are closed through the manipulation by auser can also be adopted for the lock mechanism which theopening/closing detection and lock mechanism 50 has. However, such amechanical lock mechanism must be able to make the transition to theunlocked state when the CPU 101 issues thereto an operation instruction.

When in the mobile telephone 1 in the close state (refer to FIG. 4B),the opening/closing detection and lock mechanism 50 is in the lockstate, a user can not carry out the input manipulation for themanipulation device 42, and the visual observation for the displaydevice 41. Consequently, even when the mobile telephone 1 is stolen, andso forth, the unlawful use and the outflow of the user data can beprevented, and hence the security can be ensured.

In addition, in the close state, the CPU 101 (the lock processingfunction 302) allows the radio circuit 10 to make the transition fromthe current operation mode to the wait mode. Then, in the wait mode, inorder to reduce the power consumption, the CPU 101 controls the powersupply control circuit 91 so that the supply of the electric power toeach unit of the mobile telephone 1 is limited to only the necessaryunits.

Next, a description will be given to a case where a predetermined eventoccurs when the mobile telephone 1 is in the above-mentioned states(i.e., in the close state and the lock state). In this example, it issupposed that such an event corresponds to an incoming call operationfor the voice communication (sound incoming call) and an incoming callfor the data communication (packet communication) (e.g., an incomingcall of an e-mail).

That is, when the mobile telephone 1 is in the close state and the lockstate as described above, the CPU 101 (the incoming call detectionfunction 301) of the control circuit 30 waits for an incoming call froman external apparatus (Step S13). When the CPU 101 detects an incomingcall in Step S13, the CPU 101 informs the lock processing function 302that the incoming call has arrived at the mobile telephone 1.

When the lock processing function 302 is informed that the incoming callhas arrived at the mobile telephone 1 in the state where the mobiletelephone 1 is in the close state and the lock state, the CPU 101 (thelock processing function 302) starts the lock release processing basedon the fingerprint authentication (Step S14). That is, in Step S14, theCPU 101 controls the power supply control circuit 91 (the switch 911),thereby starting the supply of the electric power to the fingerprintauthentication unit 60. As a result, the fingerprint authentication unit60 is activated. Moreover, in Step S14, the CPU 101 activates the timer32 so that the timer starts to time a predetermined period of time as anallowable time required for the fingerprint authentication.

In addition, in Step S14, the CPU 101 (the lock processing function 302)turns ON (or turns ON and OFF) the lamp 441 (the ringing of the buzzer43, or the vibration operation by a vibrator (not shown) may also beavailable), thereby requiring a user to accept the fingerprintauthentication.

Upon turn-ON of the power supply unit 90, the fingerprint authenticationunit 60 reads a fingerprint of a user with the fingerprint sensor 601,and then compares the data of the fingerprint thus read with thelegitimate user's fingerprint data which is registered in advance. Whenthe comparison results show that both the data of the fingerprint thusread and the legitimate user's fingerprint data agree with each other,the fingerprint authentication unit 60 informs the CPU 101 (the lockprocessing function 302) that the fingerprint of the user isauthenticated.

When the CPU 101 (the lock processing function 302) is informed that thefingerprint of the user is authenticated as the fingerprint of alegitimate user (the authentication is OK) from the fingerprintauthentication unit 60 before the timer 32 terminates the timing of thepredetermined period of time (time-out), the CPU 101 makes the operationto proceed to a processing in Step S21.

That is, first of all, the CPU 101 (the lock processing function 302)controls the power supply control unit 91 to stop the supply of theelectric power to the fingerprint authentication unit 60 and also toturn OFF the lamp 441 (including the stop of the buzzer 43 in ringing,and the stop of the vibrator (not shown) in vibration operation) (StepS21).

Subsequently, the CPU 101 (the lock processing function 302) instructsthe opening/closing detection and lock mechanism 50 to unlock the upperside chassis 2 and the lower side chassis. 4 (Step S22). As a result, inthe mobile telephone 1, the upper side chassis 2 and the lower sidechassis 4 can be opened through the manipulation by the user (orautomatically) (refer to FIG. 4A).

Then, the CPU 101, upon detection of the open state through theopening/closing detection and lock mechanism 50, releases the wait modeuntil that time, and controls the power supply control circuit 91 torestart the supply of the electric power to each unit for which thesupply of the electric power is stopped until that time (Step S23). As aresult, the user can carry out the input manipulation for themanipulation device 42, the response to the incoming call of a voicecommunication, the verification of an incoming call of an e-mail, andthe like while verifying the display contents on the display device 41.

