External request type function control system, terminal device, external request type function control method, and external request type function control program

ABSTRACT

A function control information transmitter  30  transmits function control information  40  for controlling the function of a terminal device  10  such as a mobile telephone. When the terminal device (mobile telephone  10 ) receives the function control information  40  from the function control information transmitter  30 , the terminal device analyzes the received function control information  40  so as to control the function of the control object even without preparing in advance a correspondence table for controlling the function. Thus, it is possible to easily use the optimal function, application software, and a service in accordance the environment and the situation.

APPLICABLE FIELD IN THE INDUSTRY

The present invention relates to an external request type functioncontrol system, a terminal device, an external request type functioncontrol method, and an external request type function control programthat accept function control information by employing means other than auser's operation, and operate.

BACKGROUND ART

The progress in a high functionality of a terminal device gives rise tothe state that a user cannot master necessary functions, applicationsoftware, and a service fully. So as to solve such a problem, it isthinkable to take the control such as starting of and setting a limit toa function of the terminal device and an application program from theoutside, and providing the service. For example, the mobilecommunication system that enables a service provider side to set a limitto use of a mobile terminal is described in Patent document 1. In themobile communication system described in the Patent document 1, a serveracquires positional information of the terminal device, and determinesthe function, application software, and a service caused to correspondto its acquired position. And, the server transmits a control commandbased upon its determination to the terminal device, thereby to take thecontrol such as setting a limit to the function of the terminal deviceand providing the application software and the service.

Further, in Patent document 2 is described the photographing-limitsystem in which a transmitter for control is mounted in a locationrequiring a functional limit to the terminal device, a signal forsetting a limit to the function is transmitted, and the terminal devicehaving received a limit signal executes the functional limit describedin the control signal. Further, in Patent document 3 is described theexternal control technique of the mobile terminal in which the terminaldevice receives a control signal and retains it in a memory, and readsout the limit control retained in the memory to execute the functionallimit at the time of not performing a process such as a public telephonecall.

Further, in Patent document 4 is described the communication system inwhich a communication function limit device is mounted in a locationrequiring the functional limit to the terminal device to transmitinformation specifying a limit level, and the terminal device havingreceived the limit information sets the functional limit automaticallyresponding to the limit level pre-stored in the inside thereof. Further,in Patent document 5 is described the communication apparatus thatenables the service to be easily used by making a configuration so thatby employing short-distance communication means such as an IC card, anowner of the terminal device automatically can install the setting thatthe terminal device side has to make in order to make a connection withan access point of a wireless LAN or a printer.

[Patent document 1] JP-P1998-276475A (paragraph 0008 to 0016)

[Patent document 2] JP-P2004-23692A(paragraph 0021 to 0055, FIG. 1 toFIG. 4)

[Patent document 3] JP-P2001-326962A(paragraph 0016 to 0024, FIG. 1 toFIG. 4)

[Patent document 4] JP-P1999-331948A (paragraph 0007 to 0016)

[Patent document 5] JP-P2003-229872A (paragraph 0010 to 0031)

DISCLOSURE OF THE INVENTION Problems to be Solved by the Invention

The mobile communication system described in the Patent document 1necessitates a server system that is capable of acquiring positionalinformation and yet transmitting a command to a mobile appliance. Forthis, the method of utilizing a base station like the case of the mobilecommunication system described in the Patent document 1 necessitates alarge-scale system. Further, an enterpriser capable of employing andcontrolling such a larger-scale system is confined to a mobile telephonecompany etc.

Further, in the photographing-limit system described in the Patentdocument 2 and the external control technique described in the Patentdocument 3, it is impossible to determine executability of the functioncontrol specified by the limit signal based upon the current operationalstate of the function, being a control object, of the terminal device.For this, the method of receiving the limit signal, thereby to executethe functional limit like the case of the photographing-limit systemdescribed in the Patent document 2 might incur a user's convenience whenthe functional limit is executed during execution of some process.Further, in the method of receiving the limit signal to retain it, andreading out the limit signal to execute the functional limit at the timeof performing no process like the case of the external control techniquedescribed in the Patent document 3, it is impossible to take thefunction control while the terminal device performs the process.

Further, in the communication system described in the Patent document 4,the terminal device has to pre-store a rule etc. for specifying thelimit level. For this, the method of causing the terminal to pre-storethe control method like the case of the communication system describedin the Patent document 4 allows a variation of the correspondablefunctional limit to be restricted.

Further, in the communication apparatus described in the Patent document5, the owner of the appliance grasps the available service, and performsan action of holding up the IC card over a reader, or the like. However,in a case where the owner of the appliance has not grasped whether ornot the available service exists, the owner cannot find the servicebecause the owner performs no action at all. For this, in the method ofaccompanying an action of the owner of the appliance like the case ofthe communication apparatus described in the Patent document 5, theowner cannot utilize the service of which the owner itself is not aware.

Further, the systems shown in the Patent document 1, the Patent document4 and the Patent document 5 allow the function control from the outsideto disturb a user' operation that is currently active in some cases.Further, in the systems shown in the Patent document 1 to the Patentdocument 5, the function control signal, which is a malicious signalcausing a wrong operation of the terminal device to be triggered, or asignal assuming a false sender, allows the function control to be takenin some cases. Further, in the systems shown in the Patent document 1 tothe Patent document 5, it is impossible to control only a specificterminal device because all of the terminal devices having received thefunction control signal result in being function-controlled. Further, inthe systems shown in the Patent document 1 to the Patent document 5, itis impossible to automatically execute the function control by thereceived function control signal in some cases, and to execute only thefunction control permitted by the user in some cases. Further, thesystems shown in the Patent document 1 to the Patent document 5, whichhave not expected the case of having received a plurality of thefunction control signals, cannot control the function sometimes in thecase of having received a plurality of the control signals for onefunction.

Thereupon, the present invention has an object of providing an externalrequest type function control system, a terminal device, an externalrequest type function control method, and an external request typefunction control program that enable the optimum function, applicationsoftware, and a service to be easily used in accordance with theenvironment and the situation by starting the terminal device with themeans other than the user's operation.

Means to Solve the Problem

The external request type function control system in accordance with thepresent invention, which includes a terminal device (which is realizedby means of a mobile telephone 10) and a function control informationtransmitting device (which is realized by means of a function controlinformation transmitter 30) for transmitting function controlinformation including an instruction for controlling a function of theterminal device, is characterized in that the terminal device includes:reception means (which is realized by means of a reception section 11)for receiving the function control information from the function controlinformation transmitting device; monitoring means (which is realized bymeans of a monitor 13 and a storage section 20) for monitoring a stateof the function that could be specified in the function controlinformation, determination means (which is realized by means of anadjuster 12) for, based upon a monitoring result by the monitoringmeans, determining whether or not the function specified in the functioncontrol information received by the reception means is controllable, anddetermining whether a control of the function indicated by the functioncontrol information is executable; and function control means (which isrealized by means of a function controller 14 and a function section 15)for, based upon a determination by the determination means, executingthe control of the function specified by the function controlinformation. Additionally, the so-called “to control a function of aterminal device” signifies taking a control, for example, byautomatically switching off an electric source of the terminal device insome cases, and by automatically setting a mode of the terminal deviceto a manner mode in some cases. Further, the so-called “to monitor astate of a function” signifies grasping a state of a function, forexample, by causing the storage section to store information as to whichkind of the function the terminal device currently includes in somecases, and by causing the storage section to store the state etc. as towhether or not each function of the terminal device is currently beingexecuted.

The terminal device in accordance with the present invention,characterized in including reception means for receiving functioncontrol information including an instruction for controlling a functionof the terminal device that an external function control informationtransmitting device of the terminal device transmits; monitoring meansfor monitoring a state of the function that could be specified in thefunction control information; determination means for, based upon amonitoring result by the monitoring means, determining whether or notthe function specified in the function control information received bythe reception means is controllable, and determining whether a controlof the function indicated by the function control information isexecutable; and function control means for, based upon a determinationby the determination means, executing the control of the functionspecified in the function control information. Such a configuration,which does not necessitate a large-scale system employing a basestation, makes it possible to control the function of the terminaldevice in some cases, and to provide the service in some cases inconformity with the environment, the location and the situation from theoutside of the terminal device even though the terminal device is notcaused to pre-store the control content, and yet the user of theterminal device is not aware of the function.

Further, the monitoring means may be means for storing a control source,being a cause of having changed a state of the function into a currentstate, and the determination means may be means for comparing a prioritydegree of the current control source of the function specified in thefunction control information, which is stored by the monitoring means,with a priority degree that is included in the function controlinformation, thereby to determine whether or not the function control bythe function control information is executable. Such a configurationmakes it possible to take the function control of the terminal device bythe function control information from the outside without disturbing thefunction that is currently being activated by the user's operation etc.

Further, the terminal device may include credibility determination means(which is realized by means of a credibility confirmer 16) fordetermining whether or not the function control information transmittingdevice, being a transmission source that has transmitted the functioncontrol information, and a transmission source described in the functioncontrol information coincide with each other, and determining existenceof tampering of the function control information. Such a configurationmakes it possible to prevent the function control by a function controlsignal bearing malice, a function control signal assuming a falsesender, etc.

Further, the terminal device may include condition determination means(which is realized by means of a situation analyzer 17) for determiningwhether or not a state of the terminal device meets a condition underwhich the function control described in the function control informationis executed. Such a configuration makes it possible to control only thefunction of the terminal device having met the condition, out of thefunctions of the terminal device having received the function controlinformation.

Further, the condition determination means may be means for, based uponevaluation information described in the function control information,determining whether or not a permission for executing the functioncontrol is requested of the user of the terminal device. Such aconfiguration makes it possible to automatically execute the functioncontrol described in the function control information in some cases, andto execute only the function control permitted by user in some cases.

Further, the condition determination means may be means for, in a casewhere the reception means has received plural kinds of the functioncontrol information, deciding an order in which a function controlprocess is executed based upon evaluation information described in thefunction control information. Such a configuration makes it possible toantecedently take the control of the valid function because the order ofthe function control process is decided even in a case of havingreceived plural kinds of the function control information. Further, itis possible not to execute the function control that is not valid. Inaddition hereto, even in a case of having received plural kinds of thefunction control information for one function, the function controldescribed in the valid function control information can be antecedentlyexecuted by removing a competition because the process order of thefunction control information is decided.

Further, the terminal device may include storage means (which isrealized by means of a storage section 20) for pre-storing an executionorder of the controllable function, and the determination means may bemeans for, in a case where the reception means has received plural kindsof the function control information, deciding an order in which afunction control process is executed based upon the execution order ofthe function that the storage means stores. Such a configuration makesit possible to antecedently execute a control of the valid functionbecause the order of the function control process is decided even in acase of having received plural kinds of the function controlinformation. Further, it is possible not to take the function controlthat is not valid. In addition hereto, even in a case of having receivedplural kinds of the function control information for one function, thefunction control described in the valid function control information canbe antecedently executed by removing a competition because the processorder of the function control information is decided.

Further, the terminal device may include storage means for pre-storingan execution order of the controllable function, and the conditiondetermination means may be means for, in a case where the receptionmeans has received plural kinds of the function control information,deciding an order in which a function control process is executed basedupon the execution order that the storage means stores, and theevaluation information described in the function control information.Such a configuration makes it possible to antecedently take a control ofthe valid function because the order of the function control process isdecided even in a case of having received plural kinds of the functioncontrol information. Further, it is possible not to take the functioncontrol that is not valid. In addition hereto, even in a case of havingreceived plural kinds of the function control information for onefunction, the function control described in the valid function controlinformation can be antecedently executed by removing a competitionbecause the process order of the function control information isdecided.

The external request type function control method in accordance with thepresent invention, which is an external request type function controlmethod of controlling a function of a terminal device in a systemincluding the terminal device and a function control informationtransmitting device for transmitting function control informationincluding an instruction for controlling a function of the terminaldevice, in which the terminal device and the function controlinformation transmitting device make communication with each other, ischaracterized in including: a step in which the function controlinformation transmitting device transmits the function controlinformation; a step in which the terminal device monitors a state of thefunction that could be specified in the function control information; astep in which the terminal device determines whether or not the functionspecified in the function control information received from the functioncontrol information transmitting device is controllable based upon themonitoring result, and determines whether or not a control of thefunction indicated by the function control information is executable;and a step in which the terminal device executes the control of thefunction specified in the function control information based upon thedetermination result.

Further, the external request type function control method, which is anexternal request type function control method of controlling a functionof a terminal device in a system including the terminal device and afunction control information transmitting device for transmittingfunction control information, in which the terminal device and thefunction control information transmitting device make communication witheach other, may include: a step in which the function controlinformation transmitting device transmits function control informationhaving a function of the terminal device, being a control object, and acontrol state of the function described; and a step in which when theterminal device receives the function control information, it controlsthe function based upon the received function control information. Sucha configuration, which does not necessitate a large-scale systememploying a base station, makes it possible to control the function ofthe terminal device in some cases, and to provide the service in somecases in conformity with the environment, the location and the situationfrom the outside of the terminal device even though the terminal deviceis not caused to pre-store the control content, and yet the user of theterminal device is not aware of the function. That is, the terminaldevice does not have to prepare in advance a control signal that istransmitted from the function control information transmitting device,the function that is controlled by the control signal, and a controlcorrespondence rule.

Further, the external request type function control method may include:a step in which the terminal device stores a control source, being acause of having changed a state of the function into a current state; astep in which the terminal device compares a priority degree of thecurrent control source of the function specified in the function controlinformation, which is stored, with a priority degree that is included inthe function control information, thereby to determine whether or notthe function control by the function control information is executable;and a step in which the terminal device executes the function control ofthe terminal device based upon the determination result of theexecutability/non-executability. Such a configuration makes it possibleto take the function control of the terminal device by the functioncontrol information from the outside without disturbing the functionthat is currently being activated by the user's operation etc.

Further, the external request type function control method may include:a step in which reliability information including a signature isdescribed in the function control information, and when the terminaldevice receives the function control information, it determines whetheror not the function control information transmitting device, being atransmission source that has transmitted the function controlinformation, and a transmission source described in the function controlinformation coincide with each other based upon the reliabilityinformation that is included in the received function controlinformation, and determines existence of tampering of the functioncontrol information, thereby to determine credibility of the functioncontrol information; and a step in which the terminal device executesthe function control of the terminal device based upon the determinationresult of the credibility. Such a configuration makes it possible toprevent the function control by the function control signal bearingmalice, the function control signal assuming a false sender, etc.

Further, the external request type function control method may include:a step in which a condition for controlling the function is described inthe function control information, and when the terminal device receivesthe function control information, it determines whether or not a stateof the terminal device meets a condition described in the receivedfunction control information; and a step in which the terminal devicecontrols the function of the terminal device based upon thedetermination result. Such a configuration makes it possible to controlonly the function of the terminal device that has met the condition, outof the functions of the terminal device having received the functioncontrol information.

