Communication system and communication method

ABSTRACT

To provide a communication system including a mobile terminal which can prevent leak of information even if the mobile terminal is lost and reproduce previously accumulated confidential data without losing newly created and updated confidential data. A mobile terminal includes connection state judging device which detects a line connection state with a server. When the line connection state is a broadband connection, the data is read directly from and written directly into a data storing device of the server. When the line connection state is a narrowband connection, the data is temporarily read out and written into a data storing device of the terminal. When the operation of the mobile terminal is completed or a security operation starting instruction is issued by a user, the updated confidential data is written into the data storing device of the server and then the confidential data is erased from the mobile terminal.

TECHNICAL FIELD

The present invention relates to a communication system including amobile terminal, a security method for the mobile terminal, and aprogram thereof.

BACKGROUND ART

Since a phonebook and reception/transmission mail addresses are storedin a mobile phone usually and accessed to be referred to or to bechanged, there is a possibility that such information is read by a thirdperson and personal information or the like are leaked when the mobilephone is lost. To deal with such problems, a phonebook management systemin which phonebook data and the like are uploaded into a server providedin a network of a wireless provider, to be downloaded according to arequest from the mobile phone side as necessary has been proposed(Patent Document 1).

Also, there has been proposed a data access device with which thephonebook data and the like are uploaded in a server, and when the datais transferred and displayed on the mobile phone, confidentialinformation is stored in a volatile memory and general information isstored in a non-volatile memory, so that the confidential information isnot remained in the mobile phone once the power is off (Patent Document2). Further, a mobile phone configured such that dial lock or dataerasing can be performed from a radio base station, even after themobile phone is lost, has been also proposed (Patent Document 3).

Patent Document 1: Japanese Patent Application Laid-Open No. 2002-57807Patent Document 2: Japanese Patent Application Laid-Open No. 2003-223368

Patent Document 3: Japanese Patent Application Laid-Open No. 2003-319453

DISCLOSURE OF THE INVENTION Problems to be Solved by the Invention

However, with the security systems shown in Patent Document 1 and PatentDocument 2 described above, there is such a possibility that newlycreated or updated confidential data is erased without being transferredto the server depending on a line connection state at a time when anoperation of the mobile phone is completed. Also, with the method ofPatent Document 3, though it is possible to lock the dial or erase thestored data after the mobile phone is lost, reproduction of the storeddata is not possible.

It is an exemplary object of the present invention to provide acommunication system including a mobile terminal which can prevent leakof information when the mobile terminal is lost and reproduce thepreviously accumulated data even after the mobile terminal is lost, acommunication method, and a program thereof.

Means for Solving the Problems

In order to achieve the foregoing exemplary object, a communicationsystem according to the invention is a system including a mobileterminal for performing a communication and a server for managinginformation needed for the communication performed by the mobileterminal, in which:

the server transfers, responding to a request from the mobile terminal,communication information managed by the server to the requesting mobileterminal, and stores and manages collectively the communicationinformation transferred from the requesting mobile terminal; and

the mobile terminal judges a communication state with the server,receives the communication information from the server based on thejudgment result, and makes the server manage the communicationinformation collectively when the communication is completed.

While the present invention is described to be constructed as thecommunication system as hardware, the present invention is not limitedto such case, and the present invention may be constructed as the mobileterminal as hardware, a communication method, or a security program assoftware.

A mobile terminal according to the invention is a terminal whichperforms communication based on communication information managed by aserver,

And the mobile terminal is configured so as to judge a communicationstate with the server, receive the communication information from theserver based on the judgment result, and make the server manage thecommunication information collectively when the communication iscompleted.

A security program according to the invention is configured so as tocause a microprocessor of a mobile terminal, which performscommunication based on communication information managed by a server, toexecute:

a function of judging a communication state with the server andreceiving the communication information from the server based on thejudgment result; and

a function of transferring the communication information to the serverwhen the communication is completed.

A communication method according to the invention is a method ofperforming a communication using a mobile terminal by combining themobile terminal for performing a communication and a server for managinginformation needed for the communication performed by the mobileterminal, and the method includes:

transferring communication information managed by the server respondingto a request from the mobile terminal to the requesting mobile terminal,storing and managing the communication information transferred from therequesting mobile terminal collectively by the server; and

judging a communication state with the server by the mobile terminal,transferring the communication information from the server to the mobileterminal based on the judgment result, and managing the communicationinformation by the server collectively when the communication iscompleted.

