Cellular phone system, cellular phone terminal, private information protection method, private information protection program and program recorded medium

ABSTRACT

A cellular phone terminal  103  can be connected to both of a wireless cellular phone base station  104  that is a public network and a wireless LAN access pint  101  that is a private wireless network to be used by particular users. When the cellular phone terminal  103  enters a wireless area  102  of the private wireless network, the cellular phone terminal  103  activates at least one part of at least one data processing functions of an address book function  103   a , a bookmark function  103   b  and a mailbox function  103   c  that handle private information for the cellular phone terminal  103 . On the other hand, when the cellular phone terminal  103  moves outside the wireless LAN area  102  like a cellular phone terminal  106 , at least one part of the function of the activated functions is non-activated or disabled. The activated/non-activated functions are differentiated depending on a plurality of the private wireless networks or the user of the cellular phone terminal.

BACKGROUND OF THE INVENTION

This application is based upon and claims the benefit of priority fromJapanese patent application No. 2006-143115, filed on May 23, 2006, thedisclosure of which is incorporated herein in its entirely by reference.

The present invention relates generally to a cellular phone system, acellular phone terminal, a private information protection method, aprivate information protection program and a program recorded medium,more specifically to a cellular phone system, a cellular phone terminal,a private information protection method, a private informationprotection program and a program recorded medium for protecting privateinformation stored in a cellular phone terminal.

Generally, a cellular phone terminal or a portable telephone terminalhas an address book function in which the user is able to search theaddress book of the cellular phone terminal for simply dialing a desiredtelephone number or sending an electronic mail.

Also, a cellular phone terminal has a mail box function for savingelectronic mail information of received electronic mails. Moreover, acellular phone terminal that is capable of gaining access to internetweb pages has a bookmark function to register web page URLs for enablingthe user to easily gaining access to his/her favorite web pages asdisclosed in the following non-patent documents 1 through 4:

Non-patent document 1: Handley, M., Schulzrinne, H., Schooler, E.,Rosenberg, J., “SIP: Session Initiation Protocol”, RFC 2543, March 1999

Non-patent document 2: Fielding, R., Gettys, J., Mogul, J., Frystyk, H.,Masinter, L., Leach, P., Berners-Lee, T, “Hypertext TransferProtocol-HTTP/1.1”, RFC 2616, June 1999

Non-patent document 3: Berners-Lee, T., Connolly, D., “Hypertext MarkupLanguage-2.0”, RFC 1866, November 1995

Non-patent document 4: Crispin, M., “INTERNET MESSAGE ACCESSPROTOCOL-VERSION 4 rev1”, RFC 2060, December 1996

However, registration numbers, telephone numbers, electronic mailaddresses, bookmark information, electronic mail information and thelikes included in the above-mentioned address, bookmark and mailboxfunctions are private information. In recent years, general public isincreasing conscious to protection of private information and it is asocial problem that such private information leaks when such cellularphone terminals are lost or stolen.

In order to avoid such problem, there are developed some cellular phoneterminals to restrict accessing to the address book and the mail box ordialing by means of password. However, such technique is not sufficientcountermeasure against leakage of private information in thatconsiderable burdens are imposed to the user for setting a password orfor manually switching to a security mode, which is sometimes failed bythe user. Additionally, a cellular phone terminal does not have enoughcapacity for a password.

Moreover, since mobile centrex is gaining popularity in recent years,cellular phone terminals that can be used also as extensions by awireless LAN in a company or the like are increasingly popular in abusiness field. Telephone numbers, mail address information andelectronic mail information included in the address book function insuch business use cellular phone terminals are clients' confidentialinformation. As a result, the leakage of such confidential informationcauses immeasurable impact.

SUMMARY OF THE INVENTION

In consideration of the above circumstances, it is an object of thepresent invention to provide a cellular phone system, a cellular phoneterminal, a private information protection method, a private informationprotection program and a program recording medium that are able toprevent leakage of private information in case when the cellular phoneterminal is lost or stolen by providing means so that the address bookfunction, the bookmark function or the mailbox function of the cellularphone terminal cannot be used by anyone other than the proper user ofsuch cellular phone terminal.

It is another object of the present invention to provide the cellularphone system, the cellular phone terminal, the private informationprotection method, the private information protection program and theprogram recording medium that achieve the primary object with minimumburden to the user.

According to an exemplary aspect of the invention, there is provided acellular phone terminal to be connected to both of a public wirelesscellular phone network available to general public users and a privatewireless network closed to be available to particular users, comprising:at least one data processing functions of an address book function, abookmark function and a mailbox function; activation means foractivating at least one part of the at least one data processingfunction of the data processing functions when the cellular phoneterminal enters the wireless area of the private wireless network; andnon-activation means for non-activating the at least one part of thefunction that is activated by the activation means when moving outsidethe wireless area of the private wireless network.

BRIEF DESCRIPTION OF THE DRAWINGS

For a more complete understanding of the present invention and theadvantages thereof, reference is now made to the following descriptiontaken in connection with the accompanying drawings in which thereference numbers indicate like features an wherein:

FIG. 1 shows the system configuration of a first exemplary embodiment ofthe cellular phone system according to the present invention;

FIG. 2 shows the system configuration of a second exemplary embodimentof the cellular phone system according to the present invention;

FIG. 3 shows the system configuration of a third exemplary embodiment ofthe cellular phone system according to the present invention;

FIG. 4 shows the system configuration of a fourth exemplary embodimentof the cellular phone system according to the present invention;

FIG. 5 is an exemplified chart to describe how a telephone number searchis conducted in the fourth exemplary embodiment of the cellular phonesystem according to the present invention;

FIG. 6 shows the system configuration of a fifth exemplary embodiment ofthe cellular phone system according to the present invention;

FIG. 7 is an exemplified chart to describe how a telephone number searchis conducted in the fifth exemplary embodiment of the cellular phonesystem according to the present invention;

FIG. 8 is an exemplified chart to describe how a bookmark search isconducted in the fifth exemplary embodiment of the cellular phone systemaccording to the present invention; and

FIG. 9 is an exemplified chart to describe how an e-mail informationsearch is conducted in the fifth exemplary embodiment of the cellularphone system according to the present invention.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

Now, exemplary embodiments of the cellular phone system of the presentinvention will be described in detail with reference to the accompanyingdrawings.

FIG. 1 shows the system configuration of the first exemplary embodimentof the cellular phone system according to the present invention. In FIG.1, FIG. 1 (A) shows an instance when a cellular phone terminal 103 islocated within a particular area of the private wireless network knownas a wireless LAN area 102 of a wireless LAN access point 101. On theother hand, FIG. 1 (B) shows an instance when a cellular phone terminal106 is located outside the wireless LAN area 102 but within the wirelesscell of a public cellular phone base station 104, that is, within thecellular phone area 105 of the public wireless cellular phone network.As shown in the system configuration in FIG. 1, the cellular phonesystem of this exemplary embodiment comprises a wireless LAN accesspoint 101, cellular phone terminals 103, 106 and the wireless cellularphone base station 104.

Although the wireless LAN area 102 in FIG. 1 is described as the servicearea of the wireless LAN access point 101 that is installed in acompany, it is not necessarily limited to the wireless LAN and may beany private wireless network that is installed, for example, in acompany or the like.

Similarly, although the cellular phone terminals 103 and 106 aredescribed in this particular exemplary embodiment to include three dataprocessing functions that handle private information, i.e., address bookfunctions 103 a-106 a, bookmark functions 103 b-106 b and mailboxfunctions 103 c-106 c, respectively, the present invention should not belimited to these three data processing functions but is effectivelyapplied to any functions that handle private information.

Each of the cellular phone terminals 103 and 106 is a terminal that canbe used in both of a public wireless cellular phone network that isusable in the cellular phone area 105 of the public wireless cellularphone base station 104 and the wireless LAN network that is usable inthe wireless LAN area 102 of the wireless LAN access point 101. As shownin FIG. 1 (A), the cellular phone terminal 103 may be located in theparticular area of the wireless LAN area 102 in, for example, a companyfor distinctive business use in the company. For this end, the cellularphone terminal 103 is set so that the three data processing functions ofthe address book function 103 a, the bookmark function 103 b and themailbox function 103 c are activated, thereby enabling the user of thecellular phone terminal 103 to use either one of the functions.Accordingly, the user is able to use, for example, the address bookfunction 103 a for conducting the search for any telephone numberregistered in the cellular phone terminal 103 and then calling thetelephone number.

On the other hand, the cellular phone terminal 106 is at a remotelocation from the wireless LAN area 102 but within the public area ofthe cellular phone area 105 in which general public users can use theircellular phone terminals. At this instance, the cellular phone terminal105 is set so that the three data processing functions of the addressbook function 106 a, the bookmark function 106 b and the mailboxfunction 106 c are inactive and the user of the cellular phone terminal106 is unable to use any one of the data processing functions.Accordingly, the user is unable to call any telephone number registeredin, for example, the address book function 106 a or reference to anytelephone number in the address book function 106 a.