Further, the external request type function control method may include:a step in which evaluation information indicating validity of thefunction control is described in the function control information, andwhen the terminal device receives the function control information, itdetermines whether or not a permission for executing the functioncontrol is requested of a user of the terminal device based upon theevaluation information that is included in the received function controlinformation; and a step in which the terminal device executes thefunction control of the terminal device based upon the determinationresult of the execution permission. Such a configuration makes itpossible to automatically execute the function control described in thefunction control information in some cases, and to execute only thefunction control permitted by the user in some cases.

Further, the external request type function control method may include:a step in which evaluation information indicating validity of thefunction control is described in the function control information, andin a case where the terminal device has received plural kinds of thefunction control information, it decides an order in which a functioncontrol process is executed based upon the evaluation informationdescribed in the received function control information; and a step inwhich the terminal device executes the function control of the terminaldevice according to the decided order. Such a configuration makes itpossible to antecedently take a control of the valid function becausethe order of the function control process is decided even in a case ofhaving received plural kinds of the function control information.Further, it is possible not to execute the function control that is notvalid. In addition hereto, even in a case of having received pluralkinds of the function control information for one function, the functioncontrol described in the valid function control information can beantecedently executed by removing a competition because the processorder of the function control information is decided.

Further, the external request type function control method may include:a step in which an execution order is pre-affixed to the controllablefunction of the terminal device, and in a case where the terminal devicehas received plural kinds of the function control information, itdecides an order in which a function control process is executed basedupon the pre-affixed execution order of the function; and a step inwhich the terminal device executes the function control of the terminaldevice according to the decided order. Such a configuration makes itpossible to antecedently execute the control of the valid functionbecause the order of the function control process is decided even in acase of having received plural kinds of the function controlinformation. Further, it is possible not to execute the function controlthat is not valid. In addition hereto, even in a case of having receivedplural kinds of the function control information for one function, thefunction control described in the valid function control information canbe antecedently executed by removing a competition because the processorder of the function control information is decided.

Further, the external request type function control method may include:a step in which evaluation information indicating validity of thefunction control is described in the function control information, andin a case where the terminal device has received plural kinds of thefunction control information, it decides an order in which a functioncontrol process is executed based upon the pre-affixed execution orderof the functions and evaluation information described in the functioncontrol information; and a step in which the terminal device executesthe function control of the terminal device according to the decidedorder. Such a configuration makes it possible to antecedently executethe control of the valid function because the order of the functioncontrol process is decided even in a case of having received pluralkinds of the function control information. Further, it is possible notto execute the function control that is not valid. In addition hereto,even in a case of having received plural kinds of the function controlinformation for one function, the function control described in thevalid function control information can be antecedently executed byremoving a competition because the process order of the function controlinformation is decided.

The external request type function control program in accordance withthe present invention, which is an external request type functioncontrol program for allowing a function of a terminal device to becontrolled, is characterized in causing a computer to execute theprocesses of: receiving function control information including aninstruction for controlling a function of the terminal device, which istransmitted by an external function control information transmittingdevice of the terminal device; monitoring a state of the function thatcould be specified in the function control information; determiningwhether or not the function specified in the received function controlinformation is controllable based upon the monitoring result, anddetermining whether or not a control of the function indicated by thefunction control information is executable; and controlling the functionof the terminal device based upon the determination result. Such aconfiguration, which does not necessitate a large-scale system employinga base station, makes it possible to control the function of theterminal device in some cases, and to provide the service in some casesin conformity with the environment, the location and the situation fromthe outside of the terminal device even though the terminal device isnot caused to pre-store the control content, and yet the user of theterminal device is not aware of the function.

Further, the external request type function control program may be aprogram for causing the computer to execute the processes of: storing acontrol source, being a cause of having changed a state of the functioninto a current state; comparing a priority degree of the current controlsource of the function specified in the function control information,out of the stored control sources, with a priority degree that isincluded in the function control information, thereby to determinewhether or not the function control by the function control informationis executable; and controlling the function of the terminal device basedupon the determination result of the executability/non-executability.Such a configuration makes it possible to execute the function controlof the terminal device by the function control information from theoutside without disturbing the function that is currently beingactivated by the user's operation etc.

Further, the external request type function control program may be aprogram for causing the computer to execute the processes of:determining whether or not the function control information transmittingdevice, being a transmission source that has transmitted the functioncontrol information, and a transmission source described in the functioncontrol information coincide with each other, and determining existenceof tampering of the function control information; and controlling thefunction of the terminal device based upon the determination result.Such a configuration makes it possible to prevent the function controlby the function control signal bearing malice, the function controlsignal assuming a false sender, etc.

Further, the external request type function control program may be aprogram for causing the computer to execute the processes of:determining whether or not a state of the terminal device meets acondition under which the function control described in the functioncontrol information is executed; and controlling the function of theterminal device based upon the determination result. Such aconfiguration makes it possible to control only the function of theterminal device that has met the condition, out of the functions of theterminal device having received the function control information.

Further, the external request type function control program may be aprogram for causing the computer to execute the process of, based uponevaluation information described in the function control information,deciding whether or not a permission for executing the function controlis requested of a user of the terminal device. Such a configurationmakes it possible to automatically execute the function controldescribed in the received function control information in some cases,and to execute only the function control permitted by the user in somecases.

Further, the external request type function control program may be aprogram for causing the computer to execute the process of, in a case ofhaving received plural kinds of the function control information,deciding an order in which a function control process is executed basedupon evaluation information described in the received function controlinformation. Such a configuration makes it possible to antecedently takea control of the valid function because the order of the functioncontrol process is decided even in a case of having received pluralkinds of the function control information. Further, it is possible notto execute the function control that is not valid. In addition hereto,even in a case of having received plural kinds of the function controlinformation for one function, the function control described in thevalid function control information can be antecedently executed byremoving a competition because the process order of the function controlinformation is decided.

Further, the external request type function control program may be aprogram for causing the computer to execute the processes of:pre-storing an execution order of the controllable function; and in acase of having received plural kinds of the function controlinformation, deciding an order in which a function control process isexecuted based upon the stored execution order of the function. Such aconfiguration makes it possible to antecedently take a control of thevalid function because the order of the function control process isdecided even in a case of having received plural kinds of the functioncontrol information. Further, it is possible not to execute the functioncontrol that is not valid. In addition hereto, even in a case of havingreceived plural kinds of the function control information for onefunction, the function control described in the valid function controlinformation can be antecedently executed by removing a competitionbecause the process order of the function control information isdecided.

Further, the external request type function control program may be aprogram for causing the computer to execute the processes of:pre-storing an execution order of the controllable function; and in acase of having received plural kinds of the function controlinformation, deciding an order in which a function control process isexecuted based upon the stored execution order of the function andevaluation information described in the function control information.Such a configuration makes it possible to antecedently take a control ofthe valid function because the order of the function control process isdecided even in a case of having received plural kinds of the functioncontrol information. Further, it is possible not to execute the functioncontrol that is not valid. In addition hereto, even in a case of havingreceived plural kinds of the function control information for onefunction, the function control described in the valid function controlinformation can be antecedently executed by removing a competitionbecause the process order of the function control information isdecided.

Effects of the Invention

In accordance with the present invention, the terminal device receivesthe function control information for controlling the function of theterminal device, the application software, and the service from theexternal function control information transmitting device in conformitywith the environment and the situation. And, the terminal devicecontrols the function automatically based upon the received functioncontrol information. Accordingly, the user of the terminal device canutilize the function control and the application software adapted to theenvironment, the location and the situation, and can receive the servicethat is provided even though the user is not aware thereof.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an explanatory view illustrating one example of aconfiguration of the external request type function control system inaccordance with the present invention.

FIG. 2 is a configuration view illustrating one example of theconfiguration of the function control information transmitter 30.

FIG. 3 is an explanatory view illustrating one example of the functioncontrol information 40.

FIG. 4 is an explanatory view illustrating another example of thefunction control information 40.

FIG. 5 is a configuration view illustrating one example of theconfiguration of the mobile telephone 10.

FIG. 6 is a flowchart illustrating one example of the function controlprocess that the external request type function control system executes.

FIG. 7 is an explanatory view illustrating yet another example of thefunction control information 40.

FIG. 8 is a flowchart illustrating another example of the functioncontrol process that the external request type function control systemexecutes.

FIG. 9 is an explanatory view illustrating yet another example of thefunction control information 40.

FIG. 10 is a block diagram illustrating another configuration example ofthe mobile telephone 10.

FIG. 11 is a flowchart illustrating yet another example of the functioncontrol process that the external request type function control systemexecutes.

FIG. 12 is an explanatory view illustrating yet another example of thefunction control information 40.

FIG. 13 is a block diagram illustrating yet another configurationexample of the mobile telephone 10.

FIG. 14 is a flowchart illustrating yet another example of the functioncontrol process that the external request type function control systemexecutes.

FIG. 15 is an explanatory view illustrating yet another example of thefunction control information 40.

FIG. 16 is a block diagram illustrating yet another configurationexample of the mobile telephone 10.

FIG. 17 is a flowchart illustrating yet another example of the functioncontrol process that the external request type function control systemexecutes.

FIG. 18 is an explanatory view illustrating yet another example of thefunction control information 40.

FIG. 19 is a block diagram illustrating yet another configurationexample of the mobile telephone 10.

FIG. 20 is a flowchart illustrating yet another example of the functioncontrol process that the external request type function control systemexecutes.

FIG. 21 is an explanatory view illustrating another configurationexample of the external request type function control system.

FIG. 22 is an explanatory view illustrating yet another example of thefunction control information 40.

FIG. 23 is a flowchart illustrating yet another example of the functioncontrol process that the external request type function control systemexecutes.

FIG. 24 is a flowchart illustrating yet another example of the functioncontrol process that the external request type function control systemexecutes.

FIG. 25 is an explanatory view illustrating an application environmentin the case of having applied the external request type function controlsystem to a movie theater.

FIG. 26 is an explanatory view illustrating yet another example of thefunction control information 40.

FIG. 27 is an explanatory view illustrating an example of the specificcontent of function control information 40-a to 40-e that each functioncontrol information transmitter 30 transmits.

FIG. 28 is a block diagram illustrating yet another configurationexample of the mobile telephone 10.

FIG. 29 is a flowchart illustrating yet another example of the functioncontrol process that the external request type function control systemexecutes.

FIG. 30 is a sequel to the flowchart of the function control processshown in FIG. 29.

DESCRIPTION OF NUMERALS

10 mobile telephone

11 reception section

12 adjuster

13 monitor

14 function controller

15 function section

20 storage section

30 function control information transmitter

31 transmission section

32 information filer

40 function control information

41 function control content

BEST MODE FOR CARRYING OUT THE INVENTION Embodiment 1

Hereinafter, a first embodiment of the present invention will beexplained by making a reference to the accompanied drawings. FIG. 1 isan explanatory view illustrating one example of a configuration of theexternal request type function control system in accordance with thepresent invention. As shown in FIG. 1, the external request typefunction control system includes a mobile telephone 10, being a terminaldevice, and a function control information transmitter 30 fortransmitting function control information 40 for controlling a functionof the mobile telephone 10.

Additionally, in this embodiment, an example in which the terminaldevice is the mobile telephone 10 will be explained; however theterminal device may be a portable terminal such as a PDA (Personal DataAssistance, Personal Digital Assistants: personal portable-typeinformation communication appliance), a mobile terminal such as amachine having a car navigation system mounted, and a fixed terminalother than the mobile terminal.

The function control information transmitter 30 is mounted, for example,in an area in which use of the mobile telephone 10 should be controlled,or an entrance to its area, that is, in an airplane and at an entranceto the airplane (a gate position of an airport) in which use of themobile telephone 10 should be prohibited, or the like. FIG. 2 is aconfiguration view illustrating one example of the configuration of thefunction control information transmitter 30. As shown in FIG. 2, thefunction control information transmitter 30 includes a transmissionsection 31 for transmitting the function control information 40, and aninformation filer 32 for storing the function control information 40.

FIG. 3 is an explanatory view illustrating one example of the functioncontrol information 40. The function control information 40 that thefunction control information transmitter 30 transmits has a functioncontrol content 41 described as shown in FIG. 3. A function that becomesan object of control, out of the functions of the mobile telephone 10,and information for specifying how its control object function iscontrolled are included in the function control content 41.

For example, there is often the case that an electric power of themobile telephone 10 of a passenger should be compulsorily switched offin the gate position of the airport. In this case, for example, thefunction control content 41 includes “an electric power supply function”as a function of a control object, and information saying the effectthat an electric power section of the mobile telephone 10 is caused toswitch off an electric power as information for specifying the controlcontent. Additionally, the function control content 41 may include, forexample, “a sound function” as a function of a control object, andinformation saying the effect that a voice of an incoming melody isoutput as information for specifying the control content. Further, thefunction control content 41 may include, for example, “a camerafunction” as a function of a control object, and information saying theeffect that a camera is incapacitated for starting as information forspecifying the control content.

Further, FIG. 4 is an explanatory view illustrating another example ofthe function control information 40. The function control information 40may include a plurality of the function control contents 41 as shown inFIG. 4.

FIG. 5 is a configuration view illustrating one example of theconfiguration of the mobile telephone 10. As shown in FIG. 5, the mobiletelephone 10 includes a reception section 11, an adjuster 12, a monitor13, a function controller 14 for controlling the function of the mobiletelephone 10, a function section 15 that is function- controlled by thefunction controller 14, and a storage section 20 for storinginformation.

The reception section 11 receives the function control information 40that the function control information transmitter 30 transmits. Themonitor 13 grasps an operational state of all functions of the functionsection 15 that is controlled in the mobile telephone 10. In thisembodiment, the monitor 13 grasps each function of the mobile telephone10. For example, the monitor 13 grasps information as to which functionthe mobile telephone 10 currently includes by causing the storagesection 20 to store it. Further, for example, the monitor 13 grasps thestate etc. as to whether or not each function of the mobile telephone 10is currently being executed by causing the storage section 20 to storeit.

The adjuster 12 determines whether or not the function specified in thefunction control information 40 exists in the functions of the mobiletelephone 10. Further, in a case where the specified function exists,the adjuster 12 inquires of the monitor 13 an operational state of itsfunction, thereby to determine whether or not the function controlspecified in the function control information 40 is possible. Thefunction controller 14 outputs a control command of the function, beinga control object, specified in the function control information 40 tothe function section 15, and controls the function of the functionsection 15.