On the other hand, when a predetermined period of time has elapsedwithout reception of the report representing that the fingerprint of auser is authenticated, the CPU 101 (the lock processing function 302)controls the power supply control circuit 91 to stop the supply of theelectric power to the fingerprint authentication unit 60 and to turn OFFthe light 441 (including the stop of the buzzer 43 in ringing, and thestop of the vibrator (not shown) in the vibration operation) (Step S17).That is, in this case, the upper side chassis 2 and the lower sidechassis 4 in the close state are held in the lock state. Then, the CPU101 (the lock processing function 302) returns the operation back to theprocessing in Step S13 to wait for a new incoming call.

Here, a description will hereinafter be given to a constitution of thesoftware program constituting the lock processing function 302.

The lock processing function 302, as described above, is realized by thecontrol based on the software program executed by the CPU 101. The lockprocessing function 302 is constituted by the following programs:

-   -   a chassis opening/closing detection function 3021,    -   a lock function 3022,    -   a lock release event detection function 3023,    -   a lock judgment function 3024,    -   an authentication start function 3025,    -   an authentication wait function 3026,    -   an authentication result judgment function 3027, and    -   a lock release function 3028.

Then, an operation of the lock processing function 302 will now bedescribed on the ground of those functions.

In the close state of the upper side chassis 2 and the lower sidechassis 4 (refer to FIG. 4B), upon the detection of the close statebased on the report from the opening/closing detection and lockmechanism 50, the chassis opening/closing detection function 3021 callsthe lock function 3022. Then, the lock function 3022 instructs theopening/closing detection and lock mechanism 50 to lock the upper sidechassis 2 and the lower side chassis 4.

Upon the detection of an incoming call based on the report from theincoming call detection function 301, the lock release event detectionfunction 3023 calls the lock judgment function 3024. The lock judgmentfunction 3024, when judging that the upper side chassis 2 and the lowerside chassis 4 are in the close state (refer to FIG. 4B) and the lockstate, calls the authentication start function 3025.

The authentication start function 3025 issues an instruction to turn ONthe power supply unit 90 for the fingerprint authentication unit 60 andto start the fingerprint authentication. Moreover, the authenticationstart function 3025, as may be necessary in correspondence to theapparatus configuration, transfers the fingerprint data of a legitimateuser to the fingerprint authentication unit 60. Then, the authenticationstart function 3025 calls the authentication wait function 3026.

The authentication wait function 3026 instructs the timer 32 to startthe timing, of a predetermined period of time, and waits for completionof the fingerprint authentication in the fingerprint authentication unit60. Then, the authentication wait function 3026, at a time point ofcompletion of the fingerprint authentication in the fingerprintauthentication unit 60, calls the authentication result judgmentfunction 3027. When a user does not touch the fingerprint sensor 601with his/her finger for the predetermined period of time, thefingerprint authentication processing is terminated (time-out) Thus, nocall is made for the authentication result judgment function 3027.

A case where the authentication wait function 3026 calls theauthentication result judgment function 3027 means that the results ofthe authentication by the fingerprint authentication unit 60 show that auser is allowed to use the mobile telephone 1 (OK). Then, theauthentication result judgment function 3027 calls the lock releasefunction 3028. The lock release function 3028 instructs theopening/closing detection and lock mechanism 50 to unlock the upper sidechassis 2 and the lower side chassis 4. This operation results in thatthe user can open the upper side chassis 2 and the lower side chassis 4(refer to FIG. 4A) which are in the close state until that time.

Note that, in this embodiment described above, an incoming call of avoice communication and an incoming call of an e-mail are detected inStep S13 as the predetermined event for release of the lock state.However, the event to be detected is not intended to be limited to thoseoperations. For example, an operation for reporting an alarm using avoice or the like on the date and time (schedule) set in advance may bedetected as the predetermined event. That is, some mobile terminals suchas a mobile telephone and a PDA are provided with a schedule managementfunction for, in response to arrival of the desired date and time(schedule) set in advance by a user, informing a user of this effectusing an alarm sound and displaying the details of the schedule set inadvance on a screen. Then, the timing at which a user is informed of thearrival of the desired date and time set in advance in such a schedulemanagement function may be detected as the predetermined event in StepS13.

In addition, the manipulation for the switch 421 provided on sidesurface of the bottom end of the lower side chassis 4 shown in FIG. 3can be handled as an event for release of the lock state. In this case,the incoming call detection function 301 to be executed in the CPU 101has to carry out not only the judgment of the presence or absence of anincoming call, but also the judgment of the presence or absence of themanipulation for the switch 421 in Step S13.

Of course, the switch 421 may not be provided. In this case, if theopening/closing detection and lock mechanism 50 is locked once in theclose state of the upper side chassis 2 and the lower side chassis 4,then the lock state is released only when there is an incoming call.Thus, the optimal configuration can be obtained in terms of a mobiletelephone which is given to a user (e.g., a child) for whom anunnecessary originating call is not wanted to be allowed.