EFFECT OF THE INVENTION

With the present invention, when the user is not using the mobileterminal, or when the user is using the mobile terminal with the line tothe server being connected, the communication information needed for thecommunication of the mobile terminal is stored in the server. Therefore,if the mobile terminal is lost, highly confidential communicationinformation is not possible to be known by others.

BEST MODE FOR CARRYING OUT THE INVENTION

Next, an exemplary embodiment of the invention is explained hereinafterin detail by referring to attached drawings.

A communication system according to an exemplary embodiment of theinvention is a system including a mobile terminal 1 for performing acommunication and a server 2 for managing information needed for thecommunication performed by the mobile terminal 1 as shown in FIGS. 1 and8, and the system is basically configured in such a manner that:

the server 2 transfers, responding to a request from the mobile terminal1, the communication information managed by the server 2 to therequesting mobile terminal 1, and stores and manages collectively thecommunication information transferred from the requesting mobileterminal 1, while the mobile terminal 1 judges a communication statewith the server 2, receives the communication state from the server 2based on the judgment result, and makes the server 2 manage thecommunication information collectively when the communication iscompleted.

With the exemplary embodiment of the invention, the communicationinformation which is stored and managed by the server 2 is transferredto the requesting mobile terminal 1 responding to the request from themobile terminal 1. Upon receiving the communication information from theserver 2, the mobile terminal 1 performs communication based on thecommunication information.

The mobile terminal 1 contains information which is not desired to bedisclosed to others, in addition to information which may be disclosedto others. As examples of the information which is not desired to bedisclosed to others, there are a telephone number and mail address ofother person. When the mobile terminal 1 is lost, such information maybe disclosed to others, and may be misused. Such cases can be avoided bypreventing the information from being disclosed by using passwords orthe like. However, as long as the communication information remains inthe mobile terminal 1, there is a possibility that the communicationinformation is leaked in any way.

Therefore, in the exemplary embodiment of the present invention, whenthe mobile terminal 1 is not being used, communication information inthe mobile terminal 1 (telephone number and mail address of otherperson, for example) is transferred to the server 2, and the server 2manages the communication information collectively. And at a time whenthe mobile terminal 1 is to be used, the communication informationcollectively managed by the server 2 is downloaded from the server 2 tothe requesting mobile terminal 1, and the communication information isstored in the mobile terminal 1 temporarily.

The user performs communication by using the communication informationdownloaded to the mobile terminal 1. When the user uses the mobileterminal 1, the communication information downloaded from the server 2may be updated along with the communication. When the user completes thecommunication by using the mobile terminal 1, the mobile terminal 1transmits the communication information temporarily stored in the mobileterminal 1 to the server 2, including the updated information. Whenreceiving the communication information transmitted from the mobileterminal 1, the server 2 stores and manages the communicationinformation, in place of the mobile terminal 1. In this case, when themobile terminal 1 transmits the communication information to the server2, the mobile terminal 1 may erase the communication informationtemporarily stored in the mobile terminal 1.

Further, in the exemplary embodiment of the invention, when the mobileterminal 1 performs communication, the mobile terminal 1 does notdownload the communication information from the server 2 unlimitedly,but the mobile terminal 1 judges the connection state with the server 2,and downloads the communication information based on the judgmentresult. Accordingly, the mobile terminal 1 transmits/receives thecommunication information to/from the server 2 only when the connectingrelation between the mobile terminal 1 and the server 2 is in an optimumstate for: downloading the communication information from the server 2to the mobile terminal 1; and, uploading the communication informationfrom the mobile terminal 1 to the server 2.

According to the exemplary embodiment of the invention, thecommunication information is downloaded from the server 2 to perform thecommunication only when the communication is performed by using themobile terminal 1. Therefore, the information needed for thecommunication of the mobile terminal 1 is to be managed by the server 2instead of the mobile terminal 1. Accordingly, if the mobile terminal 1is lost, since important information is not present in the mobileterminal 1, the security of the mobile terminal 1 can be enhanced.