Specifically, the function section 15 includes an electric power sectionfor realizing an electric power supply function, a radio wavetransmission/reception section for realizing a radio signaltransmission/reception function, a sound section for realizing a voiceoutput function, a vibrator section for realizing a vibration function,a display section for realizing a display function for a display deviceetc., a camera section for realizing an image photographing function, alight section for realizing a backlight lighting function of a liquidcrystal, and so on. Further, the function section 15 includes a browsersection for realizing a browser display function, and a controller forrealizing an execution function of various kinds of applicationsoftware.

Specifically, the storage section 20 is realized by means of a memoryetc. The storage section 20 stores the function control information 40received from the function control information transmitter 30 and aprocess result. The function that should be controlled, and a controlstate of its function are stored in the function control information 40that the storage section 20 stores.

Additionally, in this embodiment, the storage section 20 has variousprograms stored for automatic-controlling the function of the terminaldevice (mobile telephone 10). For example, the storage section 20 has anexternal request type function control program stored for causing thecomputer to execute the processes of: receiving the function controlinformation including an instruction for controlling the function of theterminal device, which the external function control informationtransmitting device of the terminal device transmits; monitoring a stateof the function that could be specified in the function controlinformation; based upon the monitoring result, determining whether ornot the function specified in the received function control informationis controllable, and determining whether or not the control of thefunction indicated in the received function control information isexecutable; and based upon the determination result, controlling thefunction of the terminal device.

Next, an operation will be explained. FIG. 6 is a flowchart illustratingone example of the function control process that the external requesttype function control system executes. The function control informationtransmitter 30 repeatedly transmits the function control information 40,which the information filer 32 stores, consecutively or intermittently(step S101). Further, the function control information transmitter 30may transmit the function control information 40 repeatedly based onsome trigger. For example, the function control information transmitter30 transmits the function control information 40 with detection of themobile telephone 10 having approached by employing a GPS and ashort-distance sensor in some cases, detection of the surroundingshaving become dark by employing an optical sensor in some cases,reception of a signal from the mobile telephone 10 in some cases, or thelike assumed to be a trigger, respectively.

When the mobile telephone 10 enters a communication area of the functioncontrol information transmitter 30 (step S102), the reception section 11of the mobile telephone 10 employs the communication means (for example,another antenna and transmission/reception section) other than thecommunication means that is employed for making a call, thereby toreceive the function control information 40 from the function controlinformation transmitter 30 (step S103). And, the reception section 11causes the storage section 20 to store the received function controlinformation 40.

The adjuster 12 specifies a function, being an object of control, basedupon the function control content 41 described in the function controlinformation 40 received by the reception section 11 (step S104).Further, the adjuster 12 inquires of the monitor 13 whether or not thespecified control object function exists in the functions of the mobiletelephone 10. Further, the adjuster 12 inquires of the monitor 13whether or not the specified control object function is controllable(step S105).

In a case of having received the effect that the control object functiondoes not exist, or the effect that the specified control object functionis uncontrollable from the monitor 13, the adjuster 12 scraps thefunction control information 40 received by the reception section 11,and erases the function control information 40 that the storage section20 stores (step S106). In a case of having received the effect that thecontrol object function is controllable from the monitor 13, theadjuster 12 determines whether or not the other function control content41 is included in the function control information 40 (step S107). In acase where the other function control content 41 exists (in a case ofhaving determined that the other function control content 41 isincluded), the adjuster 12 inquires of the monitor 13 again, thereby todetermine whether or not the function of the control object iscontrollable.

When the adjuster 12 determines that all of the function controlcontents 41 described in the function control information 40 arecontrollable, and determines in the step S107 that the other functioncontrol content 41 does not exist, the function controller 14 sends(transmits) a control command for the control object function to thefunction section 15, thereby to control the control object function(step S108). And, the function section 15 activates the control objectfunction according to an instruction from the function controller 14(step S109).

As mentioned above, in this embodiment, the terminal device (mobiletelephone 10) receives the information (function control information 40)for controlling the function of the terminal device, the applicationsoftware, and the service in conformity with the environment and thesituation from the external function control information transmitter 30.And, the terminal device automatically controls the function based uponthe received function control information 40. Accordingly, it ispossible to utilize the function control and the application softwareadapted to the environment, the location, and the situation, and toreceive the service that is provided even though the user of theterminal device is not aware thereof.

Further, in accordance with this embodiment, the function of analyzingand executing the function control information within the terminaldevice, and the large-scale server for determining the applicationsoftware and the service are rendered unnecessary. Accordingly, thesystem, which enables the function, the application software, and theservice adapted to the environment and the location of the terminaldevice to be automatically used, can be realized even though it is ofcomparatively small size.

Further, in accordance with this embodiment, upon having grasped a stateof the function as to whether or not each function is currently beingactivated, or the like, the adjustment means (adjuster 12) of theterminal device determines executability of the function control, andexecutes the function control. Accordingly, the adjustment means canexecute the function control without marring a user's convenience evenwhile the terminal device performs some process.

Further, in accordance with this embodiment, the terminal device doesnot pre-store the function control information and a correspondencetable of the function control, but analyzes and controls the functioncontrol information received from the outside. Accordingly, the terminaldevice, which has a function of analyzing and controlling the functioncontrol information, can execute the function control even though itdoes not pre-store the control content.

Additionally, in this embodiment, the case where the mobile telephone 10migrated was explained; however in the external request type functioncontrol system, this embodiment is also applicable to the case where theterminal device does not migrate, but the function control informationtransmitter 30 migrates. Further, by changing a timing at which thefunction control information 40 is transmitted in some cases, and bychanging the content of the function control information 40 in somecases, the function of the terminal device may be controlled.

Embodiment 2

Next, a second embodiment of the present invention will be explained bymaking a reference to the accompanied drawings. In this embodiment, aconfiguration of the external request type function control system issimilar to the configuration shown in FIG. 1; however this embodimentdiffers from the first embodiment in the content of the function controlinformation 40.

In this embodiment, for example, in a case where the function, being acontrol object, specified in the function control information 40 hasbeen already executed within the mobile telephone 10 by a user'soperation etc., the mobile telephone 10 determines whether the functioncontrol specified in the function control information 40 ispreferentially executed, or the process that is being executed by auser's operation etc. is given a priority.

FIG. 7 is an explanatory view illustrating yet another example of thefunction control information 40. As shown in FIG. 7, the functioncontrol information 40 includes a priority degree 42 of the functioncontrol that is specified in the function control content 41 in additionto the function control content 41 shown in FIG. 3. In this embodiment,the priority degree 42 that is included in the function controlinformation 40 is employed for making a determination as to which isgiven a priority, out of the function control that is specified infunction control information 40 and the process that allows itsfunction, being a control object, to be activated.

Further, in this embodiment, a configuration of the mobile telephone 10is similar to the configuration shown in the first embodiment; howeverthis embodiment differs from the first embodiment in the processcontents of the adjuster 12 and the monitor 13 of the mobile telephone10. Further, this embodiment differs from the first embodiment in thecontent of the information that is stored in the storage section 20.

In this embodiment, the monitor 13 causes the storage section 20 tostore a control source, being a cause of having changed a state of eachfunction of the mobile telephone 10 into a current state, in addition toperforming the process shown in the first embodiment. For example, in acase where the radio signal transmission/reception function has beenoff-lined by a user's operation, the monitor 13 causes the storagesection 20 to store “a user” as a current control source of the radiosignal transmission/reception function. Further, for example, in a casewhere the radio signal transmission/reception function has beenoff-lined by the control function by the function control information 40from the outside, the monitor 13 causes the storage section 20 to storethe function control information transmitter 30, being a transmissionsource of its function control information 40, as a current controlsource of the radio signal transmission/reception function.

Further, in this embodiment, the storage section 20 stores a controlsource, being a cause of having changed a state of its function into acurrent state, function by function in addition to the informationcontent shown in the first embodiment. Further, the storage section 20stores a priority degree of each control source. This embodiment has thepriority degree of the control source, which the storage section 20stores, and the priority degree 42, which is included in the functioncontrol information 40, stored in a relatively comparable format. Forexample, this embodiment has information indicating a priority order asa priority degree described.

Further, in this embodiment, the adjuster 12 compares the prioritydegree 42 of the function control described in the function controlinformation 40 with the priority degree of the current control source ofthe control object function in addition to performing the process shownin the first embodiment. In a case where the priority degree 42 of thefunction control information 40 is higher than the priority degree ofthe current control source, the adjuster 12 determines that the functioncontrol is possible. Further, in a case where the priority degree 42 ofthe function control information 40 is lower than the priority degree ofthe current control source, the adjuster 12 determines that the functioncontrol is impossible, and scraps the function control information 40.

Next, an operation will be explained. FIG. 8 is a flowchart illustratinganother example of the function control process that the externalrequest type function control system executes. As shown in FIG. 8, inthis embodiment, a process (step S107 a) of comparing the prioritydegree 42 of the function control described in the function controlinformation 40 with the priority degree of the current control source ofthe control object function, and a process (step S110) of storing thecontrol source having executed the function control are included inaddition to the process shown in FIG. 6. Additionally,

FIG. 8 has an identical step number affixed to the process identical tothe process shown in FIG. 6.

The function control information transmitter 30 repeatedly transmits thefunction control information 40 that the information filer 32 stores(step S101). In this embodiment, the function control information 40 hasthe priority degree 42 of the function control described in addition tothe function control content 41 shown in the first embodiment. Thefunction control information 40 includes, for example, values such as“Kou” and “Otsu” as the priority degree 42. Additionally, the prioritydegree 42 “Kou” indicates that it has a higher priority order than thepriority degree 42 “Otsu”.

When the mobile telephone 10 enters the communication area (step S102),and receives the function control information 40 (step S103), it causesthe storage section 20 to store the received function controlinformation 40. The adjuster 12 specifies a function, being a controlobject, based upon the function control content 41 (step S104). Further,when the adjuster 12 inquires of the monitor 13 whether or not thecontrol object function is controllable (step S105) and determines thatthe control object function is controllable, the former inquires of thestorage section 20 the current control source of its control objectfunction. And, the adjuster 12 compares the priority degree of thecontrol source, which the storage section 20 stores, with the prioritydegree 42 of the function control information 40, thereby to determinewhether or not the priority degree of the function control of thefunction control information 40 is higher than that of the currentcontrol source (step S107 a).

When the adjuster 12 determines that the priority degree 42 of thefunction control information 40 is higher than that of the currentcontrol source, it determines that the function control is possible.When the adjuster 12 determines that the priority degree 42 of thefunction control information 40 is lower than that of the currentcontrol source, it determines that the function control is impossible,and scraps the function control information 40 (step S106).

For example, the storage section 20 has stored a relation between thepriority degree 42 of the function control information 40 and thepriority degree of the control source. For example, the storage section20 has stored a correspondence relation, which indicates that theoperation by the user, being a control source, the incoming of a calland an e-mail of the control source, the priority degree 42 “Kou” of thefunction control information 40, the operation at the time of startingthe mobile telephone 10, the priority degree 42 “Otsu” of the functioncontrol information 40, etc. are high in its order in terms of thepriority degree. For example, the adjuster 12 determines whether or notthe priority degree 42 of the function control information 40 is higherthan the priority degree of the control source based upon thecorrespondence relation that the storage section 20 stores.

When the adjuster 12 determines that the function control of all of thefunction control contents 41 is possible, and yet the priority degree 42is higher than the priority degree of the control source, the functioncontroller 14 controls the control object function (step S108). And, thefunction section 15 activates the control object function according toan instruction by the function controller 14 (step S109).

Further, the monitor 13 causes the storage section 20 to store thepriority degree 42 of the function control information 40 as a controlsource (step S110). For example, with the priority degree 42 “Kou”, themonitor 13 causes the storage section 20 to store the current controlsource of the function-controlled function as the function controlinformation “Kou”. The control source that the storage section 20 wascaused to store in the step S110 is employed for determining thepriority degree at the moment that the mobile telephone 10 has receivedthe function control information 40 next. For example, it is employedfor making a comparison with the priority degree of the control sourcein a case where the function identical to the function of the functioncontrol information 40 received next has already been described as acontrol object function in the function control content 41. However, ina case where the user has performed the operation, the mobile telephone10 executes the process by the user's operation more preferentially thanthe function control by the function control information 40.

As mentioned above, in accordance with this embodiment, the mobiletelephone 10 has the control source, being a cause of having changed astate of the function into a current state, recorded. Further, themobile telephone 10 includes the adjustment means (adjuster 12) forcomparing the priority degree of the current control source of thefunction specified in the function control information 40 with thepriority degree 42 of the function control information 40, thereby todetermine whether or not the function control of the terminal device(mobile telephone 10) by the function control information 40 ispossible. Accordingly, even in a case where the function is currentlyactivated by a user's operation etc., the function of the terminaldevice can be controlled by the function control information 40 from theoutside without disturbing the function that is active.

Embodiment 3

Next, a third embodiment of the present invention will be explained bymaking a reference to the accompanied drawings. In this embodiment, aconfiguration of the external request type function control system issimilar to the configuration shown in FIG. 1; however this embodimentdiffers from the first embodiment in the content of the function controlinformation 40 and the configuration of the mobile telephone 10.

FIG. 9 is an explanatory view illustrating yet another example of thefunction control information 40. As shown in FIG. 9, the functioncontrol information 40 includes credit information 43 having a signatureetc. described for guaranteeing that a sender of the function controlinformation 40 and the content of function control information 40 havenot been tampered by another person in addition to the function controlcontent 41 shown in FIG. 3.

FIG. 10 is a block diagram illustrating another configuration example ofthe mobile telephone 10. As shown in FIG. 10, this embodiment differsfrom the first embodiment in a point that the mobile telephone 10includes a credibility confirmer 16 in addition to the components shownin FIG. 5. Further, this embodiment differs from the first embodiment inthe content of the information that is stored in the storage section 20.Additionally, FIG. 10 has an identical code affixed to an elementidentical to the component shown in FIG. 5.

The credibility confirmer 16 determines and verifies whether or not thesender that is included in the function control information 40 and thecontent of function control information 40 have not been tampered byanother person based upon credit information 43 that is included in thefunction control information 40. The storage section 20 pre-storesinformation and an encryption key for verifying the sender and existenceof the tampering in addition to the information content shown in thefirst embodiment. Additionally, it is also acceptable that the storagesection 20 does not pre-store these verification information andencryption key, but the mobile telephone 10 acquires them by makingcommunication with the outside, thereby to cause the storage section 20to store them.

Next, an operation will be explained. FIG. 11 is a flowchartillustrating yet another example of the function control process thatthe external request type function control system executes. As shown inFIG. 11, in this embodiment, a process (step S103 a) of confirming thecredit information 43 of the function control information 40 is includedin addition to the processes shown in FIG. 6. Additionally, FIG. 11 hasan identical step number affixed to the process identical to the processshown in FIG. 6.

