Communication system and communication terminal apparatus with changeable transmission/reception periods

ABSTRACT

In a case when a wireless communication is carried out between a communication terminal apparatus and a wireless key apparatus in which one of the two apparatuses which carry out the communication becomes a master and the other one becomes a slave, the slave detects a signal from the master and the wireless communication is carried out by a wireless communication system executing the wireless connection between the two apparatuses, it is constituted such that each of the communication terminal apparatus and the wireless key apparatus includes communication means for carrying out the wireless communication, and control means; and in a case when the wireless communication state between the communication terminal apparatus and the wireless key apparatus is a non-connection state, the side which becomes the master is to transmit a signal asking for a “response from the slave” intermittently by changing the period into a plurality of steps in response to the non-connection time period and the side which becomes the slave is to carry out a reception for searching a signal from the master intermittently by changing the period into a plurality of steps in response to the non-connection time period. It may be expected by this constitution that a communication terminal apparatus such as a mobile telephone terminal can be connected wirelessly with another terminal apparatus rapidly by low power consumption.

CROSS REFERENCES TO RELATED APPLICATIONS

The present invention contains has recognized/(object) matter related toJapanese Patent Application JP 2004-195062 filed in the Japanese PatentOffice on Jun. 30, 2004, the entire contents of which being incorporatedherein by reference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates, for example, to a communication systemsuitable for being applied to an apparatus constituted by acommunication terminal apparatus such as a mobile telephone terminal anda wireless key apparatus restricting the operation of the terminalapparatus and to a communication terminal apparatus constituting thecommunication system.

2. Description of the Related Art

In recent years, a mobile telephone terminal which is one ofcommunication terminal apparatuses a user always taking along inpossession has a trend such that various functions other than wirelesstelephone functions of primary functions are built-in so as to containmulti functions.

For example, there exists such a terminal in which a camera functioncarrying out a filming of a still picture and a moving picture, arecording and reproducing function of music data, a viewing andlistening function of television broadcast or the like is built-in.

In addition, there has been developed a mobile telephone terminal inwhich a function as a non-contacting IC card which has been prevailingrapidly in recent years is built-in. This non-contacting IC card isutilized as a boarding ticket of transport facilities, a membershipcard, an employee ID card, a card for price settlement means at a shopor the like where an authentication process is carried out by performingwireless communication between adjacent reader and writer, so that it iseasy-to-use as compared with a magnetic card or the like. It should benoted in a case when an IC card function unit is mounted in a mobileterminal that the IC card function unit is not always necessarily tohave a card type shape.

And now, it is preferable for the mobile telephone terminal having multifunctions in this manner to be carried out with a process in order tosecure some kind or another security for preventing various functionsprovided in the terminal from being abused when the terminal is lost. Inparticular, in case of a terminal installed with an IC card functionunit, there is a possibility that personal information stored as the ICcard function is read out unjustly or unjust settlement or the likeutilizing the IC card function is carried out, so that the necessity fora function for preventing the unjust use thereof is high. There aredescriptions, for example, in patent documents 1 and 2 that a wirelesscard which forms a pair with respect to the mobile telephone terminal isprepared and authentication request is wireless-transmitted periodicallyfrom that wireless card such that the functions of mobile telephoneterminal is made to be restricted in a case when collation with respectto the authentication request cannot be taken.

[Patent Document 1] Jap. laid-open patent publication No. 2001-352579

[patent document 2] Jap. laid-open patent publication No. 2001-358827

However, if it is attempted to provide in a mobile telephone terminalwith a communication circuit for carrying out an exclusiveauthentication process or authentication processing means for carryingout function limitation of that terminal such as shown in thedescriptions in the patent documents 1 and 2, there is a problem thatthe constitution of the terminal becomes complicated. In case ofcarrying out such a wireless communication for the function limitation,if various wireless communication systems existing in the related artcan be applied as they are, it is to contribute to lowering the cost ofa mobile terminal.

However, in a case when it is considered to use various wirelesscommunication systems existing in the related art as they are for thepurpose of security assuring, a case is supposed in which the functionlimitation does not always function effectively. More specifically, itis fundamental for a commonly used wireless communication systemexisting in the related art to carry out a wireless communication with aterminal of a partner as favorably as possible within the specificationgiven by the wireless system. Consequently, for example, a wireless cardfor carrying out function limitation of a mobile telephone terminal andits terminal is prepared and even if a system is composed assuming thatthe function of the mobile telephone terminal is made to be limited in acase when the distance between the both sides becomes apart equal ormore than around several meters, it is practically difficult to defineone-sidedly a distance which makes the wireless communication possiblebetween the mobile telephone terminal and the wireless card such that itis supposed that there were various problems for making it practicablewherein in case of a favorable communication environment, the functionlimitation is made effective after a quite far distance and in case ofan inferior communication environment on the contrary, the wirelesscommunication cannot be carried out even if the mobile telephoneterminal and the wireless card are adjacent and the function limitationis made effective.

Also, it is preferable for an apparatus such as a wireless card or thelike which is used as a pair with a mobile telephone terminal not totake a lot of trouble as much as possible for everyday use, butpractically, relatively a large power consumption occurs when it alwaysexchanges data for authentication or the like with a mobile telephoneterminal, so that it is frequently necessary to exchange or charge abattery and there was a problem that it took a lot of trouble forfunctioning it as an authentication apparatus.

Particularly, in a state in which apparatuses such as a mobile telephoneterminal and the wireless card are wireless-connected, considerabledegree of low power consumption is to be carried out/performed if thetransmission and reception is carried out intermittently on both sidesin synchronism with each other, but in case of a state in which acommunication partner apparatus cannot be found (more specifically, awireless communication cannot be executed), tremendous amounts ofcommunication processes are necessary for finding out the communicationpartner and there was a problem that the power consumption becomes big.More specifically, if it is always wireless-connected with thecommunication partner, it can be wireless-connected by a relatively lowpower consumption, but in a case when the wireless connection is cut offfor the reason that the wireless communication state between the twoapparatuses are deteriorated caused by some kind or another factor,tremendous amounts of power consumption is spent for the reconnectionand there was a problem that the battery duration period of theapparatus is to be shortened.

SUMMARY OF THE INVENTION

The present invention was invented in view of aforesaid matters and hasrecognized that a communication terminal apparatus such as a mobiletelephone terminal can be wireless-connected with other terminalapparatus rapidly with a low power consumption.

The present invention is constituted such that in a case when a wirelesscommunication is carried out between a communication terminal apparatusand a wireless key apparatus by carrying out a wireless communicationbased on a wireless communication system in which a wireless connectionof two apparatuses is carried out in a condition that one of the twoapparatuses which carry out a communication becomes a master, the otherone thereof becomes a slave and the slave detects a signal from themaster, each of the communication terminal apparatus and the wirelesskey apparatus is provided with communication means carrying out awireless communication by a predetermined wireless communication systemand control means for controlling communication state in thecommunication means; and in a case when the wireless communication statebetween the communication terminal apparatus and the wireless keyapparatus is in non-connection, the communication means on the side tobe the master changes the period in a plurality of steps in response tothe non-connection period and transmits “signal asking for a responsefrom the slave” intermittently and the communication means on the sideto be the slave changes the period in a plurality of steps in responseto the non-connection period and carries out a reception for searching“signal from the master” intermittently.

By constituting in this manner, even in a case of a state when thewireless connection between the communication terminal apparatus and thewireless key apparatus is cut off, the process for finding out thepartner apparatus is carried out by an intermittent transmission orreception and further by changing the intermittent transmission orreception period in a plurality of steps, it is possible to reduce powerconsumption in a state in which the wireless connection is cut off.

According to the present invention, even in a case of a state when thewireless connection between the communication terminal apparatus and thewireless key apparatus is cut off, the process for finding out thepartner apparatus is carried out by an intermittent transmission orreception and further by changing the intermittent transmission orreception period in a plurality of steps, it is possible to reduce powerconsumption in a state in which the wireless connection is cut off andit is contributed to forming a structure of low power consumption of thecommunication terminal apparatus and the wireless key apparatus.

In a case when, communication means which becomes the side of a mastertransmits “signal asking for response from slave” and in a case whenthere is on response in a predetermined period, transmission of “signalasking for response” is stop, it carries out reception for searching“signal from slave” intermittent, so that a process for searching thepartner is carried out in a state where a transmission for whichrelatively large power is necessary is not carried out and itcontributes to forming a structure of low power consumption.