Also, according to the exemplary embodiment of the invention, theconnection state between the mobile terminal 1 and the server 2 isjudged, and based on the judgment result, the communication informationis downloaded from the server 2 to the mobile terminal 1. When thecommunication is completed, the communication information is transmittedfrom the mobile terminal 1 to the server 2, and the server 2 stores andmanages the communication information collectively. Further, thecommunication information is transmitted/received only when theconnection between the mobile terminal 1 and the server 2 is in anoptimum state. Consequently, the communication by the mobile terminal 1can be performed based on the communication information at a time of thecompletion of the previous communication, so the user does not feeldiscomfort even when the server 2 manages the communication informationof the mobile terminal 1 collectively, and the communication can beperformed any time based on the communication information accumulated bythe user.

Next, an exemplary embodiment of the invention will be explainedhereinafter in detail by referring to a specified example.

First Exemplary Embodiment

FIG. 1 is a block diagram showing a basic structure of the firstexemplary embodiment of the invention. The first exemplary embodiment ofthe invention includes a mobile terminal 1 and a server 2 connected tothe mobile terminal 1 via a communication network 3.

The server 2 includes: a server main controller 21 which controls theentire server; a server data access managing device 22 which manages thetransfer of the data or communication performed within the server; aserver data storing device 23 which stores the data in the server; and aserver communication device 24 which connects the communication with themobile terminal 1.

The mobile terminal 1 includes: a data processing device 11 whichcontrols the entire mobile terminal and processes the data; a dataaccess managing device 12 which manages the transfer of the data orcommunication performed within the mobile terminal; a user interfacedevice 13 which controls the data transfer performed between an inputdevice 19 to which data is inputted from the user and a display device18 which displays an output to the user; a terminal data storing device14 which stores the data; a terminal communication device 15 whichconnects the communication to the server 2 and other mobile terminal viathe communication network 3; a connection state judging device 16 whichjudges the connection state with the server 2 via the terminalcommunication device 15; and a security operation start device 17 whichinstructs the data processing device 11 via the data access managingdevice 12 to execute a predetermined security operation by the inputfrom the user. Note that a calculation control unit 10 is configuredwith the data processing device 11 and the data access managing device12.

Further, the data processing device 11 includes: a main controller 111which controls an operation of the entire mobile terminal 1; a dataprocessor 112 which executes reading, creation, update, erasing,writing, and the like, of the data; a security operation executing unit113 which executes the security operation when the operation of theterminal is completed or when being started by the security operationstart device 17; a confidential data managing unit 114 which managesconfidential data to be stored in the terminal data storing device 14 byadding a confidential flag to the confidential data; an updated datamanaging unit 115 which manages updated data that is newly created andupdated data to be stored in the terminal data storing device 14 byadding an update flag to the updated data; and the like.

Also, the data access managing device 12 includes: a user interface unit121 which executes the data transfer with the user interface device 13;a processing data transfer unit 122 which executes the data transferwith the data processing device 11; a storing data transfer unit 123which executes the data transfer with the terminal data storing device14; a direct transfer unit 125 which executes the data transfer directlywith the server data storing device 23 of the server 2 via the terminalcommunication device 15; an indirect transfer unit 124 which obtains thedata from the server data storing device 23 of the server 2 via theterminal communication device 15 after storing the data in the terminaldata storing device 14 temporarily, or, writes the data into the serverdata storing device 23 of the server 2 via the terminal communicationdevice 15 after storing the data in the terminal data storing device 14temporarily; a data transfer destination selecting unit 126 whichselects one of the indirect transfer unit 124 and the direct transferunit 125 when the data is transferred based on the line connection statejudged by the connection state judging device 16; and the like.

In general, the phonebook data, containing personal information such asthe telephone numbers and mail addresses of other persons, and e-mailsreceived from other persons or transmitted from the user to otherpersons, are stored in the terminal data storing device 14 within themobile terminal 1, and the data is accessed for reading or writing bythe operation of the user, via the user interface device 13.

FIG. 2 is an explanatory diagram showing a storing form of data which isstored in the terminal data storing device 14 according to the firstexemplary embodiment of the invention. To the data in the terminal datastoring device 14, both of a flag for indicating confidential data and aflag for indicating updated data are added to respective data units asshown in FIG. 2. When the flag is “on” the corresponding data(corresponded), the flag shows “1”, and when the flag is “off” thecorresponding data (not corresponded), the flag shows “0”. The user candesignate the data to be defined as the confidential data. For example,in the case shown in FIG. 2, the phonebook data, mail, and the like aredesignated as the confidential data, and such as a song list isdesignated as the general data.