The function control information transmitter 30 repeatedly transmits thefunction control information 40 that the information filer 32 stores(step S101). In this embodiment, the function control information 40 hasthe credit information 43 described such as a certificate for certifyinga sender issued by an authentication bureau, and an electronic signaturefor guaranteeing that another person has not tampered the content of thefunction control information 40 in addition to the function controlcontent 41 shown in the first embodiment.

When the mobile telephone 10 enters the communication area (step S102),and receives the function control information 40 (step S103), it causesthe storage section 20 to store the received function controlinformation 40. The credibility confirmer 16 verifies existence of thetampering of the sender of the function control information 40 and thecontent of the function control information 40 based upon the creditinformation 43 of the function control information 40, and theinformation and encryption key for verifying the sender and existence ofthe tampering that the storage section 20 stores (step S103 a). Forexample, the credibility confirmer 16 authenticates the creditinformation 43 by employing a public key encryption technology, therebyto determine existence of the tampering of the sender and the content ofthe function control information 40. In this case, the mobile telephone10 may acquire it by inquiring of the authentication bureau in somecases, and receiving the encryption key from an external server via anetwork in some cases.

In a case where the credibility confirmer 16 has determined that averification result is correct (that is, it has determined that thesender is correct and the content of the function control information 40has not been tampered), the mobile telephone 10 executes the processessimilar to the processes in the procedure shown in the first embodiment(step S104 to S109), and analyzes the content of the function controlinformation 40, thereby to control the function, being a control object.In a case where the credibility confirmer 16 has determined that averification result is not correct (that is, it has determined that thesender is not correct or the content of the function control information40 has been tampered), the mobile telephone 10 scraps the functioncontrol information 40 (step S106).

As mentioned above, in accordance with this embodiment, the terminaldevice (the mobile telephone 10) includes credibility confirmation means(the credibility confirmer 16) for verifying the function controlinformation 40. Accordingly, the terminal device can determine, select,and execute only reliable information out of the received functioncontrol information 40.

Embodiment 4

Next, a fourth embodiment of the present invention will be explained bymaking a reference to the accompanied drawings. In this embodiment, aconfiguration of the external request type function control system issimilar to the configuration shown in FIG. 1; however this embodimentdiffers from the first embodiment in the content of the function controlinformation 40 and the configuration of the mobile telephone 10.

FIG. 12 is an explanatory view illustrating yet another example of thefunction control information 40. As shown in FIG. 12, the functioncontrol information 40 includes an execution condition 44 indicating acondition for executing the function control in addition to the functioncontrol content 41 shown in FIG. 3. Additionally, the executioncondition 44 may be described in plural in one kind of the functioncontrol information 40.

FIG. 13 is a block diagram illustrating yet another configurationexample of the mobile telephone 10. As shown in FIG. 13, this embodimentdiffers from the first embodiment in a point that the mobile telephone10 includes a situation analyzer 17 in addition to the components shownin FIG. 5. Additionally, FIG. 13 has an identical code affixed to anelement identical to the component shown in FIG. 5.

The situation analyzer 17 determines and verifies whether or not thestate of the mobile telephone 10 meets the execution condition 44 of thefunction control described in the function control information 40. Forexample, the situation analyzer 17 determines whether or not the noisesituation in the surroundings of the mobile telephone 10, a processingcapacity of the mobile telephone 10, and the operational situation meetthe execution condition 44.

Next, an operation will be explained. FIG. 14 is a flowchartillustrating yet another example of the function control process thatthe external request type function control system executes. As shown inFIG. 14, in this embodiment, a process (step S103 d) of confirming theexecution condition 44 of the function control described in the functioncontrol information 40 is included in addition to the processes shown inFIG. 6. Additionally, FIG. 14 has an identical step number affixed tothe process identical to the process shown in FIG. 6.

The function control information transmitter 30 repeatedly transmits thefunction control information 40 that is stored in the information filer32 (step S101). In this embodiment, the function control information 40has the execution condition 44 of the function control described inaddition to the function control content 41 shown in the firstembodiment. The execution condition 44 is, for example, a condition of atime and location, a condition based upon the situation of thesurroundings such as a sound being noisy, a condition of an age andgender of the user of the mobile telephone 10, a condition based upon anability and an operational situation of the mobile telephone 10, and acondition based upon the processes executed in the past by the mobiletelephone 10.

When the mobile telephone 10 enters the communication area (step S102),and receives the function control information 40 (step S103), it causesthe storage section 20 to store the received function controlinformation 40. The situation analyzer 17 determines and verifieswhether or not the state of the mobile telephone 10 meets the executioncondition 44 of the function control information 40 (step S103 d).

For example, in a case where the condition of a time is included in theexecution condition 44, the situation analyzer 17 inputs the currenttime information by inquiring it of a timer section that the mobiletelephone 10 includes, and determines whether or not the current timemeets the execution condition 44. Further, in a case where the conditionbased upon the situation of the surroundings is included in theexecution condition 44, the situation analyzer 17 employs a sensor value(for example, a sound volume) of a sensor that the mobile telephone 10includes, thereby to determine whether or not the execution condition 44is met. Further, in a case where the condition based upon an age of theuser is included in the execution condition 44, the situation analyzer17 determines whether or not the execution condition 44 is met basedupon profile information that the storage section 20 pre-stores.Further, in a case where the condition based upon an operationalsituation of the mobile telephone 10 is included in the executioncondition 44, the situation analyzer 17 determines the operationalsituation of each function by inquiring it of the monitor 13, thereby todetermine whether or not the execution condition 44 is met.

In the step S103 d, the situation analyzer 17 can acquire the timeinformation from a timer of the mobile telephone 10, information of thelocation from a base station of the mobile telephone 10 and a GPSsignal, information of the situation of the surroundings by employingsensors such as a microphone and a camera, and an age and gender of theuser by causing a memory to store it, respectively. Additionally, in acase where a plurality of the conditions are included, the situationanalyzer 17 determines and verifies whether or not all conditions aremet.

In a case where the situation analyzer 17 has determined that averification result is correct (that is, it has determined that thestate of the mobile telephone 10 meets the execution condition 44), themobile telephone 10 proceeds to a next process, and executes theprocesses similar to the processes in the procedure shown in the firstembodiment (step S104 to S109). In a case where the situation analyzer17 has determined that a verification result is not correct (that is, ithas determined that the state of the mobile telephone 10 does not meetthe execution condition 44), the mobile telephone 10 scraps the functioncontrol information 40 (step S106).

As mentioned above, in accordance with this embodiment, the terminaldevice (the mobile telephone 10) includes situation analysis means (thesituation analyzer 17) for confirming the condition under which thefunction control is executed. Accordingly, it is possible to make aconfiguration so as to execute only the function control under which thestate of the terminal device meets the execution condition 44, out ofthe received function control information 40.

Embodiment 5

Next, a fifth embodiment of the present invention will be explained bymaking a reference to the accompanied drawings. In this embodiment, aconfiguration of the external request type function control system issimilar to the configuration shown in FIG. 1; however this embodimentdiffers from the first embodiment in the content of the function controlinformation 40 and the configuration of the mobile telephone 10.

FIG. 15 is an explanatory view illustrating yet another example of thefunction control information 40. As shown in FIG. 15, the functioncontrol information 40 includes a compulsory force 45, being informationfor specifying whether or not an execution of the function control isinquired of the user, in addition to the function control content 41shown in FIG. 3. Additionally, the compulsory force 45 may be signifiedwith the priority degree 42 shown in the second embodiment.

FIG. 16 is a block diagram illustrating yet another configurationexample of the mobile telephone 10. As shown in FIG. 16, this embodimentdiffers from the first embodiment in a point that the mobile telephone10 includes a compulsory force determinator 18 in addition to thecomponents shown in FIG. 5. Additionally, FIG. 16 has an identical codeaffixed to an element identical to the component shown in FIG. 5.

The compulsory force determinator 18 determines whether or not anexecution of the function control is inquired of the user of the mobiletelephone 10 based upon the compulsory force 45 of the function controldescribed in the function control information 40. The storage section 20stores a process content corresponding to the compulsory force 45described in the function control information 40 in addition to theinformation content shown in the first embodiment. For example, thestorage section 20 stores the process content of the effect that with acompulsory force 45 “1”, the object function is controllable evenwithout inquiring it of the user. Further, the storage section 20 storesthe process content of the effect that with a compulsory force 45 “2”,an execution of the object function has to be inquired of the userbefore execution.

Next, an operation will be explained. FIG. 17 is a flowchartillustrating yet another example of the function control process thatthe external request type function control system executes. As shown inFIG. 17, in this embodiment, processes (step S107 c and 107 d) ofselecting permission/refusal of an execution of the function control bythe user of the mobile telephone 10, which employ the compulsory force45 described in the function control information 40, are included inaddition to the processes shown in FIG. 6. Additionally, FIG. 17 has anidentical step number affixed to the process identical to the processshown in FIG. 6.

The function control information transmitter 30 repeatedly transmits thefunction control information 40 that the information filer 32 stores(step S101). In this embodiment, the function control information 40 hasthe compulsory force 45 of the function control described in addition tothe function control content 41 shown in the first embodiment. Forexample, the function control information 40 has a compulsory force 45“1”, a compulsory force 45 “2” and so on described. Further, in thisembodiment, the storage section 20 has pre-stored the process content ofthe effect that with the compulsory force 45 “1”, the object function iscontrollable even without inquiring it of the user. Further, the storagesection 20 has pre-stored the process content of the effect that withthe compulsory force 45 “2”, an execution of the object function has tobe inquired of the user before execution.

In FIG. 17, the processes in the step S102 to step S107 are similar tothe processes shown in FIG. 6. In this embodiment, the mobile telephone10 executes a determination process based upon the compulsory force 45described in the function control information 40 before executing theprocesses (step S108 and step S109) for controlling the function, beinga control object, described in the function control information 40.

The compulsory force determinator 18 determines whether the value of thecompulsory force 45 of the function control information 40 is “1” or “2”(step S107 c). And, the mobile telephone 10 extracts and executes aprocess content corresponding to the value of the compulsory force 45from the storage section 20. That is, in a case where compulsory forcedeterminator 18 has determined that the value of the compulsory force 45is “1”, the mobile telephone 10 executes the control of the function,being a control object, as it is, irrespective of a user's intention.Further, in a case where compulsory force determinator 18 has determinedthat the value of the compulsory force 45 is “2”, the mobile telephone10 displays a window screen for urging the user for an input instructionfor permitting an execution of the function control. Giving an inputinstruction from the window screen enables the user to selectpermission/refusal of an execution of the function control.

The mobile telephone 10 determines whether or not an input instructionfor permitting an execution of the function control has been given bythe user (step S107 d). When the mobile telephone 10 determines that aninput instruction for permitting an execution of the function controlhas been given, it executes the control of the function, being a controlobject (step S108 and step S109). When the mobile telephone 10determines that the value of the compulsory force 45 of the functioncontrol information 40 is “2” and determines that an input instructionfor permitting an execution of the function control has not been givenby the user, it scraps the function control information 40 (step S106).

As mentioned above, in accordance with this embodiment, the terminaldevice (the mobile telephone 10) includes situation analysis means (thecompulsory force determinator 18) for deciding whether or not anexecution permission of the function control is requested of the user ofthe external request type function control device based upon evaluationinformation (the compulsory force 45) described in the function controlinformation 40. Accordingly, it is possible to automatically execute thefunction control by the received function control information 40, andalso possible to execute only the function control permitted by theuser.

Embodiment 6

Next, a sixth embodiment of the present invention will be explained bymaking a reference to the accompanied drawings. In this embodiment, aconfiguration of the external request type function control system issimilar to the configuration shown in FIG. 1; however this embodimentdiffers from the first embodiment in the content of the function controlinformation 40 and the configuration of the mobile telephone 10.

FIG. 18 is an explanatory view illustrating yet another example of thefunction control information 40. As shown in FIG. 18, the functioncontrol information 40 includes cancellation information 46 indicating acondition under which an execution of the function control is cancelledin addition to the function control content 41 shown in FIG. 3. Thecancellation information 46 is, for example, a condition of a time andlocation, a condition based upon the situation of the surroundings suchas a sound being noisy, a condition of an age and gender of the user,and a condition based upon an ability and an operational situation ofthe mobile telephone 10, or the like. Additionally, the cancellationinformation 46 may be described in plural within one kind of thefunction control information 40.

FIG. 19 is a block diagram illustrating yet another configurationexample of the mobile telephone 10. As shown in FIG. 19, this embodimentdiffers from the first embodiment in a point that the mobile telephone10 includes a cancellation manager 19 in addition to the componentsshown in FIG. 5. Further, this embodiment differs from the firstembodiment in the content of the information that is stored in thestorage section 20. Additionally, FIG. 19 has an identical code affixedto an element identical to the component shown in FIG. 5.

The cancellation manager 19 causes the storage section 20 to store thecancellation information 46 described in the function controlinformation 40 in executing the function control based upon the functioncontrol information 40. Further, the cancellation manager 19 determineswhether or not the state of the mobile telephone 10 meets the conditionof the cancellation information 46. Further, when the cancellationmanager 19 determines that the state of the mobile telephone 10 meetsthe condition of the cancellation information 46 described in thefunction control information 40, it cancels an execution of the functionbased upon the function control information 40.

The storage section 20 stores the cancellation information 46 describedin the function control information 40 in executing the function controlbase upon the function control information 40 in addition to theinformation content shown in the first embodiment.

Next, an operation will be explained. FIG. 20 is a flowchartillustrating yet another example of the function control process thatthe external request type function control system executes. As shown inFIG. 20, in this embodiment, a process (step S107 e) of storing thecancellation information 46 of the function control, a process (stepS102 a) of determining whether or not the state of the mobile telephone10 is equivalent to the cancellation information 46, and a process (stepS102 b) of canceling the function control are included in addition tothe processes shown in FIG. 6. Additionally, FIG. 20 has an identicalstep number affixed to the process identical to the process shown inFIG. 6.

The function control information transmitter 30 repeatedly transmits thefunction control information 40 that the information filer 32 stores(step S101). In this embodiment, the function control information 40 hasthe cancellation information 46 described indicating a condition underwhich the control of the function is cancelled in addition to thefunction control content 41 shown in the first embodiment. Thecancellation information 46 is, for example, a condition of a lapse timesince controlling the function and a location, a condition based uponthe situation of the surroundings such as a sound being noisy, acondition of an age and gender of the user, a condition based upon anability and an operational situation of the mobile telephone 10, and acondition based upon the process executed in the past by the mobiletelephone 10.