If the cellular phone terminal 103 that was located within the wirelessLAN area 102 moves outside the particular area of the wireless LAN area102, all of the three data processing functions, i.e., the address bookfunction 103 a, the bookmark function 103 b and mailbox function 103 cthat handle private information are non-activated or disabled so thatthe user can no longer use such functions. On the contrary, if thecellular phone terminal 106 that was located outside the wireless LANarea 102 enters the wireless LAN area 102, the three data processingfunctions handling the private information, i.e., the address bookfunction 106 a, the bookmark function 106 b and the mailbox function 106c that were unable to be used are activated again so that the user canuse such functions.

In general, as shown in the wireless LAN area 102 in FIG. 1, thewireless LAN area is set in a company or the like. Because of arestricted entry in the plant of a company or watching by securitypersonnel or the like, it is not easy for unauthorized persons to enterthe plant of a company and use any functions of their cellular phoneterminals that handle private information. As a result, persons who usetheir cellular phone terminals in such wireless LAN area are most likelythe users of the cellular phone terminals or other proper users who arepermitted to use the cellular phone terminals.

On the contrary, if cellular phone terminals are, for example, lost orstolen and any persons other than their proper users may attempt to usethem, it is possible to prevent leakage of private information becausesuch persons are difficult to enter the wireless LAN area and handleprivate information using the functions of such lost or stolen cellularphone terminals.

In the particular exemplary embodiment, although each data processingfunction handling private information such as the address book function,the bookmark function and the mailbox function that are installed in thecellular phone terminal is described to be activated or disenabled(non-activated) depending on whether or not the cellular phone terminalis located in the wireless LAN area, it is possible to change the dataprocessing functions so that activation/non-activation of the dataprocessing functions is set by activation/non-activation means dependingon the user of the cellular phone terminal. In other words, at least oneof the data processing functions may be set to be activated by theactivation means or disabled by the non-activation means depending onthe user of the cellular phone terminal.

It is also possible to provide a plurality of wireless LAN areas so asto change the data processing functions to be restricted for eachwireless LAN area, at least a part of the data processing functions tobe restricted, or the information to be activated or non-activated, forexample, in the address book for each wireless LAN area. In other words,at least one part of function of at least one of the data processingfunctions that are activated by the activation means or disabled by thenon-activation means are changed depending on any one of the pluralityof private wireless networks. For example, in case of application in acompany, wireless LAN areas that can be entered are differentiateddepending on the user's position in the company, the degree ofprotecting individual private information is controlled for eachwireless LAN area in which the user enters.

The second exemplary embodiment is a cellular phone terminal providedwith both connection means for connecting to a public wireless cellularphone network that can be used by general public users and forconnecting to a private wireless network that particular users arepermitted to use as a closed network, wherein the cellular phoneterminal includes at least one of the following data processingfunctions

(a) an address book function,

(b) a bookmark function, and

(c) a mailbox function

as private information handling functions, and also a function fordownloading information as stored in at least one server of

(a) an address book server that stores address book information to beused in the address book function,

(b) a bookmark information server that stores bookmark information to beused in the bookmark function, and

(c) a mailbox server that stores electronic mail information to be usedin the mailbox function that can be connected from the private wirelessnetwork.

In the second exemplary embodiment, when the cellular phone terminalenters the area of the private wireless network, at least one part of atleast one of the three data processing functions is activated by theactivation means included in the cellular phone terminal, informationrelated to the users of the cellular phone terminal from at least oneserver of the three servers and/or at least one part of the informationcommon to each user is downloaded and stored in the cellular phoneterminal by the download means provided in the cellular phone terminal.On the other hand, when the cellular phone terminal exits outside thearea of the private wireless network, at least one part of theinformation of the server that is downloaded and stored in the cellularphone terminal by the download means is deleted by deleting meansprovided in the cellular phone terminal and at least one part of theactivated functions is disabled by non-activation means provided in thecellular phone terminal.

Now, this exemplary embodiment will be described in detail withreference to the drawings.

FIG. 2 shows the system configuration of the second embodiment of thecellular phone system according to the present invention. As shown inthe system configuration in FIG. 2, this embodiment of the cellularphone system comprises a network 202, a wireless LAN access point (WLANAP) 203, an address book server 204, a bookmark information server 205,a mailbox server 206 and a cellular phone terminal 208.

FIG. 2 shows the system configuration of the second exemplary embodimentof the cellular phone system. As shown in the system in FIG. 2, thecellular phone system in this particular embodiment comprises a network202, a wireless LAN access point (WLAN AP) 203, an address book server204, a bookmark information server 205, a mailbox server 206 and acellular phone terminal 208.

It is described that a wireless LAN area 209 in FIG. 2 is the servicearea of the wireless LAN access point 203 that is installed in acompany. However, it is to be noted that the present invention shouldnot be limited only to a wireless LAN but may be any private wirelessnetwork.

Similarly, this exemplary embodiment is described that the cellularphone terminal 208 is provided with three data processing functions,i.e., an address book function 208 a, a bookmark information function208 b and a mailbox function 208 c as private information handlingfunctions. However, it is to be noted that the present invention shouldnot be limited to the particular functions including such three dataprocessing functions but is effective to any functions that handleprivate information.

The cellular phone terminal 208 is a terminal that can be used in eitherone of the public wireless cellular phone network that is usable in thecellular phone area of the wireless cellular phone base station (notshown in FIG. 2) and the wireless LAN network that is usable in thewireless LAN area 209 of the wireless LAN access point 203 as shown inFIG. 2. As shown in FIG. 2, the cellular phone terminal 208 is locatedin a particular area of the wireless LAN area 209 installed, forexample, in a company and is in the distinctive condition to be used forthe business of the company.

In this instance, the cellular phone terminal 208 is set so that thethree data processing functions, i.e., the address book function 208 a,the bookmark function 208 b and the mailbox function 208 c areactivated. Accordingly, the user of the cellular phone terminal 208 isable to connect to the address book server 204, the bookmark informationserver 205 and the mailbox server 206 by way of the wireless LAN accesspoint 203 and the network 202 for downloading the user data (privateinformation) of the cellular phone terminal 208 and/or data common toany users. The cellular phone terminal 208 is in the condition that theuser is able to use the downloaded data. This means that as long as thecellular phone terminal 208 is in the wireless LAN area 209 the user isable to use, for example, the address book function 208 a for conductingthe search for any telephone number downloaded in the cellular phoneterminal 208 from the address book server 204 and calling the telephonenumber.

On the other hand, in an instance when the cellular phone terminal 208moves outside the wireless LAN area 209 of the wireless LAN access point203, the user data that is downloaded from the address book server 204,the bookmark information server 205 and the mailbox server 206 isdeleted and the three data processing functions handling privateinformation, i.e., the address book function 208 a, the bookmarkfunction 208 b and the mailbox function 208 c that were usable in thewireless LAN area 209 are non-activated. Either one of the dataprocessing functions is no longer available to the user of the cellularphone terminal 208. As a result, the user of the cellular phone terminal208 is unable to, for example, call any telephone number that isdownloaded in the address book function 208 a from the address bookserver 204 or make reference to any telephone number, thereby preventingprivate information from leaking in the similar manner as in the firstembodiment.

On the contrary, in an instance when the cellular phone terminal 208that was outside the wireless LAN area 209 enters the wireless LAN area209, the three data processing functions handling private information,i.e., the address book function, the bookmark function and the mailboxfunction that were not available are now activated. The cellular phoneterminal 208 can be connected to the address book server 204, thebookmark information server 205 and the mailbox server 206 by way of thewireless LAN access point 203 and the network 202 for enabling the userof the cellular phone terminal 208 to download the respective user data(private information) and/or any data common to all users for subsequentuse of the downloaded data.

Generally, as shown by an entry management area 201 in FIG. 2, thewireless LAN area 209 is installed in a company or the like where entryin its plant is restricted or watched by security personnel or the like.It is therefore difficult for anyone other than authorized users of thecellular phone terminal to enter the wireless LAN area 209 in suchcompany and use the functions of the cellular phone terminal fordownloading user data (private information) or the like on the user ofthe cellular phone terminal from the address book server 204, thebookmark information server 205 and the mailbox server 206 and use theuser data 8private information). Accordingly, it is most likely that theperson who uses the cellular phone terminal 208 in the wireless LAN area209 is the proper user of the cellular phone terminal or authorizedusers of such cellular phone terminal.

Activation or non-activation of the three data processing functions,i.e., the address book function, the bookmark function and the mailboxfunction that handle private information and then downloading ordeletion of user data (private information) from the address book server204, the bookmark information server 205 and the mailbox server 206 isdescribed to be made depending on whether the cellular phone terminalenters the wireless LAN area or moves outside the wireless LAN area inthis particular embodiment. However, it is possible to differently setthe activation/non-activation of the data processing functions or changethe information (user data) to be downloaded/deleted depending on theuser of the cellular phone terminal. In other words, change is made inat least one part of the function of at least one data processingfunctions that is activated by activation means or non-activated bynon-activation means depending on the user of the cellular phoneterminal. Alternatively, it is set to change at least one part of theinformation of the information (user data) to be downloaded/deleteddepending on the user of the cellular phone terminal.