These flags are updated as needed according to the state of the data inthe terminal. The confidential flag being “on” means that the data isthe confidential data and is required to be erased from the terminalunder normal circumstances. The updated flag being “on” means that thedata is updated only within the terminal and is required to be writteninto the server 2 before erased from the terminal. Further, sum of thenumber of “1” for the confidential data flag is calculated in aconfidential data number counter for showing the number of pieces of theconfidential data being in the terminal currently, and sum of the numberof “1” for the updated data flag is calculated in a updated data numbercounter for showing the number of pieces of the updated data being inthe terminal currently.

The data access managing device 12 shown in FIG. 1 obtains informationabout the line connection state between the mobile terminal 1 and theserver 2 by an output from the connection state judging device 16 whenan instruction to access the data is issued from the user interfacedevice 13 or the data processing device 11. The connection state judgingdevice 16 judges the state of the mobile terminal 1 from among thestates such that: the mobile terminal 1 and the server 2 are connectedwith a communication bandwidth being at a level called “broadband” whichis sufficient to transmit the data; the mobile terminal 1 and the server2 are connected with a narrower communication bandwidth which is at anormal dial up level; and, the mobile terminal 1 is not in a connectionstate, being out of the communication area with the radio wave.

The data transfer destination selecting unit 126 selects one of: thedirect transfer unit 125 which accesses to the server data storingdevice 23 of the server 2 directly; and an indirect transfer unit 124which accesses to the server data storing device 23 via the terminaldata storing device 14.

When accessing to the data stored in the server data storing device 23of the server 2 directly from the data access managing device 12, thedirect transfer unit 125 is used. The data read-out request from themobile terminal 1 is sent to the server side via the terminalcommunication device 15 of the mobile terminal 1 and the servercommunication device 24 of the server 2, the data read-out request isconverted to a read-out request to read the server data storing device23 by the server data access managing device 22, and the data is readout from the server data storing device 23. The read out data is sent tothe data access managing device 12 of the mobile terminal 1 through areversed route via the server communication device 24 and the terminalcommunication device 15, sent to the data processing device 11 via thedata processing transfer unit 122, and the data is used, or, againwritten into the terminal data storing device 14 as needed.

Similarly, in a case when the data write-in request is sent from themobile terminal 1, the data write-in request from the mobile terminal 1is sent to the server side via the terminal communication device 15 ofthe mobile terminal 1 and the server communication device 24 of theserver 2, the data write-in request is converted to a write-in requestto the server data storing device 23 by the server data access managingdevice 22, and the data is written into the server data storing device23. Needless to say, these accesses are encrypted with a mutually-agreedappropriate protocol, and performed surely by taking countermeasuresagainst a communication error. The security operation start device 17instructs the data access managing device 12 to perform a prescribedsecurity operation which will be described later, when the userinstructs by means of, for example, pushing a security operation startbutton.

FIG. 3 is a flowchart showing a flow of the operations performed in thefirst exemplary embodiment of the invention when the data is transferredfrom the server 2 to the mobile terminal 1 by the indirect transfer unit124 and an instruction for reading out the confidential data is issued.

When the user uses the mobile terminal 1 at the basic state (step S101),and if an instruction for reading out the confidential data (forexample, a phonebook data about Mr. A) is issued from the user via theuser interface device 13, or from the data processing device 11, it isjudged at first whether the data is present in the terminal data storingdevice 14 in the terminal (step S103). If present, the data is read out,to respond the access request (step S107). After that, the state returnsto the basic state (step S101).

If the data is not present, the connection state judging device 16judges a current connection state. When the data is not present in theterminal and the mobile terminal 1 is not connected, the data read-outrequest is not responded, and it is displayed to the user that therequest is not able to be responded, then the user has to wait until theterminal is connected (step S108).

When the data is not present in the mobile terminal 1 and the mobileterminal 1 is connected to the server 2, the read-out request for theconfidential data is sent to the server 2 as it is, and the data readout from the server 2 accordingly is returned to the data accessmanaging device 12 of the mobile terminal 1 (step S105). And the data isused as access result data. Also, the confidential data read out fromthe server 2 is stored in the terminal data storing device 14 in themobile terminal 1 with a confidential flag being “on” (step S106). Theconfidential flag being “on” means that the data is the confidentialdata and is required to be erased from the mobile terminal 1 undernormal circumstances.