In FIG. 20, the processes in the step S102, and the step S103 to stepS107 are similar to the processes shown in FIG. 6. In this embodiment,the cancellation manager 19 causes the storage section 20 to store thecancellation information 46 of the function control information 40 (stepS107 e) before executing the processes (step S108 and step S109) forcontrolling the function, being a control object, described in thefunction control information 40.

The cancellation manager 19 regularly detects whether or not the stateof the mobile telephone 10 is equivalent to the cancellation information46 at a pre-decided predetermined time period (step S102 a). That is,the cancellation manager 19 regularly determines whether or not thestate of the mobile telephone 10 meets the condition of the cancellationinformation 46. When the cancellation manager 19 determines that thestate of the mobile telephone 10 is equivalent to the cancellationinformation 46 (meets the condition of the cancellation information 46),it cancels an execution of the function control that is currently beingactivated, and erases the corresponding function control information 40that the storage section 20 stores (step S102 b). When the cancellationmanager 19 determines that the state of the mobile telephone 10 does notmeet the condition of the cancellation information 46, the mobiletelephone 10 does not cancel an execution of the function control.

In the step S102 a, for example, in a case where the condition of a timeis included in the cancellation information 46, the cancellation manager19 inputs the current time information by inquiring it of the timersection that the mobile telephone 10 includes, and determines whether ornot the current time meets the cancellation information 46. Further, ina case where the condition based upon the situation of the surroundingis included in the cancellation information 46, the cancellation manager19 employs a sensor value (for example, a sound volume) of a sensor thatthe mobile telephone 10 includes, thereby to determine whether or notthe cancellation information 46 is met. Further, in a case where thecondition based upon an age of the user is included in the cancellationinformation 46, the cancellation manager 19 determines whether or notthe cancellation information 46 is met based upon profile informationthat the storage section 20 pre-stores. Further, in a case where thecondition based upon the operational situation of the mobile telephone10 is included in the cancellation information 46, the cancellationmanager 19 determines the operational situation of each function byinquiring it of the monitor 13, thereby to determine whether or not thecancellation information 46 is met.

In the step S102 a, the cancellation manager 19 can acquire the timeinformation from a timer of the mobile telephone 10, information of thelocation from a base station of the mobile telephone 10 and a GPSsignal, the information of the situation of the surroundings byemploying sensors such as a microphone and a camera, and an age andgender of the user by causing a memory to store it, respectively.Additionally, in a case where a plurality of the conditions areincluded, the cancellation manager 19 determines and verifies whether ornot all of the conditions are met.

Embodiment 7

Next, a seventh embodiment of the present invention will be explained bymaking a reference to the accompanied drawings. FIG. 21 is anexplanatory view illustrating another configuration example of theexternal request type function control system. This embodiment differsfrom the first embodiment in a point that the mobile telephone 10belongs to a plurality of areas (a region in which plural areas areoverlapped with each other) in which communication can madesimultaneously, and that the function control information transmitter 30that transmits the different the function control information 40 existsin plural.

FIG. 22 is an explanatory view illustrating yet another example of thefunction control information 40. As shown in FIG. 22, the functioncontrol information 40 includes evaluation information 47 indicatingvalidity of the function control in addition to the function controlcontent 41 shown in FIG. 3. Additionally, the evaluation information 47may be signified with the priority degree 42 shown in the secondembodiment and the compulsory force 45 shown in the fifth embodiment.

Further, in this embodiment, a configuration of the mobile telephone 10is similar to the configuration of the mobile telephone 10 in the fourthembodiment shown in FIG. 13. In this embodiment, the process content ofthe situation analyzer 17 is different from that of the fourthembodiment.

In this embodiment, in having received plural kinds of the functioncontrol information 40, the situation analyzer 17 decides an order ofthe process based upon the evaluation information 47 of the functioncontrol information 40. Specifically, the storage section 20 haspre-stored a correspondence relation between the evaluation information47 and the order of the process, so the situation analyzer 17 decidesthe order of the processes based upon a correspondence relation that thestorage section 20 stores. Further, the function control information hasthe evaluation information 47 described in a format (for example, apriority order) that allows the order of the evaluation information 47itself to be grasped, so the situation analyzer 17 may decide the orderof the process based upon the order that is shown in the evaluationinformation 47.

Next, an operation will be explained. FIG. 23 is a flowchartillustrating yet another example of the function control process thatthe external request type function control system executes. As shown inFIG. 23, in this embodiment, a process (step S103 c) of, in a case ofhaving received plural kinds of the function control information 40,deciding the process order based upon the evaluation information 47 ofthe function control information 40, and a process (step S111) ofdetermining an execution of the process of the next function controlinformation 40 are included in addition to the processes shown in FIG.6. Additionally, FIG. 23 has an identical step number affixed to theprocess identical to the process shown in FIG. 6.

The function control information transmitter 30 repeatedly transmits thefunction control information 40 that the information filer 32 stores(step S101). In this embodiment, the function control information 40 hasthe evaluation information 47 described indicating validity of thefunction control in addition to the function control content 41 shown inthe first embodiment. The evaluation information 47 is, for example, acredit degree of the sender of the function control information 40, arecommendation degree in word-of-mouth information, or the like.Additionally, the evaluation information 47, which is comparableinformation enabling superiority/inferiority to be decide, may beinformation other than the credit degree and the recommendation degree.

When the mobile telephone 10 enters the region in which a plurality ofthe communication areas are overlapped with each other (step S102) andreceives plural kinds of the function control information 40 (stepS103), it causes the storage section 20 to store the received all kindsof the function control information 40. The situation analyzer 17compares each evaluation information 47 of the received respective kindsof the function control information 40 with the other, thereby to decidean order of the process by the function control information 40 (stepS103 c).

For example, in a case where the function control information has theevaluation information 47 described in a format that allows the order ofthe evaluation information 47 itself to be grasped, for example, in sucha manner that the value of the evaluation information 47 is “evaluation:high”, and “evaluation: low”, respectively, the situation analyzer 17compares each evaluation information 47 of the function controlinformation 40 with the other as it stands. And, the situation analyzer17 decides the order in which the process of the function control by thefunction control information 40 is executed according to the value ofthe evaluation information 47. Further, for example, in a case where thestorage section 20 pre-stores a correspondence relation between theevaluation information 47 and the order of the process, the situationanalyzer 17 may employ a correspondence relation that the storagesection 20 stores, thereby to decide the order of the process.

Additionally, in a case where the values of the evaluation information47 of the two compared kinds of the function control information 40 areidentical, and cannot be ordered, the situation analyzer 17 may employyet another comparison information, thereby to decide the order of theprocess. For example, the situation analyzer 17 may employ a radio waveintensity in having received the function control information 40 fromthe function control information transmitter 30, a reception order inwhich the function control information 40 has been received, or the likein addition to the evaluation information 47, thereby to decide theorder of the process. Further, it is also acceptable that the situationanalyzer 17 obtains a distance between the mobile telephone 10 and thefunction control information transmitter 30, and employs the obtaineddistance to the function control information transmitter 30, thereby todecide the order of the process.

Upon deciding the process order, the mobile telephone 10 specifies thecontrol object function of the function control information 40 of whichthe process order is highest (step S104 to step S107), and controls thefunction, being a control object, (step S108 and step S109). Further,the mobile telephone 10 determines whether or not the other functioncontrol information 40 exists (step S111). In a case where the mobiletelephone 10 has determined that the other function control information40 exists, it repeatedly executes the processes of the step S104 to thestep 109 for the function control information 40 of which the processorder is second highest.

As mentioned above, in accordance with this embodiment, the functioncontrol information 40, which is transmitted from the outside, has theevaluation information 47 described for indicating validity of thefunction control. And, the terminal device (the mobile telephone 10)includes adjustment means (the situation analyzer 17) for deciding theorder of the function control process based upon its evaluationinformation 47. Accordingly, it is possible to execute the valid processeven in a case of having received plural kinds of the function controlinformation 40.

Embodiment 8

Next, an eighth embodiment of the present invention will be explained bymaking a reference to the accompanied drawings. In this embodiment, aconfiguration of the external request type function control system issimilar to the configuration shown in FIG. 21; however this embodimentdiffers from the seventh embodiment in the process content of thesituation analyzer 17 and the content of the information that thestorage section 20 stores. Additionally, in this embodiment, aconfiguration of the mobile telephone 10 is similar to that of themobile telephone 10 in the fourth embodiment shown in FIG. 13.

The storage section 20 stores a priority order (hereinafter, referred toas a function priority order) of the process of the function controlwithin the mobile telephone 10 in addition to the information contentshown in the first embodiment. In a case of having received plural kindsof the function control information 40, the situation analyzer 17compares each of the functions described so as to be controlled in linewith the respective received function control contents 41 with the otherby collating the function priority order that the storage section 20stores, thereby to determine the order of the process by the functioncontrol information 40.

Next, an operation will be explained. FIG. 24 is a flowchartillustrating yet another example of the function control process thatthe external request type function control system executes. As shown inFIG. 24, in this embodiment, a process (step S104 a) of deciding theorder of the process by the function control information 40, and aprocess (step S111) of determining the process execution of the nextfunction control information 40 are included in addition to theprocesses shown in FIG. 6. In the step S104 a, in a case of havingreceived plural kinds of the function control information 40, after thesituation analyzer 17 specifies the control object function from thefunction control content 41 of the function control information 40, itcollates the function described so as to be controlled in line with eachreceived function control content 41 with the function control orderthat the storage section 20 stores, thereby to determine the order ofthe process by the function control information 40. Additionally, FIG.24 has an identical step number affixed to the process identical to theprocess shown in FIG. 6.

The order of the process has already been decided for controlling thefunction of the function section 15, so the storage section 20 haspre-stored the function control order. For example, in a case where acontrol of setting the mode to a manner mode is given a higher prioritythan a control of starting a browser, the storage section 20 stores thepriority order higher than that of the control for starting the browseras the function control order of the manner mode control. Additionally,the function control order to be stored by the storage section 20 may beupdated at a real-time basis depending upon the situation of the mobiletelephone 10 etc.

When the mobile telephone 10 enters a region of a plurality of thecommunication areas in which a plurality of the communication areas areoverlapped with each other (step S102), and receives plural kinds of thefunction control information 40 (step S103), it causes the storagesection 20 to store the received all kinds of the function controlinformation 40. Further, the mobile telephone 10 specifies the function,being a control object, based upon the function control content 41 ofthe received function control information 40 (step S104).

Further, the situation analyzer 17 inquires of the storage section 20the priority order of the control object function of the respectivekinds of the received function control information 40. And, thesituation analyzer 17 decides the process order of the function controlinformation 40 according to the function control order that the storagesection 20 stores (step S104 a).

Upon deciding the process order, the mobile telephone 10 controls thefunction, being a control object, of the function control information 40of which the process order is highest (step S105 to step S109). Further,the mobile telephone 10 determines whether or not the other functioncontrol information 40 exists (step S111). In a case where the mobiletelephone 10 has determined that the other function control information40 exists, it repeatedly executes the processes of the step S105 to thestep 109 for the function control information 40 of which the processorder is second highest.

As mentioned above, in accordance with this embodiment, the terminaldevice (the mobile telephone 10) stores the execution order of thefunction that is controllable by the function control information 40.And, the terminal device includes adjustment means (the situationanalyzer 17) for, in having received plural kinds of plural functioncontrol information 40, deciding the process order of the functioncontrol information 40 according to the execution order of its function.Accordingly, it is possible to execute the valid process even in a caseof having received plural kinds of the function control information 40.

Embodiment 9

Next, a ninth embodiment of the present invention will be explained bymaking a reference to the accompanied drawings. In this embodiment, anexample having the embodiments shown in the first embodiment to theeighth embodiment illustrated more specifically will be explained.

FIG. 25 is an explanatory view illustrating an application environmentin the case of having applied the external request type function controlsystem to a movie theater. As shown in FIG. 25, the external requesttype function control system includes a plurality of function controlinformation transmitters 30 a, 30 b, 30 c, 30 d, and 30 e. Further, inthis embodiment, as the user migrates, the mobile telephone 10sequentially migrates from a position of a mobile telephone 10 a to aposition of a mobile telephone 10 e shown in FIG. 25. Additionally, inthis embodiment, in a case of comprehensively expressing the functioncontrol information transmitters 30 a to 30 e, or in a case of pointingto any of the function control information transmitters, it is simplyreferred to as the function control information transmitter 30.

As shown in FIG. 25, in this embodiment, the function controlinformation transmitters 30 for transmitting the function controlinformation 40 for controlling the function of the mobile telephone 10are placed in a gateway, a ticket barrier, a seat, and a stand,respectively. The function control information transmitter 30 is, forexample, a wireless LAN apparatus, a RFID tag, and a feeble radio waveapparatus.

FIG. 26 is an explanatory view illustrating yet another example of thefunction control information 40. As shown in FIG. 26, the functioncontrol information 40 includes icon information 48 for display an iconfor notifying reception of the function control information 40 to theuser of the mobile telephone 10 in addition to the information contentsshown in FIG. 3, FIG. 7, FIG. 9, FIG. 12, FIG. 15, FIG. 18, and FIG. 22.Additionally, FIG. 25 has an identical code affixed to an elementidentical to each information element of the function controlinformation 40 shown in FIG. 3, FIG. 7, FIG. 9, FIG. 12, FIG. 15, FIG.18, and FIG. 22.

FIG. 27 is an explanatory view illustrating an example of the specificcontents of function control information 40-a to 40-e that each functioncontrol information transmitter 30 transmits.

The function control information transmitter 30 a that is placed in agateway transmits the function control information 40-a. The functioncontrol information 40-a includes the condition of the effect that themanner mode has not been set as the execution condition 44. Further, thefunction control information 40-a includes as the function controlcontent 41 information saying the effect that it is stored that the modehas been set to the manner mode and the function control by thisfunction control information 40-a has been executed. Further, thefunction control information 40-a includes the priority degree 42 “low”,the evaluation information 47 “high”, and the compulsory force 45“normal”. Further, the function control information 40-a includes thecondition of the effect that the function control is cancelled afterfour hours since the execution thereof as the cancellation information46. Further, the function control information 40-a includes informationfor displaying an icon of a ◯◯ movie theater a as the icon information48. Further, the function control information 40-a has the effect thatthe information sender is a ◯◯ movie theater described, and has asignature affixed indicating the effect that the function controlinformation 40-a has not been tampered as the credit information 43.