Further, in a case when operation means is provided and the operation ofthis operation means is detected, “signal asking for response” istransmitted from the communication means, so that in a case when it isin a state that the partner carries out an intermittent reception, thepossibility that the signal is received becomes high and it is possibleto carry out a wireless connection rapidly between two apparatuses whichare in a state that the wireless connection is cut off.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a perspective view showing a system constitutional exampleaccording to one exemplified embodiment of the present invention;

FIG. 2 is a block diagram showing a constitutional example of acommunication terminal apparatus according to one exemplified embodimentof the present invention;

FIG. 3 is a block diagram showing a constitutional example of a wirelesskey apparatus according to one exemplified embodiment of the presentinvention;

FIG. 4 is an explanatory diagram showing a usage example according toone exemplified embodiment of the present invention;

FIG. 5 is a block diagram showing a modified example of a wireless keyapparatus (example integrated with head set) according to oneexemplified embodiment of the present invention;

FIG. 6 is an explanatory diagram showing a usage example of the examplein FIG. 5;

FIG. 7 is an explanatory diagram showing a setting example of a securitymode according to one exemplified embodiment of the present invention;

FIG. 8 is an explanatory diagram showing a transition example of asecurity mode by a communication mode according to one exemplifiedembodiment of the present invention;

FIG. 9 is a flowchart showing a mode selection process example accordingto one exemplified embodiment of the present invention;

FIG. 10 is a flowchart showing a scanning process example according toone exemplified embodiment of the present invention;

FIG. 11 is a flowchart showing a page transmission process exampleaccording to one exemplified embodiment of the present invention;

FIG. 12 is a timing diagram showing an example of a process state of apage transmission and a scanning according to one exemplified embodimentof the present invention;

FIG. 13 is a sequence diagram showing an example of a connection stateaccording to one exemplified embodiment of the present invention;

FIG. 14 is a flowchart showing a shifting process example for low powerconsumption according to one exemplified embodiment of the presentinvention;

FIG. 15 is a sequence diagram showing a transmission example of acommunication state message according to one exemplified embodiment ofthe present invention;

FIG. 16 is a flowchart showing a communication process example in amobile terminal according to one exemplified embodiment of the presentinvention;

FIG. 17 is a flowchart showing a communication process example in awireless key apparatus according to one exemplified embodiment of thepresent invention;

FIG. 18 is a sequence diagram showing a transmission example in a sniffstate according to one exemplified embodiment of the present invention;

FIG. 19 is a flowchart showing a process example in a standby stateaccording to one exemplified embodiment of the present invention;

FIG. 20 is a timing diagram showing a connection process example in aslave according to one exemplified embodiment of the present invention;

FIG. 21 is a timing diagram showing a connection process example in amaster according to one exemplified embodiment of the present invention;

FIG. 22 is a sequence diagram showing a process example in a connectionmode according to one exemplified embodiment of the present invention;

FIG. 23 is a sequence diagram showing a connection return processexample by an operation in a wireless key apparatus in a connection modeaccording to one exemplified embodiment of the present invention;

FIG. 24 is a sequence diagram showing a connection return processexample by an operation in a mobile terminal apparatus in a connectionmode according to one exemplified embodiment of the present invention;

FIG. 25 is an explanatory diagram showing a state transition example ofa wireless key apparatus in a connection mode according to oneexemplified embodiment of the present invention;

FIG. 26 is an explanatory diagram showing a state transition example ofa mobile terminal apparatus in a connection mode according to oneexemplified embodiment of the present invention; and

FIG. 27 is an explanatory diagram showing a state transition example ofa wireless key apparatus in a connection mode according to oneexemplified embodiment of the present invention.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

Hereinafter, one exemplified embodiment of the present invention will beexplained with reference to attached drawings.

In the present invention, a wireless key apparatus carrying out awireless communication with a mobile telephone terminal apparatus isprepared and it is constituted such that security lock of the mobiletelephone terminal apparatus is to be carried out according to awireless communication state of the both sides.

FIG. 1 is a diagram showing an example of an apparatus of the presentinvention. A wireless key apparatus 50 is prepared as a separate bodywith a mobile telephone terminal apparatus 10. According to thisexample, the wireless key apparatus 50 is constituted in a smaller sizeas compared with the mobile telephone terminal apparatus 10 and, forexample, it is constituted such that it is hung around the neck of auser by a neck strap 50 a or the like and is made to be a small sizedshape which a user can always wear. The wireless key apparatus 50 isarranged with a light emitting unit 55 and an operation unit 59(constituted in FIG. 1 such that they are push button shaped), and it isalso constituted such that a terminal unit 56 for connecting with themobile telephone terminal apparatus 10 is prepared.

As a mobile telephone terminal apparatus 10, there is shown here anexample of a general mobile telephone terminal. In the mobile telephoneterminal apparatus 10, there are arranged an antenna 11 for a wirelesstelephone communication, a speaker 14, a microphone 15, a display unit16, an operation unit (operation key) 17, a light emitting unit 22 andthe like. Also, a terminal unit 23 for connecting with the wireless keyapparatus 50 is prepared. This terminal unit 23 may be used as anexisting terminal which is prepared for the mobile telephone terminalapparatus 10 to be connected with a charger or various externalapparatuses. Also, it may be constituted in the display unit 16 such,for example, that a security display 16 a showing that it is in anoperation under a state that security is assured as explainedhereinafter and a display (not shown) showing a fact that a so-calledsecurity lock in which the operation is limited according to itssecurity function is executed may be carried out.

Next, a constitutional example of the mobile telephone terminalapparatus 10 of the present invention will be explained with referenceto FIG. 2. The mobile telephone terminal apparatus 10 of the presentinvention is provided with an antenna 11 for a wireless telephonecommunication for carrying out a wireless communication with a basestation for a wireless telephone. The antenna 11 is connected to acommunication circuit 12 for a wireless telephone communication so as tocarry out a wireless communication with the base station under a controlof a control unit 19. When a communication for a telephone call iscarried out in the communication circuit 12, received sound data aresupplied to a sound data processing unit 13 so as to perform a receivingprocess of the sound data and thereafter, they are supplied to a speaker14 to be outputted and also, sound data for transmission which arepicked up by a microphone 15 and processed in the sound data processingunit 13 are supplied to the communication circuit 12 to be transmitted.

The mobile telephone terminal apparatus 10 is provided with a displayunit 16 constituted by a liquid crystal display or the like and anoperation unit 17 constituted by operation keys or the like. It ispossible to display a mail sentence, a picture screen accessed to theweb or the like on the display unit 16 an input operation of a telephonenumber, a mail sentence or the like and various mode settings or thelike can be carried out by an operation unit 17. Here, it is constitutedsuch that a communication process is carried out in a communicationcircuit 32 for short distance which will be described later on and in acase when its communication state is in a connection mode in which aconnection process with a communication partner is carried out and whenthe control unit 19 detects that any one of the keys constituting theoperation unit 17 or the like was operated, a process for transmitting asignal (page signal) compulsorily asking for a response with respect tothe partner. This concrete process example will be described later on.

These respective blocks in the terminal apparatus 10 are connected withthe control unit 19 or the like by way of a control line 25. Also, eachblock is constituted such that data transfer can be carried out by wayof a data line 26 so as to store necessary data in a memory 18. In thememory 18, not only data necessary as a mobile telephone terminal arestored but also it is possible to store data necessary in an IC cardfunction unit 40 which will be described later on. Also, a necessarydata saving for executing a program and/or for realizing the securityfunction thereof can be carried out in the memory 18.

Also, the mobile terminal apparatus 10 is provided with a vibration unit21 constituted by a vibration motor or the like which vibrates theterminal itself for carrying out notification of receiving signal by wayof the telephone line to this terminal apparatus 10 and various warningsand a light emitting unit 22 constituted by a light emitting diode orthe like. Then, the vibration and the light emission are carried outunder a control of the control unit 19. These vibration unit 21 andlight emitting unit 22 are used as notification means for notifyingreceiving signal or the like for the mobile telephone terminal and theyare used also for necessary warning means as a security function. Itshould be noted that it is possible to output warning sound from thespeaker 14 or the like in a case when sound is to ring as necessarywarning means in the security function.

Then, the mobile telephone terminal 10 of the present invention isprovided with a communication circuit 32 for short distance wirelesscommunication in addition to the communication circuit 12 for telephonecommunication Then, it is carried out by using this communicationcircuit 32 a wireless communication with a partner within a relativelynarrow region of, for example, around from several meters to hundredmeters at the maximum by way of a connected antenna 31 (however, it isconstituted such that a process for narrowing the communication possibleregion is to be executed when carrying out a communication during anormal period with the wireless key apparatus as will be described lateron). Here, for example, a wireless communication system for shortdistance referred to as Bluetooth® is applied. In this short distancewireless communication, various kinds of use applications are supposedsuch, for example, that a communication is carried out with a head setfor a hands-free telephone call or a communication with a personalcomputer apparatus is carried out through the mobile telephone terminalapparatus 10. As to the frequency band used for the wirelesscommunication, for example, 2 GHz band is used, it is constituted suchthat a frequency band or modulation system which does not intervene inthe wireless telephone communication in the communication circuit 12 isemployed. According to this constitution, it is possible to carry outthe wireless telephone communication in the communication circuit 12 andthe communication in the communication circuit 32 for short distancewireless communication at the same time.