It is also possible to provide a plurality of wireless LAN areas andchange the data processing functions to be restricted for each wirelessLAN area, differentiate at least one part of function of the dataprocessing functions to be restricted, change the information (userdata) to be downloaded/deleted, or change the information (user data) tobe downloaded/deleted, for example, in the address book for eachwireless LAN area. Moreover, it is possible to set so as to change atleast one part of the function of at least one data processing functionsor change at least one part of information of the information (userdata) to be downloaded/deleted depending on locations of the wirelessLAN areas. This means that at least one part of the function of at leastone data processing function of the data processing functions to beactivated by activation means or non-activated by non-activation meansis set differently depending on the plurality of private networks.Moreover, at least one part of the information of the information thatare stored by downloading by downloading means or deleted by deletingmeans is differentiated. In this instance, in case of the use, forexample, in a company in which different wireless LAN areas are prepareddepending on user's business position, it is possible to control thedegree of protection of the respective information for each wireless LANarea where the user enters.

The third exemplary embodiment of the present invention is the cellularphone system in which the cellular phone terminal is provided withconnection means for connecting to a public wireless cellular phonenetwork to be used by general public users and also to a privatewireless network to be used by particular users as a closed localnetwork, the cellular phone terminal is further provided with as aprivate information handling function at least one data processingfunction of:

(a) an address book function,

(b) a bookmark function, and

(c) a mailbox function

as well as a function for restoring or encrypting at least one ofinformation stored in the data processing functions after encryption.

In this particular exemplary embodiment, when the cellular phoneterminal enters the area of the private wireless network, at least onepart of information of at least one of the three data processingfunctions is activated by activation means provided in the cellularphone terminal and at least one part of information that is encryptedand stored is restored by restoration means that is provided in thecellular phone terminal for making it available to the cellular phoneterminal. On the other hand, when the cellular phone terminal movesoutside the area of the private wireless network, at least one part ofinformation that is restored by the restoration means is encrypted bythe encryption means that is included in the cellular phone terminal forstorage and at least one function of the functions that are activated bythe activation means is non-activated by the non-activation meansincluded in the cellular phone terminal.

Moreover, the cellular phone terminal of this particular embodimentcomprises an encryption key server that stores encryption key data forencrypting information to be stored in each data processing function orto restore the encrypted information. The cellular phone terminal mayincludes encryption key acquisition means for acquiring encryption keydata from the encryption key server for the cellular phone terminaluser. In case of restoring information stored in each data processingfunction after encryption by using the encryption key data that isacquired from the encryption key server, when storing the restoredinformation after encrypting such information again, it is possible toencrypt again at least one part of information of at least one of therestored information by using the same encryption key data that isacquired from the encryption key server by the encryption keyacquisition means at the time of restoration. Encryption may be made byusing encryption key data different from the one that is acquired by theencryption key acquisition means at the time of restoration.

Now, a detailed description of this particular exemplary embodiment willbe made hereunder with reference to the drawings.

FIG. 3 shows a system configuration of the third exemplary embodiment ofthe cellular phone system according to the present invention. As shownin the system configuration in FIG. 3, this particular embodiment of thecellular phone system comprises a network 302, a wireless LAN accesspoint (WLAN AP) 303, a key data server 310 and a cellular phone terminal308.

Although the wireless LAN area 309 in FIG. 3 will be described as aservice area of the wireless LAN access point 303 installed in acompany, it should not be restricted to a wireless LAN but may be aprivate wireless network installed, for example, in a company.

Similarly, although this particular exemplary embodiment will bedescribed that the cellular phone terminal 308 is provide with threedata processing functions, i.e., an address book function 308 a, abookmark function 308 b and a mailbox function 308 c as privateinformation handling functions, the present invention should not berestricted to such particular data processing functions and is effectivefor any function that handles private information.

The cellular phone terminal 308 is a terminal that can be used in eitherone of a public wireless cellular phone network usable in a cellularphone area of a wireless cellular phone base station that is not shownin FIG. 3 and a wireless LAN network usable in the wireless LAN area 309of the wireless LAN access point 303 in FIG. 3. As shown in FIG. 3, thecellular phone terminal 308 is located in a particular area so-calledthe wireless LAN area 309, for example, in a company and is in adistinctive condition to be used for the business of the company.

At this time, the cellular phone terminal 308 is in the condition thatthe three data processing functions of the address book function 308 a,the book mark function 308 b and the mailbox function 308 c areactivated. This means that the user of the cellular phone terminal 308is able to use any one of the data processing functions after restoringinformation stored in the address book, the bookmark and the mailbox byusing the encryption key data that is prepared in advance for the userof the cellular phone terminal 308 or by using the encryption key datafor the user of the cellular phone terminal 308 that is downloaded fromthe key data server 310 to be connected by way of the wireless LANaccess point 303 and the network 302. Accordingly, as long as the userremains in the wireless LAN area 309, he/she is able to use, forexample, the address book function 308 a and conduct a search for aparticular telephone number memorized in the cellular phone terminal 308in the restored condition and call the phone number.

On the other hand, when the cellular phone terminal 308 moves outsidethe wireless LAN area 309 of the wireless LAN access point 303,information restored using the encryption key data for the user of thecellular phone terminal 308 is encrypted again using the encryption keydata and stored in the address book, the bookmark and the mailbox. Thethree data processing functions of the address book function 308 a, thebook mark function 308 b and the mailbox function 308 c handling privatedata that were usable so far are now set to the non-activationcondition, thereby disabling the user of the cellular phone terminal 308to use anyone of the data processing functions. Accordingly, so long asthe user is outside the wireless LAN area 309, he/she is unable to callusing any telephone number registered in, for example, the address bookfunction 308 a or browse the telephone numbers, thereby preventingprivate information from leaking in the similar manner as the first andsecond embodiments.

When moving outside the wireless LAN area 309, it is possible to performencryption without newly acquiring the encryption key data from the keydata server 310 if encrypted information is stored in the address book,the bookmark and the mailbox by using the same encryption key data asused for restoration when entered the wireless LAN area. On the otherhand, in case of using any encryption data different from the one usedfor restoration when entering the wireless LAN area 309, protection forprivate information to be stored in the address book, the bookmark andthe mailbox will be enhanced. In this case, it is necessary to save thedifferent encryption data used for encryption in the key data server 310by way of the wireless LAN access point 303 and the network 302 inpreparation for the next entrance in the wireless LAN area.

On the contrary, when the cellular phone terminal that was outside thewireless LAN area 309 enters the wireless LAN area 309, the three dataprocessing functions of handling private information, i.e., the addressbook function, the bookmark function and the mailbox function that werenot usable are now activated. This means that the user of the cellularphone terminal is able to use anyone of the data processing functions byrestoring the information stored in the address book, the bookmark andthe mailbox using the encryption key data that is prepared in advancefor the user of the cellular phone terminal or an encryption key datafor the user of the cellular phone terminal that is downloaded from thekey data server 310 after connecting by way of the wireless LAN accesspoint 303 and the network 302.

Generally, as shown in the entrance/exit management area 301 in FIG. 3,the wireless LAN area 309 is installed in a company or the like whereanybody other than proper user of the cellular phone terminal isdifficult to enter the wireless LAN area 309 in such company forhandling the private information by utilizing the functions in thecellular phone terminals because of restricted entry into the plant ofsuch company or careful watching by security personnel or the like.Accordingly, it is most likely that persons who use the cellular phoneterminal in the wireless LAN area 309 are the proper user of thecellular phone terminal or other users permitted to use such cellularphone terminal.

It is described in this particular embodiment that activation ornon-activation of the three data processing functions of the addressbook function, the bookmark function and the mailbox function andsubsequent restoration or encryption of the information (privateinformation) stored in the address book, the bookmark and the mailbox isperformed depending on whether the cellular phone terminal is in thewireless LAN area or outside such area. It is to noted, however, thatthe data processing functions to be activated or non-activated and theinformation (user data) to be restored or encrypted may be set to differdepending on the user of the cellular phone terminal. In other words,out of at least one data processing functions that are activated by theactivation means or non-activated by the non-activation means dependingon the user of the cellular phone terminal, at least one part of suchfunctions is differentiated and at least one part of information of therestored/encrypted information (user data) may be differentiated.

It is also possible to provide a plurality of wireless LAN areas eachhaving different data processing functions to be restricted,differentiate at least one part of data processing functions to berestricted, differentiate information (user data) to berestored/encrypted, or differentiate information (user data) to berestored/encrypted in, for example, the address book. This means that atleast one part of the function of at least one of the data processingfunctions to be activated by the activation means or non-activated bythe non-activation means is set to be different depending on particularone of the plurality of private wireless networks. Moreover, it ispossible to differentiate at least one part of information of theinformation to be restored by the restoration means or encrypted by theencryption means. In this case, if it is the use in, for example, acompany, it is possible to enhance the protection of individualinformation for each wireless LAN area by differentiating the wirelessLAN areas that are permitted to enter depending on the business positionof the user in the company.