The function control information transmitter 30 b that is placed in aticket barrier transmits the function control information 40-b. Thefunction control information 40-b includes the condition of the effectthat the mobile telephone 10 has application software of an electronicticket installed as the execution condition 44. Further, The functioncontrol information 40-b includes information saying the effect that theapplication software of an electronic ticket is started as the functioncontrol content 41. Further, the function control information 40-bincludes the priority degree 42 “low”, the evaluation information 47“low”, and the compulsory force 45 “normal”. Further, the functioncontrol information 40-b includes the condition of the effect that thefunction control information 40-b has not received as the cancellationinformation 46. Further, the function control information 40-b includesinformation for displaying an icon of a ◯◯ movie theater b as the iconinformation 48. Further, the function control information 40-b has theeffect that the information sender is a ◯◯ movie theater described, andhas a signature affixed indicating the effect that the function controlinformation 40-b has not been tampered as the credit information 43.

The function control information transmitter 30 c that is placed in aseat transmits the function control information 40-c. The functioncontrol information 40-c includes information saying the effect that acamera photographing is prohibited, information saying the effect that abacklight of a liquid crystal is caused to come into a state ofnon-lighting, and information saying the effect that the mode is set tomanner mode as the function control content 41. Further, the functioncontrol information 40-c includes the priority degree 42 “high”, theevaluation information 47 “high”, and the compulsory force 45“compulsory”. Further, the function control information 40-c includesthe condition of the effect that the function control information 40-chas not been received as the cancellation information 46. Further, thefunction control information 40-c includes information for displaying anicon of a ◯◯ movie theater c as the icon information 48. Further, thefunction control information 40-c has the effect that the informationsender is a ◯◯ movie theater described, and has a signature affixedindicating the effect that the function control information 40-c has notbeen tampered as the credit information 43. Additionally, the functioncontrol information 40-c does not include the execution condition 44.

The function control information transmitter 30 d that is placed in astand transmits the function control information 40-d. The functioncontrol information 40-d includes the condition of the effect that themobile telephone 10 has application software for a process of settlingan account installed as the execution condition 44. Further, thefunction control information 40-d includes information saying that theapplication software for a process of settling an account is started asthe function control content 41. Further, the function controlinformation 40-d includes the priority degree 42 “low”, the evaluationinformation 47 “low”, and the compulsory force 45 “normal”. Further, thefunction control information 40-d includes the condition of the effectthat the function control information 40-d has not received as thecancellation information 46. Further, the function control information40-d includes information for displaying an icon of a ΔΔ stand d as theicon information 48. Further, the function control information 40-d hasthe effect that the information sender is a ΔΔ stand described, and hasa signature affixed indicating the effect that the function controlinformation 40-d has not been tampered as the credit information 43.

One function control information transmitter 30 e is additionallymounted in a gateway apart from the function control informationtransmitter 30 a. One function control information transmitter 30 e thatis additionally placed in a gateway transmits the function controlinformation 40-e. The function control information 40-e includes thecondition of the effect that the function control information 40-a hasbeen executed as the execution condition 44. Further, The functioncontrol information 40-e includes information saying the effect that themanner mode is cancelled, information saying the effect that the effectthat the function control information 40-a has been executed is erased,and information saying the effect that a discount ticket of a next-timemovie show is distributed as the function control content 41. Further,the function control information 40-e includes the priority degree 42“high”, the evaluation information 47 “high”, and the compulsory force45 “normal”. Further, the function control information 40-e includes thecondition of the effect that the function control information 40-e hasnot been received as the cancellation information 46. Further, thefunction control information 40-e includes information for displaying anicon of a ◯◯ movie theater e as the icon information 48. Further, thefunction control information 40-e has the effect that the informationsender is a ◯◯ movie theater described, and has a signature affixedindicating the effect that the function control information 40-e has notbeen tampered as the credit information 43.

FIG. 28 is a block diagram illustrating yet another configurationexample of the mobile telephone 10. A configuration of the mobiletelephone 10 shown in FIG. 28 is equivalent to the configurationobtained by all combining each component shown in FIG. 5, FIG. 10, FIG.13, FIG. 16, and FIG. 19. Additionally, FIG. 28 has an identical codeaffixed to an element identical to the component shown in FIG. 5, FIG.10, FIG. 13, FIG. 16, and FIG. 19. Further, in this embodiment, themobile telephone 10 includes a function of setting the manner mode, anda camera. Further, the mobile telephone 10 has the application softwareof an electronic ticket and the application software for a process ofsettling an account mounted (installed).

The storage section 20 of the mobile telephone 10 stores an encryptionkey corresponding to the sender. Further, the storage section 20 storesthe effect that with a relation between the priority degree 40 of thefunction control information 40 and the current control source of thefunction, “the value “high” of the priority degree 40″, “a user'soperation”, “the value “low” of the priority degree 42″, and “no” arehigh in its order in terms of the priority degree. Further, the storagesection 20 stores the effect that the value “high” of the evaluationinformation 47 is higher than the value “low” in terms of evaluation.Further, the storage section 20 stores the effect that with the value“compulsory” of the compulsory force 45, the function control isexecutable even without inquiring it of the user. Further, the storagesection 20 stores the effect that with the value “normal” of thecompulsory force 45, the function control cannot be executed without auser's permission.

Additionally, a function of each component of the mobile telephone 10other than the storage section 20 is similar to the function shown inthe first embodiment to the eighth embodiment.

Next, an operation will be explained. Each of FIG. 29 and FIG. 30 is aflowchart illustrating yet another example of the function controlprocess that the external request type function control system executes.As shown in FIG. 29 and FIG. 30, in this embodiment, a process (stepS103 b) of determining whether or not the function control information40 has been received in plural, and a process (step S107 b) ofdisplaying an icon are included in addition to the processes shown inFIG. 6, FIG. 11, FIG. 14, FIG. 17, FIG. 20, and FIG. 23. Additionally,FIG. 29 and FIG. 30 have an identical step number affixed to the processidentical to the process shown in FIG. 6, FIG. 11, FIG. 14, FIG. 17,FIG. 20, and FIG. 23. Hereinafter, the processes in the case that themobile telephone 10 sequentially migrates to a position of the mobiletelephone 10 a, a position of the mobile telephone 10 b, a position ofthe mobile telephone 10 c, a position of the mobile telephone 10 d, anda position of the mobile telephone 10 e shown in FIG. 25 will beexplained, respectively.

In this embodiment, it is assumed that when the user has arrived at anentrance to a movie theater at the first time, the mobile telephone 10is in a state where no operation is performed with an electric powerswitched on. The function control information transmitter 30 arepeatedly transmits the function control information 40-a consecutivelyand intermittently. Further, the function control informationtransmitter 30 b repeatedly transmits the function control information40-b consecutively and intermittently. Further, the function controlinformation transmitter 30 c repeatedly transmits the function controlinformation 40-c consecutively and intermittently. Further, the functioncontrol information transmitter 30 d repeatedly transmits the functioncontrol information 40-d consecutively and intermittently. Further, thefunction control information transmitter 30 e repeatedly transmits thefunction control information 40-e consecutively and intermittently (stepS101).

An operation in the case that the user arrives at an entrance to a movietheater at the first time and the mobile telephone 10 is located at aposition of the mobile telephone 10 a in the vicinity of a gateway of amovie theater shown in FIG. 25 will be explained. When the mobiletelephone 10 enters a communication area of the function controlinformation transmitter 30 a (step S102), the reception section 11 ofthe mobile telephone 10 employs communication means (for example,another antenna and transmission/reception section) other than thecommunication means that is employed for making a call, or the like,thereby to receive the function control information 40-a from thefunction control information transmitter 30 a (step S103). And, thereception section 11 causes the storage section 20 to store the receivedfunction control information 40-a.

The credibility confirmer 16 verifies credit information 43 “a sender: asignature of a ◯◯ movie theater”, thereby to determine whether or notthe credit information 43 is valid (step S103 a). Specifically, thecredibility confirmer 16 employs a public key encryption technology etc.to authenticate the credit information 43 based upon an encryption keycorresponding to “sender: of a ◯◯ movie theater” that the storagesection 20 stores, and verifies existence of the tampering of the senderand the content of the function control information 40-a. In a casewhere the credibility confirmer 16 has failed in the authentication andhas determined that a verification result is not correct, the mobiletelephone 10 scraps the function control information 40-a (step S106).

Further, the mobile telephone 10 determines whether or not the functioncontrol information 40 has been received in plural (step S103 b). In acase where the mobile telephone 10 has determined that the functioncontrol information 40 has been received in plural, the situationanalyzer 17 inquires of the storage section 20 the order of the processthat corresponds to the evaluation information 47 of respective kinds ofthe function control information 40, thereby to decide the order of theprocess (step S103 c).

The situation analyzer 17 of the mobile telephone 10 determines andverifies whether or not the state of the mobile telephone 10 meets theexecution condition 44 of the function control in the descending order,to begin with the function control information 40 of which the processpriority is highest (step S103 d). In this example, as shown in FIG. 27,the execution condition 44 of the function control information 40-a isthat “the manner mode has not been set”. The mobile telephone 10 is in astate of leaving the electric power switched on, whereby upon inquiringof the monitor 13, the situation analyzer 17 receives the effect thatthe manner mode has not been set. Accordingly, in this example, thesituation analyzer 17 determines that the state of the mobile telephone10 meets the condition. Additionally, in a case where the condition isnot met in the step S103 b, the mobile telephone 10 scraps the functioncontrol information 40-a (step S106).

When the situation analyzer 17 determines that the execution condition44 is met, the adjuster 12 specifies the control object function (stepS104). In this example, the adjuster 12 decides specifically that thecontrol object function is a function of setting the manner mode and afunction of recording an execution of the function control information40-a based upon the function control information 40-a shown in FIG. 27.And, by inquiring of the monitor 13, the adjuster 12 determines whetheror not the setting of the manner mode is possible (step S105). In thisexample, the adjuster 12 determines that the function of setting themanner mode exists, and is controllable.

Next, the situation analyzer 17 compares the priority degree 42 of thefunction control with the priority degree of the current control sourceof the control object function (step S107 a). In this embodiment, themonitor 13 causes the storage section 20 to store the control source ofeach function. Further, the storage section 20 has stored a relation aswell between the priority degree of the control source and the prioritydegree 42 of the function control information 40. In this example, theoperation of setting the manner mode has not been performed yet, wherebythe storage section 20 has not stored the current control source of themanner mode setting function. Accordingly, the situation analyzer 17determines that the priority degree 42 of the function controlinformation 40-a is higher than the priority degree of the currentcontrol source.

Additionally, with “a process of storing an execution of the functioncontrol information 40-a”, the instructions for it from a plurality ofthe control sources do not compete with each other, so the situationanalyzer 17 does not have to compare each of the priority degrees withthe other in terms of “a process of storing an execution of the functioncontrol information 40-a”. Thus, the situation analyzer 17 determinesthat the function control of the function control information 40-a ispossible.

When the situation analyzer 17 determines that all of the functioncontrol contents 41 of the function control information 40-a arecontrollable, the mobile telephone 10 displays an icon of a ◯◯ movietheater a based upon the icon information 48 (step S107 b), and notifiesthe effect that the function control information 40-a has been receivedto the user.

Next, the compulsory force determinator 18 inquires of the storagesection 20 a process content corresponding to the compulsory force 45 ofthe function control information 40-a. In this case, the compulsoryforce determinator 18 determines whether or not the value of thecompulsory force 45 is “compulsory” (step S107 c). In this example, thevalue of the compulsory force is “normal”, so the mobile telephone 10displays the effect that an instruction input of permission/refusal ofan execution of the function control is urged, and inquires of the userof the mobile telephone 10 whether or not an execution of the functioncontrol is permitted. The mobile telephone 10 determines whether or notan input instruction for permitting an execution has been given by theuser (step S107 d). In a case where the user does not permit anexecution of the function control (it has been determined that an inputinstruction for permitting an execution has not been given), the mobiletelephone 10 scraps the function control information 40-a (step S106).

In a case where the user has permitted an execution of the functioncontrol (it has been determined that an input instruction for permittingan execution has been given), the cancellation manager 19 causes thestorage section 20 to store the cancellation information 46 “the controlis cancelled after four hours” of the function control information 40-a(step S107 e). Further, the cancellation manager 19 causes the storagesection 20 to store the time when the function, being a control object,is controlled.

And, the mobile telephone 10 controls the control object function (stepS108 and step S109). In this case, the mobile telephone 10 sets the modeof the mobile telephone 10 to the manner mode, and causes the storagesection 20 to store the effect that the function control has beenexecuted according to the function control information 40-a. Further,the monitor 13 causes the storage section 20 to store the control sourcehaving activated the function (step S110). In this case, the monitor 13causes the storage section 20 to store the priority degree 42 “low” asthe control source.

In this state, when the user performs an operation of canceling themanner mode of the mobile telephone 10, the mobile telephone 10determines the current control source and the user's operation in termsof the priority degree in the step S107 a. In this example, the mobiletelephone 10 determines that the priority degree of the user's operationis higher than the priority degree “low”, being the current controlsource of the manner mode, based upon the priority degree of the controlsource that the storage section 20 stores. For this, the user canperform an operation of canceling the manner mode without being effectedby the function control by the function control information 40.

Next, an operation in the case that the mobile telephone 10 has migratedto a position of the mobile telephone 10 b in the vicinity of a ticketbarrier shown in FIG. 25 will be explained. The cancellation manager 19of the mobile telephone 10 regularly detects whether or not the state ofthe mobile telephone 10 is equivalent to the condition of thecancellation information 46, which is stored by the storage section 20,at a predetermined time period (step S102 a). In a case where thecancellation manager 19 has determined that it is equivalent tocancellation information 46 (it meets the condition), it cancels anexecution of the function control (step S102 b).

In this example, the storage section 20 has stored the cancellationinformation 46 “after four hours” of the function control information40-a, whereby the cancellation manager 19 can verify whether or not thestate of the mobile telephone 10 is equivalent to the condition of thecancellation information 46 by employing the time when the functioncontrol by the function control information 40-a has been executed, andtime information of a timer of the mobile telephone 10. Additionally, inthis example, an operation will be explained on the assumption that fourhours have not elapsed since an execution of the function control by thefunction control information 40-a and the function control by thefunction control information 40-a has not been canceled yet.

When the mobile telephone 10 enters the communication area of thefunction control information transmitter 30 b (step S102), the receptionsection 11 of the mobile telephone 10 employs communication means otherthan the communication means that is employed for making a call, therebyto receive the function control information 40-b from the functioncontrol information transmitter 30 b (step S103). And, the receptionsection 11 causes the storage section 20 to store the received functioncontrol information 40-b.

The credibility confirmer 16 verifies credit information 43 “a sender: asignature of a ◯◯ movie theater”, thereby to determine whether or notthe credit information 43 is valid (step S103 a). Specifically, thecredibility confirmer 16 employs a public key encryption technology etc.to authenticate the credit information 43 based upon an encryption keycorresponding to “sender: of a ◯◯ movie theater” that the storagesection 20 stores, and verifies existence of the tampering of the senderand the content of the function control information 40-b. In a casewhere the credibility confirmer 16 has failed in the authentication andhas determined that a verification result is not correct, the mobiletelephone 10 scraps the function control information 40-b (step S106).