In case of this example, a wireless communication is carried out with awireless key apparatus 50 by using this communication circuit 32 forshort distance communication. However, a wireless communication ispossible also with an apparatus (head set, personal computer apparatusor the like) other than the wireless key apparatus 50 if it is acommunication apparatus of the same communication system. Also, in acase when a security function is executed, the wireless key apparatus 50carrying out a wireless communication by the communication circuit 32 isto be limited to a specific one apparatus. For that purpose, forexample, identification ID or the like of the apparatus is to beregistered in the memory 18 or the like beforehand. With respect toregistered information relating to this wireless key apparatus 50, itmay be constituted such that a user cannot revise it.

A transmission amplifier 33 which amplifies the transmission signal inthe communication circuit 32 is constituted such that transmission poweris to be set in a plurality of steps by the control of the control unit19 or the like. Also, in a state in which it is wireless-connected withthe wireless key apparatus 50, it is constituted such that lowtransmission power among the plurality of steps is to be set. Further,in a state in which it is connected with an apparatus other than thewireless key apparatus 50, transmission power of a relatively high stepis to be set. It should be noted in a case when it is wireless-connectedwith an apparatus installed a function for a wireless key apparatus suchas a head set which will be described later on that the transmissionpower is to be set depending on the operation state of the partnerapparatus at that time (more specifically, depending on whether or notit is operated only as a wireless key apparatus or whether or notcombined another function is operated). It will be described later onwith respect to a concrete process example for setting the transmissionpower.

The mobile telephone terminal 30 of the present invention is providedwith a non-contacting IC card function unit 40. The non-contacting ICcard function unit 40 includes a billing data control unit 41 connectionwith an antenna 42 and an adjacent wireless communication in a veryadjacent distance of around several centimeters is carried out withreader and writer. In this adjacent wireless communication, it ispossible to operate the billing data control unit 41 by means of thepower obtained by receiving a radio wave from the reader and writerside, but according to this example, it is constituted such that thebilling data control unit 41 is to be operated by the power supplysupplied from a power supply circuit 24 in the mobile telephone terminal10.

When the IC card function is executed, the billing data control unit 41reads out data necessary for billing or authentication from the memory18 (or a memory in the billing data control unit 41 (not shown)) and anexchange of the read out data is carried out with the reader and writerby an adjacent wireless communication. For example, in a case when it isfunctioned as a boarding ticket of transport facilities, it isconstituted such that the billing data control unit 41 transmits datacharged amount of money or the like which is possible to be paid bydirect debit for an effective zone and an effective period as a boardingticket (commutation ticket) or as a boarding ticket or personalinformation or the like relating to a person possessing this terminal(IC card) to the reader and writer so as to carry out a billing processor an authentication process. In case of using an employee ID card, amembership card, a card for price settlement, a credit card or the like,necessary information for its authentication is also exchanged.

Further, it is constituted such that the mobile telephone terminalapparatus 10 of the present invention is provided with a terminal unit23 and various peripheral apparatuses, data process apparatuses whichare not shown or the like can be connected directly thereto by way ofthis terminal 23. In this case, it is constituted such that power supplycan be applied to external apparatuses connected by means of theterminal unit 23 from the power supply circuit 24 installed with asecondary battery or the like which applies power supply to respectiveportions in the mobile telephone terminal apparatus 10. For example, asshown by an arrow J of a dotted line in FIG. 1, it is constituted in acase when the terminal unit 56 of the wireless key apparatus 50 and theterminal unit 23 of this mobile telephone terminal apparatus 10 areconnected directly such that it is possible to supply power to asecondary battery in the wireless key apparatus 50 from the power supplycircuit 24 in the mobile telephone terminal apparatus 10 so as to chargeit. Also, it is constituted in a case when the wireless key apparatus 50is connected directly to the terminal unit 23 of the mobile telephoneterminal apparatus 10 such that the control unit 19 of the mobiletelephone terminal apparatus 10 detects that fact and a security processwhen directly connected (for example, security process executed withoutshort distance wireless communication which will be described later on)is to be carried out.

Next, it will be explained with respect to the constitution of thewireless key apparatus 50 which carries out a wireless communicationwith the mobile telephone terminal apparatus 10 according to the presentinvention with reference to FIG. 3. The wireless key apparatus 50 of thepresent invention is provided with a communication circuit 52 for shortdistance wireless communication. Then, by using this communicationcircuit 52, a wireless communication is carried out with a partner in arelatively narrow region of, for example, around several meters and atthe maximum hundred meters by way of a connected antenna 51 (however, itis constituted when communication is carried out normally with themobile telephone terminal apparatus 10 such that a process for narrowingthe communication possible region is executed). Here, it is constitutedsuch that Bluetooth system which is a short distance wirelesscommunication system provided on the mobile telephone terminal apparatus10 side is also applied to the wireless key apparatus 50. The partnercarrying out a wireless communication by the communication circuit 52 islimited to a specific one of the mobile telephone terminal apparatus 10.For that purpose, for example, the identification ID or the like of itsapparatus was registered beforehand. With respect to the registeredinformation as to the mobile telephone terminal apparatus 10, it may beconstituted such that a user cannot revise it.

With respect to the wireless communication in the communication circuit52, it is executed under a control of a control unit 53. In this case,it is constituted such that transmission power is to be set in aplurality of steps in a transmission amplifier 52 a which amplifies atransmission signal in the communication circuit 52 under a control ofthe control unit 53 or the like. Also, in a state where it iswireless-connected with the mobile telephone terminal apparatus 10, alow transmission power is to be set in the plurality of steps. However,it is constituted in a case when the control unit 53 detects that anoperation unit 59 (button shaped operation unit or the like as shown inFIG. 1) arranged in the wireless key apparatus 50 is operated such thatthe transmission power is to be heightened temporarily in thetransmission amplifier 52 a and a transmission process of a signal (pagesignal or the like) for making the partner recognize it compulsorily isto be carried out.

The wireless key apparatus 50 of this example is provided with a warningsound creation unit 54 connected with a speaker 54 a for outputtingwarning sound and a light emitting unit 55 constituted by a lightemitting diode or the like. Then, output of the warning sound, vibrationand light emission are carried out under the control of the control unit53. These warning sound creation unit 54 and light emitting unit 55 areused as warning means necessary for security function. Also, it isconstituted such that the light emitting unit 55 functions also asdisplay means which displays the security mode at present in a statewhere a wireless communication is carried out with the mobile telephoneterminal apparatus 10 and the security function is operated.Specifically, for example, the light emitting unit 55 functions also asdisplay means for displaying a security mode by changing the displaysuch that when the light emitting unit 55 is blinking in green, itindicates that it is in a normal mode and when it is blinking in red, itindicates that it is in a warning mode, when there is no display at all,it indicates that it is in a function limitation mode, or the like. Thedisplay means for displaying the security mode may be constituted suchthat a liquid crystal display or the like is used and a display wheremodes can be recognized directly by characters and figures or the likeis carried out. Also, it may be constituted as warning means for warningby vibration.

It is constituted such that the control unit 53 and each unit isconnected by means of a control line 58 and a wireless communication inthe communication circuit 52, operations in the warning sound creationunit 54 and the light emitting unit 55 and the like are executed under acontrol of the control unit 53.

Also, it is constituted such that the wireless key apparatus 50 of thepresent invention is provided with a terminal unit 56 and the mobiletelephone terminal apparatus 10 can be connected directly by using thisterminal 56. When connected thereof, the control unit 53 in the wirelesskey apparatus 50 carries out a data transfer directly with the controlunit 19 in the mobile telephone terminal apparatus 10 and carries out asecurity process when directly connected without carrying out a shortdistance wireless communication. Also, in a case when remaining chargeamount of the secondary battery installed in a power supply circuit 57in the wireless key apparatus 50 is small, it is possible to charge thesecondary battery in the power supply circuit 57 by a power suppliedfrom the side of the mobile telephone terminal apparatus 10.