The fourth exemplary embodiment of the present invention comprises acellular phone terminal provided with means for connecting to a publicwireless cellular phone network usable by general public users and anaddress book server including means for connecting to a private networkusable by particular users as a closed network and means for connectingto a public telephone network to which a wireless cellular phone basestation of the public wireless cellular phone network or an IP network,wherein the cellular phone terminal calls the address book server andthen the address book server calls based on the address book informationstored in the address book server for relaying the call of the cellularphone terminal or transferring the call from the cellular phoneterminal.

Moreover, the cellular phone terminal may comprise at least one of

(a) a calling function using ISDN sub-address and

(b) a DTMF signal transmission function

and the address book server may select address book data in the addressbook server based on the received sub-address or the DTMF signal or by avoice recognition function to the received voice for controlling whereto call/transfer from the address book server. If the address bookserver receives a call from the cellular phone terminal havingparticular telephone numbers to prohibit the use of the addressinformation stored in the address book server or ID (identification)information such as telephone numbers not permitted to use, IP addressesor the like, it is possible to set not to use the address book data andalso not to call, relay/transfer from the address book server.

Now, the fourth exemplary embodiment will be described in detail withreference to the accompanying drawings.

FIG. 4 shows the system configuration of the fourth exemplary embodimentof the cellular phone system according to the present invention. Asshown in the system configuration in FIG. 4, the fourth exemplaryembodiment of the cellular phone system comprises an address bookmanagement system 401, a telephone network 404, a wireless cellularphone base station 405, cellular phone terminals 406, 407 and atelephone terminal 408. The address book management system 401 comprisesa network 402, an address book server 403 and a presence server 409. Thepresence server 409 is a presence device that registers currentlocations of users of the cellular phone terminals.

It is to be noted in this exemplary embodiment that the telephonenetwork 404 may be a VoIP (Voice over IP) that uses an IP network and aSession Initiation Protocol (SIP) for connecting a call.

The cellular phone terminal 406 has no telephone number data as theaddress book in the cellular phone terminal 406. As a result, in orderto use the address book function, firstly, it is necessary to call theaddress book server 403 in the address book management system 401 formaking connection to the address book server 403 by way of the wirelesscellular phone base station 405 and the telephone network 404. Theaddress book server 403 that is connected to the telephone network 404receives the call from the cellular phone terminal 406. A judgment ismade on the user of the cellular phone terminal 406 from the telephonenumber of the calling cellular phone terminal 406 and a search isconducted on the private information (user data) for the user in theaddress book. Then, the call of the cellular phone terminal 406 istransferred to the cellular phone terminal 407 or the telephone terminal408 that the user likes to call or alternatively such call from thecellular phone 406 is relayed by the address book server 403 to call thecellular phone terminal 407 or the telephone terminal 408.

Unexpectedly, if the cellular phone terminal 406 is lost or stolen, suchcase has immediately been registered in the address book server 403.When the address book server 403 is called by the cellular phoneterminal 406, leakage of private information is prevented by refusing toreceive the call by the address book server 403 or by prohibiting thesearch of the address book by the cellular phone terminal 406. In otherwords, if there is a call from the cellular phone terminal 406 toprohibit the use of the address information that is stored in theaddress book server 403 or non-permitted telephone number, the addressbook server 403 is able to set not to relay or transfer any call fromthe particular cellular phone terminal 406.

Moreover, if it is possible to recognize the location of the user of thecellular phone terminal 406 by means of, for example, entrancepermission to the plant, entrance/exit management or the like and reportit to the presence server 409 in the address book management system 401,the address book server 403 that receives a call from the cellular phoneterminal 406 asks the presence server 409 about the location of the userof the cellular phone terminal 406. After confirming whether user is inthe plant or not, a decision is made whether the search of the addressbook or transfer or relay of a call should be permitted or refused,thereby restricting any unauthorized use of the address book in casewhen the cellular phone terminal is lost or stolen.

Methods of searching a desired number for connecting the cellular phoneterminal 406 by the address book server 403 include the use of thesub-address of the ISDN, the use of the DTMF signal or by voicerecognition. Such search methods will be described further withreference to FIG. 5. FIG. 5 is a chart to describe one exemplifiedsearch method of telephone numbers in the fourth embodiment of thecellular phone system according to the present invention.

In FIG. 5, the cellular phone terminal 505 (corresponding to thecellular phone terminal 406 in FIG. 4) is connected to the address bookserver 502 (corresponding to the address book server 403 in FIG. 4) byway of the wireless cellular phone base station 504 and the telephonenetwork 503. Assuming in this instance that, for example, the user ofthe cellular phone terminal 505 likes to call a cellular phone terminalof “person A”, “aaaa (number)” is assigned to the address book server502 as the sub-address of the ISDN. Then, the address book server 502conducts a search of the address book for the user of the cellular phoneterminal 505 using the number “aaaa” for transferring to the telephonenumber for “person A” or relaying the call to “person A” and the call ofthe cellular phone terminal 505.

Similarly, as for the method of using the DTMF signal, if the user ofthe cellular phone terminal 505 likes to call, for example, “person B”,the cellular phone terminal 505 sends the DTMF signal “bbbb (number)” tothe address book server 502 by key operation. Then, the address bookserver 502 searches the address book of the user of the cellular phoneterminal 505 using the number “bbbb”, thereby transferring to thetelephone number of “person B” or relaying the call to “person B” andthe call of the cellular phone terminal 505.

Similarly, as for the method by voice recognition, if the user of thecellular phone terminal 505 likes to call, for example, “person C”,voice instructions such as “person C” or “cccc” are given to the addressbook server 502. Then, the voice recognition function of the addressbook server 502 recognizes the voice instructions and transfers to thetelephone number of “person C” or relays the call to “person C” and thecall the cellular phone terminal 505. Additionally, if voicecertification is made in the voice recognition, it is possible torestrict the use of the address book of the address book server 502 byany unauthorized user of the cellular phone terminal.

The fifth exemplary embodiment of the present invention is the cellularphone system comprising a cellular phone terminal including means forconnecting to an IP network by way of a public wireless cellular phonenetwork to be used by general public, an address book server includingmeans for connecting to the IP network by way of an HTTP server in aprivate network to be used by particular users as a closed network, abook mark information server including means for connecting to the IPnetwork by way of the HTTP server in a private network to be used byparticular users as a closed network, a mailbox server including meansfor connecting to the IP network by way of the HTTP server in a privatenetwork to be used by particular users as a closed network, and the HTTPserver connected to the IP network for disclosing information stored inthe address book server, the book mark information server and themailbox server in accordance with the HTTP (HyperText Transfer Protocol)protocol.

In this exemplary embodiment, the cellular phone terminal is connectedto the HTTP server for calling based on the telephone number informationas included in the address book server. Alternatively, it transmitselectronic mails based on the mail address information as included inthe address book server, makes an internet web connection based on thebook mark information as included in the book mark information server,or browses electronic mail information as included in the mailboxserver.

Moreover, if the cellular phone terminal is connected to the HTTPserver, the cellular phone terminal user certification is performed todecide whether or not information can be disclosed. It is possible notto disclose information to particular cellular phone terminal.

Now, the fifth exemplary embodiment of the present invention will bedescribed in detail hereunder with reference to the accompanyingdrawing.

FIG. 6 shows the system configuration of the fifth exemplary embodimentof the cellular phone terminal according to the present invention. Asshown in the system configuration in FIG. 6, this exemplary embodimentof the cellular phone system comprises a cellular phone privateinformation management system 601, an IP network 608, a telephonenetwork 609, a wireless cellular phone base station 610, cellular phoneterminals 611, 612 and a telephone terminal 613. The cellular phoneprivate information management system 601 comprises a network 602, anaddress book server 603, a bookmark information server 604, a mailboxserver 605, a presence server 606 and an HTTP server 607. The HTTPserver 607 in this particular exemplary embodiment is provided with acertification server 607 a for performing user certification.

It is to be noted in this exemplary embodiment that the telephonenetwork 609 may be a VoIP (Voice over IP) telephone that uses an IPnetwork and connects a call using an SIP (Session Initiation Protocol)protocol. In this case, the telephone network 609 may be integrated withthe IP network 608.

The cellular phone terminal 611 does not hold any data such as telephonenumber data as the address book, book mark information, electronic mailsor the like inside the cellular phone terminal 611. As a result, inorder to use such data, it is first required to connect to the HTTPserver 607 in the cellular phone private information management system601 by way of the wireless cellular phone base station 610 and the IPnetwork 608. The HTTP server 607 connected to the IP network 608receives a connection request from the cellular phone terminal 611 andstarts the certification server 607 a for performing user certificationof the cellular phone terminal 611 by means of, for example, a passwordor the like. If the connection of the cellular phone terminal 611 ispermitted by the certification server 607 a, the HTTP server 607discloses the user data (private information) on the user that is storedin the address book server 603, the bookmark server 604 and the mailboxserver 605 in accordance with HTTP or HTTPS protocol. It is possible touse the browsing technique by, for example, HTTP or HTTPS in thecellular phone terminal 611 for the way of disclosing such data. It isalso possible to provide the certification server 607 a separately fromthe HTTP server 607, thereby performing the user certification of thecellular phone terminal 611 by accessing the certification server 607 awhen the address book server 603, the bookmark information server 604 orthe mailbox server 605 when the cellular phone terminal 611 connectsthereto.