When the credibility confirmer 16 has determined that a verificationresult is correct, the situation analyzer 17 determines and verifieswhether or not the state of the mobile telephone 10 meets the executioncondition 44 of the function control information 40 (step S103 d). Inthis example, as shown in FIG. 27, the execution condition 44 of thefunction control information 40-b is that “the electronic ticketapplication software has been mounted”. Upon inquiring of the monitor13, the situation analyzer 17 receives the effect that the electronicticket application software has been mounted. Accordingly, in thisexample, the situation analyzer 17 determines that the state of themobile telephone 10 meets the condition. Additionally, in a case wherethe condition is not met in the step S103 b, the mobile telephone 10scraps the function control information 40-b (step S106).

When the situation analyzer 17 determines that the execution condition44 is met, the adjuster 12 specifies the control object function (stepS104). In this example, the adjuster 12 decides specifically that thecontrol object function is a function of starting the electronic ticketapplication software based upon the function control information 40-bshown in FIG. 27. And, by inquiring of the monitor 13, the adjuster 12determines whether or not the electronic ticket application software isstartable (step S105). In this example, the adjuster 12 determines thatthe application software is startable.

Next, the situation analyzer 17 compares the priority degree 42 of thefunction control information 40-b with the priority degree of thecurrent control source of the control object function (step S107 a). Inthis embodiment, the monitor 13 causes the storage section 20 to storethe control source of each function. Further, the storage section 20 hasstored a relation as well between the priority degree of the controlsource and the priority degree 42 of the function control information40. In this example, the application software is in a state of havingnot been started elsewhere, whereby the storage section 20 has notstored the current control source of the start function of theapplication software. For this, the situation analyzer 17 determinesthat the priority degree 42 of the function control information 40-b ishigher than the priority degree of the current control source. Thus, thesituation analyzer 17 determines that the function control of thefunction control information 40-b is possible.

When the situation analyzer 17 determines that all of the functioncontrol contents 41 of the function control information 40-b arecontrollable, the mobile telephone 10 displays an icon of a ◯◯ movietheater b based upon the icon information 48 (step S107 b), and notifiesthe effect that the function control information 40-b has been receivedto the user.

Next, the compulsory force determinator 18 inquires of the storagesection 20 a process content corresponding to the compulsory force 45 ofthe function control information 40-b. In this case, the compulsoryforce determinator 18 determines whether or not the value of thecompulsory force 45 is “compulsory” (step S107 c). In this example, thevalue of the compulsory force is “normal”, whereby the mobile telephone10 displays the effect that an instruction input of permission/refusalof an execution of the function control is urged, and inquires of theuser of the mobile telephone 10 whether or not an execution of thefunction control is permitted. The mobile telephone 10 determineswhether or not an input instruction for permitting an execution has beengiven by the user (step S107 d). In a case where the user does notpermit an execution of the function control (it has been determined thatan input instruction for permitting an execution has not been given),the mobile telephone 10 scraps the function control information 40-b(step S106).

In a case where the user has permitted an execution of the functioncontrol (it has been determined that an input instruction for permittingan execution has been given), the cancellation manager 19 causes thestorage section 20 to store the cancellation information 46 “while thefunction control information 40-b is received” of the function controlinformation 40-b (step S107 e).

And, the mobile telephone 10 controls the control object function (stepS108 and step S109). In this case, the mobile telephone 10 starts theelectronic ticket application software. Further, the monitor 13 causesthe storage section 20 to store the control source having activated thefunction (step S110). In this case, the monitor 13 causes the storagesection 20 to store the priority degree 42 “low” as the control source.

The process above makes it possible to use the electronic ticketapplication software at a ticket barrier even though the user performsno operation. Further, when the user performs an operation of ending theelectronic ticket application software, the mobile telephone 10determines the current control source and the user's operation in termsof the priority degree in the step S107 a. In this example, the mobiletelephone 10 determines that the priority degree of the user's operationis higher than the priority degree “low”, being a current control sourceof the electronic ticket application software, based upon the prioritydegree of the control source that the storage section 20 stores. Forthis, the mobile telephone 10 ends the electronic ticket applicationsoftware according to the user's operation without being effected by thefunction control by the function control information 40.

Additionally, it is also possible that the mobile telephone 10 performsa process so that even though the mobile telephone 10 receives thefunction control information 40 again corresponding to the functioncontrol executed once, it does not accept an execution of the functioncontrol until a predetermined time elapses.

Next, an operation in the case that the mobile telephone 10 has migratedto a position of the mobile telephone 10 c within a seat shown in FIG.25 will be explained. The cancellation manager 19 of the mobiletelephone 10 regularly detects whether or not the state of the mobiletelephone 10 is equivalent to the condition of the cancellationinformation 46, which the storage section 20 stores, at a predeterminedtime period (step S102 a). In a case where the cancellation manager 19has determined that it is equivalent to the condition of thecancellation information 46 (it meets the condition), it cancels anexecution of the function control (step S102 b).

In this example, the storage section 20 has stored the cancellationinformation 46 “after four hours” of the function control information40-a and the cancellation information 46 “the function controlinformation 40-b has not been received” of the function controlinformation 40-b. The mobile telephone 10 cannot receive the functioncontrol information 40-b in a location of the mobile telephone 10 cshown in FIG. 25, whereby the cancellation manager 19 cancels thefunction control by the function control information 40-b. That is, themobile telephone 10 ends the electronic ticket application software, anderases an icon display of a ◯◯ movie theater b as well. Further, themobile telephone 10 erases the function control information 40-b as wellstored in the storage section 20. Additionally, in this example, anoperation will be explained on the assumption that four hours have notelapsed since an execution of the function control by the functioncontrol information 40-a and the function control by the functioncontrol information 40-a has not been canceled yet.

When the mobile telephone 10 enters the communication area of thefunction control information transmitter 30 c (step S102), the receptionsection 11 of the mobile telephone 10 employs communication means otherthan the communication means that is employed for making a call, therebyto receive the function control information 40-c from the functioncontrol information transmitter 30 c (step S103). And, the receptionsection 11 causes the storage section 20 to store the received functioncontrol information 40-c.

The credibility confirmer 16 verifies credit information 43 “a sender: asignature of a ◯◯ movie theater”, thereby to determine whether or notthe credit information 43 is valid (step S103 a). Specifically, thecredibility confirmer 16 employs a public key encryption technology etc.to authenticate the credit information 43 based upon an encryption keycorresponding to “sender: a ◯◯ movie theater” that the storage section20 stores, and verifies existence of the tampering of the sender and thecontent of the function control information 40-c. In a case where thecredibility confirmer 16 has failed in the authentication and hasdetermined that a verification result is not correct, the mobiletelephone 10 scraps the function control information 40-c (step S106).

When the credibility confirmer 16 determines that a verification resultis correct, the adjuster 12 specifies the control object function (stepS104). In this example, the adjuster 12 specifically decides that thecontrol object function is a function of prohibiting the cameraphotographing, a function of causing a backlight of a liquid crystal tocome into a state of non-lighting, and a function of setting the mannermode based upon the function control information 40-c shown in FIG. 27.

At first, by inquiring of the monitor 13, the adjuster 12 determineswhether or not a prohibition of the camera photographing is possible(step S105). In this example, the adjuster 12 determines that aprohibition of the camera photographing is possible. Next, the situationanalyzer 17 compares the priority degree 42 of the function controlinformation 40-c with the priority degree of the current control sourceof the control object function (step S107 a). In this embodiment, themonitor 13 causes the storage section 20 to store the control source ofeach function. Further, the storage section 20 has stored a relation aswell between the priority degree of the control source and the prioritydegree 42 of the function control information 40. In this example, thecamera is in a state of having not been started yet at the otherlocation, whereby the storage section 20 has not stored the currentcontrol source of the camera control function. For this, the situationanalyzer 17 determines that the priority degree of the function controlinformation 40-c is higher than the priority degree of the currentcontrol source. Thus, the situation analyzer 17 determines that thefunction control is possible.

Next, the mobile telephone 10 determines whether or not the otherfunction control content 41 exists in the function control information40-c (step S107), and executes the processes from step S104 to the stepS107 a for the other function control content 41. By inquiring of themonitor 13, the adjuster 12 determines whether or not the non-lightingof a backlight of a liquid crystal is possible (step S105). In thisexample, the adjuster 12 determines that the non-lighting of a backlightof a liquid crystal is possible. Next, the situation analyzer 17compares the priority degree 42 of the function control information 40-cwith the priority degree of the current control source of the controlobject function (step S107 a). In this example, the backlight of theliquid crystal is in a state of having not been control-started yet inthe other location, whereby the storage section 20 has not stored thecurrent control source of the control function of the backlight. Forthis, the situation analyzer 17 determines that the priority degree ofthe function control information 40-c is higher than the priority degreeof the current control source. Thus, the situation analyzer 17determines that the function control by the function control information40-c is possible.

Further, by inquiring of the monitor 13, the adjuster 12 determineswhether or not the manner mode setting is possible (step S105). In thisexample, the adjuster 12 determines that the manner mode setting ispossible. Next, the situation analyzer 17 compares the priority degree42 of the function control information 40-c with the priority degree ofthe current control source of the control object function (step S107 a).In this example, the storage section 20 stores the function controlinformation 40-a, of which the priority degree 42 is “low”, as thecurrent control source of the manner mode setting function. For this,the situation analyzer 17 determines that the priority degree 42 of thefunction control information 40-c is higher than the priority degree ofthe current control source. Thus, the situation analyzer 17 determinesthat the function control is possible.

When the situation analyzer 17 determines that all of the functioncontrol contents 41 of the function control information 40-c arecontrollable, the mobile telephone 10 displays an icon of a ◯◯ movietheater c based upon the icon information 48 (step S107 b), and notifiesthe effect that the function control information 40-c has been receivedto the user.

Next, the compulsory force determinator 18 inquires of the storagesection 20 a process content corresponding to the compulsory force 45 ofthe function control information 40-c. In this case, the compulsoryforce determinator 18 determines whether or not the value of thecompulsory force 45 is “compulsory” (step S107 c). In this example, thevalue of the compulsory force is “compulsory”, whereby the mobiletelephone 10 determines that a permission for executing the functioncontrol does not have to be obtained from the user of the mobiletelephone 10. Thus, the cancellation manger 19 causes the storagesection 20 to store the cancellation information 46 “while the functioncontrol information 40-c is received” of the function controlinformation 40-c without obtaining an input instruction for permissionby the user (step S107 e).

And, the mobile telephone 10 controls the control object function (stepS108 and step S109). In this case, the mobile telephone 10 sets theprohibition of the camera photographing, sets the backlight of theliquid crystal to the non-lighting, and sets the mode to the mannermode. Further, the monitor 13 causes the storage section 20 to store thecontrol source having activated the function (step S110). In this case,the monitor 13 causes the storage section 20 to store the prioritydegree 42 “high” as each control source.

In this state, when the user performs an operation of canceling themanner mode, the mobile telephone 10 determines the current controlsource and the user's operation in terms of the priority degree in thestep S107 a. In this example, the mobile telephone 10 determines thatthe priority degree “high” of the current control source of the mannermode control function is higher than the priority degree of the user'soperation based upon the priority degree of the control source that thestorage section 20 stores. For this, the user cannot cancel the mannermode.

Next, an operation in the case that the mobile telephone 10 has migratedto a position of the mobile telephone 10 d in the vicinity of a standshown in FIG. 25 will be explained. Additionally, in this example, it isassumed that the mobile telephone 10 migrates to a region, in which anarea of the function control information transmitter 30 c and an area ofthe function control information transmitter 30 d are overlapped witheach other, out of the area of the function control informationtransmitter 30 d, and the mobile telephone 10 can receive both of thefunction control information 40-c and the function control information40-d.

The cancellation manager 19 of the mobile telephone 10 regularly detectswhether or not the state of the mobile telephone 10 is equivalent to thecondition of the cancellation information 46, which the storage section20 stores, at a predetermined time period (step S102 a). In a case whereit is equivalent to the condition of the cancellation information 46 (ithas been determined that the condition is met), the cancellation manager19 cancels an execution of the function control (step S102 b).

In this example, the storage section 20 has stored the cancellationinformation 46 “after four hours” of the function control information40-a, and the cancellation information 46 “the function controlinformation 40-c has not been received” of the function controlinformation 40-c. The mobile telephone 10 can receive the functioncontrol information 40-c in a location of the mobile telephone 10 dshown in FIG. 25, whereby the cancellation manager 19 determines thatthe condition of the cancellation information 46 of the function controlinformation 40-c is not met, and continues the function control of thefunction control information 40-c. Additionally, in this example, anoperation will be explained on the assumption that four hours have notelapsed since an execution of the function control by the functioncontrol information 40-a and the function control by the functioncontrol information 40-a has not been cancelled.

When the mobile telephone 10 enters the communication area of thefunction control information transmitter 30 c and the function controlinformation transmitter 30 d (step S102), the reception section 11 ofthe mobile telephone 10 employs communication means other than thecommunication means that is employed for making a call, thereby toreceive the function control information 40-c and the function controlinformation 40-d (step S103). The function control information 40-c hasalready been function-controlled, whereby the reception section 11causes the storage section 20 to store the received function controlinformation 40-d. And, the mobile telephone 10 performs a process forthe function control information 40-d.

The credibility confirmer 16 verifies credit information 43 “a sender ofthe function control information 40-d: a signature of a ΔΔ stand”,thereby to determine whether or not the credit information 43 is valid(step S103 a). Specifically, the credibility confirmer 16 employs apublic key encryption technology etc. to authenticate the creditinformation 43 based upon an encryption key corresponding to “sender: ofa ΔΔ stand” that the storage section 20 stores, and verifies existenceof the tampering of the sender and the content of the function controlinformation 40-d. In a case where the credibility confirmer 16 hasfailed in the authentication and has determined that a verificationresult is not correct, the mobile telephone 10 scraps the functioncontrol information 40-d (step S106).

When the credibility confirmer 16 determines that a verification resultis correct, the situation analyzer 17 determines and verifies whether ornot the state of the mobile telephone 10 meets the execution condition44 of the function control information 40 (step S103 d). In thisexample, as shown in FIG. 27, the execution condition 44 of the functioncontrol information 40-d is that “the application software for settlingan account has been mounted”. Upon inquiring of the monitor 13, thesituation analyzer 17 receives the effect that the application softwarefor settling an account has been mounted. Accordingly, in this example,the situation analyzer 17 determines that the state of the mobiletelephone 10 meets the condition. Additionally, in a case where thecondition is not met in the step S103 b, the mobile telephone 10 scrapsthe function control information 40-d (step S106).

