Computer system having backup function

ABSTRACT

A computer unit with excellent backup function is realized. A backup operation system is set, and based on the setting, a data file under editing or the like is saved in a backup section. The backup operation system is distinguished through existence of execution of a backup operation, execution timing of the backup operation, an object to be backed up, a backup destination, and the like. This prevents data loss in the case where a computer unit is hanged, or in the case where trouble of the computer unit, crash of a terminal side data storage section, or the like occurs.

BACKGROUND OF THE INVENTION

[0001] 1. Field of the Invention

[0002] The present invention relates to a backup operation of a datafile and a computer unit.

[0003] 2. Description of the Related Art

[0004] Although personal computers have been normally used individuallyor as a network of the personal computers, in these cases, each personalcomputer is owned by an individual or an organization such as a company,so that people capable of using the personal computers are limited to acertain degree.

[0005] In order to conduct various kinds of information processing,information gathering, and so on, it is necessary to arrange a systemsuch that an individual, a company or the like purchases/rents apersonal computer or connects the computer to a network. Particularly,in the case of personal use in a home or the like, the personal computeris not one which can be easily introduced. Thus, it can not be said thatthe advantage of use of the computer is enjoyed by the majority ofpeople.

[0006] Although it appears that with the development of a communicationnetwork, electronic information supply to many unspecified people comesinto wide use from now on, it has been desired to enable as many peopleas possible to use the service and the like.

[0007] As patent applications in view of these circumstances, there isU.S. patent application Ser. No. 174,290 filed Oct. 16, 1998 andassigned to the same assignee as the present application, which ishereby incorporated by reference. This application relates to a computersystem including computer terminals which unspecified many users canarbitrarily use.

[0008] In this prior application, computer terminals are disposed instations and stores like, for example, public telephones, so that manyusers can perform editing, downloading, uploading, and the like.

[0009] In the case where computer terminals are disposed like publictelephones so that the public can use them, as a practical problem, itis necessary to design such that measures can be taken at the time ofhang-up (freeze) or the like in which the terminal comes not to receiveany input.

[0010] For example, in the case where hang-up occurs when a user isusing a computer terminal to perform operations of file preparation orupdate, it is quite undesirable that file data under the operations arelost. Especially in the case where a fee is charged for the use of theterminal, the disappearance of the data under the operations givesserious trouble and a loss to the user.

[0011] Thus, even in the case where hang-up occurs so that the terminalmust be restarted (reset), it is required that data backup is carriedout so that the data under the operations are not lost.

SUMMARY OF THE INVENTION

[0012] In view of the foregoing circumstances, in such a computer systemthat many unspecified people arbitrarily use and information processingusing computers becomes possible, an object of the invention is toenable such backup operation that data loss can be made minimum even inthe case where a computer terminal under use is hanged. Another objectof the invention is to enable such high backup operation that data canbe held even in the case where for example, a backup data storagesection (for example, a hard disk drive) in a computer terminal iscrashed.

[0013] In order to achieve the above objects, according to an embodimentof the invention, a computer system comprises a server and a computerterminal, the server and the computer terminal being connected to becapable of communicating with each other, wherein the computer terminalcomprises data processing means for processing a data file;communication means for communicating with the server; and control meansfor executing an external backup operation to cause the communicationmeans to transmit the data file processed by the data processing meansas backup data to the server, and wherein the server comprises receivingmeans for receiving the data file as the backup data transmitted fromthe communication means; and storage means for storing the data filereceived by the receiving means.

[0014] Also, in another embodiment of the invention, a computer systemcomprises a computer unit and a removable recording medium removablymounted to the computer unit, wherein the removable recording mediumcomprises a record medium main body; and an information recording areaprovided in the recording medium main body, wherein backupidentification information indicating one of a plurality of backupsystems is recorded in the information recording area; and wherein thecomputer unit comprises data processing means for processing a datafile; detection means for detecting the backup identificationinformation from the removable recording medium; and control means forbacking up the data file processed by the data processing means withbackup system based on a detection result of the detection means.

[0015] In a further embodiment of the invention, a computer terminalconnected with a server to be capable of communicating comprises dataprocessing means for processing a data file; communication means forcommunicating with the server; and control means for executing anexternal backup operation to cause the communication means to transmitthe data file processed by the data processing means as backup data tothe server.

[0016] In a still further embodiment of the invention, a computer unitcomprises detection means for detecting, from a removable recordingmedium in which backup identification information indicating one of aplurality of backup systems is recorded, the backup identificationinformation; data processing means for processing a data file; andcontrol means for backing up the data file processed by the dataprocessing means with the backup system based on a detection result ofthe detection means.

[0017] In an even further embodiment of the invention, a recordingmedium removably loaded to a computer unit comprises recording mediummain body; and a backup identification information recording area formedon the recording medium main body; wherein backup identificationinformation indicating one of a plurality of backup systems of thecomputer unit is recorded in the recording area.

BRIEF DESCRIPTION OF THE DRAWINGS

[0018]FIG. 1 is an explanatory view of a system network structure of anembodiment of the invention.

[0019]FIGS. 2A to 2C are explanatory views of a disk of an embodiment.

[0020]FIG. 3 is an explanatory view of an area structure of a disk of anembodiment.

[0021]FIG. 4 is an explanatory view of information recorded in a disk ofan embodiment.

[0022]FIG. 5 is an explanatory view of information recorded in a disk ofan embodiment.

[0023]FIG. 6 is an explanatory view of information recorded in a disk ofan embodiment.

[0024]FIG. 7 is an explanatory view of an example of an outer appearanceof a public terminal of an embodiment.

[0025]FIG. 8 is a block diagram of a public terminal of an embodiment.

[0026]FIG. 9 is an explanatory view of various backup systems of anembodiment.

[0027]FIG. 10 is an explanatory view of a use procedure of a user to apublic terminal of an embodiment.

[0028]FIG. 11 is an explanatory view of a use procedure of a user to apublic terminal of an embodiment.

[0029]FIGS. 12A and 12B are explanatory views of examples of an initialscreen of a public terminal of an embodiment.

[0030]FIG. 13 is an explanatory view of an example of a screen for atelephone in a public terminal of an embodiment.

[0031]FIGS. 14A to 14C are explanatory views of examples of a backuplevel selection screen in a public terminal of an embodiment.

[0032]FIG. 15 is an explanatory view of an example of a screen for acomputer in a public terminal of an embodiment.

[0033]FIG. 16 is a flowchart of a processing of a public terminal of anembodiment.

[0034]FIG. 17 is a flowchart of a processing of a public terminal of anembodiment.

[0035]FIG. 18 is a flowchart of a processing of a public terminal of anembodiment.

[0036]FIG. 19 is a flowchart of a processing of a public terminal of anembodiment.

[0037]FIG. 20 is explanatory view of example of download objectselection screens of a public terminal of an embodiment.

[0038]FIG. 21 is a flowchart of a processing of a public terminal of anembodiment.

[0039]FIG. 22 is a flowchart of a processing of a public terminal of anembodiment.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

[0040] Preferred embodiments of the present invention will be describedbelow in the following order. Incidentally, a computer terminal in theembodiments will be referred to as “public terminal” for explanation. Asan example of a removable recording medium used in the public terminal,a disk media is cited.

[0041] 1. System mode

[0042] 2. Disk

[0043] 3. Structure of public terminal

[0044] 4. Type of backup operation system

[0045] 5. Use procedure

[0046] 6. Processing of public terminal

[0047] 7. Modified example

[0048] 1. System Mode

[0049] A system mode example according to an embodiment will bedescribed with reference to FIG. 1.

[0050]FIG. 1 shows structural elements of a system and an example of acharge collection system as a pay system.

[0051] As shown in FIG. 1, the system of this embodiment includes publicterminals 1, a public terminal management company 2, a credit cardcompany 3, a contents company 4, an application company 5, a publictelephone management company 6, a network 7, a telephone line 8, asatellite communication section 10, and the like.

[0052] That is, the plurality of public terminals 1 each functioning asa computer terminal and a telephone terminal are connected to aplurality of server systems (accounting server 2 a in the publicterminal management company 2, contents server 4 a in the contentscompany 4, application server 5 a in the application company 5, and soon) through the network 7.

[0053] Further, the public terminals 1 are connected to the publictelephone management company 6 and each server system through thetelephone line 8. Some of the public terminals 1 are connected to thenetwork through wireless communication by the satellite communicationsection 10.

[0054] In the public terminal management company 2 functioning as theserver system, a section including a large capacity recording medium andprovided with a writing/reading function of backup data to the recordingmedium is arranged as a backup section 2 b. This backup section 2 boperates to hold file data etc. transmitted from the public terminal 1for a predetermined period as backup data.

[0055] The network 7 to which the public terminal 1 is connected means acommunication network structured for the system, for example, as a LAN(Local Area Network). The network 7 is managed by, for example, thepublic terminal management company 2.

[0056] The telephone line 8 means a common public telephone line networkmanaged by, for example, the public telephone management company 6.

[0057] The public terminal 1 is disposed at a place where someunspecified people can use, such as a store, station, school, andcompany.

[0058] As described later, each user can use the public terminal 1 as aso-called public telephone or can use the public terminal 1 as a pay orfree computer unit by loading the public terminal 1 with a disk owned bythe user. For example, it becomes possible to edit a data file recordedin the disk owned by the user, or to download or upload various databetween the disk and the public terminal 1. Even if the disk is notloaded, the public terminal can be used as a terminal for executing, forexample, information retrieval, preparation of a data file, and upload.

[0059] The public terminal management company 2 performs management ofthe public terminals 1 set at various places, registration of users,check processing for preventing dishonest use when the registered useruses, charge collection management to the use by the registered user,and so on. The accounting server 2 a becomes a section for executingthese processings.

[0060] As the need arises, it is possible to upload or download variousdata, applications, contents (file or the like as one information unit),or the like between the public terminal management company 2 and thepublic terminal 1.

[0061] Further, with respect to information which the user downloads byusing the public terminal 1 and which requires update, the publicterminal management company 2 periodically or irregularly suppliesupdate data through the network 7 or the satellite communication section10, and causes update at the side of the public terminal 1 to beexecuted.

[0062] For example, in the case where a daily electronic newspaper orthe like is considered and a user is enabled to download information asthe electronic newspaper to the user's own disk every day (or at desiredtime), electronic newspaper data of new contents are transmitted to therespective public terminals 1 and update is made, for example, each timethe electronic newspaper is issued. By causing such update to beexecuted through the network 7 or the satellite communication section10, it is possible to provide the newest data for download to the largenumber of public terminals 1 instantaneously and to the respectivepublic terminals 1 without getting assistance from somebody.

[0063] Incidentally, not only the update is made through such network 7or satellite communication section 10, but also the update may be madesuch that update data are distributed as, for example, a disk, and aperson in charge at the place where each of the public terminals 1 isset (a clerk in the store, etc.) loads the public terminal 1 with thedistributed disk, so that the contents of the download data are renewed.

[0064] The credit card company is a company which manages generally usedcredit cards. In the case where a registered user in the public terminalmanagement company pays by a credit card, on the basis of the requestfrom the public terminal management company 2, the credit card companycharges a fee to the user's bank account and makes service of paying thevalue to the organization (public terminal management company 2,contents company 4, application company 5, etc.) entitled to receive thefee.

[0065] The contents company 4 is an organization capable of providingelectronic information to be provided to unspecified many people, forexample, electronic newspaper, electronic magazine, electronic book,music information (music, etc.), video information (television program,movie, video clip, etc.), as one piece of contents through the network 7to the respective public terminals 1. Each of various kinds ofinformation is stored as one piece of contents in the contents server 4a, and is transmitted to the public terminal 1 on the basis of therequest at the side of the public terminal 1, or is periodicallytransmitted to each of the public terminals 1 to cause informationupdate to be executed in the public terminal 1.

[0066] Of course, the contents company may have the satellitecommunication section 10 so that the contents can be provided to therespective public terminals 1 through satellite communication.

[0067] The application company 5 is an organization capable of providingapplications as software to the computer system. That is, applicationsused at the public terminal 1 are provided from the application server 5through the network 7 to the respective public terminals 1.Alternatively, in response to a request from some public terminal 1, therequired application is provided.

[0068] The application company may have the satellite communicationsection 10 so that applications can be provided through the satellitecommunication to the respective public terminals 1.

[0069] The public telephone management company 6 is an organization formanaging the public telephone line. The public terminal 1 can be used asa public telephone, and the public telephone management company 6manages the use as the public telephone.

[0070] In such a system, functions capable of being realized by usingthe public terminal 1 become as follows:

[0071] The functions of the public terminal 1 are roughly divided into afunction as a telephone terminal and a function as a computer terminal(information processing terminal).

[0072] In the case where the public terminal is used as the computerterminal, for example, it becomes possible to carry out editing (edit)of a data file or the like in a disk owned by the user, upload/downloadof data to or from the public terminal 1, upload/download of datathrough the network, various kinds of information retrieval from thenetwork (or database or the like structured in the hard disk or the likein the public terminal), and so on.