FIG. 4 is a flowchart showing a flow of the operations performed in thefirst exemplary embodiment of the invention when the data is transferredfrom the mobile terminal 1 to the server 2 by the indirect transfer unit124 and an instruction for writing-in the confidential data is issued.

When the user uses the mobile terminal 1 at the basic state (step S201),and if a write-in request for writing the confidential data (forexample, #2 of an editing mail) into the terminal data storing device 14is issued from the user via the user interface device 13, or from thedata processing device 11 (step S202), the data is processed in themobile terminal 1 and stored in the terminal data storing device 14 inthe mobile terminal 1 with the update flag being “on” or theconfidential flag being “on” (step S203). The confidential flag being“on” means that the data is the confidential data and is required to beerased from the terminal under normal circumstances. The update flagbeing “on” means that the data is updated only within the mobileterminal 1 and is required to be written into the server data storingdevice 23 of the server 2 before erased from the mobile terminal 1.

Examples shown in the flowcharts of FIG. 3 and FIG. 4 adopt such apolicy that a process which can be performed in the terminal iscontrolled to be performed in the terminal as much as possible, and allthe confidential data is erased at a timing when the security operationis instructed. Next, described is another example which is configuredsuch that a time period during which the confidential data is present inthe mobile terminal 1 is shortened as much as possible by using theindirect transmit unit 124 and direct transmit unit 125.

FIG. 5 shows a flow of operations in a case when: the user uses themobile terminal 1 in the first exemplary embodiment; the read-outrequest of the confidential data in the terminal data storing device 14is issued from the user or the data processing device 11; and theindirect transfer unit 124 and direct transfer unit 125 are used.

First, it is assumed that the user's mobile terminal 1 is being used inthe basic state (step S301). Here, when the confidential data read-outrequest is issued (step S302), the connection state judging device 16judges a current connection state at first (step S303).

When the mobile terminal 1 is not being connected because the mobileterminal 1 is outside a communication area or else, the data read-outrequest is not responded, and it is displayed to the user that therequest is not able to be responded (step S307), then the user has towait until the terminal is connected.

When the mobile terminal 1 is being connected, it is checked furtherwhether the connection state is the broadband connection and there is aroom for the communication line, or the connection state is thenarrowband connection and there is no room for the communication line bythe connection state judging device 16, and based on the judging result,the data transfer destination selecting unit 126 selects the directtransfer unit 125 when it is the broadband connection, and selects theindirect transfer unit 124 when it is the narrowband connection.

When the connection state is the broadband connection and the directtransfer unit 125 is selected, it is judged whether the data is presentin the terminal data storing device 14 of the mobile terminal 1 at first(step S308), and if present, the data is read out and the access requestis responded thereby (step S310). When the data is not present in theterminal data storing device 14, the confidential data read-out requestis sent to the server 2 as it is, and the data read out from the serverdata storing device 23 of the server 2 accordingly is used as accessresult data, thereby the request is responded (step S309).

When the connection state is the narrowband connection and the indirecttransfer unit 124 is selected, it is judged whether the data is presentin the terminal data storing device 14 of the mobile terminal 1, and ifpresent, the data is read out and the access request is respondedthereby (step S310). When the data is not present in the terminal datastoring device, the confidential data read-out request is sent to theserver as it is, and the data read out from the server accordingly isreturned to the data access managing device of the mobile terminal andused as access result data (step S305). Also, the data read out from theserver is stored in the terminal data storing device in the terminalwith the confidential flag being “on” (step S306).

FIG. 6 is a flowchart showing a flow of operations in a case when: theuser uses the mobile terminal 1 into the basic state; the write-inrequest of the confidential data in the terminal data storing device isissued from the user or the data processing device; and the indirecttransfer unit 124 and direct transfer unit 125 are used.

It is assumed that the user's mobile terminal 1 is used in the basicstate, for example (step S401), and when the confidential data write-inrequest is issued (step S402), the connection state judging device 16judges a current connection state at first (step S403).

When the mobile terminal 1 is connected to the server 2 with thebroadband, the confidential data write-in request is sent to the server2 as it is, and the data which is sent accordingly is written into theserver data storing device 23 of the server 2 (step S406). When themobile terminal 1 is not connected, or connected with the narrowband,the confidential data write-in request is processed in the mobileterminal 1, stored in the terminal data storing device 14 of the mobileterminal 1 (step S404) with the updating flag being “on” and theconfidential flag being “on” (step S405). Other operations are the sameas in the case of FIG. 3 described above.