In an event that the cellular phone terminal 611 is lost or stolen, suchevent is immediately registered in the HTTP server 607. When the HTTPserver 607 receives a connection request from the cellular phoneterminal 611, the HTTP server 607 is able to refuse the connection fromthe particular cellular phone terminal or the connection request isrefused by user certification by the certification server 607 a, therebypreventing leakage of private information. In other words, the HTTPserver 607 is able to prohibit connection to the address book server603, the bookmark information server 604 or the mailbox server 605 oralternatively to refuse connection to the cellular phone terminal 611when there is a receiving call from the cellular phone terminal 611having the non-permitted telephone number. Moreover, it is possible thatthe address book server 603, the bookmark information server 604 or themailbox server 605 is prohibited to use the address book data stored inthe address book server 603, the bookmark information stored in thebookmark information server 604 or the electronic mail informationstored in the mailbox server 605 or alternatively refusing connection tothe cellular phone terminal 611 when there is a connection request fromthe cellular phone terminal 611 having the non-permitted telephonenumber by way of the HTTP server 607.

Furthermore, in case of registering the location of the user of thecellular phone terminal 611 in the presence server 606 in the cellularphone private information management system 601 by recognizing throughany method such as, for example, entrance/exit control or the like byentrance permission, etc., the HTTP server 607 that receives aconnection request from the cellular phone terminal 611 asks thepresence server 606 about the location of the user of the cellular phoneterminal 611. After confirming whether or not the user is in the plant,a decision will be made whether the information in the address book, thebookmark or the mailbox should be disclosed or refused, therebyrestricting the use of such private information in case when thecellular phone terminal 611 is lost or stolen. Instead of asking thepresent location of the user of the cellular phone terminal 611 by theHTTP server 607, it is also possible that the address book server 603,the bookmark information server 604 or the mailbox server 605 asks thelocation of the user and a decision is made whether the connection tothe cellular phone terminal 611 is permitted or refused based on thecurrent location of the user of the cellular phone terminal 611 that isregistered in the presence server 606 at the time of connection from thecellular phone terminal 611.

Now, a method of searching the address book server 603 or the bookmarkinformation server 604 for a desired telephone number that the cellularphone terminal 611 is connected will be described further with referenceto FIG. 7 in an example of the address book server 603. FIG. 7 is achart to describe one example of searching a telephone number in thefifth embodiment of the cellular phone system according to the presentinvention.

In FIG. 7, the cellular phone terminal 705 (corresponding to thecellular phone terminal 611 in FIG. 6) is connected to the HTTP server701 (corresponding to the HTTP server 607 in FIG. 6) by way of awireless cellular phone base station 704 and an IP network 703. Afterpassing the certification in the HTTP server 701, it is possible on thecellular phone terminal 705 to browse the address to contact each userof the cellular phone terminal 705 that is stored in an address bookserver 702 (corresponding to the address book server 603 in FIG. 6).

If the user of the cellular phone terminal 705 chooses one address for,for example, “person A” among many addresses that he/she browsed, theHTTP server 701 calls the telephone number of “person A” using, forexample, “phone to” in the HTML language. In this way, it is possible tocall the telephone number in the address book on the cellular phoneterminal 705 that is stored in the address book server 702 withoutsaving the telephone number information in the cellular phone terminal705. In other words, if described based on the system configuration inFIG. 6, one of the telephone numbers that are registered in the addressbook server 603 as private information of the user of the cellular phoneterminal 611 is selected and the telephone number that is described inthe HTML language “phone to” is transmitted to the IP network 608,thereby enabling to call the cellular phone terminal 612 or thetelephone terminal 613 by way of, for example, the telephone network609.

Subsequently, a method of searching a desired bookmark of the cellularphone terminal 611 in the bookmark information server 604 will bedescribed further with reference to FIG. 8. FIG. 8 is a chart todescribe an exemplified method of searching bookmarks in the fifthembodiment of the cellular phone system according to the presentinvention.

In FIG. 8, a cellular phone terminal 805 (corresponding to the cellularphone terminal 611 in FIG. 6) is connected to an HTTP server 801(corresponding to the HTTP server 607 in FIG. 6) by way of a wirelesscellular phone base station 804 and an IP network 803. After passingcertification by the HTTP server 801, it is possible on the cellularphone terminal 805 to browse bookmark information on the users of thecellular phone terminal 805 stored in a bookmark information server 802(corresponding to the bookmark information server 604 in FIG. 6) inaccordance with HTTP or HTTPS.

When the user of the cellular phone terminal 805 chooses a bookmarkinformation, for example, his/her “favorite A” from the browsed bookmarkinformation, the HTTP server 801 makes a connection to a web server ofhis/her “favorite A” described in, for example, “URL” in the HTMLlanguage. In this manner, it is possible to access the web server oninternet using the bookmark information on the cellular phone terminal805 that is stored in the bookmark information server 802 without savingthe bookmark information in the cellular phone terminal 805. In otherwords, if described using the system configuration in FIG. 6, any one ofthe bookmark information that is registered in the bookmark informationserver 604 as the private information for the user of the cellular phoneterminal 611 for transmitting the address information described in “URL”in the HTML language to the IP network 608, thereby enabling to accessto the web server on internet.

Now, a method of searching desired electronic mail information of thecellular phone terminal 611 by the mailbox server 605 is describedfurther with reference to FIG. 9. FIG. 9 is a chart to describe anexemplified method of searching electronic mail information in the fifthexemplary embodiment of the cellular phone system according to thepresent invention.

In FIG. 9, a cellular phone terminal 905 (corresponding to the cellularphone terminal 611 in FIG. 6) is connected to an HTTP server 901(corresponding to the HTTP server 607 in FIG. 6) by way of a wirelesscellular phone base station 904 and an IP network 903. After passingcertification in the HTTP server 901, it is possible to browse on thecellular phone terminal 905 electronic mail information on users of thecellular phone terminal 905 stored in a mailbox server 902(corresponding to the mailbox server 605 in FIG. 6) in accordance withHTTP, HTTPS or IMAP4 protocol.

When the user of the cellular phone terminal 905 chooses one of theelectronic mail information, for example, electronic mail 1 from thebrowsed electronic mail information, the HTTP server 901 reads out theelectronic mail 1 under the title of “Request for . . . .” stored in themailbox server 902 and transmits it to the cellular phone terminal 905in accordance with the HTTP, HTTPS or IMAP4 protocol. In this manner, itis possible to browse the electronic mail information on the cellularphone terminal 905 stored in the mailbox server 902 without saving theelectronic mail information in the cellular phone terminal 905. In otherwords, describing in the system configuration in FIG. 6, it is possibleto browse any desired electronic mail information in accordance withHTTP, HTTPS or IMAP4 protocol by choosing any one of the electronic mailinformation stored in the mailbox server 605 as the private informationof the user of the cellular phone terminal 611.

As described in greater detail hereinabove, the exemplary embodiments ofthe present invention are able to surely prevent private informationfrom leaking in an unexpected situation when the cellular phone terminalis lost or stolen. Also, the present invention provides theaforementioned advantage without causing any inconvenience to the userof the cellular phone terminal. Moreover, the present invention is ableto provide the aforementioned advantage with paying essentially noattention to private information protection by the user of the cellularphone terminal.

According to the present invention may provide the following featuredexemplary embodiments:

(1) A cellular phone terminal defined in the invention stated in theSummary, wherein the private network comprises a plurality of privatenetworks which differ in at least one part of the function of at leastone data processing function of the data processing functions to beactivated by the activation means and non-activated by thenon-activation means depending on the private networks.

(2) A cellular phone terminal defined in the invention stated in theSummary, wherein at least one part of the function of the at least onedata processing function of the data processing functions to beactivated by the activation means and non-activated by thenon-activation means differs.

(3) A cellular phone terminal to be connected to both of a publicwireless cellular phone network available to general public users and aprivate wireless network closed to be available to particular users,comprising: at least one data processing function of an address bookfunction, a bookmark function and a mailbox function; download means fordownloading and saving from at least one of an address book server thatstores address book information to be used in the address book function,a bookmark information server that stores bookmark information to beused in the bookmark function and a mailbox server that storeselectronic mail information to be used in the mailbox function theinformation relating to users of the cellular phone terminal and/or atleast one part of information common to all users when the cellularphone terminal enters the wireless area of the private wireless network;and deleting means for deleting at least one part of the informationthat is downloaded and saved by the download means when moving outsidethe wireless area of the private wireless network.