When the situation analyzer 17 determines that the execution condition44 is met, the adjuster 12 specifies the control object function (stepS104). In this example, the adjuster 12 specifically decides that thecontrol object function is a function of starting the applicationsoftware for settling an account based upon the function controlinformation 40-d shown in FIG. 27. And, by inquiring of the monitor 13,the adjuster 12 determines whether or not the application software forsettling an account is startable (step S105). In this example, theadjuster 12 determines that the application software for settling anaccount is startable.

Next, the situation analyzer 17 compares the priority degree 42 of thefunction control information 40-d with the priority degree of thecurrent control source of the control object function (step S107 a). Inthis embodiment, the monitor 13 causes the storage section 20 to storethe control source of each function. Further, the storage section 20 hasstored a relation as well between the priority degree of the controlsource and the priority degree 42 of the function control information40. In this example, the application software for settling an account isin a state of having not been started yet elsewhere, whereby the storagesection 20 has not stored the current control source of the startfunction of the application software for settling an account. For this,the situation analyzer 17 determines that the priority degree 42 of thefunction control information 40-d is higher than the priority degree ofthe current control source. Thus, the situation analyzer 17 determinesthat the function control by the function control information 40-d ispossible.

When the situation analyzer 17 determines that all of the functioncontrol contents 41 of the function control information 40-d arecontrollable, the mobile telephone 10 displays an icon of a ΔΔ stand dbased upon the icon information 48 (step S107 b), and notifies theeffect that the function control information 40-d has been received tothe user.

Next, the compulsory force determinator 18 inquires of the storagesection 20 a process content corresponding to the compulsory force 45 ofthe function control information 40-d. In this case, the compulsoryforce determinator 18 determines whether or not the value of thecompulsory force 45 is “compulsory” (step S107 c). In this example, thevalue of the compulsory force is “normal”, whereby the mobile telephone10 displays the effect that an input instruction for permission/refusalof an execution of the function control is urged, and inquires of theuser of the mobile telephone 10 whether or not an execution of thefunction control is permitted. The mobile telephone 10 determineswhether or not an input instruction for permitting an execution has beengiven by the user (step S107 d). In a case where the user does notpermit an execution of the function control (it has been determined thatan input instruction for permitting an execution has not been given),the mobile telephone 10 scraps the function control information 40-d(step S106)

In a case where the user has permitted an execution of the functioncontrol (it has been determined that an input instruction for permittingan execution has been given), the cancellation manager 19 causes thestorage section 20 to store the cancellation information 46 “while thefunction control information 40-d is received” of the function controlinformation 40-d (step S107 e).

And, the mobile telephone 10 controls the control object function (stepS108 and step S109). In this case, the mobile telephone 10 starts theapplication software for settling an account. Further, the monitor 13causes the storage section 20 to store the control source havingactivated the function (step S110). In this case, the monitor 13 causesthe storage section 20 to store the priority degree 42 “low” as thecontrol source. Additionally, in this case, in the mobile telephone 10,the function controls by the function control information 40-a, thefunction control information 40-c, and the function control information40-d are validly operating.

Next, an operation in the case that the mobile telephone 10 has migratedto a position of the mobile telephone 10 e in the vicinity of a gatewayin FIG. 25 will be explained. The cancellation manager 19 of the mobiletelephone 10 regularly detects whether or not the state of the mobiletelephone 10 is equivalent to the condition of the cancellationinformation 46, which the storage section 20 stores, at a predeterminedtime period (step S102 a). In a case where the cancellation manager 19has determined that the state of the mobile telephone 10 is equivalentto the condition of the cancellation information 46 (the state of themobile telephone 10 meets the condition), it cancels an execution of thefunction control (step S102 b).

In this example, the storage section 20 has stored the cancellationinformation 46 “after four hours” of the function control information40-a, the cancellation information 46 “the function control information40-c has not been received” of the function control information 40-c,and the cancellation information 46 “the function control information40-d has not been received” of the function control information 40-d.The mobile telephone 10 cannot receive the function control information40-c and the function control information 40-d in a location of themobile telephone 10 e shown in FIG. 25, whereby the cancellation manager19 cancels the function control by the function control information 40-cand the function control information 40-d.

That is, the mobile telephone 10 cancels the setting of prohibiting thecamera photographing, cancels the setting of the non-lighting, and endsthe application software for settling an account. Further, the mobiletelephone 10 erases an icon display of a ◯◯ movie theater c and a ΔΔstand d, and erases the function control information 40-c and thefunction control information 40-d stored in the storage section 20.Additionally, if it is assumed that four hours have not elapsed since anexecution of the function control by the function control information40-a, the mobile telephone 10 does not erase the manner mode setting bythe function control information 40-a.

When the mobile telephone 10 enters the communication area of thefunction control information transmitter 30 e (step S102), the receptionsection 11 of the mobile telephone 10 employs communication means otherthan the communication means that is employed for making a call, therebyto receive the function control information 40-e from the functioncontrol information transmitter 30 e (step S103). And, the receptionsection 11 causes the storage section 20 to store the received functioncontrol information 40-e.

The credibility confirmer 16 verifies credit information 43 “a sender ofthe function control information 40-e: a signature of a ◯◯ movietheater”, thereby to determine whether or not the credit information 43is valid (step S103 a). Specifically, the credibility confirmer 16employs a public key encryption technology etc. to authenticate thecredit information 43 based upon an encryption key corresponding to“sender: a ◯◯ movie theater” that the storage section 20 stores, andverifies existence of the tampering of the sender and the content of thefunction control information 40-e. In a case where the credibilityconfirmer 16 has failed in the authentication and has determined that averification result is not correct, the mobile telephone 10 scraps thefunction control information 40-e (step S106).

When the credibility confirmer 16 determines that a verification resultis correct, the situation analyzer 17 determines and verifies whether ornot the state of the mobile telephone 10 meets the execution condition44 of the function control information 40 (step S103 d). In thisexample, as shown in FIG. 27, the execution condition 44 of the functioncontrol information 40-e is that “the function control information 40-ahas been executed”. Upon inquiring of the monitor 13, the situationanalyzer 17 receives the effect that the function control information40-a has been executed. Accordingly, in this example, the situationanalyzer 17 determines that the state of the mobile telephone 10 meetsthe condition. Additionally, in a case where the condition is not met inthe step S103 b, the mobile telephone 10 scraps the function controlinformation 40-e (step S106).

When the situation analyzer 17 determines that the execution condition44 is met, the adjuster 12 specifies the control object function (stepS104). In this example, the adjuster 12 specifically decides that thecontrol object function is a function of canceling the manner mode, afunction of deleting an execution record of the function controlinformation 40-a, and a function of distributing a discount ticket for anext-time movie show based upon the function control information 40-eshown in FIG. 27. And, by inquiring of the monitor 13, the adjuster 12determines whether or not a cancellation of the manner mode, a delete ofan execution record of the function control information 40-a, and adistribution of a discount ticket for a next-time movie show arepossible (step S105). In this example, the adjuster 12 determines thatany of a cancellation of the manner mode, a delete of an executionrecord of the function control information 40-a, and a distribution of adiscount ticket for a next-time movie show is possible.

Next, the situation analyzer 17 compares the priority degree 42 of thefunction control information 40-e with the priority degree of thecurrent control source of the control object function (step S107 a). Inthis embodiment, the monitor 13 has caused the storage section 20 tostore the control source of each function. Further, the storage section20 has stored a relation as well between the priority degree of thecontrol source and the priority degree 42 of the function controlinformation 40. In this example, the situation analyzer 17 determinesthat the priority degree 42 “high” of the function control information40-e is higher than the priority degree “low” of the current controlsource of the manner mode setting function. Further, in this example,the storage section 20 has stored the priority degree “low” as thecurrent control source of “an execution record of the function controlinformation 40-a”. For this, the situation analyzer 17 determines thatthe priority degree 42 “high” of the function control information 40-eis higher than the priority degree “low” of the current control source.

Further, the application software for distributing a discount ticket ofa net-time movie show is in a state of having not been started yetelsewhere, whereby the storage section 20 has not stored the currentcontrol source of the start function of the application software. Forthis, the situation analyzer 17 determines that the priority degree 42of the function control information 40-e is higher than the prioritydegree of the current control source. Thus, the situation analyzer 17determines that the function control by the function control information40-e is possible.

When the situation analyzer 17 determines that all of the functioncontrol contents 41 of the function control information 40-e arecontrollable, the mobile telephone 10 displays an icon of a ◯◯ movietheater e based upon the icon information 48 (step S107 b), and notifiesthe effect that the function control information 40-e has been receivedto the user.

Next, the compulsory force determinator 18 inquires of the storagesection 20 a process content corresponding to the compulsory force 45 ofthe function control information 40-e. In this case, the compulsoryforce determinator 18 determines whether or not the value of thecompulsory force 45 is “compulsory” (step S107 c). In this example, thevalue of the compulsory force is “compulsory”, whereby the mobiletelephone 10 determines that a permission for executing the functioncontrol has not to be obtained from the user of the mobile telephone 10.

The mobile telephone 10 controls the control object function withoutobtaining an input instruction for permission by the user (step S108 andstep S109). In this case, the mobile telephone 10 cancels the mannermode setting, deletes an execution record of the function controlinformation 40-a from the storage section 20, and erases the icondisplay of a ◯◯ movie theater a. Further, the mobile telephone 10 erasesthe function control information 40-a stored in the storage section 20,and causes the storage section 20 to store a discount ticket for anext-time movie show. Further, the monitor 13 causes the storage section20 to store the control source having activated the function (stepS110). In this case, canceling the manner mode setting, and deleting theexecution record of the function control information 40-a allow thestate of the mobile telephone 10 to return to the initial state, wherebythe monitor 13 causes the storage section 20 to store the prioritydegree “no” as the control source.

The mobile telephone 10, which has returned to the initial state, beingthe state prior to arriving at the movie theater at the first time, isin a state of having preserved the discount ticket in the storagesection 20 having a discount ticket for a next-time movie showdistributed. Thereafter, when the mobile telephone 10 migrates to alocation in which the function control information 40-e cannot bereceived, it cancels the function control by the function controlinformation 40-e. Additionally, at the stage that the state of themobile telephone 10 has returned to the initial state, the mobiletelephone 10 erases the icon display of a ◯◯ movie theater e, and erasesonly the function control information 40-e stored in the storage section20.

As mentioned above, when the mobile telephone 10 sequentially migratesfrom a position of the mobile telephone 10 a up to a position of themobile telephone 10 e shown in FIG. 25, the mode is set to the mannermode at an entrance of a movie theater, the electric ticket applicationsoftware thereof is automatically started in a ticket barrier, theprohibition of the camera photographing and the non-lighting of thebacklight of the liquid crystal are automatically set in a seat, theapplication software for a process of settling an account thereof isautomatically started in a stand, and the state is returned to theoriginal state when it leaves the movie theater. Such a system makes itpossible to easily utilize the function of the mobile telephone 10 thatis adapted to the situation even though the user does not think about anoperation of the mobile telephone 10.

As mentioned above, in accordance with this embodiment, the terminaldevice (the mobile telephone 10) includes the situation analyzer 17 fordeciding the order of the function control process based upon theexecution order of controllable function, and the evaluation informationindicating validity of the function control information 40. Accordingly,this embodiment enables the valid process to be antecedently performedalso in a case of having received plural kinds of the function controlinformation 40.

Further, this embodiment allows the control source having activated thefunction, the application software and the service, and the functioncontrol information 40 to have a control intensity affixed. Further, theterminal device includes the adjustment means (adjuster 12) for, in acase where there exists the function control information 40 thatcompetes with the function, being a control object, inquiring of themonitoring means (monitor 13) the control intensity of the controlsource that is currently controlling its function, being a controlobject, in some cases, and making a comparison with the controlintensity of the other function control information 40 in some cases,thereby to determine propriety of the process. Accordingly, the validprocess can be performed also in a case of having plural kinds of thefunction control information 40 for one function.

SUSCEPTIBLE OF INDUSTRIAL APPLICATION

The external request type function control system in accordance with thepresent invention can be put into practical use for the mobile terminalsuch as the mobile telephone, a PHS (Personal Handyphone System), a PDA,and a machine having a car navigation system mounted. Putting thepresent invention into practical use makes it possible to easily utilizethe function of the mobile terminal that is adapted to the situationeven though the user does not operate the mobile terminal.

1-18. (canceled)
 19. An external request type function control programfor allowing a function of a terminal device to be controlled,characterized in causing a computer to execute the processes of:receiving function control information including an instruction forcontrolling a function of said terminal device, said function controlinformation being transmitted by an external function controlinformation transmitting device of the terminal device; monitoring astate of the function that could be specified in said function controlinformation and storing a control source, being a cause of havingchanged a state of the function into a current state; based upon saidmonitoring result, comparing a priority degree of the current controlsource of the function specified in the function control information,out of said stored control sources, with a priority degree that isincluded in said function control information, thereby to determinewhether or not the function control by said function control informationis executable; and based upon said determination result, controllingsaid function of said terminal device.
 20. (canceled)
 21. The externalrequest type function control program according to claim 19,characterized in causing the computer to execute the processes of:determining whether or not the function control information transmittingdevice, being a transmission source that has transmitted the functioncontrol information, and a transmission source described in saidfunction control information coincide with each other, and determiningexistence of tampering of said function control information; andcontrolling the function of the terminal device based upon saiddetermination result.
 22. The external request type function controlprogram according to claim 19, characterized in causing the computer toexecute the processes of: determining whether or not a state of theterminal device meets a condition under which the function controldescribed in the function control information is executed; andcontrolling said function of said terminal device based upon saiddetermination result.
 23. The external request type function controlprogram according to claim 19, characterized in causing the computer toexecute the process of, based upon evaluation information described inthe function control information, deciding whether or not a permissionfor executing the function control is requested of a user of theterminal device.
 24. The external request type function control programaccording to claim 19, characterized in causing the computer to executethe process of, in a case of having received plural kinds of thefunction control information, deciding an order in which a functioncontrol process is executed based upon evaluation information describedin said function control information.
 25. The external request typefunction control program according to claim 19, characterized in causingthe computer to execute the processes of: pre-storing an execution orderof the executable function; and in a case of having received pluralkinds of the function control information, deciding an order in which afunction control process is executed based upon said stored executionorder of said function.
 26. The external request type function controlprogram according to claim 19, characterized in causing the computer toexecute the processes of: pre-storing an execution order of thecontrollable function; and in a case of having received plural kinds ofthe function control information, deciding an order in which a functioncontrol process is executed based upon said stored execution order ofsaid function and evaluation information described in said functioncontrol information. 27-31. (canceled)