When the mobile telephone terminal apparatus 10 and the wireless keyapparatus 50 constituted in this manner are used, a user always carriesthe wireless key apparatus 50 as shown, for example, in FIG. 4. Then, itis constituted such that when the user uses the mobile telephoneterminal apparatus 10, the function is not to be limited (normal modewhich will be described later on). Then, in a case when a user goes awayfrom the mobile telephone terminal apparatus 10 by a distance of acertain degree after putting the mobile telephone terminal apparatus 10somewhere in a state where the wireless key apparatus 50 is alwaysmaintained to be carried, a warning operation is executed from thewireless key apparatus 50 (warning mode which will be described lateron). If he stays away from the mobile telephone terminal apparatus 10 ina state where the warning operation is executed, it becomes a statewhere the function of the mobile telephone terminal apparatus 10 islimited (function limitation mode which will be described later on). Itshould be noted with respect to the warning operation in a warning modethat it may be constituted such that it is to be carried out only on theside of the mobile telephone terminal apparatus 10. Alternatively, itmay be constituted such that the warning operation in the warning modeis to be carried out in both of the wireless key apparatus 50 and themobile telephone terminal apparatus 10.

With respect to a function of the mobile telephone terminal apparatus 10which is limited in a function limitation mode, it is a choice, forexample, to direct to all of the functions of the mobile telephoneterminal apparatus 10 (however, communication function related tosecurity function is not to be limited) and it is another choice todirect to a partial function within the function which the terminalapparatus 10 is provided with. Specifically, it may be constituted, forexample, such that only the process using the non-contacting IC cardfunction unit 40 is to be limited. Also, it may be constituted such thataddress book inspection of the mobile telephone terminal apparatus 10,display of personal information of mail inspection or the like is to belimited. Also, it may be constituted such that only the reception of asignal can be allowed while the transmission as a wireless telephone isto be limited. Also, it may be constituted such that only the receptionof a signal can be allowed while the transmission as a wirelesstelephone is to be limited. In this case, it may be constituted suchthat only the telephone number for emergency announcement to a policestation or the like can be transmitted. Also, it may be constituted suchthat a process using the non-contacting IC card function unit 40 is notto be limited while only the function as a wireless telephone apparatusis to be limited.

The wireless key apparatus 50 explained so far was constituted as anapparatus for exclusive use which carries out only the securityfunction, but it should be noted that it may be constituted such that itis to be mounted on an apparatus having other function. For example, itmay be constituted such that a wireless key apparatus is to be mountedon a head set for carrying out a wireless communication of Bluetoothsystem with the mobile telephone terminal apparatus 10 and carrying outa so-called hands-free telephone call.

FIG. 5 is a diagram showing a constitutional example of a head set withthis wireless key. A head set with a wireless key 60 according to thepresent invention is provided with a communication circuit 62 for shortdistance wireless communication. This communication circuit 62 carriesout a wireless communication with a partner in a relatively narrowregion of, for example, around several meters and at the maximum hundredmeters by way of a connection antenna 61. Here, Bluetooth system whichis the same system as the short distance wireless communication systemprovided on the side of the mobile telephone terminal apparatus 10 isapplied also to the communication circuit 62 of the head set with thewireless key. The partner carrying out a wireless communication by thecommunication circuit 62 is limited to the specific one of the mobiletelephone terminal apparatus 10 which was registered. For that purpose,for example, identification ID of the apparatus or the like isregistered beforehand. However, it may be constituted when using onlythe head set such that there is no limitation for the partner whom thecommunication circuit 62 carries out a wireless communication.

With respect to the wireless communication in the communication circuit62, it is executed under a control of the control unit 63. In this case,it is constituted such that transmission power for the transmissionamplifier 62 a which amplifies the transmission signal in thecommunication circuit 62 is to be set under a control of the controlunit 63 or the like.

When a communication for the head set (more specifically, sound datacommunication for a telephone call) is carried out in the communicationcircuit 62, received sound data are supplied to a sound data processingunit 66 and a receiving process of the sound data is performed.Thereafter, they are supplied to a speaker 67 and outputted. Also, sounddata picked up by a microphone 68 are processed in the sound dataprocessing unit 66 so as to become sound data for transmission. Then,the sound data for transmission are supplied to the communicationcircuit 62 and transmitted.

In addition, the head set with the wireless key 60 of the presentinvention is provided with an operation unit 64 constituted by operationkeys or the like, a memory 65 and a light emitting unit 70. The lightemitting unit 70 is used as warning means relating to the securityfunction and at the same time used also as display means of operationstate on the occasion when it is functioned as a head set. Theserespective units in the head set 60 can carry out exchange of controldata by way of a control line 73. Further, the respective units cancarry out exchange of sound data or the like by way of a data line 74.

Also, the head set with the wireless key 60 of the present invention isprovided with a terminal unit 71 and it is constituted such that themobile telephone terminal apparatus 10 can be connected directly bymeans of this terminal 71. When connected with the mobile telephoneterminal apparatus 10 directly, it is constituted such that the controlunit 63 in the head set with the wireless key 60 carries out a datatransfer directly with the control unit 19 in the mobile telephoneterminal apparatus 10 and a direct sound data transfer or a securityprocess is to be carried out without a short distance wirelesscommunication. Also, in a case when remaining charge amount of asecondary battery installed in a power supply circuit 72 in the head setwith the wireless key 60 is small, it is possible to charge thesecondary battery in the power supply circuit 72 by an power suppliedfrom the side of the mobile telephone terminal apparatus 10.

In a case when such a head set with a wireless key 60 is prepared, asshown, for example, in FIG. 6, a user putting on the head set with thewireless key 60 can carry out a so-called hands-free telephone calldepending on a fact that the mobile telephone terminal apparatus 10which remains inside a bag or the like and the head set with thewireless key 60 carries out a wireless communication. Further, withrespect to a function as a wireless key apparatus, a warning and afunction limitation of the mobile telephone terminal apparatus 10 areexecuted according to position relationship (distance) between the headset with the wireless key 60 and the mobile telephone terminal apparatus10. More specifically, in a case when the mobile telephone terminalapparatus 10 goes away from the head set with the wireless key 60 to acertain degree of distance, the head set with the wireless key 60 or themobile telephone terminal apparatus 10 (alternatively, both sides)carries out a warning operation (warning mode which will be describedlater on). Then, if the user stays away from the mobile telephoneterminal apparatus 10 in the state in which this warning operation wascarried out, it becomes a state in which the function of the mobiletelephone terminal apparatus 10 is limited (function limitation modewill be described later on).

Next, a fundamental process example in a case when the mobile telephoneterminal apparatus 10 and the wireless key apparatus 50 having such aconstitution are prepared and a security process is carried out will beexplained with reference to FIGS. 7 to 19. It should be noted in thefollowing explanation that it will be explained on the assumption thatthe wireless key apparatus 50 is to be used but a security process in acase when the head set 60 with the wireless key is used is also similarfundamentally.

First, it will be explained with reference to FIG. 7 with respect to asecurity process mode (hereinafter designates as security process mode).It is constituted in case of this example such that there are prepared anormal mode M1 which does not limit the function of the mobile telephoneterminal apparatus 10, a warning mode M2 for warning that it gets out ofthe normal mode caused by a fact that the distance between the mobiletelephone terminal apparatus 10 and the wireless key apparatus 50 goesaway or the like and a function limitation mode M3 for limiting thefunction of the mobile telephone terminal apparatus 10 in a case when itdoes not return to from the warning mode to the normal mode (morespecifically, in a case when the distance between the mobile telephoneterminal apparatus 10 and the wireless key apparatus 50 remains in a farstate).

With respect to the transition of these modes, there are, as shown byarrows in FIG. 7, a change from the normal mode M1 to the warning modeM2 and a change from the warning mode M2 to the function limitation modeM3 and further, it returns to the normal mode M1 if the wireless keyapparatus 50 approaches the mobile telephone terminal apparatus 10 in astate in which it became the function limitation mode M3. Further, itreturns to the normal mode M1 if the wireless key apparatus 50approaches the mobile telephone terminal apparatus 10 in a state inwhich it became the warning mode M2 and the warning operation is carriedout.

In case of the present invention, these security modes are made to haverelation with the communication modes prepared in the Bluetooth systemwhich is a wireless communication system between the mobile telephoneterminal apparatus 10 and the wireless key apparatus 50. Morespecifically, as communication modes in the wireless communicationsystem (Bluetooth system) of this example are shown in FIG. 8, there isa connection mode M11 for authenticating and wireless-connecting thepartner apparatus in both of the mobile telephone terminal apparatus 10and the wireless key apparatus 50 and when authentication is completedmutually and connection is carried out in the connection mode M11, itbecomes a data transfer mode M12 in which payload data transfer iscarried out practically. When the data transfer is completed in the datatransfer mode M12, it is shifted to a low power consumptioncommunication mode M13. In this low power consumption communication modeM13, the wireless communications of both sides are carried outintermittently by a cycle longer than a communication cycle in the datatransfer mode M12 and it becomes a state in which the wirelessconnection between the both sides is maintained. Owing to the fact thatthe cycle carrying out the intermittent communication is long in thismanner, it becomes possible to make the power consumption required forthe communication smaller than a case in which it is operated in thedata transfer mode M12 and low power consumption is realized. It shouldbe noted that the low power consumption here indicates a phenomenon thatthe low power consumption is realized by thinning out communicationcycles and is not related directly to the process for lowering thetransmission power which will be described later on (however, it isconstituted as described later on such that a process for loweringtransmission power is carried out during a low power consumption mode).