(4) A cellular phone terminal of the above (3), wherein the privatenetwork comprises a plurality of private networks that differ in atleast one part of the information to be downloaded and saved by thedownload means and deleted by the deleting means depending on theprivate wireless networks.

(5) A cellular phone terminal of the above (3), wherein at least onepart of the information of the information to be downloaded and saved bythe download means and deleted by the deleting means differs dependingon the user of the cellular phone terminal to be used.

(6) A cellular phone terminal to be connected to both of a publicwireless cellular phone network available to general public users and aprivate wireless network closed to be available to particular users,comprising: at least one data processing functions of an address bookfunction, a bookmark function and a mailbox function; restoration meansfor restoring at least one part of the information of at leastinformation of encrypted address book information, encrypted bookmarkinformation and encrypted electronic mail information when the cellularphone terminal enters the wireless area of the private wireless network;and encryption means for encrypting at least one part of the informationrestored by the restoration means when moving outside the wireless areaof the private wireless network.

(7) A cellular phone terminal to be connected to both of a publicwireless cellular phone network available to general public users and aprivate wireless network closed to be available to particular users,comprising: at least one data processing functions of an address bookfunction, a bookmark function and a mailbox function; encryption keyacquisition means for acquiring encryption key data for the user of thecellular phone terminal from an encryption key server that stores theencryption key data when the cellular phone terminal enters the wirelessarea of the private wireless network; restoration means for restoring atleast one part of the at least one information of the encrypted addressbook information, encrypted bookmark information and encryptedelectronic mail information using the encryption key data acquired bythe encryption key acquisition means; and encryption means forencrypting at least one part of the information restored by therestoration means.

(8) A cellular phone terminal of the above (7), wherein the encryptionkey data for encrypting at least one part of the restored at least oneinformation by the encryption means when moving outside the wirelessarea of the private wireless network is the same as or different fromthe encryption key data acquired by the encryption key acquisition meanswhen entering the wireless area of the private wireless network.

(9) A cellular phone terminal of either one of the above (6) to (8),wherein the private network comprises a plurality of private networksthat differ in at least one part of the information of the informationto be restored by the restoration means and encrypted by the encryptionmeans depending on the private wireless networks.

(10) A cellular phone terminal of either one of the above (6) to (9),wherein at least one part of the information to be restored by therestoration means and encrypted by the encryption means differsdepending on the user of the cellular phone terminal.

(11) A cellular phone terminal of either one of the above (3) to (10),wherein the private wireless network is a wireless LAN.

(12) A cellular phone system comprising at least a cellular phoneterminal provided with at least means for connecting to a wirelesscellular phone network available to general public users and an addressbook server to be connected to a wireless cellular phone network, apublic telephone network or an IP network available to general publicusers, wherein the address book server stores telephone numbers forcellular phone terminals or telephone terminals that each cellular phoneterminal likes to call, when the address book serve receives a call fromthe cellular phone terminal by way of the wireless cellular phonenetwork, the public telephone network or the IP network, a call is madeto the cellular phone terminal or the telephone terminal that thecellular phone terminal likes to call by way of the wireless cellularphone network, the public telephone network or the IP network forrelaying the call from the cellular phone terminal based on thetelephone numbers stored in the respective cellular phone terminal.

(13) A cellular phone system comprising at least a cellular phoneterminal including at least means for connecting to a wireless cellularphone network available to general public users and an address bookserver to be connected to a wireless cellular phone network, a publictelephone network or an IP network available to general public users,wherein the address book server stores telephone numbers of cellularphone terminals or telephone terminals that each cellular phone terminallikes to call, when the address book server receives a call from thecellular phone terminal by way of the wireless cellular phone network,the public telephone network or the I network, the call from thecellular phone terminal is transferred by way of the wireless cellularphone network, the public telephone network or the IP network based onthe telephone numbers stored in the respective cellular phone terminal.

(14) A cellular phone system of the above (12) or (13), wherein theaddress book server is able to search the telephone number that thecellular phone terminal likes to call by either an ISDN sub-address, aDTMF signal or voice information that is transmitted from the callingcellular phone terminal.

(15) A cellular phone system of either one of the above (12) to (14),wherein the address book server decides to permit or refuse the use ofthe address information stored therein and/or relaying or transferringthe call from the cellular phone terminal by the ID information of thecellular phone terminal from which a call is received.

(16) A cellular phone system of either one of the above (12) to (15),further comprising a presence device for registering the currentlocation of the user of each cellular phone terminal, and when receivinga call from the cellular phone terminal, the address book server decidesto permit or refuse relaying or transmitting a call from the addressbook server in response to the current location of the user of thecellular phone terminal registered in the presence device.

(17) A cellular phone system comprising at least a cellular phoneterminal including at least means for connecting to an IP network by wayof a wireless cellular phone network available to general public users,an address book server for storing as address book data telephonenumbers of cellular phone terminals or telephone terminals that eachcellular phone terminal likes to call, and an HTTP server connected tothe IP network and the address book server for performing datacommunication between the cellular phone terminal and the address bookserver in accordance with the HTTP or HTTPS protocol, characterized inthat when acquiring the address book data of the cellular phone terminalstored in the address book server, the cellular phone terminal isconnected to the HTTP server by way of the wireless cellular phonenetwork and the IP network for acquiring the address book data from theaddress book server by way of the HTTP server in accordance with theHTTP or HTTPS protocol.

(18) A cellular phone system comprising at least a cellular phoneterminal including at least means for connecting to an IP network by wayof a wireless cellular phone network available to general public users,a bookmark information server for storing the address of a web serverfor each cellular phone terminal as bookmark information, and an HTTPserver connected to the IP network and the bookmark information serverfor performing data communication between the cellular phone terminaland the bookmark information server in accordance with the HTTP or HTTPSprotocol, characterized in that when acquiring the bookmark informationof the cellular phone terminal stored in the bookmark informationserver, the cellular phone terminal is connected to the HTTP server byway of the wireless cellular phone network and the IP network foracquiring the bookmark information from the bookmark information serverby way of the HTTP server in accordance with the HTTP or HTTPS protocol.

(19) A cellular phone system comprising at least a cellular phoneterminal including at least means for connecting to an IP network by wayof a wireless cellular phone network available to general public users,a mailbox server for storing electronic mail information for eachcellular phone terminal, and an HTTP server connected to the IP networkand the mailbox server for performing data communication between thecellular phone terminal and the mailbox server in accordance with theHTTP or HTTPS protocol, characterized in that when acquiring theelectronic mail information for the cellular phone terminal stored inthe mailbox server, the cellular phone terminal is connected to the HTTPserver by way of the wireless cellular phone network and the IP networkfor acquiring the electronic mail information from the mailbox server byway of the HTTP server in accordance with the HTTP or HTTPS protocol.

(20) A cellular phone system of either one of the above (17) to (19),wherein the address book server, the bookmark server or the mailboxserver decides to permit or refuse the use of the address book datastored in the address book server, the bookmark information stored inthe bookmark information server or the electronic mail informationstored in the mailbox server by the ID information of the cellular phoneterminal that requests connection by way of the HTTP server.

(21) A cellular phone system of either one of the above (17) to (20),wherein the HTTP server decides to permit or refuse the connection tothe address book server, the bookmark server or the mailbox server bythe ID information of the cellular phone terminal from which a call isreceived.

(22) A cellular phone system of either one of the above (17) to (21),wherein at the time of connection from the cellular phone terminal, theaddress book server, the bookmark information server, the mailbox serveror the HTTP server is able to perform user certification of the cellularphone terminal.

(23) A cellular phone system of either one of the above (17) to (22),further comprising a presence device for registering the currentlocation of the user of each cellular phone terminal, and in case ofconnection from the cellular phone terminal, either the address bookserver, the bookmark information server, the mailbox server or the HTTPserver decides to permit or refuse connection to the cellular phoneterminal depending on the current location of the user of the cellularphone terminal as registered in the presence device.

(24) A private information protection method for protecting privateinformation stored in a cellular phone terminal that can be connected toboth of a public wireless cellular phone network available to generalpublic users and a private wireless network closed to be used byparticular users, wherein the cellular phone terminal activates at leastone part of function of at least one data processing functions of thedata processing functions including an address book function, a bookmarkfunction and a mailbox function when it enters the wireless area of theprivate wireless network, while non-activating at least one part of theactivated functions when it moves outside the wireless area of theprivate wireless network.

(25) A private information protection method for protecting privateinformation stored in a cellular phone terminal that can be connected toboth of a public wireless cellular phone network available to generalpublic users and a private wireless network closed to be used byparticular users, wherein the cellular phone terminal downloads andsaves information on the user of the cellular phone terminal from atleast one of an address book server that stores address book informationavailable to an address book function, a bookmark server that storesbookmark information available to a bookmark function and a mailboxserver that stores electronic mail information available to a mailboxfunction when entering a wireless area of the private wireless network,while deleting at least one part of the downloaded and saved informationwhen moving outside the wireless area of the private wireless network.