[0073] The edit of a data file in this embodiment means a processingthat the user accesses a data file previously recorded in the user'sdisk through the public terminal 1 and edits the data file to update thefile contents in the disk, a processing that the user newly prepares adata file by the public terminal 1 to record the data file in the disk,and so on. Of course, it is not always necessary to write the dataedited with the public terminal 1 into the disk.

[0074] The upload/download of data to or from the public terminal 1means such a function that the user uploads some data file to a storagemedium (for example, a hard disk) in the public terminal 1, or the userdownloads a data file, application, contents, and the like recorded inthe hard disk or the like to the user's own disk.

[0075] The upload/download of data through the network 7 means such aprocessing that the user executes upload/download of some data to orfrom sections connected through the network (or sections where wirelesscommunication can be made through the satellite communication section10), for example, other public terminals 1, the public terminalmanagement company 2, the contents company 4, the application company 5,and the like.

[0076] For example, the upload becomes such an operation that the userprovides a data file such as an electronic mail or contents prepared bythe user onto the network.

[0077] The download becomes such an operation that the user downloads adata file, application, contents (an electronic publication, musicsoftware, video software, game software, etc.) as information providedfrom sections connected to the network to the user's own disk.

[0078] Next, modes of charge payment will be considered. First, it ispossible to provide the use of the public terminal 1 to the public (oronly people in some organization) without charge. As the case of freeprovision, such an example is conceivable that several public terminals1 are disposed in a school, and the students or the staff of the schoolcan freely use the public terminals 1 to carry out processing based onthe foregoing respective functions.

[0079] In the case of charging a fee, it is possible to consider paymentfrom a credit card (bank account, etc.) by payment registration of theuser to the public terminal management company 2, payment by money or aprepaid card, payment by loading of a credit card, and so on.

[0080] With respect to the credit card payment by the paymentregistration, for example, the public terminal management company 2manages.

[0081] When purchasing a disk, the user makes a registration procedurethat he or she uses the disk to use the public terminal 1 and pays by acredit card.

[0082] When the public terminal management company 2 receives theregistration procedure, the user can use the public terminal 1thereafter by using the disk even if he or she does not have money or aprepaid card.

[0083] In this case, when the user uses the public terminal 1, a strictcheck is made for the loaded disk and the user by both the publicterminal 1 and the accounting server 2 a. If the check is OK, the usebecomes possible.

[0084] With respect to this check, a disk serial number, a user ID, apassword, and the like are used.

[0085] When the use is ended, for example, as shown in FIG. 1,information FDt of the use fees is sent to the accounting server 2 afrom the used public terminal 1.

[0086] The public terminal management company 2 shows the use fees(public terminal use fee, contents use/purchase fee, applicationuse/purchase fee, etc.) of the user to the credit card company 3 on thebasis of the management of the accounting server 2 a, and charges thepublic terminal use fee Fpc. Based on the use fees shown by the publicterminal management company 2, the credit card company 3 charges the usefees to the user's bank account, and pays the public terminal use feeFpc to the public terminal management company.

[0087] In the case where contents provided by the contents company 4 isused or purchased at the use of the public terminal, the credit cardcompany 3 pays the contents use/purchase fee Fct to the contents company4.

[0088] Further, in the case where an application provided by theapplication company 5 is used or purchased at the use of the publicterminal, the credit card company 3 pays the application use/purchasefee Fap to the application company 5.

[0089] Incidentally, the public terminal use fee Fpc among the use feesis a fee to be paid by the user in accordance with, for example, a usetime of the public terminal 1.

[0090] The contents use/purchase fee Fct is a fee to be paid in the case(purchase) where the user downloads the contents into the user's owndisk, or in the case where the user uses the contents in the publicterminal 1 (for example, reads an electronic newspaper).

[0091] The application use/purchase fee Fap is a fee to be paid in thecase where the user downloads (purchases) an application to the user'sown disk, or in the case where the user uses the application forprocessing in the public terminal 1.

[0092] Further, in the case of this embodiment, as described later, whenthe user uses the public terminal 1 to edit or prepare a data file,there is a case where the user saves the data under the preparation orjust before or after the preparation for backup into the hard disk inthe inside of the public terminal 1 or into the backup section of thepublic terminal management company 2. As the backup operation system, asdescribed later, there are plural operation systems classified accordingto levels of backup capacity, and one of them is selectively executed.At this time, in the case where the fee is set according to the executedbackup operation system, the fee is also included in the public terminaluse fee Fpc.

[0093] Next, payment with money (coin or bill) or a prepaid card is alsoconceivable.

[0094] In this case, when the public terminal 1 is used as a computer byusing a coin or a prepaid card, the public terminal transmits theinformation FDco of the use fees through, for example, the telephoneline 8 to the public telephone management company 6.

[0095] On the basis of the transmitted use fees (public terminal usefee, contents use/purchase fee, application use/purchase fee, etc.) ofthe user, the public telephone management company 6 pays the publicterminal use fee Fpc to the public terminal management company.

[0096] Besides, in the case where contents provided by the contentscompany 4 are used or purchased at the use of the public terminal, thepublic telephone management company 6 pays the contents use/purchase feeFct to the contents company 4. Further, in the case where an applicationprovided by the application company 5 is used or purchased at the use ofthe public terminal, the public telephone management company 6 pays theapplication use/purchase fee Fap to the application company 5.

[0097] Besides, as a fee payment mode, like an example of a publictelephone set in recent years, such a system is also conceivable that acredit card is directly loaded into the public terminal 1 to use it. Inthis case, the public terminal 1 must have a processing function for acredit card.

[0098] In the case where the public terminal 1 is used in such a paymentsystem, the public terminal 1 transmits information FDcc of the use feesthrough, for example, the telephone line 8 to the credit card company 3.

[0099] On the basis of the transmitted use fees (public terminal usefee, contents use/purchase fee, application use/purchase fee, etc.) ofthe user, the credit card company 3 performs charging of fees to theuser's bank account, payment of public terminal use fee Fpc to thepublic terminal management company 2, payment of contents use/purchasefee Fct to the contents company 4, payment of application use/purchasefee Fap to the application company 5, and so on.

[0100] Although explanation has been made on the structural elements asa computer system, fee payment modes, and functions of the publicterminal 1 in FIG. 1, these are merely an example of a systemcorresponding to specific structures and operation functions describedin the following. Particularly, extremely wide variations areconceivable for the mode of structure constituting a computer system(number and kinds as a server system) and the like, and according tothat, various kinds of network connection modes, fee collection systems,and the like are formed.

[0101] 2. Disk

[0102] Next, a disk 90 used as a recording medium owned by a user inthis embodiment will be described.

[0103] The user owns a disk (disk main body) corresponding to the publicterminal 1 and uses it, so that various uses of the computer using thepublic terminal 1 become possible.

[0104] In this embodiment, even if the disk 90 described in thefollowing is not owned, the public terminal 1 can be used as a telephoneand a computer terminal. However, when the public terminal is used asthe computer terminal without using the disk 90, it becomes naturallyimpossible to download data or the like to the disk, and so on.

[0105] Besides, information for a check on a user to prevent dishonestuse and the like is also recorded in the disk described here, and thisbecomes important in the case where payment is made through registrationof a credit card. Thus, in the case where the public terminal 1 is usedwithout using the disk, such a system is also conceivable that paymentof fees by the registration of a credit card can not be made (only theuse by a coin, prepaid card, or the like is admissible).

[0106] As the disk 90 used in this embodiment, it is preferable that thedisk is a data writable disk and includes an area in which datarewriting can not be made. Thus, a RAM disk shown in FIG. 2A or partialROM disks shown in FIGS. 2B and 2C are used. Here, an optical disk isused as the disk.

[0107] In the RAM disk of FIG. 2A, its whole main data area is made arewritable area ARW in which recording/reproducing can be made with amagneto-optical area, a phase change area, or the like. In the case ofthis RAM disk, since all of the main data area physically becomes therewritable area, it is necessary to partially set an area for recordingdata which can not be rewritten, so that write protection is made tosome area by disk managing information.

[0108] The partial ROM disk is a disk having a structure as shown in,for example, FIG. 2B or 2C. That is, in a main data area of one disk, aROM area AE and a rewritable area ARW are provided.

[0109] The ROM area AE is an area where data are recorded by so-calledemboss bits or the like, that is, it is a region where data rewriting isimpossible also from a physical viewpoint. Such a partial ROM disk ismost suitable for the condition that data can be written and there is aregion where data rewriting is impossible, which is required for arecording medium of the computer system of this embodiment.

[0110]FIG. 3 shows an example of an area structure from an outerperiphery side to an inner periphery side, which is common to each ofthe disks of FIGS. 2A to 2C, each becoming the recording medium of thisembodiment.

[0111] For example, at the outermost periphery side, a GCP (Gray CodePart) zone is provided, and a buffer zone, an outer control zone, abuffer zone, and a test zone are provided toward the inner peripheryside.

[0112] Subsequent to the test zone, there is formed a user area as amain data area composed of a rewritable region ARW in which the user canrecord desired data or a ROM region AE used only for reproduction. Theuser area is divided into 16 bands of band 0 to band 15.

[0113] In the RAM disk of FIG. 2A, the entire user area becomes therewritable region ARW. One or plural specific bands are controlled tobecome an area only for reproduction so that rewriting can not be made.

[0114] In the partial ROM disk as in FIG. 2B or 2C, a part of the bands0 to bands 15 becomes the ROM region AE of emboss bits, and a partthereof becomes the rewritable region ARW as a magneto-optical region orthe like.

[0115] A manufacturer side can freely determine how many bands in 16bands are made the rewritable area ARW and how many bands are made theROM area AE.

[0116] Although FIGS. 2B and 2c show the examples in which therewritable area ARW and the ROM area AE are divided at the innerperiphery side and the outer periphery side of the user area, therewritable area ARW and the ROM area AE may be formed over non-adjacentbands.

[0117] At the inner periphery side of the user area, a test zone, abuffer zone, an inner control zone, a buffer zone, and a GCP zone areprovided.

[0118] The GCP zone, the outer control SFP zone, and the inner controlSFP zone formed at the outer periphery and inner periphery of the userarea are made management areas in each of which predetermined controlinformation is recorded.

[0119] In the disk 90 as such partial ROM disk or RAM disk, informationas in examples of FIGS. 4 to 6 is recorded when the public terminal 1 isused.

[0120]FIG. 4 shows the ROM area AE of the user area as the partial ROMdisk (or write protected area in the RAM disk) at the upper side, andthe rewritable area ARW of the user area at the lower side, and furthershows information to be stored in each area.

[0121] Incidentally, although the user area is used in this embodiment,it is also conceivable that a format is set so that the illustratedinformation is recorded in the management area such as the control zone.Besides, the format as shown in FIG. 3 is also an example, and it is notalways necessary to set the disk 90 into the format as shown in FIG. 3.

[0122] First, in the case of FIG. 4, in the ROM area AE (or writeprotected area) of the disk 90, that is, in the area where the user cannot rewrite, an identification code indicating that the disk is a mediacorresponding to the public terminal 1 is recorded. In the case of thepartial ROM disk, the disk 90 is manufactured in such a state that thisidentification code is recorded in emboss bits.

[0123] Like this, by loading the public terminal 1 with the disk 90 ofthis embodiment in which the identification code corresponding to thepublic terminal is recorded, it becomes possible to edit file datarecorded in the disk 90, to upload data recorded in the disk, todownload contents or the like to the disk, and so on.

[0124] In this embodiment, as the disk 90 corresponding to the publicterminal 1, there is also a disk in which a backup ID as identificationinformation to specify a backup operation system described later isrecorded.

[0125] That is, the information is such that when information processing(file editing, preparation, etc.) is carried out in the public terminal1 by using the disk 90, identification is made on whether or not abackup operation of data is executed, and if executed, what backupoperation should be executed, and so on.

[0126] It is appropriate that such backup ID is written by the diskmanufacturer side according to, for example, the kind of applicationcontained in the disk 90.

[0127] As information recorded in the rewritable area ARW of the disk90, the media ID is first recorded.

[0128] This media ID is a code corresponding to a serial number of thedisk, that is, is a code given to each disk as a serial number justbefore the shipment of the disk 90 and becomes a number (media serialnumber) intrinsic to each disk.

[0129] Not only this media ID is written in the disk 90, but also, forexample, a code as the media ID is attached to a package or the like ofthe disk 90, so that the user who purchased the disk can know the codenumber as the media ID.

[0130] An area in which the user ID is recorded is arranged in therewritable area ARW, and as user ID, the user who purchased the disk 90sets arbitrary values or character lines and records them. This user IDhas a meaning of a personal identification number when the user uses thepublic terminal 1 by using the disk 90, that is, the user ID makes itpossible to allow only a person who knows the personal identificationnumber as the user ID to use the disk 90.