As described above, the flowcharts shown in FIG. 3 to FIG. 6 areoperational flowcharts explaining the cases when the user data is readout from the server data storing device 23 of the server 2 to the mobileterminal 1 and when the user data is written into the server datastoring device 23 of the server 2 from the terminal data storing device14 of the mobile terminal 1 under various conditions, and the procedureshown by the flowcharts corresponds to a user data transfer step.

FIG. 7 is a flowchart showing a flow of the operations of the mobileterminal 1 according to the first exemplary embodiment of the inventionin such a case that, when the mobile terminal 1 is used in the basicstate (step S501), the user ceases the use of the mobile terminal 1 andstarts up a security operation to keep the mobile terminal 1 in a safetystate, and the security operation executing unit 113 is in operation(step S502: security operation starting step).

First, a count number of the confidential data number counter indicatingthe number of pieces of data whose confidential flag is “on” in theterminal data storing device 14 within the mobile terminal 1 is referredto (step S503).

When the number is zero, it is found that the confidential data is notpresent in the mobile terminal 1. Accordingly, the mobile terminal 1 isconsidered to be safe as it is, which means the security operation iscompleted (step S509).

When the count number of the confidential data number counter is one ormore, it is found that the confidential data is present in the mobileterminal 1, and in this case, the procedure proceeds to step S504. Then,an updated data number counter indicating the number of pieces of datawhose updated flag is “on” in the terminal data storing device 14 withinthe mobile terminal 1 is referred to. When the number is zero, it isfound that the data required to be written into the server is notpresent in the mobile terminal 1. In this case, all pieces of the datawhose confidential flag is “on” in the terminal data storing device 14are erased by a previous confidential data erasing unit 1131 (stepS510). With this, the confidential data is not present in the mobileterminal 1, and the mobile terminal 1 is considered to be safe, whichmeans the security operation is completed (step S511).

When both of the count numbers of the confidential data number counterand the updated data number counter are one or more, it is found thatthe updated confidential data is present in the mobile terminal 1. Inthis case, the procedure proceeds to step S505, and the connection statebetween the mobile terminal 1 and the server 2 is checked by theconnection state judging device 16 (connection state judging step).

When both are connected, the data whose update flag is “on” in theterminal data storing device 14 in the mobile terminal 1 aresequentially written into the server data storing device 23 of theserver 2 by an updated confidential data transfer unit 1132. Theconfidential data write-in request is sent to the server 2 by theindirect transfer unit 124 of the data access managing device 12 of themobile terminal 1, and the data which is sent accordingly is writteninto the server data storing device 23 of the server 2 (step S506).

After all pieces of the date whose update flags are “on” are writteninto the server 2, all pieces of the data whose confidential flags are“on” in the terminal data storing device 14 are erased by the previousconfidential data erasing unit 1131 (step S507). With this, theconfidential data is not present in the mobile terminal, and the mobileterminal 1 is considered to be safe, which means the security operationis completed (step S508).

When the connection state judging device 16 judges that the mobileterminal 1 and the server 2 are not connected even though the numberindicated by the updated data counter is one or more, the mobileterminal 1, which is in the not-safety state, enters a sophisticatedlock mode in step S512. In the sophisticated lock mode, a sophisticatedlock unit 1133 is operated, and when the mobile terminal 1 is intendedto be used, an operation which makes it difficult for a person otherthan the authorized user to use the mobile terminal 1, such that thelock can be released only by an authentication with a password longerthan a usually used one or by a biometric authentication, which provideshigher reliability and higher security, is forcibly required. Here, aseries of operations from step S506 to step S512 corresponds to aconfidential data processing step.

In particular, when the user is not using the mobile terminal 1, and ifthe mobile terminal 1 is lost, the possibility of information leak withwhich personal information and the like are viewed by others to beleaked can be reduced by storing the confidential data, which isrequired to be protected, not in the mobile terminal but on the server.Note that the security operation may be started automatically at thetime when the operation of the mobile terminal 1 is completed, inaddition to the time when the user starts the security operation.

Second Exemplary Embodiment

FIG. 8 is a block diagram showing a basic configuration of the secondexemplary embodiment of the invention. The second exemplary embodimentof the invention includes a mobile terminal 5 and a server 6 connectedto the mobile terminal 5 via a communication network 7.