In a case when the data transfer between the both sides is to berestarted in a state of this low power consumption communication modeM13, it returns to the connection mode M11, a process for restarting thecommunication is carried out in the connection mode M11 and thereafterit becomes the data transfer mode M12 in which the data transfer iscarried out practically. In a state in which the wireless connection ismaintained in the low power consumption communication mode M13, theconnection process in the connection mode M11 is carried out relativelysimply and it is possible to carry out the restart of the data transferrapidly as compared with a case in which the wireless connection isrecommenced.

Also, in a case when a connection process with anyone of communicationpartners is not carried out in the connection mode M11 (or in a casewhen a connection is not possible), each apparatus is shifted to thestandby mode M14. The apparatus which becomes this standby mode M14carries out an intermittent reception or transmission with a very longcycle and carries out a process for searching whether or not acommunication apparatus to become a partner exists. Here, it may beconstituted such that the apparatus becoming the standby mode M14 doesnot return to the connection mode M11 if there is no process which maybecome some kind or another opportunity caused by a user operation orthe like. Also, during a period when a communication is carried outbetween two apparatuses, the two apparatuses are to be set in the samemode basically. More specifically, at least the connection mode M11, thedata transfer mode M12 and the low power consumption mode M13 are themodes which shift in synchronism with each other between the twoapparatuses.

Here, in case of the present invention, as shown in FIG. 8, the normalmode M1 is set as a security mode when it is a state in which itcommunicated between the mobile telephone terminal apparatus 10 and thewireless key apparatus 50 in the low power consumption communicationmode M13 and a warning mode is started by an opportunity that thecommunication mode shifts from the low power consumption communicationmode M13 to the connection mode M11. The process with respect to thedetail in which it is shifted from a warning mode to a functionlimitation mode will be described later on, but when the security modebecomes the function limitation mode M3, the function limitation mode M3remains during a period when it is the connection mode M11, the datatransfer mode M12 and the standby mode M14. It is constituted only in acase when it is shifted from the data transfer mode M12 to the low powerconsumption communication mode M13 such that the security mode is toreturn from the function limitation mode M3 to the normal mode M1.

Next, it will be explained a process in which the security mode isselected in each of the mobile telephone terminal apparatus 10 and thewireless key apparatus 50 with reference to FIG. 9. This security modeselection process is, for example, executed under the control of thecontrol units 19 and 53 of the respective apparatuses.

First, it is judged whether or not the communication mode at present isin a low power consumption communication mode (step S1). Here, in a casewhen it is in a low power consumption communication mode, a state timerprepared in the control unit is reset (step S2). Then, the security modeis set to a normal mode (step S3) and a process as a normal mode (morespecifically, a mode without limiting the function) is executed (stepS4). It should be noted that the state timer is a timer counted up bypassage of time.

Also, in a case when it is judged in step S1 that it is not in a lowpower consumption communication mode, it is judged whether or not thesecurity mode just before (at present) is a normal mode (step S5). Here,in case of a normal mode, a state timer prepared in the control unit ismade to start (step S6). Then, a start of a warning mode is set (stepS7) and a warning operation as a warning mode is executed (step S8). Itshould be noted that in a case when it is constituted such that only oneof the mobile telephone terminal apparatus 10 and the wireless keyapparatus 50 carries out the warning operation, any process is notcarried out particularly in the other apparatus during the warning mode.

Then, in a case when it is judged in step S5 that the security mode justbefore (at present) is not a normal mode, it is judged whether or notthe counted value of the state timer activated in step S6 exceeds avalue TH determined beforehand (step S9). It remains in the warning modeof step S8 until the counted value exceeds the predetermined value TH1and in a case when the counted value exceeds the predetermined valueTH1, it is made to change the security mode to a warning mode (stepS10). It is designed such that the period when the counted value of thestate timer exceeds the predetermined value TH1 after the count isstarted is a period, for example, of around several seconds to severalten seconds.

Next, it will be explained with reference to the drawings of FIG. 10 andsubsequent thereto about a specific example of a communication state ineach communication mode in each of the mobile telephone terminalapparatus 10 and the wireless key apparatus 50. First, it will beexplained an example in which the mobile telephone terminal apparatus 10and the wireless key apparatus 50 carry out the authentication processof a partner in the connection mode M11.

In case of carrying out a wireless communication by Bluetooth system,one of the communication apparatus of the two apparatuses carrying outthe communication becomes a master apparatus and the other communicationapparatus becomes a slave apparatus. For the Bluetooth system, eitherone of the apparatuses may become a master or a slave, but in case ofthe present invention, it is to be set such that the wireless keyapparatus 50 becomes a master and the mobile telephone terminalapparatus 10 becomes a slave.

The apparatus which became a slave (mobile telephone terminal apparatus10 here) carries out a scan process for searching the master in aconnection mode. FIG. 10 is a flowchart showing an operation example inthis scan process. In the scan process, continuous reception is carriedout for a constant period and a process for searching a signal from themaster is carried out (step S11). It is judged in its scan processwhether or not a signal (page signal) added with an ID number of thewireless key apparatus 50 which is a partner carrying out the securityprocess was received (step S12). Here, in a case when signal added withthe ID number of the wireless key apparatus 50 is not received, it isshifted to an idle process so as to wait for a constant period (stepS13) and thereafter it returned to step S11 such that the scan processis repeated.

Then, in a case when it is judged in step S12 that the page signal addedwith the ID number of the wireless key apparatus 50 was received, aresponse signal with respect to that page signal is transmitted (stepS14) and it is shifted to a communication state by carrying out aconnection process with the master (more specifically, shifted to a datatransfer mode M12) (step S16).

Next, FIG. 11 will be explained. The apparatus which became a master(here, wireless key apparatus 50) starts a standby timer when theconnection mode starts (step S21). A page signal is transmitted by adetermined channel for a predetermined period (step S22). At that time,for example, an ID number which was set for the own apparatus is addedto the page signal and at the same time, the ID number of thecommunication partner is also added. Then, it is judged whether or notthere is a response from the slave after the transmission of the pagesignal (step S23). In case of no response, it is judged whether or notthe counted value of the standby timer exceeds a determined time periodTH2 (step S24). In a case when the counted value of the standby timerdoes not exceed the determined time period TH2, it is shifted to an idleprocess and it waits for a constant period (step S25) and thereafter, itreturns to step S22 and the transmission process of the page signal isrepeated.

Then, in a case when it is judged in step S23 that there is a responsefrom the slave, a connection process with the slave is performed and itis shifted to a communication state (more specifically, shifted to adata transfer mode) (step S27). Also, in a case when the counted valueof the standby timer exceeds the determined time period TH2 in step S24,it becomes a standby state (step S28) and a process for attempting aconnection with the slave here is discontinued.

FIGS. 12A and 12B are diagrams showing an example of a communicationstate between the apparatus which became the master (wireless keyapparatus 50) in which the process of the flowchart in FIG. 11 iscarried out and the apparatus which became the master slave (mobiletelephone terminal apparatus 10) in which the process of the flowchartin FIG. 10 is carried out. FIG. 12A shows a transmission timing of thepage signal and an idle period of the master (wireless key apparatus50). FIG. 12B shows a receiving (scan) timing and an idle period of theslave (mobile telephone terminal apparatus 10). As shown in FIGS. 12Aand 12B, the idle period of the transmission side and the idle period ofthe receiving side are different from each other and it is constitutedsuch that the page signal transmitted at any one of timings can bereceived on the receiving side.

FIG. 13 is a diagram showing the process of FIG. 12 by a sequencediagram. As shown in FIG. 13, the transmission of the page signal iscarried out from the wireless key apparatus 50 intermittently (at timingT11, T12, T13). Here, if there is a response with respect to the pagesignal (at timing T14), mutual exchange of the response between the twoapparatuses are further carried out (at timing T15, T16), thereaftermutual exchange of the connection signal performing the wirelessconnection is carried out (at timing T17, T18) and it is shifted to adata transfer mode.