[0131] It is appropriate that record of the user ID to the disk 90 canbe made by the user from the public terminal 1 or the user's ownpersonal computer.

[0132] In the rewritable area ARW, there is provided an area in whichpayment registration information is recorded. This area includes arecord that this is a disk in which registration payment is madepossible when the user performs credit card payment registration to thepublic terminal management company 2 to make registration payment. Thispayment registration information can be recorded from, for example, thepublic terminal 1 or the computer owned by the user.

[0133] For example, it is designed such that when the user registers acredit card before the use of the public terminal 1, a registrationnumber is sent from the public terminal management company 2 to theuser. Then, when the disk 90 is used at the public terminal 1, it isconceivable to make such that when the user inputs the registrationnumber after loading the disk 90, a check processing is carried outbetween the public terminal 1 and the public terminal managementcompany, and if the check is OK, it is recorded that the disk is one inwhich registration payment is made possible.

[0134] Further, use record information and fee record information arerecorded in the rewritable area ARW.

[0135] The use record information is information of use contents or thelike each time the public terminal 1 is used with the disk 90, and eachtime the public terminal 1 is ended, and its contents are updated(addition of the use record) by the public terminal 1.

[0136] For example, there are recorded a use date of the public terminal1, an edited file name, a name of downloaded contents, application, orthe like, an uploaded file name, a name of an organization of a downloadsource, a name of an upload target, and so on.

[0137] For example, like this, the contents which the user has performedby using the public terminal 1 are respectively recorded in the userecord information. Of course, the contents are not limited to theexemplified contents, but if other processing contents can be made,those contents are also recorded. For example, in the case where dataprovided as contents are not downloaded to the disk 90, but the data areonly seen at the display section 11 of the public terminal 1, such ismade the use of the contents, and the name of the used contents, usestart time, use end time, and the like are recorded.

[0138] There is a case where plural pieces of information of the samecontent are recorded. For example, in the case where a plurality ofapplications are downloaded in the disk 90, the names of the respectiveapplications are recorded.

[0139] Next, the charge record information is information as to a fee tobe paid each time the public terminal 1 is used with the disk 90, andeach time the use of the public terminal 1 is ended, and its contentsare updated (addition of the fee record) by the public terminal 1.

[0140] As examples of the charge record information, for example, apublic terminal number set for each public terminal 1 to identify theused public terminal 1, and a public terminal use fee as a fee to bepaid for the use of the public terminal 1 are recorded. When the publicterminal 1 adopts a system in which accounting is carried out accordingto a use time, the use time is recorded together with the use fee.Besides, the method of payment selected by the user at the use is alsorecorded. That is, it is recorded whether payment is made by credit cardregistration or whether payment is made by insertion of a coin orprepaid card.

[0141] Further, as accounting contents according to the actual use ofthe public terminal, information corresponding to the use contents isrecorded.

[0142] For example, in the case where the user uses the public terminal1 to perform file edit or the like, and in the case where an applicationheld in the user's own disk 90 is started, the case is naturally free ofcharge since the application is owned by the user.

[0143] On the other hand, in the case where an application is startedfrom the hard disk drive in the public terminal 1 or the network 7, theuse fee of the application is required to the user (of course, there canbe an application provided without charge). In such a case, theapplication use fee is recorded. If a system in which accounting is madeaccording to the use time is adopted for the application use fee, theuse time is recorded together with the use fee.

[0144] Although not exemplified, with respect to data and contents aswell, in the case where one requiring a charge for its use is used, thecontents use fee and the data use fee are recorded.

[0145] That the user downloads an application, data, contents, and thelike into the user's own disk 90 has a meaning of purchase of so-calledsoftware.

[0146] Thus, in the case where the user downloads an application, data,contents, or the like and there is a charge for its provision, thedownload fee (purchase fee) is recorded.

[0147] Incidentally, together with the use fee and download fee of theapplication, data, contents, or the like, the provision source of theapplication, data, contents, or the like may be recorded.

[0148] For example, like this, the accounting contents when the useruses the public terminal 1 and makes execution are recorded in thecharge record information. Of course, there is a case where pluralpieces of information of the same content are recorded. For example, inthe case where a plurality of applications are downloaded into the disk90, the download fees as to the respective applications are recordedrespectively.

[0149] In the rewritable area ARW shown in FIG. 4, for example, asdescribed above, the media ID, the user ID, the payment registrationinformation, the use record information, and the charge recordinformation are recorded.

[0150] Although these pieces of information are recorded in therewritable region ARW, it is necessary to make such that these otherthan the payment registration information can not be freely rewritten bythe user.

[0151] First, write protection is made so that the media ID is put in astate where rewriting can not be made. It is appropriate that the userID is made such that rewriting can not be made after the user ID is oncewritten. The use record information and charge record information aremade such that only the public terminal 1 can make update. Such a caseis also conceivable that it is preferable to make rewriting of thepayment registration information impossible after it is once written.

[0152] It is conceivable that such rewriting management is realized bymanaging all or part of the media ID, the user ID, the paymentregistration information, the use record information, and the chargerecord information as an inaccessible file (hidden file which is notseen by the user) by, for example, the mode of a management file of thedisk 90 or a disk-oriented program at the side of the public terminal 1.

[0153] Besides, in order to improve security by means of the disk 90itself, that is, to make dishonest use of the disk 90 impossible, it isalso conceivable that all or part of the media ID, the user ID, thepayment registration information, the use record information, and thecharge record information is coded and recorded.

[0154] Although the information recorded in the ROM area AE (or writeprotected area) and the rewritable area ARW of the disk 90 is set asdescribed above, the remaining area in the rewritable area ARW is made ause area of the public terminal 1.

[0155] That is, the remaining area is used for record of a data fileedited by the public terminal 1, or as a storage area of downloadeddata, application, and the like.

[0156] On the other hand, as the ROM area AE, although only the sectionof the identification code area may be provided, such an example is alsoconceivable that a ROM area AE is also set in a section other than thesection of the identification code (and backup ID) area as shown in FIG.4, and an application and a setup system are recorded in this ROM areaAE.

[0157] For example, when the partial ROM disk or RAM disk is used, thereis also a case where it is necessary for the side of the user to carryout management of a defect area or a format processing to, for example,form file management information. In that case, when a format program(setup system) for executing the format is recorded in the disk, itbecomes possible to format the disk 90 even if the format program is notheld in the public terminal 1 or the personal computer owned by theuser.

[0158] Besides, as described above, although it is necessary for theuser side to input the user ID, if a program for writing the user ID isrecorded, it becomes possible to write the user ID by not only thepublic terminal 1 but also the personal computer owned by the user.

[0159] Further, as service to a purchaser of the disk 90, it isconceivable that applications as so-called bundle software are recordedso that the use of the public terminal 1 is made convenient.

[0160] Next, although an example of FIG. 5 is basically the same as FIG.4, in this example, a backup level ID is recorded in a rewritable areaARW.

[0161] As in the case of FIG. 4, in the case where the backup level IDis recorded in the ROM area AE, a disk manufacturer side normally writesit. Thus, there can be a case where a backup operation which a user, whopurchased the disk, does not desire is specified by the backup level ID.

[0162] Then, in this example, the backup level ID is recorded in therewritable area ARW so that the user can rewrite the backup level IDitself.

[0163] Further, in an example of FIG. 6, a plurality of backup level IDsare recorded.

[0164] For example, in the case where the side of the disk manufacturerrecords a plurality of application programs AP1, AP2 . . . in the ROMregion to provide the user with them, consideration is given to a backuplevel which becomes suitable at the time of information processing usingeach of the applications AP1, AP2 . . . , and the backup level IDcorresponding to each of the applications AP1, AP2 . . . is recorded.

[0165] Thus, for example, in the case where the user loads the publicterminal 1 with the disk 90 and executes information processing by usingthe application AP1, it is possible to make such that the backupoperation corresponding to the backup level ID for the application AP1is carried out.

[0166] Although not shown, for example, it is also possible for the userto set and record the backup level ID individually to an application ordata file which has been recorded in the rewritable area ARW byprocessing such as download.

[0167] It is not always necessary to make one-to-one correspondencebetween the backup level ID and the data file/application or the like,and various recording modes of the backup level ID are conceivableaccording to the circumstances of the disk manufacturer or the userside.

[0168] Besides, in each example, although the backup level ID isrecorded in the disk, even if the backup level ID is not recorded, aslong as the identification code indicating that the disk is a mediacorresponding to the public terminal 1 is recorded, the disk is made onewhich can be used in the public terminal 1.

[0169] Examples of processing of the public terminal 1 corresponding toeach of a disk in which the backup level ID is recorded and a disk inwhich the backup level ID is not recorded will be described later.

[0170] Incidentally, in this embodiment, although the disk media iscited as an example of the recording medium, for example, it is alsopossible to use other kinds of data writable recording medium such as anIC card and a memory cassette instead of the disk.

[0171] 3. Structure of Public Terminal

[0172]FIG. 7 shows an example of an outer appearance of the publicterminal 1.

[0173] This public terminal 1 is set at a store or the like on theassumption that the public use it. For example, in this example, thepublic terminal has the outer appearance similar to a normal publictelephone.

[0174] As shown in FIG. 7, a display section 11 using a liquid crystalpanel, a cathode ray tube (CRT) or the like is formed at the front uppersection of the public terminal 1, and various kinds of image display atthe use of the public terminal 1 are made.

[0175] In the case where the user uses the public terminal 1 as acomputer terminal, for example, an input section such as a keyboardbecomes necessary. In the case where the user uses' it as a telephone, apush dial key or the like becomes necessary. In this structural example,a mechanical input key such as a keyboard or a push dial key is notformed.

[0176] Although the detail will be described later, in this embodiment,there is provided a touch sensor mechanism (touch sensor 33 in FIG. 8)for detecting a position on the screen of the display section 11 whichthe user touches by a finger or the like. Further, display of akeyboard, display of a push dial key, and display of various requiredoperation buttons are made on the display section 11. That is, it isdesigned such that the user can execute various kinds of operation inputby carrying out operations of pressing each key on the image such as thekeyboard displayed on the display section 11.

[0177] However, of course, it does not matter if a mechanical input keysection such as a keyboard or an input mechanism such as a mouse isarranged. Further, it is also conceivable that a voice recognitionmechanism is provided to enable voice input.

[0178] When the public terminal 1 is used, there is a case where thedisk 90 owned by the user is loaded, and a disk tray 14 is provided as asection where this disk is loaded.

[0179] The disk tray 14 is pulled out from the inside of the unit whenthe user presses an eject key 13. In this state, the user puts the disk90 on the disk tray 14, and again operates the eject key 90, so thatsuch a state is realized that the disk tray 14 is housed. In this state,the disk 90 is placed in such a state that it is loaded in an insidedisk drive (disk drive 24 of FIG. 8), and recording and reproducingoperation to the disk 90 becomes possible in the public terminal 1.

[0180] In this public terminal 1, as the charge payment mode of theuser, as described above, the user can select payment by credit cardregistration, or payment by insertion of money, a prepaid card, or acredit card.

[0181] For the purpose of dealing with the payment by the insertion,there are provided a coin insertion section 15, a prepaid card insertionsection 16, and a credit card insertion section 17 as shown in thedrawing.

[0182] Incidentally, a coin return port 19 is arranged for returningchange, which is used in the case of the coin insertion.

[0183] This public terminal 1 is connected to both the network 7 and thetelephone line 8 of FIG. 1. It is designed such that the public terminalis connected to the telephone line 8 and is provided with the functionof a public telephone, so that it can be used as the public telephone aswell. A receiver-transmitter 18 as shown in the drawing is provided as ahandset used for a telephone call by a user.

[0184] The receiver-transmitter 18 is held in a state where it is hungon a hook, and in the case where the user uses the public terminal as atelephone to make a telephone call, the user picks up thereceiver-transmitter 18 from the hook and uses it.

[0185]FIG. 8 shows an inner structure of the public terminal 1.

[0186] A computer/network computer 20 (hereinafter referred to as acomputer 20) is a unit section in which the public terminal 1 executesvarious kinds of processing as a so-called computer, and is providedwith a CPU for executing arithmetic/control processing, a RAM section asa main storage area, a ROM section storing an OS (Operating System) andother programs, an interface function to each section in the publicterminal 1, an interface function to the network 7 and the telephoneline 8, and the like, any of which is not shown.

[0187] As an internal storage medium, a hard disk drive 21 is included.

[0188] Concerning the disk 90 loaded from the foregoing disk tray 14,contents and the like are recorded/reproduced in the disk drive 24.

[0189] The computer 20 instructs a tray drive section 22 to eject orhouse the disk tray 14 in response to pressing of the eject key 13, andin response to this, the tray drive section 22 drives a not-shown traymoving motor and a tray moving gear system to eject or house the disktray 14. For example, at the end of the use of the public terminal 1,even if the operation of the eject key 13 is not made, the computer 20instructs the tray drive section 22 to eject or house the disk tray 14.