The server 6 includes: a server main controller 61 which controls theentire server; a server data access managing device 62 which manages adata transfer and the communication in the server; a server data storingdevice 63 which stores the data in the server; and a servercommunication device 64 which connects the communication with the mobileterminal 5.

Meanwhile, the mobile terminal 5 includes: a data processing device 51which performs a control of the entire terminal device and dataprocessing; a data access managing device 52 which manages a datatransfer and the communication in the terminal; a user interface device53 which controls a data transfer between an input device 59 to whichdata is inputted by a user and a display device 58 which displays anoutput to the user; a terminal data storing device 54 which stores thedata; a terminal communication device 55 which connects a communicationwith the server 6 or other mobile terminal via a communication network7; a connection state judging device 56 which judges a connection statewith the server 6 via the terminal communication device 55; and asecurity operation start device 57 which instructs to execute apredetermined security operation to the data processing device 51 viathe data access managing device 52 when the mobile terminal 5 is foldedor a no-operation time reaches to a prescribed time, by an input fromthe user or a start up operation from a folding operation judging unit57A or a no-operation timer mechanism 57B.

The second exemplary embodiment differs from the first exemplaryembodiment in that: in the first exemplary embodiment, the securityoperation is started when the user instructs the security operation tothe mobile terminal clearly, but in the second exemplary embodiment, thesecurity operation is started automatically by providing the foldingoperation judging unit 57A and the no-operation timer mechanism 57B, toreduce the possibility of the mobile terminal 5 to be at risk when theuser forgets to start the security operation carelessly. Otheroperations are the same as those of the first exemplary embodiment.

During the user uses the terminal, the key input to the user interfacedevice 53 is performed if only intermittently. However, when the userceases the use, the input is stopped for a relatively long time, andwhen the terminal is a folding type one, the mobile terminal 5 isfolded.

The no-operation timer mechanism 57B detects the fact that the input isnot performed and no-operation state continues for more than aprescribed time, and the folding operation judging unit 57A detects thefact that the mobile terminal 5 is being folded for a long time, theneach of them notifies the security operation start device 57 of thefact. Upon being notified, the security operation start device 57 startsthe predetermined security operation. With this, when the mobileterminal 5 is not used during a prescribed period, the securityoperation start device 57 operates and executes the predeterminedsecurity operation even if the user does not start the securityoperation.

Third Exemplary Embodiment

With the first exemplary embodiment and the second exemplary embodimentdescribed above, since the write-in operation to the server and anerasing operation of the confidential data, required when the securityoperation is started, are performed at once, it takes time to completethe operations and to be in the safety state.

To avoid this disadvantage, a third exemplary embodiment of theinvention is configured such that, even when the user continuously usesthe terminal, the above-described operations are performed at abackground of the normal operation within the limits of the processingability and bandwidth of the connection line of the mobile terminal. Aconfiguration of the third exemplary embodiment is the same as that ofthe first exemplary embodiment shown in FIG. 1.

FIG. 9 is a flowchart showing the operation in this case. It is assumedthat, in the third exemplary embodiment, the user's mobile terminal isused in the basic state, for example (step S601). When the terminal isin operation, it is checked whether the processing ability of CPU andbandwidth of the connection line of the mobile terminal have someleftover (step S602).

When there is some leftover, the procedure proceeds to step S603, andthe count number indicated by the confidential data number counter inthe terminal data storing device is checked. If the count numberindicated by the confidential data number counter is more than zero, theprocedure proceeds to step S604, and the line connection state isjudged. When it is connected, the data whose updated flag andconfidential flag are both being “on,” stored in the terminal datastoring device, is written into the server data storing devicesequentially to be stored. Then, the updated flag of the data which isstored in the server data storing device is changed to be “off.”Meanwhile, when the confidential data number counter indicates zero instep S603, the procedure proceeds to step S407, and, when it is judgednot to be connected in step S604, the procedure proceeds to step S608.In both cases, the state of the mobile terminal returns to the basicstate of step S601 while nothing is done.

This flow is executed repeatedly, and if there is the data whose updatedflag is “on,” operations to write the data into the server sequentiallyand change the updated flag to be “off” are executed steadily. Withthis, the number of pieces of data remained when the security operationis started, whose updated flags and confidential flags are both being“on,” can be decreased, and therefore, the load of the securityoperation can be reduced. Here, the confidential data in the terminaldata storing device may be erased at the same time in step S606.