(26) A private information protection method for protecting privateinformation stored in a cellular phone terminal that can be connectedboth of a public cellular phone network available to general publicusers and a private wireless network closed to be used by particularusers, wherein the cellular phone terminal restores at least one part ofinformation of at least one information of encrypted address bookinformation, encrypted bookmark information and encrypted electronicmail information when entering the wireless area of the private wirelessnetwork, while encrypting at least one part of the restored informationwhen moving outside the wireless area of the private wireless network.

(27) A private information protection method for protecting privateinformation stored in a cellular phone terminal that can be connectedboth of a public wireless cellular phone network available to generalpublic users and a private wireless network closed to be used byparticular user, wherein the cellular phone terminal acquires encryptionkey data for the user of the cellular phone terminal from an encryptionkey server that saves the encryption key data and restores at least onepart of information of at least one of encrypted address bookinformation, encrypted bookmark information and encrypted electronicmail information when entering the wireless area of the private wirelessnetwork, while encrypting at least one part of the restored informationwhen moving outside the wireless area of the private wireless network.

(28) A private information protection method of the above (26) or (17),wherein the private wireless network comprises a plurality of privatewireless networks that differ in at least one part of information to berestored when entering the wireless area of the private wireless networkor encrypted when moving outside the wireless area depending on theplurality of the private wireless networks.

(29) A private information protection method of either one of the above(26) to (28), wherein at least one part of the information of theinformation to be restored when entering the wireless area of theprivate wireless network or encrypted when moving outside the wirelessarea is differentiate depending on the user of the cellular phoneterminal.

(30) A private information protection method for protecting privateinformation stored in a cellular phone terminal comprising at least thecellular phone terminal including at least means for connecting to an IPnetwork by way of a wireless cellular phone network available to generalpublic users, an address book server for storing as address book datatelephone numbers of cellular phone terminals or telephone terminalsthat each cellular phone terminal is to be connected and an HTTP serverconnected to the IP network and the address book server for performingdata communication between the cellular phone terminal and the addressbook server in accordance with the HTTP or HTTPS protocol, wherein foracquiring the address book data for the cellular phone terminal storedin the address book server, the cellular phone terminal is connected tothe HTTP server by way of the wireless cellular phone network and the IPnetwork and acquires the address book data from the address book serverby way of the HTTP server in accordance with the HTTP or HTTPS protocol.

(31) A private information protection method for protecting privateinformation stored in a cellular phone terminal in a cellular phonesystem comprising at least the cellular phone terminal including atleast means for connecting to an IP network by way of a wirelesscellular phone network available to general public users, a bookmarkinformation server for storing as bookmark information address of a webserver for respective cellular phone terminal and an HTTP serverconnected to the IP network and the bookmark information server forperforming data communication between the cellular phone terminal andthe bookmark information server in accordance with the HTTP or HTTPSprotocol, wherein for acquiring the bookmark information for thecellular phone terminal stored in the bookmark server, the cellularphone terminal is connected to the HTTP server by way of the wirelesscellular phone network and the IP network and acquires the bookmarkinformation from the bookmark information server by way of the HTTPserver in accordance with the HTTP or HTTPS protocol.

(32) A private information protection method for protecting privateinformation stored in a cellular phone terminal in a cellular phonesystem comprising at least the cellular phone terminal including atleast means for connecting to an IP network by way of a wirelesscellular phone network available to general public users, a mailboxserver for storing electronic mail information for respective cellularphone terminal, an HTTP server connected to the IP network and themailbox server for performing data communication between the cellularphone terminal and the mailbox server in accordance with the HTTP orHTTPS protocol, wherein for acquiring the electronic mail informationfor the cellular phone terminal stored in the mailbox server, thecellular phone terminal is connected to the HTTP server by way of thewireless cellular phone network and the IP network and acquires themailbox information from the mailbox server by way of the HTTP server inaccordance with the HTTP or HTTPS protocol.

(33) A private information protection program for achieving the privateinformation protection method of either one of the above (24) to (32) asa computer executable program.

(34) A program recording medium for storing the private informationprotection program of the above (33) in a computer readable recordingmedium.

While the invention has been particularly shown and described withreference to exemplary embodiments thereof, the invention is not limitedto those embodiments. It will be understood by those of ordinary skillin the art that various changes in form and details may be made thereinwithout departing from the spirit and scope of the present invention asdefined in claims.