[0190] The disk drive 24 executes a recording/reproducing operation tothe disk 90 loaded in the disk drive 24 in accordance with a read/writerequest from the computer 20.

[0191] That is, the computer 20 transmits a read command, read positionaddress, data length, and the like to the disk drive 24, so that thedisk drive 24 executes a reading operation according to the instruction,and transmits the read data to the computer 20. Besides, the computer 20transmits a write command, write position address, data length, filedata to be written, and the like to the disk drive 24, so that the diskdrive 24 executes a writing operation according to the instruction, andrecords the transmitted data file in the disk 90.

[0192] On the display section 11, as a monitor screen of so-calledcomputer processing/operation, a GUI image, a sentence under processingsuch as editing, images, and the like are displayed. The computer 20gives a display driver 25 information to be displayed, and the displaydriver 25 causes the display section 11 to make display.

[0193] Only the eject key 13 is disposed as a mechanical operation keyto the computer 20 on a box. Other input operation keys are displayed onthe display section 11, and the contents of operation input are detectedwith detection of a pressed position to the screen by the touch sensor33.

[0194] That is, the computer 20 causes the display section 11 to makekeyboard display, menu icon display, function key display, and the like,and monitors a pressed position of the user to the screen with the touchsensor 33.

[0195] The touch sensor 33 detects a position on the screen in a planedirection, for example, in x and y coordinates, and in the case wherethe user touches a place on the screen, the coordinate data thereof aresupplied to the computer 20.

[0196] When the coordinate data are supplied, the computer 20discriminates an operator (image such as a key) corresponding to theposition of the coordinate data in the content displayed on the displaysection 11. The computer judges that the operation content by thediscriminated operator has been inputted.

[0197] Thus, in the case where the computer 20 causes an image like akeyboard to be displayed on the display section 11, the user can performvarious kinds of input by touching each key of the keyboard on thescreen.

[0198] The same applies to the case of use as a telephone, and thecomputer 20 causes the display section 11 to display an image like apush dial key, so that the user can input a desired telephone number bypressing the push dial on the screen.

[0199] The public terminal 1 in this embodiment includes a LAN interface27, and is connected to the network 7. By this, the computer 20 canexecute data communication with each section connected to the network 7as shown in FIG. 1.

[0200] The computer 20 is connected to the telephone line 8 through amodem 29, so that data communication through the telephone line 8 isalso made possible. Further, a telephone circuit 28 and thereceiver-transmitter 18 are included, so that the use as a publictelephone is also made possible.

[0201] For example, when the computer 20 detects through the telephonecircuit 28 that the receiver-transmitter 18 is made to be off the hook(picked up by the user), it enters into a control mode as the publictelephone, causes the display section 11 to display the push dial, andcauses the telephone circuit 28 to call according to the operation tothe displayed push dial.

[0202] After the line is connected, the computer causes the telephonecircuit 28 to execute a normal telephone call operation, so that thepublic terminal functions as the public telephone.

[0203] Besides, in order to cope with coin insertion payment, the publicterminal 1 is provided with a coin processing section 30, which executescharge collection processing and return processing of change to the coininserted through the coin insertion section 15.

[0204] A prepaid card processing section 31 executes charge collectionprocessing with a prepaid card inserted through the prepaid cardinsertion section 16. For example, it executes processing of update ofmagnetic data of the prepaid card, punching, and the like according tothe charge to be collected.

[0205] When the public terminal 1 is used as the computer terminal, andin the case where payment by a coin or prepaid card is executed, thecomputer 20 transmits the information of the payment to the publictelephone management company 6 through the telephone line 8.

[0206] The credit card processing section 32 reads information of acredit card inserted through the credit card insertion section 17, andsupplies it to the computer 20. In this case, the computer 20 transmitsthe credit card information (card number) and information of use fees tothe credit card company 3 through the telephone line 8.

[0207] In the case where the user makes payment by credit cardregistration, that is, in the case where a credit card or the like isnot inserted in the public terminal 1, the processing at the coinprocessing section 30, the prepaid card processing section 31, and thecredit card processing section 32 is not carried out.

[0208] In that case, high level identification processing through, forexample, communication with the public terminal management company 2 isexecuted by using the media ID and the user ID recorded in the disk 90,the user ID and the personal identification number inputted by the user,and the like. If the identification result is OK, the user can use thepublic terminal 1, and accounting of use fees and the like is made tothe user as paperwork to the public terminal management company 2, thecredit card company 3, and the like.

[0209] Although the public terminal 1 is, for example, constructed asdescribed above, all of the structural elements are not alwaysnecessary, and a structural element not illustrated maybe provided. Forexample, in a type of unit which does not deal with insertion payment ofa credit card, the credit card insertion section 17 and the credit cardprocessing section 32 are not necessary.

[0210] As an example in which other structural elements are added, it isconceivable that a printer section is disposed and print output is madepossible at the use of the public terminal 1. Of course, a printer unitas a separate body from the public terminal 1 may be connected anddisposed.

[0211] Such an example is also conceivable that a CD-ROM drive isprovided.

[0212] Besides, a power amplifier and a speaker unit may be provided sothat the user can listen to music or the like as contents at that place.

[0213] Further, in the case where the use of the public terminal 1 ismade free of charge, the coin insertion section 15, the coin processingsection 30, the prepaid card insertion section 16, the prepaid cardprocessing section 31, the credit card insertion section 17, and thecredit card processing section 32 naturally become unnecessary.

[0214] 4. Type of Backup Operation System

[0215] Next, backup operation systems as types of backup operationcarried out in this embodiment will be described.

[0216] In this embodiment, it is designed such that as shown in FIG. 9,five backup operation systems of backup levels LV1 to LV5 can beselectively carried out.

[0217] The operation content and backup capacity of each of the backupoperation systems become as follows:

[0218] In the backup level LV1, the backup operation is not carried out.Of course, in the case where this backup level LV1 is selected, there isa high possibility that the data under operations are lost in such acase that hang-up of the public terminal 1 occurs.

[0219] In the backup level LV2, at the time when the user carries outediting/preparation at the public terminal 1, such an operation is madethat backup data of the data under operations are automatically andperiodically (every fixed time) saved. The storing place in this case ismade the HDD 21 in the public terminal 1.

[0220] In the case where this backup level LV2 is selected, since thedata under operations are periodically saved, for example, even if thesystem is reset in the case where hang-up of the public terminal 1occurs, it is possible to make data loss minimum.

[0221] In the backup level LV3, similarly to the backup level LV2, atthe time when the user carries out editing/preparation at the publicterminal 1, backup data of the data under operations are automaticallyand periodically (every fixed time) saved, and further, the data filebefore update (before operations) is also automatically saved. Forexample, in the case where such operations are carried out that a datafile is read from the disk 90 and the content of the file is edited, thedata file at the time point when it is read out is also saved forbackup. The storing place in this case is made the HDD 21 in the publicterminal 1.

[0222] In the case where the backup level LV3 is selected, since thedata under operations are periodically saved as in the case of thebackup level LV2, even in the case where hang-up of the public terminal1 occurs, data loss can be made minimum. Further, measures can be takeneven in the case where setting of a new file name is forgotten when afile edited by the user is saved.

[0223] For example, in the case where the user reads a file from thedisk 90 and edits the file to prepare a new file, let us imagine thatthe edited file has been recorded in the disk 90 erroneously as the filename of the read file without change. In this case, the original file isoverwritten and is deleted. However, by the operation of the backuplevel LV3, since the data of the original file are saved, the user canread out the backup file and record it in the disk 90. Like this, evenif the user makes a mistake in the storing operation, the lost file canbe revived.

[0224] At the backup level LV4, at the time when the user carries outediting/preparation with the public terminal 1, such operation isexecuted that all of key inputs under operations are automatically savedas backup data. The storing place is made the backup section 2 b of thepublic terminal management company 2 in addition to the HDD 21 in thepublic terminal 1. That is, all of the key inputs are recorded in theHDD 21 at all times, and are transmitted to the public terminalmanagement company 2 to be saved in the backup section 2 b.

[0225] In the case where this backup level LV4 is selected, sinceinformation of all the key inputs is saved for backup, even in the casewhere hang-up of the public terminal 1 occurs and reset is carried out,all of the file state just before the hang-up can be reproduced. Thatis, there is no data loss. Further, even in the case where the usernotices an error in the user's operations under the processing of editoperation or the like, it becomes possible to return to file contents ata desired stage.

[0226] Further, in addition to the hang-up, even in the case where theHDD 21 is crushed, or the public terminal 1 itself is put into such astate as malfunction or complete shutdown, files before the operationssuch as editing or under the operations can be reproduced from the datasaved at the side of the backup section 2 b.

[0227] Of course, even if there is a storing mistake of the user to thedisk 90 as set forth above, it is also possible to revive the lost file.

[0228] At the backup level LV5, in addition to the operation of thebackup level LV4, a final file after the operations is transmitted tothe public terminal management company 2 and is saved in the backupsection 2 b for a predetermined period.

[0229] In the case where this backup level LV5 is selected, similarly tothe case of the backup level LV4, high level backup capacity isprovided, and the final file (file prepared by the user in the editoperation or the like) is saved at the side of the public terminalmanagement company 2, so that the user can access the final file at alater time and at an arbitrary place.

[0230] For example, a file prepared by using some public terminal can beaccessed by another public terminal at a later time to be confirmed orto be saved in the disk 90. Moreover, even in a place where there is nopublic terminal 1 as in a foreign country, it becomes possible to accessthe public terminal management company 2 by using a personal computerexisting there and to read the saved file.

[0231] In the case where the final file is saved for backup at the sideof the public terminal management company 2 at the backup level LV5, thestorage period is also set. For example, it is designed such that whenthe user selects the backup level LV5, the storage period can be alsoselected, and the final file is saved in the backup section 2 b of thepublic terminal management company 2 for only the period.

[0232] At the backup levels LV4 and LV5, with respect to the data ofinput keys as well, it is possible to design such that the user can setthe storage period at the backup section 26. However, it is assumed thatthis is fixed at a definite period.

[0233] In this embodiment, the backup level ID recorded in the disk 90is the identification information indicating any one of the backuplevels LV1 to LV5. The identification information may containinformation of a storage period of a final file at the backup level 5.

[0234] Incidentally, use fees of the public terminal may be addedaccording to the backup capacity of each of the backup systems.

[0235] 5. Use Procedure

[0236] A use procedure of a user to the public terminal 1 in thisembodiment will be described. First, FIG. 10 shows the procedure of thecase where the public terminal 1 is used as a public telephone.

[0237] In the case where the public terminal is used as the telephone(S1), the user first picks up the receiver-transmitter 18 (S2). Althoughthe processing of the computer 20 of the public terminal 1 will bedescribed later in detail, in the case where the receiver-transmitter 18is picked up, the computer 20 judges that the user has an object to usethe public terminal as a telephone, and proceeds to a processcorresponding to that. For example, a push dial is displayed on thedisplay section 11.

[0238] As the procedure of the user, he or she subsequently makes feeinsertion (S3). That is, the user inserts a coin, prepaid card, orcredit card.

[0239] Then the user performs a dial operation to the push dialdisplayed on the display section 11, and makes a telephone call when theline is connected (S4).

[0240] When the telephone call is ended, the user puts thereceiver-transmitter 18 on the hook (S5). The computer 20 detects theend of the telephone call by that, and makes accounting processing toreturn the prepaid card or change. The user receives the card or change(S6), and ends the use.

[0241] Next, the procedure in the case where the user uses the publicterminal 1 as a computer terminal will be shown in FIG. 11.

[0242] In the case where the public terminal is used as the computerterminal (S10), the user can select a use mode of using a disk, theuser's own disk 90 in which a backup level ID is recorded, a use mode ofusing a disk, the user's own disk 90 in which a backup level ID is notrecorded, or a use mode of not using the disk 90.

[0243] First, the procedure of the case where the disk 90 is not used isas follows:

[0244] The user first selects the use as the computer terminal from theinitial screen displayed on the display section 11 of the publicterminal 1 (S11).

[0245] Then the public terminal 1 (the computer 20) enters into aprocessing mode as the computer use.

[0246] Next, the user performs an operation of selecting a backup levelaccording to the display screen (S12). That is, a screen on which thebackup levels LV1 to LV5 described with reference to FIG. 9 can beselected is displayed, and the user selects a desired backup level amongthem.

[0247] The user subsequently inserts a coin, prepaid card, or creditcard as the fee insertion processing. In the case where the user selectsthe payment by registration of a credit card, he or she inputs the userID or the like for the identification processing (S13). In the casewhere the use through the credit card registration payment is madeimpermissible when the disk 90 is not used, the input procedure of theuser ID or the like for the identification processing becomesunnecessary.

[0248] Subsequently, the user selects a function in accordance with thedisplay on the display section 11 (S14). In this embodiment, it isdesigned such that information retrieval using the public terminal 1 andupload of data can be made in the case where the disk 90 is not used. Ofcourse, functions other than these may be made executable.