<Effects of Embodiment>

According to this embodiment described above, when the mobile telephone1 is in the close state and the lock state, the supply of the electricpower to the fingerprint authentication unit 60 is stopped, while upondetection of an incoming call, the supply of the electric power to thefingerprint authentication unit 60 is restarted. At this time, when auser is authenticated as a legitimate user within a predetermined periodof time, the control circuit 30 instructs the opening/closing detectionand lock mechanism 50 to unlock the upper side chassis 2 and the lowerside chassis 4. As a result, a user can open the upper side chassis 2and the lower side chassis 4 of the mobile telephone 1 to carry out themanipulation for a response to an incoming call and the like.

Consequently, according to this embodiment, in the mobile telephone 1including the opening/closing detection and lock mechanism 50 and thefingerprint authentication unit 60, the supply of the electric power tothe fingerprint authentication unit 60 is precisely carried out, wherebyit is possible to make the reduction of the power consumption and theensuring of the security compatible with each other without increasing aburden imposed on a user in terms of the manipulation operations.

In this embodiment as described above, the mobile telephone to which thepresent invention can be applied has been described by giving an examplethe folding mobile telephone 1. However, the present invention is notintended to be limited in scope to this example. For example, thepresent invention can also be applied to an information processingapparatus such as a folding PDA or a notebook PC.

In addition, in this embodiment as described above, the principal(legitimate user) authentication unit has been described by giving as anexample the fingerprint authentication unit 60 for carrying out theauthentication using a fingerprint of a user. However, the presentinvention is not intended to be limited in scope to this example. Forexample, there may be adopted various kinds of authentication units suchas an authentication unit utilizing a pattern of the blood stream in afinger of a user, and an authentication unit utilizing a pattern of theiris or the retina.

In addition, in this embodiment as described above, the opening/closingoperation of the upper side chassis 2 and the lower side chassis 4 isregulated by the mechanical mechanism provided in the opening/closingdetection and lock mechanism 50. However, electronic regulation means(keylock function) for disabling any of the manipulations for theapparatus in accordance with the manipulation of a specific switch (key)may also be adopted as the lock function to be installed in theapparatus instead of such a mechanical mechanism. In this case, thepresent invention can be widely applied to the electronic apparatuses (amobile telephone or an information processing apparatuses such as a PDAand a notebook PC) each of which is not of the folding type. However,the present invention is aimed to reduce the power consumption of theelectronic apparatus in which a miniature battery (rechargeable battery)having a limited power supply capacity is installed without impairingthe usability for a user. Consequently, when the present invention isapplied to a mobile electronic apparatus (i.e., a mobile terminal) inwhich a chassis is limited in size, the more preferable effects can beoffered.

That is, according to this embodiment, in the mobile terminal includingthe lock function (i.e., the mechanical lock mechanism or the electronickeylock function) and the authentication unit, the supply of theelectric power to the fingerprint authentication unit 60 is preciselycarried out, whereby it is possible to reduce the power consumption aswell as ensure the security without increasing a burden imposed on auser in terms of the manipulation operations.

Note that, after the computer program with which the functions (theincoming call detection function 301, the lock processing function 302,and the like) of the flow chart (refer to FIG. 2) referred to in thedescription of the mobile telephone 1 can be realized is supplied to themobile telephone 1, the computer program is written to the CPU 101 ofthe mobile telephone to be executed, thereby implementing the presentinvention which has been described based on the above-mentionedembodiment.

In addition, in the above-mentioned case, as for the method of supplyingthe computer program to each of the apparatuses, at the present time,the general procedure can be adopted as typified by a method ofinstalling a computer program in an apparatus in the manufacturing stagebefore the shipment, the maintenance stage after the shipment, or thelike by utilizing a suitable jig, a method of downloading a computerprogram from the outside into an apparatus through a communication linesuch as the Internet, or the like. Then, in such a case, the presentinvention is constituted by a code or a storage medium of the computerprogram.

While this invention has been described in connection with certainpreferred embodiments, it is to be understood that the subject matterencompassed by way of this invention is not to be limited to thosespecific embodiments. On the contrary, it is intended for the subjectmatter of the invention to include all alternative, modification andequivalents as can be included within the spirit and scope of thefollowing claims.