1. A cellular phone terminal to be connected to both of a publicwireless cellular phone network available to general public users and aprivate wireless network closed to be available to particular users,comprising: at least one data processing functions of an address bookfunction, a bookmark function and a mailbox function; control activationmeans including activation means for activating at least one part of theat least one data processing function of the data processing functionswhen the cellular phone terminal enters the wireless area of the privatewireless network and non-activation means for non-activating the atleast one part of the function that is activated by the activation meanswhen moving outside the wireless area of the private wireless network.2. A cellular phone terminal according to claim 1, wherein the privatenetwork comprises a plurality of private networks which differ in atleast one part of the function of at least one data processing functionof the data processing functions to be activated by the activation meansand non-activated by the non-activation means depending on the privatenetworks.
 3. A cellular phone terminal of according to claim 1, whereinat least one part of the function of the at least one data processingfunction of the data processing functions to be activated by theactivation means and non-activated by the non-activation means differs.4. A cellular phone terminal according to claim 1, wherein the controlmeans comprises download means for downloading and saving from at leastone of an address book server that stores address book information to beused in the address book function, a bookmark information server thatstores bookmark information to be used in the bookmark function and amailbox server that stores electronic mail information to be used in themailbox function the information relating to users of the cellular phoneterminal and/or at least one part of information common to all userswhen the cellular phone terminal enters the wireless area of the privatewireless network; and deleting means for deleting at least one part ofthe information that is downloaded and saved by the download means whenmoving outside the wireless area of the private wireless network.
 5. Acellular phone terminal according to claim 1, wherein the control meanscomprises restoration means for restoring at least one part of theinformation of at least information of encrypted address bookinformation, encrypted bookmark information and encrypted electronicmail information when the cellular phone terminal enters the wirelessarea of the private wireless network; and encryption means forencrypting at least one part of the information restored by therestoration means when moving outside the wireless area of the privatewireless network.
 6. A cellular phone terminal of claim 1, wherein thecontrol means comprises encryption key acquisition means for acquiringencryption key data for the user of the cellular phone terminal from anencryption key server that stores the encryption key data when thecellular phone terminal enters the wireless area of the private wirelessnetwork; restoration means for restoring at least one part of the atleast one information of the encrypted address book information,encrypted bookmark information and encrypted electronic mail informationusing the encryption key data acquired by the encryption key acquisitionmeans; and encryption means for encrypting at least one part of theinformation restored by the restoration means.
 7. A cellular phonecomprising: at least a cellular phone terminal including at least meansfor connecting to a wireless cellular phone network available to generalpublic users and an address book server to be connected to a wirelesscellular phone network, a public telephone network or an IP networkavailable to general public users, wherein the address book serverstores telephone numbers of cellular phone terminals or telephoneterminals that each cellular phone terminal likes to call, when theaddress book server receives a cell from the cellular phone terminal byway of the wireless cellular phone network, the public telephone networkor the I network, the cellular phone terminal is transferred by way ofthe wireless cellular phone network, the public telephone network or theIP network based on the telephone numbers stored in the respectivecellular phone terminal.
 8. A cellular phone terminal according to claim7, wherein the address book server is able to search the telephonenumber that the cellular phone terminal likes to call by either an ISDNsub-address, a DTMF signal or voice information that is transmitted fromthe calling cellular phone terminal.
 9. A cellular phone systemaccording to claim 7, wherein the address book server decides to permitor refuse the use of the address information stored therein and/orrelaying or transferring the call from the cellular phone terminal bythe ID information of the cellular phone terminal from which a call isreceived.
 10. A cellular phone system according to claim 7, furthercomprising a presence device for registering the current location of theuser of each cellular phone terminal, and when receiving a call from thecellular phone terminal, the address book server decides to permit orrefuse relaying or transmitting a call from the address book server inresponse to the current location of the user of the cellular phoneterminal registered in the presence device.
 11. A cellular phoneterminal according to claim 7, wherein the address book server decidesto permit or refuse the use of the address book data stored in theaddress book server by the ID information of the cellular phone terminalthat requests connection by way of the AHTTP server.
 12. A cellularphone system according to claim 7, wherein the HTTP server decides topermit or refuse the connection to the address book server, the bookmarkserver or the mailbox server by the ID information of the cellular phoneterminal from which a call is received.
 13. A cellular phone systemaccording to claim 7, wherein at the time of connection from thecellular phone terminal, the address book server is able to perform usercertification of the cellular phone terminal.
 14. A cellular phonesystem according to claim 7, further comprising a presence device forregistering the current location of the user of each cellular phoneterminal and in case of connection from the cellular phone terminal, theaddress book server decides to permit or refuse connection to thecellular phone terminal depending on the current location of the user ofthe cellular phone terminal as registered in the presence device.
 15. Aprivate information protection method for protecting private informationstored in a cellular phone terminal that can be connected to both of apublic wireless phone network available to general public users and aprivate wireless network closed to be used by particular users, whereinthe cellular phone terminal activates at least one part of function ofat least one data processing functions of the data processing functionsincluding an address book function, a bookmark function and a mailboxfunction when it enters the wireless area of the private wirelessnetwork, while non-activating at least one part of the activatedfunctions when it moves outside the wireless area of the privatewireless network.
 16. A private information protection program forachieving the private information protection method of claim 15 as acomputer executable program.
 17. A program recording medium for storingthe private information protection program of claim 16 in a computerreadable recording medium.
 18. A cellular phone system comprising atleast a cellular phone terminal including at least means for connectingto an IP network by way of a wireless cellular phone network availableto general public users, an address book server for storing as addressbook data telephone numbers of cellular phone terminals or telephoneterminals that each cellular phone terminal likes to call, and an HTTPserver connected to the IP network and the address book server forperforming data communication between the cellular phone terminal andthe address book server in accordance with the HTTP or HTTPS protocol,characterized in that when acquiring the address book data of thecellular phone terminal stored in the address book server, the cellularphone terminal is connected to the HTTP server by way of the wirelesscellular phone network and the IP network for acquiring the address bookdata from the address book server by way of the HTTP server inaccordance with the HTTP or HTTPS protocol.
 19. A cellular phone systemcomprising at least a cellular phone terminal including at least meansfor connecting to an IP network by way of a wireless cellular phonenetwork available to general public users, a bookmark information serverfor storing the address of a web server for each cellular phone terminalas bookmark information, and an HTTP server connected to the IP networkand the bookmark information server for performing data communicationbetween the cellular phone terminal and the bookmark information serverin accordance with the HTTP or HTTPS protocol, characterized in thatwhen acquiring the bookmark information of the cellular phone terminalstored in the bookmark information server, the cellular phone terminalis connected to the HTTP server by way of the wireless cellular phonenetwork and the IP network for acquiring the bookmark information fromthe bookmark information server by way of the HTTP server in accordancewith the HTTP or HTTPS protocol.
 20. A cellular phone system comprisingat least a cellular phone terminal including at least means forconnecting to an IP network by way of a wireless cellular phone networkavailable to general public users, a mailbox server for storingelectronic mail information for each cellular phone terminal, and anHTTP server connected to the IP network and the mailbox server forperforming data communication between the cellular phone terminal andthe mailbox server in accordance with the HTTP or HTTPS protocol,characterized in that when acquiring the electronic mail information forthe cellular phone terminal stored in the mailbox server, the cellularphone terminal is connected to the HTTP server by way of the wirelesscellular phone network and the IP network for acquiring the electronicmail information from the mailbox server by way of the HTTP server inaccordance with the HTTP or HTTPS protocol.
 21. A cellular phone systemaccording to claim 18, wherein the address book server, the bookmarkserver or the mailbox server decides to permit or refuse the use of theaddress book data stored in the address book server, the bookmarkinformation stored in the bookmark information server or the electronicmail information stored in the mailbox server by the ID information ofthe cellular phone terminal that requests connection by way of the HTTPserver.
 22. A cellular phone system of claim 20, wherein the HTTP serverdecides to permit or refuse the connection to the address book server,the bookmark server or the mailbox server by the ID information of thecellular phone terminal from which a call is received.
 23. A cellularphone system claim 20, wherein at the time of connection from thecellular phone terminal, the address book server, the bookmarkinformation server, the mailbox server or the HTTP server is able toperform user certification of the cellular phone terminal.
 24. Acellular phone system of claim 18, further comprising a presence devicefor registering the current location of the user of each cellular phoneterminal, and in case of connection from the cellular phone terminal,either the address book server, the bookmark information server, themailbox server or the HTTP server decides to permit or refuse connectionto the cellular phone terminal depending on the current location of theuser of the cellular phone terminal as registered in the presencedevice.
 25. A private information protection method for protectingprivate information stored in a cellular phone terminal that can beconnected to both of a public wireless cellular phone network availableto general public users and a private wireless network closed to be usedby particular users, wherein the cellular phone terminal activates atleast one part of function of at least one data processing functions ofthe data processing functions including an address book function, abookmark function and a mailbox function when it enters the wirelessarea of the private wireless network, while non-activating at least onepart of the activated functions when it moves outside the wireless areaof the private wireless network.
 26. A private information protectionmethod for protecting private information stored in a cellular phoneterminal that can be connected to both of a public wireless cellularphone network available to general public users and a private wirelessnetwork closed to be used by particular users, wherein the cellularphone terminal downloads and saves information on the user of thecellular phone terminal from at least one of an address book server thatstores address book information available to an address book function, abookmark server that stores bookmark information available to a bookmarkfunction and a mailbox server that stores electronic mail informationavailable to a mailbox function when entering a wireless area of theprivate wireless network, while deleting at least one part of thedownloaded and saved information when moving outside the wireless areaof the private wireless network.
 27. A private information protectionmethod for protecting private information stored in a cellular phoneterminal that can be connected both of a public cellular phone networkavailable to general public users and a private wireless network closedto be used by particular users, wherein the cellular phone terminalrestores at least one part of information of at least one information ofencrypted address book information, encrypted bookmark information andencrypted electronic mail information when entering the wireless area ofthe private wireless network, while encrypting at least one part of therestored information when moving outside the wireless area of theprivate wireless network.
 28. A private information protection methodfor protecting private information stored in a cellular phone terminalthat can be connected both of a public wireless cellular phone networkavailable to general public users and a private wireless network closedto be used by particular user, wherein the cellular phone terminalacquires encryption key data for the user of the cellular phone terminalfrom an encryption key server that saves the encryption key data andrestores at least one part of information of at least one of encryptedaddress book information, encrypted bookmark information and encryptedelectronic mail information when entering the wireless area of theprivate wireless network, while encrypting at least one part of therestored information when moving outside the wireless area of theprivate wireless network.
 29. A private information protection method ofclaim 27, wherein the private wireless network comprises a plurality ofprivate wireless networks that differ in at least one part ofinformation to be restored when entering the wireless area of theprivate wireless network or encrypted when moving outside the wirelessarea depending on the plurality of the private wireless networks.
 30. Aprivate information protection method of claim 28, wherein at least onepart of the information of the information to be restored when enteringthe wireless area of the private wireless network or encrypted whenmoving outside the wireless area is differentiate depending on the userof the cellular phone terminal.
 31. A private information protectionmethod for protecting private information stored in a cellular phoneterminal comprising at least the cellular phone terminal including atleast means for connecting to an IP network by way of a wirelesscellular phone network available to general public users, an addressbook server for storing as address book data telephone numbers ofcellular phone terminals or telephone terminals that each cellular phoneterminal is to be connected and an HTTP server connected to the IPnetwork and the address book server for performing data communicationbetween the cellular phone terminal and the address book server inaccordance with the HTTP or HTTPS protocol, wherein for acquiring theaddress book data for the cellular phone terminal stored in the addressbook server, the cellular phone terminal is connected to the HTTP serverby way of the wireless cellular phone network and the IP network andacquires the address book data from the address book server by way ofthe HTTP server in accordance with the HTTP or HTTPS protocol.
 32. Aprivate information protection method for protecting private informationstored in a cellular phone terminal in a cellular phone systemcomprising at least the cellular phone terminal including at least meansfor connecting to an IP network by way of a wireless cellular phonenetwork available to general public users, a bookmark information serverfor storing as bookmark information address of a web server forrespective cellular phone terminal and an HTTP server connected to theIP network and the bookmark information server for performing datacommunication between the cellular phone terminal and the bookmarkinformation server in accordance with the HTTP or HTTPS protocol,wherein for acquiring the bookmark information for the cellular phoneterminal stored in the bookmark server, the cellular phone terminal isconnected to the HTTP server by way of the wireless cellular phonenetwork and the IP network and acquires the bookmark information fromthe bookmark information server by way of the HTTP server in accordancewith the HTTP or HTTPS protocol.
 33. A private information protectionmethod for protecting private information stored in a cellular phoneterminal in a cellular phone system comprising at least the cellularphone terminal including at least means for connecting to an IP networkby way of a wireless cellular phone network available to general publicusers, a mailbox server for storing electronic mail information forrespective cellular phone terminal, an HTTP server connected to the IPnetwork and the mailbox server for performing data communication betweenthe cellular phone terminal and the mailbox server in accordance withthe HTTP or HTTPS protocol, wherein for acquiring the electronic mailinformation for the cellular phone terminal stored in the mailboxserver, the cellular phone terminal is connected to the HTTP server byway of the wireless cellular phone network and the IP network andacquires the mailbox information from the mailbox server by way of theHTTP server in accordance with the HTTP or HTTPS protocol.
 34. A privateinformation protection program for achieving the private informationprotection method of claim 25 as a computer executable program.
 35. Aprogram recording medium for storing the private information protectionprogram of claim 34 in a computer readable recording medium.