[0249] In the case where information retrieval is to be executed, theuser selects the information retrieval in the function selectingprocedure, and carries out an actual information retrieval operation(S24). For example, it is possible to make retrieval from the network 7,and in the case where a data base is formed in the inside HDD 21, it ispossible to make information retrieval from the data base. The user canconfirm the retrieval result on the display section 11.

[0250] In the case where upload is to be executed, the user selects theupload in the function selecting procedure, and performs an actualoperation for the upload (S21). For example, the user prepares adocument at the public terminal 1, and can upload the document as anelectronic mail to the system through the public terminal 1 or thenetwork 7 (the upload processing in this embodiment includespreparation/editing of a file, an electronic mail, and the like to beuploaded).

[0251] Incidentally, when the file for the upload is prepared, thebackup operation selected at the foregoing procedure S13 is executed.

[0252] When these necessary processings are ended, the user performs anend operation, and receives the prepaid card inserted for charge payment(receives change in the case of the coin) (S25) and ends the use.

[0253] In the case where the disk with the backup level ID is used, theuser loads the disk 90 from the disk tray 14 to the public terminal 1(S15). Then the computer 20 judges that the user has an object to usethe public terminal as a computer terminal, and enters into a processingmode as the computer use. Incidentally, it is also possible to modifysuch that the user performs an operation to select the use as thecomputer terminal from the initial screen displayed on the displaysection 11, and thereafter, loads the public terminal with the disk 90.

[0254] As the fee insertion processing, the user inserts a coin, prepaidcard, or credit card. In the case where payment by registration of acredit card is to be carried out, the user inputs the user ID or thelike for identification processing (S16).

[0255] Subsequently, the user selects a function in accordance with thedisplay on the display section 11 (S17). In this embodiment, it isdesigned such that edit, information retrieval, upload, and download,which use the public terminal 1, can be executed in the case where thedisk is used.

[0256] In the case where the edit is to be executed, the user selectsthe edit in the function selecting procedure, and performs an actualedit operation (S22).

[0257] As the edit, it is possible to execute such processing that theuser accesses the data recorded in the disk 90, such as a document file,to edit it and saves the edited data in the disk 90, such processingthat the user newly prepares a document file etc. to save it in the disk90, and so on.

[0258] In such edit processing, while the file preparation/editing isexecuted, the backup operation at the backup level indicated by thebackup level ID recorded in the disk 90 is carried out.

[0259] In the case where information retrieval is to be carried out, theuser selects the information retrieval in the function selectingprocedure, and performs an actual information retrieval operation (S24).In this case, similarly to the foregoing case where the disk 90 is notused, for example, retrieval from the network 7 or information retrievalfrom the database formed in the inside HDD 21 can be made, and the usercan confirm the retrieval result on the display section 11.

[0260] In the case where upload is to be executed, the user selects theupload in the function selecting procedure, and performs an actualoperation for the upload (S21).

[0261] In this case, an object to be uploaded is a data file (variousfiles such as a document, music contents, video contents) previouslysaved in the disk 90, or a data file edited with the forgoing editfunction or newly prepared. These can be uploaded.

[0262] For example, a document file as an electronic mail can beuploaded to the system through the public terminal 1 or the network 7,or music or the like composed by the user as music contents can beprovided to the network 7.

[0263] In the upload processing, while the file preparation/editing isexecuted, the backup operation at the backup level indicated by thebackup level ID recorded in the disk 90 is carried out.

[0264] In the case where download is to be carried out, the user selectsthe download in the function selecting procedure, and performs an actualoperation for the download (S23).

[0265] In this case, as an object to be downloaded, the user can selectnecessary information (file, contents, application, etc.) in the publicterminal 1 or from the network 7, and can download arbitrary informationinto the user's own disk 90 by specifying the download object.

[0266] After these necessary processings are ended, the user performs anend operation, receives the prepaid card inserted for charge payment(receives change in the case of the coin) as the need arises (S25), andends the use. In the case of payment by credit card registration, it isalso acceptable to design such that the user receives a receiptindicating charged fees.

[0267] In the case where the user uses a disk in which the backup levelID is not recorded, the user first loads the disk 90 from the disk tray14 to the public terminal 1 (S18). Then the computer 20 judges that theuser has an object to use the public terminal as a computer terminal,and enters into a processing mode as the computer use.

[0268] Next, the user performs an operation to select a backup levelaccording to a display screen (S19). That is, the screen on which thebackup levels LV1 to LV5 described with reference to FIG. 9 can beselected is displayed, and the user selects a desired backup level amongthem.

[0269] The user subsequently inserts a coin, prepaid card, or creditcard as the fee insertion processing. In the case where the user selectspayment by registration of a credit card, he or she inputs the user IDor the like for identification processing (S20).

[0270] Subsequently, the user selects a function in accordance with thedisplay on the display section 11 (S17). The following processing is thesame as the case where the disk with the backup level ID is loaded.

[0271] However, in the processing of the edit (S22) or upload (S21), andin the case where the user performs file preparation/editing and thelike, the backup operation corresponding to the backup level selected atthe procedure S19 is carried out.

[0272] The user can use the public terminal 1 as the telephone or thecomputer terminal in, for example, the foregoing procedure of FIGS. 10and 11.

[0273] 6. Processing of Public Terminal

[0274] The processing of the computer 20 of the public terminal 1 forrealizing the use in the foregoing procedure and for executing variousprocessings according to the request by the user, including the desiredbackup operation, will be described with reference to the flowcharts ofFIGS. 18 to 22. Besides, examples of display screens on the displaysection 11 at the respective processings will be described withreference to FIGS. 12 to 15 and FIG. 20.

[0275] The public terminal 1 is on standby at a set place in a statewhere an initial screen is displayed on the display section 11 at stepF101.

[0276] An example of the initial screen is shown in FIGS. 12A and 12B.FIG. 12A shows an example in which, for the purpose of making the userrecognize that the public terminal can be used as a public telephone, apush dial display 11 a is shown, and for the purpose of making the userrecognize that the public terminal can be used as a computer terminal, acomputer use select display 11 b is shown.

[0277]FIG. 12B shows an example in which a use select display 11 c forfacilitating selection of telephone use or computer use is shown, sothat the user recognizes that these use modes can be selected. Ofcourse, various examples for the initial screen are conceivable otherthan these.

[0278] The computer 20 executes monitoring processing at steps F102,F103, and F104 in the state where such an initial screen is displayed atstep F101.

[0279] In the case where the computer 20 judges that the user has anobject to use a telephone, the computer proceeds from step F102 to stepF105. That the user has an object to use a telephone is judged bydetection of picking up of the receiver-transmitter 18 or by detectionof the user's operation of selecting the telephone to the initial screenas shown in FIG. 12B.

[0280] In the case where the computer 20 judges the object to be thetelephone use, the computer causes the display section 11 to display animage for a telephone at step F105. The computer 20 causes a push dialto be displayed as in an example of FIG. 13. In the case where theinitial screen is made a screen as shown in FIG. 12A, the screen may beused as it is.

[0281] Subsequently, as the fee insertion processing at step F106, thecomputer 20 monitors the fee insertion dealing processing of the coinprocessing section 30, the prepaid card processing section 31, or thecredit card processing section 32, and confirms that the user performsthe fee insertion as the procedure S3 in FIG. 10.

[0282] After confirming the fee insertion, the computer 20 proceeds tothe actual telephone call processing at step F107.

[0283] That is, the computer 20 causes the telephone circuit 28 to makedial calling in accordance with the dialing operation of the user to thedisplayed push dial, and when the line is connected, the computer causesthe telephone circuit 28 to execute a telephone call.

[0284] When the user ends the telephone call, he or she hangs thereceiver-transmitter 18 on the hook. When it is detected that thereceiver-transmitter 18 is put like that, the computer 20 proceeds fromstep F108 to F109, and makes processing corresponding to the telephonecall fee. That is, the computer 20 causes the accounting processing bythe coin processing section 30, the prepaid card processing section 31,or the credit card processing section 32 to be executed, and causes thereturn processing of the card or change to be executed as the needarises.

[0285] The operation as the telephone device is ended here, and thecomputer returns to step F101.

[0286] In the case where the public terminal 1 is used as the computerterminal, as described above, as the use procedure of the user, thereare a case where the disk 90 is loaded and a case where the disk is notloaded.

[0287] In the case where the disk 90 is not used, the user selects thecomputer use from the initial screen as shown in FIG. 12A or 12B.

[0288] In the case where such selecting operation is detected, theprocessing of the computer 20 proceeds from step F103 of FIG. 18 to stepF117 of FIG. 17 as shown by in the drawings.

[0289] First, at step F117, the computer 20 causes the display section11 to make display for backup level selection.

[0290] An example of a backup level selecting screen in this case isshown in FIG. 14C.

[0291] That is, the backup operation contents of the backup levels LV1to LV5 of FIG. 9 are displayed on the screen so that the user can selectone by a touch operation.

[0292] However, as in this case, when the disk 90 is not used, thebackup level LV3 is made impossible to be selected. That is, since thebackup level LV3 is such an operation that backup of file data beforeupdate, that is, file data read out from the disk 90 is made in additionto the operation of the backup level LV2, in the case where the disk 90is not used, it can not be applied. Thus, as shown in FIG. 14C, withrespect to the backup level LV3, display is made in the non-active state(of course, it does not matter if the level LV3 is not displayed).

[0293] The user makes selection by touching any one of display sectionsof the backup levels LV1, LV2, LV4 and LV5, and the computer 20 sets thebackup level selected in the processing at step F118 as the backupoperation to be executed.

[0294] In the case where the backup level LV5 is selected, a storageperiod of a final file in the public terminal management company 2 isset. Although not specified in the flowchart of FIG. 17, as processingin step F118, in the case where the backup level LV5 is selected, forexample, the screen for setting the storage period as shown in FIG. 14Bis displayed for setting of the storage period.

[0295] That is, keys necessary for the operation, such as a ten-key, acursor moving key, a decision key, and a cancellation key are displayed,so that the user inputs the storage period (date) in the server (publicterminal management company 2). The computer 20 sets the information ofthe storage period in response to the input.

[0296] Incidentally, as the selection of the storage period, it is alsopossible to design such that specific periods, for example, one week,two weeks, one month, three months, one year, and the like, are preparedso that the user selects one among them (the same applies to the case ofstep F115 described later).

[0297] When the backup level is set, the computer 20 proceeds to stepF119 and causes the display section 11 to display a screen for acomputer.

[0298] An example of the screen for the computer is shown in FIG. 15.For example, as in this example, the display region of the displaysection 11 is divided into upper and lower sections, and the uppersection is made a so-called monitor display 11 d and the lower sectionis made a keyboard display 11 e.

[0299] The monitor display 11 d is used for display of a monitor imageas a computer terminal, and the computer 20 causes, for example, a menuimage, a text or an image of a file itself to be processed, and variousicons to be displayed according to the progress of the processing.

[0300] On the other hand, the keyboard image 11 e is made an imagesimilar to a keyboard in a normal computer device, and this image issupplied to the user for a keyboard operation. That is, when the usertouches each key of the keyboard display 11 e, input of characters andcommands can be made similarly to a normal keyboard.

[0301] Subsequently, the computer 20 executes processing as to feeinsertion, for example, confirmation of insertion of a coin, prepaidcard, credit card, or the like, and the corresponding processing at stepF120. In the case where payment by registration of a credit card is madepossible and the user selects that, the computer 20 executes, forexample, an input request of a user ID or personal identificationnumber, an input processing, a check processing, and the like, as anecessary user authentication processing.

[0302] When the processing as to the fee insertion is ended, thecomputer 20 executes the function select processing at step F121. Forexample, the computer causes the monitor display 11 d at the displaysection 11 to show a function menu and urges the user to select.

[0303] Since this case is the use as the computer terminal in the casewhere the disk 90 is not loaded, the computer 20 prepares, for example,three options of information retrieval, upload, and end of use, as theoption of functions.

[0304] At steps F122, F123, and F124, the computer 20 waits forselection of the user.

[0305] In the case where the user selects the information retrieval, thecomputer 20 proceeds from step F123 to F125, and proceeds to the actualinformation retrieval processing. That is, the computer 20 proceeds withthe required processing in response to the touch operation of the userto the icon display, menu display, and the like on the keyboard display11 e and the monitor display 11 d at the display section 11, andexecutes the retrieval processing of information required by the user.The computer 20 executes also the communication processing through thenetwork 7 for retrieval as the need arises. Then the computer 20 causesthe monitor display section lid to show information as the retrievalresult, actually retrieved information, and the like.

[0306] When the retrieval processing is ended, the computer returns fromstep F126 to step F121.