Next, a process example in a case when the respective apparatuses of thepresent invention are shifted to the data transfer mode M12 will beexplained with reference to a flowchart of FIG. 14. When it is shiftedto a data transfer mode, an authentication process in a channel in whichthe data transfer is carried out is performed (step S31). Then, it isjudged whether or not the authentication was completed correctly (stepS32). In a case when the authentication process is not completed here,it returns to the connection mode M11.

Then, in a case when the connection process in step S32 is completed, adata transfer is carried out ordinarily, but in the security process ofthe present invention, the data transfer is not carried out and aprocess for shifting to a low power consumption mode M13 is carried outdirectly (step S33). Then, it is judged whether or not it can be shiftedto a low power consumption mode (step S34). In case of a state in whichit can be shifted to a low power consumption mode M13, it is set to asniff state of a low power consumption mode M13. In a case when itcannot be shifted to a low power consumption mode, it returns to theconnection mode M11.

FIG. 15 is a sequence diagram showing an example of the communicationstate shown in the flowchart of FIG. 14. More specifically, packettransmission is carried out mutually in the data transfer mode M12 forperforming authentication or the like (at timing T21, T22, T23, T24).Then, after the authentication is completed, data (sniff mode request)for shifting to a low power consumption mode is transmitted (at timingT25) from the master (wireless key apparatus 50) and its consent isreceived (at timing T26) such that both apparatuses are shifted to a lowpower consumption mode (sniff mode).

FIG. 16 is a flowchart showing a process example in a low powerconsumption mode M13 (sniff mode) relating to the slave (mobiletelephone terminal apparatus 10). The process will be explained. When itbecomes a sniff mode, first, a timer is started (step S41) and a scanprocess for receiving a signal from the master is carried out (stepS42). It is judged subsequently to the scan process whether or not asignal (page signal) added with the ID number of the wireless keyapparatus 50 which is a partner carrying out a security process wasreceived (step S43). Here, in a case when a signal added with the IDnumber of the wireless key apparatus 50 is received, a response signalwith respect to the page signal is transmitted (step S44). Then, thetimer started in step S41 is reset (step S45) and it is shifted to anidle period (step S46). When an idle period of a constant periodelapses, it returns to the scan process in step S42. Here, in case ofthe present invention, it is constituted such that the idle period instep S46 (period when communication is not carried out) is set as arelatively longer period and at the same time, it is constituted suchthat it is synchronized with the idle period on the master side.

On the other hand, in a case when it is judged in step S43 that a signaladded with the ID number of the wireless key apparatus 50 is notreceived, it is judged whether or not the timer started in step S41exceeded a predetermined value T_SV (step S47). Then, in a case when itdoes not exceed the predetermined value T_SV, the flow is shifted to theidle process of step S46. Then, in a case when step S47 it is judged itexceeds the predetermined value T_SV, the communication mode is changedto a connection mode M11 (step S48). The transmission power of thetransmission amplifier may be changed to be higher when thecommunication mode is changed to a connection mode.

FIG. 17 is a flowchart showing a process example in the master (wirelesskey apparatus 50) with respect to the low power consumption mode (sniffmode). Its process will be explained. A first timer is started when itbecomes a sniff mode (step S51) Then, a process for transmitting a pagesignal for a predetermined period is carried out (step S52). After thetransmission of this page signal, it is judged whether or not a responsefrom a partner (mobile telephone terminal apparatus 10) which carriesout a security process was received (step S53) Here, in a case when theresponse signal is receive, the timer started in step S51 is to be reset(step S54). Then, the flow is shifted to the idle period (step S55).When an idle period of a constant period elapses, the flow returns tothe page transmission process of step S52. Here, in case of the presentinvention, it is constituted such the idle period (period in which thecommunication is not carried out) in step S55 is to be set as arelatively long period and at the same time is to be synchronized withthe idle period on the slave side.

On the other hand, in a case when it is judged in step S53 that aresponse from the mobile telephone terminal apparatus 10 is notreceived, it is judged whether or not the timer started in step S51exceeded a predetermined value T_SV (step S56). In a case when it doesnot exceed the predetermined value T_SV, it is shifted to the idleprocess of step S55. Then, in a case when it is judged in step S56 thatthe predetermined value T_SV is exceeded, the communication mode ischanged to a connection mode M11 (step S57). When the communication modeis changed to a connection mode M11, the transmission power of thetransmission amplifier may be changed to be high.

FIG. 18 a sequence diagram showing communication timings of the bothapparatuses in a low power consumption mode (sniff mode) As shown inFIG. 18, the timing at which the sniff process of the master is carriedout (portion designated as “ON”) and the timing at which the sniffprocess of the slave is carried out coincide with each otherapproximately. More specifically, the timings at which polling packetsare transmitted form the master (T31, T33, T35, T37) and the periods inwhich the reception thereof is carried out in the slave coincide, andrespective polling packets are received by the slave and with respect tothe responses thereof (at timing T32, T34, T36, T38), they are receivedon the master side. Owing to the fact that an intermittent bidirectionalcommunication is carried out in this manner, a low power consumptionmode is maintained and a wireless connection state between the masterand the slave is maintained.

FIG. 18 is a sequence diagram showing communication timings in the bothapparatuses in connection with a low power consumption mode (sniff mode)M13. As shown in FIG. 18, the timing at which the sniff process (portiondescribes as ON) is carried out in the master and the timing at whichthe sniff process is carried out in the slave approximately coincidewith each other. More specifically, the timings (T31, T33, T35, T37) atwhich polling packets are transmitted from the master and the periodswhen the reception thereof are carried out in the slave approximatelycoincide with each other. Also, respective polling packets are receivedby the slave and with respect to the responses thereof (at timing T32,T34, T36, T38), they are received on the master side. Owing to the factthat an intermittent bidirectional communication is carried out in thismanner, a low power consumption mode M13 is maintained and a wirelessconnection state between the master and the slave is maintained.

Owing to a fact that the processes explained so far are executed, in acase when the mobile telephone terminal apparatus 10 and the wirelesskey apparatus 50 can wireless-communicate favorably in an adjacentstate, the mobile telephone terminal apparatus 10 and the wireless keyapparatus 50 are maintained in a wireless-connected state using a lowpower consumption mode. In this wireless-connected state using the lowpower consumption mode, a data transfer which becomes a so-calledpayload is not carried out and a signal for maintaining the wirelessconnection is only transmitted and received intermittent. In this case,by selecting the idle period properly, it is possible to carry out acommunication with very low power consumption. Therefore, it is possibleto lower the power consumption caused by carrying out the securityprocess of the present invention and it is possible to make the batteryduration periods of both the mobile telephone terminal apparatus 10 andthe wireless key apparatus 50 be a longer period. In particular, thereis a big effect on a wireless key apparatus which is desired to beconstituted in a small size as much as possible.

Also, with respect to the mobile telephone terminal apparatus 10, asecurity process was carried out by applying a short distance wirelesscommunication system of the Bluetooth system which has a great number ofexamples already mounted on mobile telephone terminals, so that thesecurity process of the present invention can be realized only byslightly changing a control constitution or the like of a mobiletelephone terminal provided with a short distance wireless communicationcircuit of an existing Bluetooth system and a favorable securityfunction is realized easily.

The process explained so far is a fundamental process for carrying out asecurity process of the present invention and here, in the presentinvention, it is constituted in a case when a connection is attempted ina state in which a wireless connection between the mobile telephoneterminal apparatus 10 and the wireless key apparatus 50 is cut off suchthat a following process it to be carried out. More specifically, thecommunication mode shown in FIG. 8 becomes a connection mode in a statein which the wireless connection is cut off and the connection processshown in FIGS. 10 and 11 is carried out with respect to a fundamentalcommunication process, but according to the present invention, a processexplained hereinafter will be carried out as a concrete communicationprocess. With respect to the process in this connection mode, areception for searching a signal from the master is carried out in theslave (mobile telephone terminal apparatus 10) and in the master(wireless key apparatus 50), a process for transmitting a signal (pagesignal) asking for a response from the slave is carried out. It shouldbe noted in the following explanation that it is explained by an examplein which the mobile telephone terminal apparatus 10 is made to be aslave and the wireless key apparatus 50 is made to be a master, but itmay be constituted such that the mobile telephone terminal apparatus 10is to be a master and the wireless key apparatus 50 is to be a slave.