1. A mobile terminal provided with lock function and an authenticationunit, in which any of manipulations for the mobile terminal areinhibited based on lock by the lock function and the lock function isunlocked to allow a manipulation for the mobile terminal in response tothat a user is authenticated as a legitimate user by the authenticationunit, comprising: a control circuit which starts supply of an electricpower to the authentication unit in response to an occurrence of apredetermined event in the mobile terminal during the lock by the lockfunction, and unlocks the lock function when a user is authenticated asa legitimate user by the authentication unit.
 2. The mobile terminalaccording to claim 1, wherein said control circuit supplies the electricpower to the authentication unit over a predetermined period of time inresponse to the occurrence of the predetermined event, and unlocks thelock function when the user is authenticated as a legitimate user withinthe predetermined period of time by the authentication unit.
 3. Themobile terminal according to claim 2, wherein said control circuit stopsthe supply of the electric power to the authentication unit when theauthentication by the authentication unit is not carried out within thepredetermined period of time.
 4. The mobile terminal according to claim1, wherein said control circuit informs the user that the electric poweris supplied to the authentication unit by utilizing at least one of asound, light, and a vibration.
 5. The mobile terminal according to claim1, wherein the predetermined event is at least one of an operation of anincoming call from an external apparatus to the mobile terminal, and anoperation of report of preset schedule.
 6. The mobile terminal accordingto claim 1, wherein the authentication unit is a fingerprintauthentication unit for carrying out user authentication based onresults of comparison of information representing a fingerprint which isnewly read during the supply of the electric power with fingerprintinformation of the legitimate user which is registered in advance. 7.The mobile terminal according to claim 1, wherein the lock functionincludes a mechanical lock mechanism which regulates an opening/closingmanipulation by a user for a plurality of chassis constituting a mainbody of the mobile terminal.
 8. The mobile terminal according to claim1, wherein the lock function electronically regulates an inputmanipulation for the mobile terminal by a user.
 9. The mobile terminalaccording to claim 1, further comprising manipulation unit which allowsthe supply of the electric power to the authentication unit in beingstopped to be started in accordance with a manipulation by a user,wherein said control circuit unlocks the lock function when a user isauthenticated as a legitimate- user by the authentication unit even whenthe predetermined event does not occur.
 10. A mobile terminal providedwith lock means and an authentication unit, in which any ofmanipulations for the mobile terminal are inhibited based on lock by thelock means and the lock means is unlocked to allow a manipulation forthe mobile terminal in response to that a user is authenticated as alegitimate user by the authentication unit, comprising: control meansfor starting supply of an electric power to the authentication unit inresponse to an occurrence of a predetermined event in the mobileterminal during the lock by the lock means, and for unlocking the lockmeans when a user is authenticated as a legitimate user by theauthentication unit.
 11. A mobile terminal, comprising: authenticationmeans for authenticating whether or not a user is a legitimate user ofthe mobile terminal; lock means for inhibiting and allowing amanipulation for the mobile terminal; lock control means for inhibitingany of manipulations for the mobile terminal by said lock means and forunlocking said lock means to allow a manipulation for the mobileterminal in response to that a user is authenticated as a legitimateuser by said authentication means; detection means for detecting anincoming call from an external apparatus; and a power supply controlunit which starts supply of an electric power to said authenticationmeans in response to detection of an incoming call by said detectionmeans during lock by said lock means.
 12. A method of controlling amobile terminal provided with lock function and an authentication unit,in which any of manipulations for the mobile terminal are inhibitedbased on lock by the lock function and the lock function is unlocked toallow a manipulation for the mobile terminal in response to that a useris authenticated as a legitimate user by the authentication unit,comprising: starting supply of an electric power to the authenticationunit in response to an occurrence of a predetermined event in the mobileterminal during the lock by the lock function; and unlocking the lockfunction when a user is authenticated as a legitimate user by theauthentication unit.
 13. The method of controlling a mobile terminalaccording to claim 12, wherein: in said supplying, the electric power tothe authentication unit is supplied over a predetermined period of timein response to the occurrence of the predetermined event; and in saidunlocking, the lock function is unlocked when a user is authenticated asa legitimate user within the predetermined period of time by theauthentication unit.
 14. The method of controlling a mobile terminalaccording to claim 13, further comprising: stopping the supply of- theelectric power to the authentication unit when the authentication by theauthentication unit is not carried out within the predetermined periodof time.
 15. A computer program for operation control for a mobileterminal provided with a lock function and an authentication unit, inwhich any of manipulations for the mobile terminal are inhibited basedon lock by the lock function and the lock function is unlocked to allowa manipulation for the mobile terminal in response to that a user isauthenticated as a legitimate user by the authentication unit, thecomputer program causing a computer to implement: a control function ofstarting supply of an electric power to the authentication unit inresponse to an occurrence of a predetermined event occurs in the mobileterminal during the lock by the lock function, and for unlocking thelock function when a user is authenticated as a legitimate user by theauthentication unit.