[0307] In the case where the user selects the upload, the computer 20proceeds from step F124 to F127, and proceeds to the upload processing.That is, in response to the touch operation of the user to the icondisplay, menu display, and the like on the keyboard display 11 e and themonitor display 11 d at the display section 11, the computer 20 executesthe processing for document preparation by the user and the upload ofthe prepared document, etc. The destination of upload is the HDD 21 or apredetermined system or terminal through the network 7.

[0308] In the upload processing, although the user prepares the datafile to be uploaded in the public terminal 1, at this time, the backupoperation set at the foregoing step F118 is executed.

[0309] Processing for this in step F127 is shown in detail as steps F201to 212 of FIG. 16.

[0310] First, when the upload processing is started, the computer 20makes the processing branch off at step F201 according to the backuplevel set at step F201 (that is, set in accordance with the selectingoperation at step F118).

[0311] When the backup level LV1 is set, since the backup operation isnot executed, the computer 20 proceeds to step F204 directly.

[0312] When the backup level LV2 is set, the computer 20 starts a backuptimer to execute the periodic backup operation at step F202, andproceeds to step F204.

[0313] When the backup level LV4 or LV5 is set, the computer 20 executesthe operation setting to transmit all key inputs to the server (publicterminal management company 2) and to save them in the HDD 21 at stepF203, and proceeds to step F204.

[0314] As described above, the backup level LV3 is not set in this case.

[0315] The computer 20 executes present file preparation processing atstep F204. That is, the computer prepares file data such as a documentin response to the input of the user.

[0316] Moreover, in the case where the backup operation of the backuplevel LV4 or LV5 is set at step F203, the computer 20 saves all of thekey input data under the file preparation processing at step F204 in theHDD 21 at all times, and further, transmits them to the backup section 2b of the public terminal management company 2 through the network 7. Thebackup section 2 b stores the transmitted data for backup in response tothe transmission.

[0317] Under the file preparation processing, only in the case where thebackup timer is started at step F202 (that is, only in the case wherethe backup level LV2 is set), interruption processing occurs everypredetermined time interval on the basis of the backup timer.

[0318] In that case, the computer 20 proceeds from step F206 to F207,and executes the processing of saving the file data under preparation atthe point of time into the HDD 21. Then the computer returns from stepF208 to F204, and proceeds with the file preparation processing.

[0319] According to circumstances, there is also a case where a datawriting error to the HDD 21 occurs. In that case, the computer 20proceeds from step F208 to F209, transmits the file data to be saved tothe public terminal management company 2, and has the data saved in thebackup section 2 b. That is, even in the case where some disadvantageoccurs in the HDD 21, at least the backup data are saved in the backupsection 2 b, so that the certainty and reliability of the backupoperation are secured.

[0320] When the file preparation processing is ended, the usersubsequently performs an operation to cause the file data to beuploaded, and in that case, the computer 20 proceeds from step F205 toF210, and executes the upload operation control according to theinstruction of the user.

[0321] In the case where the backup level LV5 is set, the computer 20proceeds from step F211 to F212, transmits the final file, that is, theuploaded file data to the public terminal management company 2, and hasthe data saved in the backup section 2 b. At this time, the computersimultaneously transmits also the storage period information, which wasset by the user's input to the display as shown in FIG. 14B, to indicatethe storage period at the backup section 2 b. The backup section 2 bstores the final file only for the period specified by the storageperiod information. With respect to the key input information in thecase of the backup level LV4 and LV5, the backup section 2 b stores, forexample, only for a fixed period.

[0322] After the above processing is ended, the computer 20 proceeds tostep F128 of FIG. 17.

[0323] When it is judged that the upload processing is ended, thecomputer 20 returns to step F121.

[0324] In the case where the use as the computer terminal is ended, theuser selects the use end from the function selecting menu screen at stepF121. When detecting the operation, the computer 20 proceeds from stepF122 to F129, and first, at the point of time, executes processing todelete the backup data saved in the HDD 21 for this use. In the caseother than the backup level LV1, and in the case where an actual backupoperation is executed, some backup data are save in the HDD 21 at thepoint of time when the use is ended. Since anyone can use the publicterminal 1, it can not be said that the security is high for the HDD 21in the public terminal 1. Thus, it is not preferable to leave dataprepared (under preparation) by the user in the HDD 21 since there canbe a leak of personal information. Thus, at the end of the use, thebackup data in the HDD 21 are deleted.

[0325] Subsequently, the computer 20 executes the accounting processingat step F130. That is, the computer causes the accounting processing bythe coin processing section 30, the prepaid card processing section 31,or the credit card processing section 32 to be executed. Alternatively,in the case of payment by the credit card registration, the computertransmits the accounting information to the public terminal managementcompany 2.

[0326] The amount of money to be charged to the user is set according tothe use time and the processing content of the public terminal 1. Acharge may be added according to the backup level of the executed backupoperation. For example, the charge is added as a backup service fee suchthat when the backup level LV1 is set, there is no charge, when LV2 isset, 300 yen . . . when LV5 is set, 1000 yen. However, it is alsoconceivable that the backup service is made free of charge.

[0327] After the accounting processing is ended, at step F131, thecomputer causes the return processing of the card or change to beexecuted as the need arises.

[0328] Here, the computer 20 ends the operation as the computer terminalin the case where the disk 90 is not used, and returns to step F101 ofFIG. 18.

[0329] In the case where the user uses the disk 90 and uses the publicterminal 1 as the computer terminal, as described above, as the useprocedure of the user, the user first loads the disk 90. That is, whenthe user operates the eject key 13 to load the disk 90, the computer 20ejects the disk tray 14. When the user puts the disk 90 on the disk tray14 and again presses the eject key 13 (or pushes the disk tray 14), thecomputer 20 causes the disk tray 14 to be housed, whereby the recordingand reproducing of the disk 90 is enabled by the disk drive 24.

[0330] In the case where such insertion operation of the disk 90 isdetected, the computer 20 proceeds from step F104 of FIG. 18 to stepF110.

[0331] At step F110, the computer 20 instructs the disk drive 24 to readthe identification code for the public terminal in the disk 90, andconfirms the identification code. That is, the computer confirms whetherthe inserted disk is a disk suitable for the use of this public terminal1.

[0332] If the computer 20 judges that the disk does not correspond tothe public terminal 1 since the identification code can not be suitablyread, the computer proceeds from step F111 to F112, and instructs thetray driving section 22 to eject the disk tray 14, so that the disk isejected and the processing is ended. That is, the computer returns tostep F101.

[0333] In the case where the identification code is suitably confirmed,the computer 20 proceeds from step F111 to F113, and judges whether thebackup ID is recorded in the disk 90. Incidentally, it is satisfactoryif the reading of the backup ID from the disk 90 is simultaneouslyexecuted in the reading operation at step F110.

[0334] At step F113, the computer causes the process to branch offaccording to the existence of the backup ID.

[0335] In the case of the disk in which the backup ID is recorded, atstep F116, the computer sets the backup level indicated by the backup ID(one of LV1 to LV5). In the case where the backup level LV5 is indicatedas the backup ID, the storage period information is also recorded, andthe computer 20 reads the storage period information.

[0336] On the other hand, in the case of the disk in which the backup IDis not recorded, at step F114, the computer 20 causes the displaysection 11 to make display for backup level selection. An example of thebackup level selecting screen in this case is shown in FIG. 14A.

[0337] That is, it is designed such that the computer 20 causes thebackup operation contents of the backup levels LV1 to LV5 to be shown onthe screen, so that the user can select through a touch operation.

[0338] To such display, the user touches any one display section of thebackup levels LV1, LV2, LV3, LV4, and LV5 to make selection, and thecomputer 20 sets the backup level selected in the processing at stepF115 as the backup operation to be executed.

[0339] In the case where the backup level LV5 is selected, in order tomake the user select the storage period of the final file in the publicterminal management company 2, the computer causes, as the processing instep F115, a screen for setting the storage period to be displayed as inFIG. 14B.

[0340] That is, the computer 20 causes keys necessary for the operation,such as a ten-key, a cursor moving key, a decision key, and acancellation key to be shown, and urges the user to input the storageperiod (date) at the server (public terminal management company 2).According to the input by the user, the computer 20 sets the storageperiod information.

[0341] After the processing at step F116 or F115 is ended, as shown byin the drawing, the computer 20 proceeds to step F132 of FIG. 19.

[0342] At step F132, the computer 20 causes the display section 11 todisplay a screen for a computer. That is, similarly to the case of theforegoing step F119, the computer 20 provides a display as shown in FIG.15 to make such a state that the user can perform various operations forinformation processing and confirm a processing screen.

[0343] Subsequently, at step F133, the computer 20 executes theprocessing as to fee insertion, for example, executes confirmation ofinsertion of a coin, prepaid card, credit card, or the like and thecorresponding processing. In the case where payment by registration of acredit card is executed, the computer 20 executes, as a necessary userauthentication processing, for example, an input request of a user ID orpersonal identification number, an input processing, a check processing,and the like. The computer 20 can judge by, for example, confirming thecontent of the payment registration information (see FIG. 4) of the disk90 that the credit card registration payment is to be executed.

[0344] After the processing as to the fee insertion is ended, thecomputer 20 executes the function selecting processing at step F134. Forexample, the computer 20 causes the monitor display 11 d at the displaysection 11 to display the function menu and urges the user to select.

[0345] In this case, since the public terminal is used as the computerterminal in the case where the disk is loaded, the computer 20 prepares,as options of functions, for example, five options of edit, informationretrieval, upload, download, and end of use.

[0346] At steps F135, F136, F137, F138, and F139, the computer waits forselection by the user.

[0347] In the case where the user selects the information retrieval, thecomputer 20 proceeds from step F139 to F140, and proceeds to an actualinformation retrieval processing. That is, the computer 20 proceeds witha required processing in response to the touch operations of the user tothe key board display 11 e on the display section 11, or the icondisplay, menu display, etc. on the monitor display lid, and executes theretrieval processing of information to be requested by the user. Thecomputer 20 executes also communication processing through the network 7for retrieval as the need arises. Then the computer 20 causes themonitor display 11 d to display the information as the retrieval result,actually retrieved information, and the like.

[0348] When the retrieval processing is ended, the computer 20 returnsfrom step F141 to F134.

[0349] In the case where the user selects the download, the computer 20proceeds from step F136 to F146, and first displays a download objectselecting screen to urge the user to select.

[0350]FIGS. 20A and 20B show examples of the download object selectingscreen.

[0351] For example, FIG. 20(a) shows a screen for urging selection ofgenres of information to be downloaded, and the options of genres arearranged. Here, if the user makes a touch operation to select 1:Newspaper, the computer 20 displays specific names of newspapers asshown in FIG. 20(b) to request selection. To this, for example, in thecase where the user requests the download of the electronic newspaperissued by Tonan Newspaper Company, the computer selects 3: Tonannewspaper.

[0352] When such selection is completed, the computer 20 proceeds fromstep F147 to F148, and executes download of selected contents or thelike. That is, the computer 20 loads the selected contents from the HDD21 or the contents server 4 a or the like through the network 7, andwrites them in the disk 90.

[0353] By the download processing executed in this way, the user can getarbitrarily the selected information from the public terminal 1 by usingthe disk 90.

[0354] After ending the download processing, the computer 20 returnsfrom step F149 to F134.

[0355] In the case where the user selects the edit, the computer 20proceeds from step F138 to F142, and proceeds to the edit processing.That is, the computer 20 proceeds with the edit processing of the userin response to the touch operation of the user to the keyboard display11 e at the display section 11 or the icon display, menu display, or thelike on the monitor display 11 d. The computer 20 executes, for example,new preparation of a file such as a document, update of a data file readout of the disk 90, and so on, in response to the operation.

[0356] The computer 20 records the edited file to the disk 90 inresponse to the instruction of the user.

[0357] In this edit processing, the user makes such operations asediting on the basis of the data file stored in the disk 90, or newpreparation of the data file, and at this time, the backup operation setat the above step F116 or F115 is executed.

[0358] The processing for this in step F142 is shown in detail as stepsF301 to F313 in FIG. 21.

[0359] First, at the start of the edit processing, the computer 20 makesthe processing branch off according to the set backup level at stepF301.

[0360] When the backup level LV1 has been set, since the computer 20does not execute the backup operation, the computer proceeds to stepF204 directly.

[0361] When the backup level LV2 has been set, the computer 20 starts abackup timer for executing a periodic backup operation at step F302, andproceeds to step F305.

[0362] When the backup level LV3 has been set, the computer 20 firstsaves the data file read from the disk 90 into the HDD 21 at step F303,proceeds to step F302, starts the backup timer to execute the periodicbackup operation, and proceeds to step F305. In the case where the datafile is not read out at this point of time (for example, in the casewhere the user performs new preparation, and so on), since an object tobe saved does not exist at step F303, the computer 20 proceeds to stepF302 directly.

[0363] When the backup level LV4 or LV5 has been set, the computer 20transmits all of key inputs to the server (public terminal managementcompany 2) at step F304, and executes the operation setting to storethem in the HDD 21. Then the computer 20 proceeds to step F305.