FIG. 20 is a diagram showing a communication process example of thepresent invention which is carried out when the slave (mobile telephoneterminal apparatus 10) is in a connection mode. Here, when it becomes aconnection mode, a reception carried out continuously at the beginningfor predetermined period (R1) and a reception of a page signal from themaster is attempted. Here, it is assumed that this continuous receptionis to be an interval 1. Then, in a case when a page signal cannot bereceived by the continuous reception in the interval 1, it is shifted toa process of an interval 2 and intermittent reception (R2, R3, R4) iscarried out by a predetermined duty ratio. Then, in a case when a pagesignal cannot be received by the intermittent receive in the interval 2either, it is shifted to a process of an interval 3 and intermittentreception (R5, R6) is carried out by making the duty ratio smaller thanthat of the interval 2 (making smaller here means a state in whichreceiving period is shortened). Further, in a case when a page signalcannot be received by the intermittent receive in the interval 3 either,it is shifted to a process of an interval 4 and intermittent reception(R7, R8) is carried out by making the duty ratio smaller than that ofthe interval 3. Thereafter, the process of the interval 4 is carried outas long as the connection mode continues.

FIG. 21 is a diagram showing a communication process example of thepresent invention which is carried out when the master (wireless keyapparatus 50) is in a connection mode. Here, when it becomes aconnection mode, transmission of a page signal is carried out at thebeginning for a predetermined period continuously (Ta). However, thecontinuously transmission here means a process for transmitting a packetof a page signal periodically and just after the page signaltransmission, there exists a period in which a reception of a responsewith respect to the page signal is attempted. It is assumed that thecontinuous transmission is an interval 1. Then, in a case when aresponse signal with respect to the page signal transmission cannot bereceived by the continuous transmission in the interval 1, it is shiftedto a process of an interval 2 and an intermittent transmission (Tb) iscarried out by a predetermined duty ratio. Then, in a case when theresponse signal with respect to the page signal transmission cannot bereceived by the intermittent transmission for the interval 2 either, itis shifted to a process of an interval 3 and an intermittenttransmission (Tc) is carried out by making the duty ratio smaller thanthat of the interval 2 (making smaller here means a state in whichtransmission period is shortened).

Further, in a case when there is no response and a connection cannot berealized in the interval 3 either, it is shifted to a process of aninterval 4. In the process of this interval 4, signal detection mode ischanged over from transmission to reception. More specifically, thetransmission is stopped and an intermittent reception (Ra, Rb) iscarried out by a predetermined duty ratio. Thereafter, the receivingprocess in the interval 4 is carried out as long as the connection modecontinues.

FIG. 22 a sequence diagram showing a state in which a communicationbetween the mobile telephone terminal apparatus 10 and the wireless keyapparatus 50 is carried out in a connection mode in this manner. Thesequence diagram is a diagram in which there are shown a statecontrolling from the control unit 19 (host) on the side of the mobiletelephone terminal apparatus 10 to the communication unit 32, a processin the communication unit 32 according to that control, a statecontrolling from the control unit 53 (host) on the side of the wirelesskey apparatus 50 to the communication unit 52 and a process in thecommunication unit 52 according to that control.

It will be explained according to FIG. 22, wherein an instruction fortransmitting continuously is transmitted from the control unit on theside of the wireless key apparatus 50 which is the master (at timingT51) and a continuous transmission is carried out from the communicationunit (at timing T52). An instruction for receiving continuously istransmitted from the control unit of the mobile telephone terminalapparatus 10 which is the slave (at timing T61) and a continuousreception is carried out in the communication unit.

Thereafter, an instruction DTX1 for transmitting intermittently istransmitted from the control unit on the side of the wireless keyapparatus 50 which is the master (at timing T53) and an intermittenttransmission is carried out from the communication unit (at timing T54).Further, an instruction DTX2 for transmitting intermittently with theduty ratio being made small is transmitted (at timing T55) and anintermittent transmission with the duty ratio being made small iscarried out from the communication unit (at timing T56).

Also, an instruction DRX for receiving intermittently is transmittedfrom the control unit of the mobile telephone terminal apparatus 10which is the slave (at timing T62) and an intermittent reception iscarried out in the communication unit.

Also, an instruction DRX for receiving intermittently is transmittedfrom the control unit of the mobile telephone terminal apparatus 10which is the slave (at timing T62) and an intermittent reception iscarried out in the communication unit.

In a state in which intermittent receiving processes are carried out inboth of the master and the slave in this manner, it becomes a very lowpower consumption, because only an intermittent reception is carried outin at least each of the communication units 32 and 52. Morespecifically, the power consumption is small in the reception operationas compared with that in the transmission operation and even if thestate remains and is continued, it is possible to be in a low powerconsumption state of both the apparatuses 10 and 50.

Then, if there is any kind of operation in the operation unit of any oneof the apparatuses when it becomes a state in which the intermittentreceiving processes are carried out in both of the master and the slavein that manner, it is constituted according to the present inventionsuch that a wireless connection can be executed rapidly by making theapparatus in which there was that operation to be changed from theintermittent reception state to a signal continuous-transmission statefor asking for a response from the partner.

FIG. 23 is a sequence diagram showing a process example in a case whenthe operation unit 59 on the side of the wireless key apparatus 50 isoperated in a state in which the intermittent receiving processes arecarried out in both of the master and the slave. As shown in FIG. 23, aninstruction DRX for receiving intermittently is transmitted from thecontrol unit on the side of the wireless key apparatus 50 (at timingT71), an intermittent reception is carried out in the communicationunit, an instruction DRX for receiving intermittently is transmittedfrom the control unit of the mobile telephone terminal apparatus 10 (attiming T81) and an intermittent reception is carried out in thecommunication unit. In this state, if the control unit 53 detects that abutton constituting a part of the operation unit 59 or the like wasoperated (at timing T70), an instruction for transmitting continuouslyis transmitted from the control unit 53 (at timing T72) and a continuoustransmission of a signal asking for a response from the terminal 10 iscarried out from the communication unit (at timing T73). With respect tothe period in which this continuous transmission is carried out, it ispreferable for the partner side apparatus, for example, to transmitcontinuously in a period of one time or more periods in which theintermittent reception is executed. Also, it may be constituted on anoccasion of this continuously transmission such that the transmissionpower is to be set highly.

On the occasion of the intermittent reception in the mobile telephoneterminal apparatus 10 if there is this continuously transmission, thereis a high possibility that the transmitted signal is received and ifreceived, a response signal is transmitted in a process in thecommunication unit 32 (at timing T82). If the response signal isreceived by the wireless key apparatus 50, that fact is transmitted tothe control unit 19 (at timing T74), and at the same time, aconfirmation signal (ACK signal) with respect to the response signal issent back (at timing T75) and the reception of the ACK signal isconveyed to the control unit 19 of the mobile telephone terminalapparatus 10 (at timing T83).

If there are a reception of the response signal on the side of thewireless key apparatus 50 and a reception of the ACK signal on the sideof the mobile telephone terminal apparatus 10 in this manner, a processfor authenticating between the wireless key apparatus 50 and the mobiletelephone terminal apparatus 10 mutually is carried out, a wirelessconnection process is carried out, a process in the connection mode iscompleted and it is shifted to a data transfer mode.

FIG. 24 is a sequence diagram showing a process example in a case whenanyone of keys constituting the operation unit 17 on the side of themobile telephone terminal apparatus 10 or the like is operated in astate in which the intermittent receiving processes are carried out inboth of the master and the slave. As shown in FIG. 24, an instructionDRX for receiving intermittently is transmitted from the control unit onthe side of the wireless key apparatus 50 (at timing T91), anintermittent reception is carried out in the communication unit, aninstruction DRX for receiving intermittently is transmitted from thecontrol unit of the mobile telephone terminal apparatus 10 (at timingT101) and the intermittent reception is carried out in the communicationunit. In this state, if the control unit 19 detects that a keyconstituting a part of the operation unit 17 or the like was operated(at timing T102), an instruction for transmitting continuously istransmitted from the control unit 19 (at timing T103) and a continuouslytransmission a signal asking for a response from the wireless keyapparatus 50 is carried out from the communication unit (at timingT104). With respect to the period in which this continuous transmissionis carried out, it is preferable for the partner side apparatus, forexample, to transmit continuously in a period of one time or moreperiods in which the intermittent reception is executed. Also, it may beconstituted on an occasion of this continuously transmission such thatthe transmission power is to be set highly.

On the occasion of the intermittent reception in the wireless keyapparatus 50 if there is this continuously transmission, there is a highpossibility that the transmitted signal is received and if received, aresponse signal is transmitted in a process in the communication unit 52(at timing T92). If the response signal is received by mobile telephoneterminal apparatus 10, that fact is transmitted to the control unit 19(at timing T104), and at the same time, a confirmation signal (ACKsignal) with respect to the response signal is sent back (at timingT105) and the reception of the ACK signal is conveyed to the controlunit 53 of the wireless key apparatus 50 (at timing T93).