[0364] At step F305, the computer 20 executes the present fileediting/preparation processing. That is, the computer 20 proceeds withediting/preparation of file data such as documents in response to theinput of the user.

[0365] Further, at step F304, in the case where setting of the backupoperation of the backup level LV4 or LV5 is made, the computer 20 savesall of the key input data into the HDD 21 at all times under the fileedit processing at step F305, and further, transmits them to the backupsection 2 b of the public terminal management company 2 through thenetwork 7. The backup section 2 b stores the transmitted data for backupin response to the transmission.

[0366] In the case where the backup level LV3 is set, for example, whennew file data are read out from the disk 90 under the file editprocessing, the computer 20 saves the contents of the read file data forbackup at that point of time into the HDD 21.

[0367] In the file preparation processing, only in the case where thebackup timer is started at step F302 (that is, only in the case wherethe backup level LV2 or LV3 is set), interrupt processing occurs everypredetermined time interval on the basis of the backup timer.

[0368] In that case, the computer proceeds from step F307 to F308, andexecutes the processing to save the file data under editing at thatpoint of time into the HDD 21. Then the computer returns from step F309to F305, and proceeds with the file edit processing.

[0369] Incidentally, similarly to the case described with reference toFIG. 16, in the case where a data writing error to the HDD 21 occurs bysome cause, the computer 20 proceeds from step F309 to F310, transfersthe file data to be saved to the public terminal management company 2,and has the data stored in the backup section 2 b.

[0370] When the file edit processing is ended, the user makes anoperation to save the file data in the disk 90. In that case, thecomputer 20 proceeds from step F306 to step F311, and records the fileafter completion of the edit in the disk 90 with a file name specifiedby the user.

[0371] Then the computer 20 proceeds to step F312, and in the case wherethe backup level LV5 is set, further proceeds to step F313, transmitsthe final file, that is, the file data recorded in the disk 90 to thepublic terminal management company 2, and has the data saved in thebackup section 2 b. At this time, the computer 20 simultaneouslytransmits the storage period information taken at step F116 or F115, andindicates the storage period at the backup section 2 b.

[0372] The backup section 2 b stores the final file only for the periodspecified by the storage period information. In this case as well, withrespect to the key input information in the case of the backup level LV4or LV5, the backup section 2 b stores it only for a specific period.

[0373] When the above processing is ended, the computer 20 proceeds tostep F143 in FIG. 19.

[0374] When judging that the edit processing is ended, the computer 20returns to step F134.

[0375] In the case where the user selects the upload in the functionselecting processing at step F134, the computer 20 proceeds from stepF137 to F144, and proceeds to the upload processing. That is, inresponse to the touch operation of the user to the display section 11,the computer 20 executes the upload of a data file (data file recordedin the disk 90) specified by the user, a file such as a newly preparedor edited document, or the like. The destination of upload is the HDD 21or a designated system or terminal through the network 7.

[0376] By this processing, it becomes possible for the user to uploadthe data written in the user's own disk 90 by using the public terminal1 or the user's own personal computer, or the data prepared at thatplace, and to supply them to a specific person or unspecified manypeople, and so on. For example, the user can transmit an electronic mailor can provide music, videos, documents, and the like prepared by theuser.

[0377] In this upload processing as well, in the case where there is anecessity, that is, in the case where the user performs preparation orediting of the data file, the backup operation set at step F116 or F115is executed.

[0378] In the case where the contents previously recorded in the disk 90are directly uploaded, it is not necessary to specifically make thebackup operation.

[0379] The processing in the step F144 including the case where thebackup operation is executed is shown in detail as steps F401 to F415 inFIG. 22.

[0380] At the start of the upload processing, the computer makes theprocessing branch off at step F401 according to the set backup level,executes a necessary processing among steps F402, F403, and F404according to the setting, and proceeds to step F405. These become equalto steps F301 to F304 in FIG. 21.

[0381] At step F405, the computer 20 executes an present fileediting/preparation processing. That is, the computer 20 proceeds withediting/preparation of file data such as documents in response to theinput of the user.

[0382] However, in the case where the user uploads the data file readout from the disk 90 directly, the actual operation of fileediting/preparation is not executed, and the user makes an uploadinstruction of the read data file. In that case, at step F405,substantial editing/preparation processing is not carried out, and thecomputer 20 proceeds from step F406 to F411. That is, in such a case,the backup operation in the editing/preparation processing is notexecuted.

[0383] In the case where some file editing/preparation is actuallyexecuted at step F405, and in the case where the backup operationsetting of the backup level LV4 or LV5 is made at step F404, thecomputer 20 saves all of the key input data in the HDD 21 at all timesunder the file edit processing, and further, transmits them to thebackup section 2 b of the public terminal management company 2 throughthe network 7. The backup section 2 b stores the transmitted data forbackup in response to the transmission.

[0384] In the case of the backup level LV3, in addition to storing atstep F403, in such a case that new file data are read from the disk 90under the file edit processing, the computer saves the contents of theread file data at that point of time for backup into the HDD 21.

[0385] Under the processing of file preparation, only in the case wherethe backup timer is started at step F402 (only in the case where thebackup level LV2 or LV3 is set), interrupt processing occurs everypredetermined time interval on the basis of the backup timer.

[0386] In that case, similarly to the case of steps F307 to F310 of FIG.16, the backup operation is executed every predetermined period in theprocessing of steps F407 to F410.

[0387] When the file preparation/editing processing is ended, the userperforms the operation of upload of the file data. In that case, thecomputer 20 proceeds from step F406 to F411, and executes the uploadprocessing of the file after completion of the preparation/editing tothe address specified by the user.

[0388] Then the computer 20 proceeds to step F412, and in the case wherethe backup level LV5 is set, further proceeds to step F413, transmitsthe final file, that is, the uploaded file data to the public terminalmanagement company 2, and has the data saved in the backup section 2 b.At this time, the computer 20 simultaneously transmits also the storageperiod information taken at the foregoing step F116 or F115, andindicates the storage period at the backup section 2 b.

[0389] In the backup section 2 b, the final file is stored only for theperiod specified by the storage period information. In this case aswell, with respect to the key input information in the case of thebackup level LV4 or LV5, the backup section 2 b stores it, for example,only for a specific period.

[0390] Subsequently, at step F414, the computer 20 judges whether theuploaded data file should be written in the disk 90.

[0391] If the data file read out from the disk 90 is uploaded withoutany edit, the computer 20 judges that writing is not necessary.

[0392] On the other hand, in the case where some edit is carried out ornew preparation is made, the computer 20 inquires the user of whether itshould be stored in the disk 90, and in the case where the user makes aninstruction of storage execution, the computer proceeds to step F415 andrecords the uploaded data in the disk 90.

[0393] When the above processing is ended, the computer 20 proceeds tostep F145 of FIG. 19.

[0394] When judging that the upload processing is ended, the computer 20returns from step F145 to F134.

[0395] In the case where the use as the computer terminal is ended, theuser selects the use end from the screen of the function selecting menuat step F134. In the case where the computer 20 detects the operation,the computer proceeds from step F135 to F150, and for the same purposeas the case of step F129 of FIG. 17, in the case where the computerexecuted the backup operation under the use, the computer deletes thebackup data in the HDD 21.

[0396] Subsequently, at step F151, the computer 20 executes theaccounting processing and the writing processing of use record into thedisk 90.

[0397] As the accounting processing, the computer 20 causes theaccounting processing by the coin processing section 30, the prepaidcard processing section 31, or the credit card processing section 32 tobe executed. Alternatively, in the case of payment of credit cardregistration, the computer 20 transmits the accounting information tothe public terminal management company 2. Further, the computer 20writes the fee record information (see FIG. 4) in the disk 90.

[0398] In this case as well, the fee charged to the user is determinedaccording to the use time of the public terminal 1 and the processedcontent. In the case where download is executed, the purchase fee of thecontents or the like is added.

[0399] Further, according to the backup level of the executed backupoperation, a predetermined amount of money may be added as a backupservice fee.

[0400] As the writing processing of the use record, the computer 20writes a use time, information of a used file, application, contents,and the like, and information of a purchased application, contents, andthe like, as the use record information, into the disk 90.

[0401] At step F152, the computer 20 executes the return processing ofthe disk 90, that is, drives the disk tray 14 to eject the disk 90, andcauses the return processing of the card or change to be executed as theneed arises.

[0402] Here, the computer 20 ends the operation as the computer terminalin the case where the disk 90 is used, and returns to step F101 of FIG.18.

[0403] Although the processing of the public terminal 1 is executed asdescribed above, this processing example is merely an example.

[0404] In the case where the public terminal 1 is a system which can beused without fee, it is needless to say that the fee insertionprocessing, accounting processing, and the like are not executed.

[0405] As is understood from the above processing example, in the casewhere backup is required at the use, that is, in the case where the userperforms preparation and editing of a data file in the public terminal1, since the backup operation is executed according to the set backuplevel, the safety of the data at the use is secured.

[0406] Besides, since the public terminal 1 displays the image for thetelephone operation or the image for the information processingoperation according to the use object of the user, that is, according tothe use as the telephone or the use as the computer, it is satisfactoryif the user makes operations in accordance with the displayed image, andthe user can easily make operations for action of each function.

[0407] Besides, by providing the touch panel operation system on thedisplay screen, it is unnecessary to dispose a number of operation keysand the like in the public terminal 1, so that simplification of thestructure of the terminal unit can be realized, and it is also possibleto make the operation of the user simple.

[0408] Particularly, that the push dial image or keyboard image for thetouch panel operation is displayed can make the operation easy tounderstand for the user.

[0409] Besides, if the computer 20 judges that the telephone is to beused when the user picks up the receiver-transmitter 18, and that thecomputer terminal is to be used when the user loads the disk 90, itbecomes unnecessary for the user to make even a selecting operation of ause object, so that simplicity is further increased.

[0410] Incidentally, as processing examples, further various examplesare conceivable.

[0411] For example, although the initial screen is displayed when thepublic terminal is not used in the former example, it is conceivablethat various displays are made when it is not used. Alternatively, it isconceivable that various image displays are made together with icons andthe like for selection as the initial screen.

[0412] For example, when such pictures as to function as a screen saver,pictures for various advertisements, image pictures according to the setplace, demonstration pictures, or the like are displayed, it is possibleto make the system more interesting and having high additional value.According to circumstances, it is also possible to make the user's usefee free of charge by keeping advertisement pictures displayed.

[0413] With respect to the screen for the computer, although one inwhich the keyboard display 11 e as shown in FIG. 15 is continuouslydisplayed is basically satisfactory, it is also conceivable that at thetiming when the input by the keyboard becomes unnecessary, the keyboarddisplay lie is made to disappear and the whole surface of the displaysection 11 is used as the monitor display 11 d.

[0414] The keyboard display 11 e may be enlarged or contracted to such asize that it is convenient for the user to use.

[0415] Further, as the keyboard image to be displayed, it is alsopossible to design such that the user can select various keyboardstandards (JIS, new JIS, etc.) so that a keyboard which is easy for theuser to use can be displayed.

[0416] In this embodiment, although the public terminal 1 can be usedeven if the disk 90 is not used, it is also possible to design such thatthe public terminal 1 can not be used if the disk 90 corresponding tothe public terminal 1 is not loaded.

[0417] 7. Modified Example

[0418] With respect to the backup operation which becomes the point ofthe present invention, various modified examples are conceivable. Thesewill be described below.

[0419] First, although the backup ID is recorded in some disk 90 in theformer example, when this backup ID is recorded in the rewritable areaARW as shown in FIG. 5, it is possible to enable the user to makerewriting, new setting, addition, and the like. That is, it becomespossible for the user to record a desired backup level as the backup ID,so that it is possible to make such that even if the backup levelselecting operation is not executed at the use of the public terminal 1,the backup operation desired by the user is executed.

[0420] Besides, as in FIG. 6, for example, in the case where the backupID is recorded correspondingly to each application, although notdescribed as processing of the public terminal 1 in the foregoingexample, when some application is started from the disk 90, it issatisfactory if the computer 20 automatically sets the backup level onthe basis of the backup ID corresponding to the application.

[0421] Of course, in the case where a plurality of backup IDs arerecorded for each application, data file, and the like, it is alsoconceivable that the user is made to be allowed to rewrite, newly set,or add the backup level ID.

[0422] Besides, in the foregoing example, in the case where the backuplevel ID is recorded in the disk 90, the backup level is automaticallyset on the basis of the backup ID. However, in that case as well, it isalso acceptable to enable the user to select the backup level.

[0423] For example, such a system is conceivable that at the stage ofstep F116 in FIG. 18, display is made to express that the backup levelcorresponding to the backup ID is set, and if the user makes anoperation of approval, automatic setting is directly made, and in thecase where the user desires modification, transition to the processingof step F114 is made so that the backup level selecting screen isdisplayed.

[0424] The same applies to the storage period information in the case ofthe backup level LV5, and even if the storage period information isrecorded in the disk 90, the user may perform such processing as tochange the storage period at the use.

[0425] Of course, in the disk 90, such a case is also conceivable thatalthough the backup ID indicating the backup level LV5 is recorded, thestorage period information is not recorded. In that case, it issatisfactory if such display as in FIG. 14B is made to request the userto set the storage period.

[0426] Further, it is also acceptable to enable the user to specify theperiod of storage of key input data executed at the backup level LV4 orLV5. On the contrary, it is also conceivable that the storage period ofthe final file at the backup level LV5 is made a fixed period so thatthe user is made to be unable to specify it.

[0427] Besides, as described in FIG. 1, although the public terminal 1in the foregoing example is made one which can communicate with thepublic terminal management company 2 through the network, the publicterminal 1 which is not connected to the network is also conceivable. Inthe backup operation in that case, it is satisfactory if only the insideHDD 21, for example, is made the destination of backup. It is sufficientif one of the backup levels LV1 to LV3, for example, can be selected.

[0428] Besides, in the foregoing example, the backup data in the HDD 21are deleted at the end of the use of the public terminal 1. However, itis also possible to consider such a processing example that deletion isnot carried out, and further, such a processing example that the user isinquired whether deletion should be done, and if an instruction ofdeletion is made, the deletion is executed.

[0429] Besides, in the foregoing example, as the backup operationsystems, the backup levels LV1 to LV5 are cited as examples. However, ofcourse, the number of backup operation systems to be selected, theoperation content of each backup operation system, and the like arevariously conceivable.

[0430] Further, such a processing example is also conceivable that thebackup operation system to be executed is made one kind, and the useronly selects whether or not the backup is executed, or that the backupoperation is executed irrespective of the user's intention.

[0431] Although modified examples of the present invention have beendescribed, modified examples of the processing and structure are furthervariously conceivable.

[0432] Particularly, backup operation timing, data as an object ofbackup, a storage medium as a destination of backup, and the like may besuitably set according to actual system specifications or setting, amanagement system, and the like.

[0433] As is understood from the above description, the presentinvention has the following advantages.

[0434] According to the present invention, when a computer terminal isused, data under an information processing operation or just before orafter the operation are backed up in one of or both of a terminal sidedata storage section and a server side data storage section with apredetermined backup operation system. Thus, even when the computerterminal is hanged, it is possible to prevent loss of the data under theoperation such as edit or just before or after the operation.

[0435] In the case where the data are backed up in the server side datastorage section, even if there occurs trouble of the computer terminal,crash of the terminal side data storage section, or the like, it ispossible to prevent the loss of the data.

[0436] Further, if the data before the operation is saved for backup,for example, even if there is a mistake of saving operation by the user,a necessary file can be revived. For example, when some file data areread out, are edited, and are saved as a new file in a recording medium,even if the original file data have been deleted by overwriting sincethe new file has been saved with the same file name as the originalfile, the original (prior to the operation) file data can be revivedsince the data are backed up.

[0437] Besides, if the data after the operation are backed up in theserver system, the file after the operation (that is, a new fileprepared by editing or new preparation) can be accessed at an arbitrarytime and an arbitrary place (any terminal unit capable of communicatingwith the server system, such as an arbitrary computer terminal), so thatthe convenience is extremely improved.

[0438] Besides, according to the invention, since a backup operationsystem, that is, timing of a backup operation, an object to be backedup, a destination of backup, and the like are set based onidentification information recorded in a removable recording medium.Thus, it is not necessary for the user to bother to select the backupoperation system at the use, and also a selection mistake does not occurby that. Thus, with respect to information processing using a file orapplication recorded in the recording medium, backup in the optimumbackup operation system is always executed.

[0439] Moreover, according to the invention, the identificationinformation recorded in the recording medium is made information toselect a specific backup operation system among a plurality of backupoperation systems (for example, a plurality of backup systems which thecomputer terminal can execute). Thus, it is possible to realizesimplification of the code system or the like as the identificationinformation, simplification of setting processing of the backup controlsection, and so on.

[0440] Moreover, according to the invention, since plural pieces ofidentification information are recorded in the recording medium, forexample, each identification information can also be made identificationinformation individually corresponding to each application or data filerecorded in the recording medium. Thus, it is also possible to set theoptimum backup operation system according to each application or datafile.

[0441] Moreover, according to the invention, since the backup operationsystem is set according to an instruction of the user through the inputsection, a backup operation desired by the user himself can be realizedaccording to working to be executed by the user or the importance offile content.

[0442] That the selection of the backup operation system on the basis ofinput through the input section is possible means that for example, evenif identification information to specify the backup system is recordedin the recording medium as in the above, a different backup operationsystem can be specified according to a request of the user.

[0443] Moreover, according to the invention, the user merely makes inputof selecting a specific backup operation system through the inputsection among a plurality of backup operation systems, and thespecifying operation of the backup operation system can be made simple.

[0444] Moreover, according to the invention, when the backup data aresaved in the server side data storage section, the storage period can bespecified. Thus, for example, during the period set according to theidentification information recorded in the recording medium or the inputof the user, files and the like can be backed up. For example, thestorage period can be set according to the content of the file or thecircumstances of the user.

[0445] Moreover, according to the invention, when the use of thecomputer terminal is ended, the data backed up in the terminal side datastorage section by the inside backup section are deleted. Thus, the datafile and the like edited/prepared by the user do not remain in thecomputer terminal after the use of the computer terminal, which canavoid danger (that is, a leak of personal information) due to the statethat the personal file or the like of the user is kept remaining in theso-called public unit. Thus, security of user information at the use ofthe system can be improved.

[0446] Moreover, according to the invention, it is possible to designsuch that a sum of money corresponding to the backup operation system ischarged to the user. That is, the charge collection corresponding to thecapacity of the executed backup operation (that is, corresponding to theservice level) becomes possible. For the user, such use becomes possiblethat in view of the content of the backup service and the fee, a desiredbackup operation is selected.

What is claimed is:
 1. A computer system comprising a server and acomputer terminal, said server and said computer terminal beingconnected to be capable of communicating with each other, wherein saidcomputer terminal comprises: data processing means for processing a datafile; communication means for communicating with said server; andcontrol means for executing an external backup operation to cause saidcommunication means to transmit said data file processed by said dataprocessing means as backup data to said server; and wherein said servercomprises: receiving means for receiving said data file as said backupdata transmitted from said communication means; and storage means forstoring said data file received by said receiving means.
 2. A computersystem according to claim 1, wherein: said computer terminal furthercomprises storage period specifying means for specifying a storageperiod of said backup data; and said communication means transmitsstorage period information indicating said storage period specified bysaid storage period specifying means to said server.
 3. A computersystem according to claim 2, wherein said server further comprisesstorage period control means for controlling said storage means so thatsaid backup data are saved in said storage means during said storageperiod indicated by said storage period information received by saidreceiving means.
 4. A computer system according to claim 1, wherein:said computer terminal further comprises drive means for driving aremoval recording medium in which backup identification information isrecorded; and said control means changes a system of said backupoperation based on said backup identification information recorded insaid removable recording medium.
 5. A computer system according to claim4, wherein said computer terminal further comprises accounting means forexecuting different accounting according to said system of said backupoperation by said control means.
 6. A computer system according to claim1, wherein: said computer terminal further comprises input means forinputting a user's instruction as to a system of said external backupoperation; and said control means changes said system of said externalbackup operation based on said user's instruction with said input means.7. A computer system according to claim 6, wherein said computerterminal further comprises accounting means for executing differentaccounting according to said system of said backup operation by saidcontrol means.
 8. A computer system according to claim 1, wherein: saidcomputer terminal further comprises internal storage means for storingsaid data file; and said control means executes an internal backupoperation to save said data file processed by said data processing meansas said backup data in said internal storage means.
 9. A computer systemaccording to claim 8, wherein: said computer terminal further comprisesdrive means for driving a removable recording medium in which backupidentification information is recorded; and said control means executessaid external backup operation and said internal backup operation basedon said backup identification information recorded in said removablerecording medium.
 10. A computer system according to claim 5, wherein:said computer terminal further comprises input means for inputting auser's instruction as to a system of said external backup operation; andsaid control means executes said external backup operation and saidinternal backup operation based on said user's instruction with saidinput means.
 11. A computer system according to claim 8, wherein saidcontrol means deletes said data file saved in said internal storagemeans when processing with said data file by said data processing meansis ended.
 12. A computer system according to claim 8, wherein saidcontrol means executes said external backup operation when said internalbackup operation has failed.
 13. A computer system comprising a computerunit and a removable recording medium removably loaded to said computerunit, wherein said removable recording medium comprises: a record mediummain body; and an information recording area provided in said recordingmedium main body, wherein backup identification information indicatingone of a plurality of backup systems is recorded in said informationrecording area; and wherein said computer unit comprises: dataprocessing means for processing a data file; detection means fordetecting said backup identification information from said removablerecording medium; and control means for backing up said data fileprocessed by said data processing means with backup system based on adetection result of said detection means.
 14. A computer systemaccording to claim 13, wherein: said computer unit further comprisesstorage period specifying means for specifying a storage period of saidbackup data; and said control means saves said data file during saidstorage period specified by said storage period specifying means.
 15. Acomputer system according to claim 14, wherein said computer unitfurther comprises accounting means for executing different accountingaccording to said backup system by said control means.
 16. A computersystem according to claim 13, wherein said control means deletes saidbacked up data file when processing with said data file by said dataprocessing means is ended.
 17. A computer terminal connected with aserver to be capable of communicating, comprising: data processing meansfor processing a data file; communication means for communicating withsaid server; and control means for executing an external backupoperation to cause said communication means to transmit said data fileprocessed by said data processing means as backup data to said server.18. A computer terminal according to claim 17, further comprisingstorage period specifying means for specifying a storage period of saidbackup data; wherein said communication means transmits storage periodinformation indicating said storage period specified by said storageperiod specifying means to said server.
 19. A computer terminalaccording to claim 17, further comprising drive means for driving aremoval recording medium in which backup identification information isrecorded; wherein said control means changes a system of said backupoperation based on said backup identification information recorded insaid removable recording medium.
 20. A computer terminal according toclaim 19, further comprising accounting means for executing differentaccounting according to said system of said backup operation by saidcontrol means.
 21. A computer terminal according to claim 17, furthercomprising input means for inputting a user's instruction as to a systemof said external backup operation; wherein said control means changessaid system of said external backup operation based on said user'sinstruction with said input means.
 22. A computer terminal according toclaim 21, further comprising accounting means for executing differentaccounting according to said system of said backup operation by saidcontrol means.
 23. A computer terminal according to claim 17, furthercomprising internal storage means for storing said data file; whereinsaid control means executes an internal backup operation to save saiddata file processed by said data processing means as said backup data insaid internal storage means.
 24. A computer terminal according to claim23, further comprising drive means for driving a removable recordingmedium in which backup identification information is recorded; whereinsaid control means executes said external backup operation and saidinternal backup operation based on said backup identificationinformation recorded in said removable recording medium.
 25. A computerterminal according to claim 23, further comprising input means forinputting a user's instruction as to a system of said external backupoperation; wherein said control means executes said external backupoperation and said internal backup operation based on said user'sinstruction with said input means.
 26. A computer terminal according toclaim 23, wherein said control means deletes said data file stored insaid internal storage means when processing with said data file by saiddata processing means is ended.
 27. A computer terminal according toclaim 23, wherein said control means executes said external backupoperation when said internal backup operation has failed.
 28. A computerunit comprising: detection means for detecting, from a removablerecording medium in which backup identification information indicatingone of a plurality of backup systems is recorded, said backupidentification information; data processing means for processing a datafile; and control means for backing up said data file processed by saiddata processing means with said backup system based on a detectionresult of said detection means.
 29. A computer unit according to claim28, further comprising storage period specifying means for specifying astorage period of said backup data; wherein said control means savessaid data file during said storage period specified by said storageperiod specifying means.
 30. A computer unit according to claim 29,further comprising accounting means for executing different accountingaccording to said backup system by said control means.
 31. A computerunit according to claim 28, wherein said control means deletes saidbacked up data file when processing with said data file by said dataprocessing means is ended.
 32. A recording medium removably loaded to acomputer unit, comprising: a recording medium main body; and a backupidentification information recording area formed on said recordingmedium main body; wherein backup identification information indicatingone of a plurality of backup systems of said computer unit is recordedin said recording area.
 33. A recording medium according to claim 32,further comprising an application recording area which is formed in saidrecording medium main body and in which plural pieces of applicationsoftware are recorded; wherein said backup identification information isrecorded for each of said plural pieces of application software in saidbackup identification recording area.
 34. A recording medium accordingto claim 32, wherein said recording medium main body includes arecordable area and a reproduction only area, and said backupidentification information recording area is formed in said reproductiononly area.
 35. A recording medium according to claim 32, wherein saidbackup identification information includes information indicating thatbackup is not performed and information indicating that backup isperformed.