If there are a reception of the response signal on the side of themobile telephone terminal apparatus 10 and a reception of the ACK signalon the side of the wireless key apparatus 50 in this manner, a processfor authenticating between the wireless key apparatus 50 and the mobiletelephone terminal apparatus 10 mutually is carried out, a wirelessconnection process is carried out, a process in the connection mode iscompleted and it is shifted to a data transfer mode.

FIG. 25 is a diagram showing a state transition in a connection mode inthe wireless key apparatus 50 in a case when such a process is carriedout. In a state in which a page signal is transmitted continuously (stepS111), when a period of a timer A1 which counts a predetermined periodfrom that state elapses, it is shifted to an intermittent transmissionof an interval 2 (step S112) and further, when a period of a timer A2which counts a predetermined period from that state elapses, it isshifted to an intermittent transmission of an interval 3 (step S113).Then, further, when a period of a timer A3 which counts a predeterminedperiod from that state elapses, it is shifted to an intermittenttransmission of an interval 4 (step S114). Then, in either one of thestates, if there is an operation of the operation unit, it is returnedto the continuous transmission (step S111).

FIG. 26 is a diagram showing a state transition example in a connectionmode in the mobile telephone terminal apparatus 10. In a state in whichthe page signal is received continuously (step S121), when a period of atimer B1 which counts a predetermined period from that state elapses, itis shifted to an intermittent reception of an interval 2 (step S122).

Then, if there is an operation of anyone of keys constituting theoperation unit or the like on an occasion of the continuous reception instep S121, the period for carrying out the continuous reception in stepS121 is prolonged. In this state, it is supposed that it is just afterbeing shifted to a connection mode and there is a high possibility thata page signal is transmitted continuously or transmitted by a relativelyshort period from the partner side, so that there is a high possibilitythat a connection can be realized only by continuing the reception.

Also, if there is an operation of any one of the keys constituting theoperation unit or the like in the intermittent reception state in stepS122, it is shifted to a process for repeating the transmission of asignal which asks for a response and an intermittent reception (stepS123). In a case when a connection is not completed even if it becomesthis state, it returns to an intermittent reception of an interval 2when the period of the timer B1 which counts a predetermined periodelapses (step S122).

Here, it may be constituted with respect to the state transition in thewireless key apparatus 50 such that it is to be set, for example, asshown in FIG. 27. More specifically, in a state in which the page signalis transmitted continuously (step S131), when a period of a timer C1which counts a predetermined period from that state elapses, it isshifted to an intermittent transmission of an interval 2 (step S132) andfurther, when a period of a timer C2 which counts a predetermined periodfrom that state elapses, it is shifted to an intermittent transmissionof an interval 3 (step S133). Then, further, when a period of a timer C3which counts a predetermined period from that state elapses, it isshifted to an intermittent reception of an interval 4 (step S134). Then,in either one of the states, if there is an operation of the operationunit, it is to be returned to the continuous transmission in step S131.

It is all the same as the process in FIG. 25 so far, but when it isshifted to an intermittent reception in step S134 and when a period of atimer C4 which counts a predetermined period from that state elapses, itis shifted to an intermittent transmission of a page signal (step S135).Further, when the period of the timer C4 which counts a predeterminedperiod from the intermittent transmission of the page signal in stepS135 elapses, it is shifted to an intermittent reception in step S134.In this manner, if it is constituted such that an intermittent receptionand an intermittent transmission are carried out repeatedly, a wirelessconnection can be executed automatically when it becomes a state inwhich the wireless key apparatus 50 and the mobile telephone terminalapparatus 10 can communicate wirelessly even if it is a sate in whichthere is no key operation at all or the like.

It should be noted in the exemplified embodiment mentioned above thatshort distance wireless communication means of such as Bluetooth systemor the like was installed in the mobile telephone terminal 10 and theshort distance wireless communication means was used for actuating thesecurity mode, but it may be constituted, for example, such that theshort distance wireless communication is not installed in the mobiletelephone terminal 10 the short distance wireless communication means isto be connected to the mobile telephone terminal 10 externally. Morespecifically, for example, two of an apparatus which corresponds to thewireless key apparatus are prepared and one of the two wireless keyapparatuses is connected to the mobile telephone terminal 10 such thatthe security mode is to be set according to the communication mode ofthe two of wireless key apparatuses.

Also, in the exemplified embodiment explained so far, a communicationcircuit of a Bluetooth system was installed in a mobile telephoneterminal such that a wireless communication is to be carried out withthe wireless key apparatus by that communication circuit, but it may beconstituted such that a wireless communication is to be carried out withthe wireless key apparatus by means of another wireless communicationsystem. More specifically, if it is a system which at least includes afirst communication mode which enables a data transfer as a wirelesscommunication system between both apparatuses which communicate eachother and a second communication mode which carries out a wirelesscommunication between both the apparatuses in a period shorter than thatof the communication in the first communication mode in awireless-connected state maintained, similar processes as those of theexemplified embodiment mentioned above are possible and applicable.

Also, in case of the Bluetooth system, one of the apparatus which carryout a communication becomes a master and the other one becomes slave andto make the above mentioned wireless key apparatus side be a master andto make the mobile terminal side be a slave is only one example and itis allowed to reverse the relation there-between. Also, it may beconstituted such that the master and the slave are counterchanged on thecommunication halfway.

Also, in the exemplified embodiment mentioned above, it was applied tothe security assuring process of the mobile telephone terminalapparatus, but it may be constituted such that it is applied to aprocess for assuring the security of other mobile type.

Further, also with respect to the wireless key apparatus, an examplewhich was constituted as a key apparatus for exclusive use was employedin the exemplified embodiment mentioned above, but it may be constitutedsuch that a program which makes if function as a key apparatus of thepresent invention is installed to a terminal apparatus capable ofcommunicating by the Bluetooth system or the like (for example, PDAapparatus or the like) so as to function as a key apparatus.

It should be understood by those skilled in the art that variousmodifications, combinations, sub-combinations and alterations may occurdepending on design requirements and other factors insofar as they arewithin the scope of the appended claims or the equivalents thereof.

1. A communication system comprising: a communication terminalapparatus; and a wireless key apparatus capable of a wirelesscommunication with the communication terminal apparatus by apredetermined wireless communication system and limits a function ofsaid communication terminal apparatus in response to a communicationstate between said communication terminal apparatus and said wirelesskey apparatus, wherein said predetermined wireless communication systemis a system in which one of two apparatuses carrying out a communicationeach other becomes a master and the other one becomes a slave such thata signal from the master is detected by the slave so as to carry out awireless connection between the two apparatuses; each of saidcommunication terminal apparatus and said wireless key apparatuscomprises communication means for carrying out a wireless communicationby said predetermined wireless communication system, and control meansfor controlling the communication state in said communication means;when the wireless communication state between said communicationterminal apparatus and said wireless key apparatus is a non-connectionstate, the communication means on the side which becomes said masterdecreases a transmission period in a plurality of steps in response tothe non-connection time period and transmits a signal asking for aresponse from said slave intermittently; and the communication means onthe side which becomes said slave decreases a reception period in aplurality of steps in response to the non-connection period and carriesout a reception for searching for the signal from said masterintermittently.
 2. A communication system according to claim 1, whereinthe communication means on the side of said master stops thetransmission of said signal asking for a response and carries out areception for searching for the signal from said slave intermittentlywhen the signal asking for a response from said slave was transmittedand there is no response for a predetermined period.
 3. A communicationsystem according to claim 2, wherein said communication terminalapparatus and/or said wireless key apparatus includes operation means,and the control means which detected an operation of the operation meanstransmits a signal asking for said response from the communicationmeans.
 4. A communication terminal apparatus in which one of a partnerside communication apparatus to be communicated and the communicationterminal apparatus becomes a master, the other one becomes a slave, anda wireless communication system carrying out a wireless connection forboth sides when the slave detects a signal from the master, thecommunication terminal apparatus comprising: communication means forcarrying out a wireless communication by said predetermined wirelesscommunication system, and control means for controlling a communicationstate in said communication means; and when operating as said masterwhen in the wireless communication state, said communication meanstransmits a signal asking for a response from said slave intermittentlyby decreasing a reception period in a plurality of steps in response tothe non-connection time period, and when operating as said slave, saidcommunication means carries out a reception for searching for a signalfrom said master intermittently by decreasing a reception period in aplurality of steps in response to the non-connection time period.
 5. Acommunication terminal apparatus according to claim 4, wherein saidcommunication means transmits said signal asking for a response fromsaid slave when operating as said master and stops transmitting thesignal asking for said response and carries out a reception forsearching for the signal from said slave intermittently in a case whenthere is no response for a predetermined period.
 6. A communicationterminal apparatus according to claim 5, wherein operation means isincluded and when the control means detects an operation of theoperation means, the signal asking for said response is transmitted fromsaid communication means.