In the above explanation, the communication system including the mobileterminal of the present invention and the security system are described.However, an execution content of each step in the security methoddescribed above may be programmed to be executed by a microprocessor(computer) of the mobile terminal. With this, a security effect which issimilar to an effect obtained with the above described method can beobtained.

With this exemplary embodiment, the confidential data is stored in theserver when the mobile terminal is not used by the user or when themobile terminal is used with the line being connected to the server.Further, when the confidential data is read out to the terminal datastoring device and accessed, once the security operation inputted fromoutside is started or the operation of the mobile terminal is completed,the confidential data which is remained in the terminal as being readout is erased, the confidential data which is newly created and updatedis written into the server and erased from the mobile terminal, and ifthe line to the server is not in the connection state, the confidentialdata is stored in the terminal by performing the sophisticated lock.With this, it is possible to present the communication system includingthe mobile terminal with which: the confidential information is securedfrom being read by others when the mobile terminal is lost; newlycreated and updated confidential data is not erased; and the securityoperation can be realized at low cost by its basic data transfer unit.Also, the security method executed by the communication system and theprogram therefor can be presented.

Further, in each exemplary embodiment described above, the securityoperation is performed on the base of the normal data transfer unitwithout providing special devices and configurations. Therefore, thecost for realizing the security function can be reduced.

Next, another exemplary embodiment of the invention will be described. Acommunication system according to another exemplary embodiment of theinvention may be a system including a plurality of mobile terminals anda server which can communicate with the mobile terminals, in which: theserver includes a server data storing device having a user data storingarea for storing user data which contains confidential data set inadvance corresponding to each of the mobile terminals; the mobileterminal includes a calculation control unit which performs calculationprocessing and transfer of data containing the user data, a terminaldata storing device which stores the user data, and a connection statejudging device which judges the line connection state with the server;where the calculation control unit performs writing/reading of the userdata directly with respect to the server data storing device when theconnection state judging device judges that the line connection state isa broadband connection which is enough for the data transfer, andperforms writing/reading of the user data with respect to the serverdata storing device after storing the user data in the terminal datastoring device temporarily when the connection state judging devicejudges that the connection state is a narrowband connection which is ata normal dial up level.

With this, even if the mobile terminal is lost, the data is not lost andthe confidential information can be secured from being read by others byconfiguring the system in such a manner that, by storing theconfidential data in the user data storing area of the server normally,the user accesses the data stored in the server directly when thecommunication line has some leftover and the user can access to theserver directly, and the user accesses the confidential data by readingout the data to the terminal data storing device temporarily when thecommunication line has no leftover and the user cannot access to theserver directly.

Here, the calculation control unit may be configured to include a datatransfer destination selecting function for selecting either the directtransfer function or the indirect transfer function based on thejudgment result of the connection state judging device. Also, thecalculation control unit may be configured so as to store the user datain the terminal data storing device during the mobile terminal is beingused when the line is determined not to be connected based on thejudgment result of the connection state judging device.

With this, even if the mobile terminal is lost, the possibility of theconfidential information to be read by others can be reduced byconfiguring the system in such a manner that, when the mobile terminalis being used, the calculation control unit transfers the data to theuser data storing area of the server as much as possible based on thejudgment result of the connection state judging device, so as not toleave the confidential data in the terminal data storing device of themobile terminal.

Here, the calculation control unit may be configured to perform thesecurity operation set in advance based on a detection of either asecurity operation starting instruction signal inputted from outside oran operation completion signal indicating a lapse of a predeterminedtime after the mobile terminal completed the operation. This securityoperation may include: an operation to erase the confidential data whichis remained as being read out from the server data storing device, fromamong the confidential data stored in the terminal data storing device;an operation to update the storing content of the server data storingdevice by transferring updated confidential data which is newly createdand updated by the data processing device, from among the confidentialdata, and then erase the updated confidential data from the terminal;and an operation to store the updated confidential data into theterminal data storing device again by setting a sophisticated data lockto the updated confidential data when the connection state judgingdevice judges the line is not in the connection state and the updatedconfidential data is not able to be transferred.

With this, even if the mobile terminal is lost, the data is not lost andthe confidential information can be secured from being read by others,and even when the mobile terminal and the server cannot be connected,the newly created and updated confidential data can be stored withoutbeing lost, by configuring the system in such a manner that: theconfidential data remained as being read out from the server is erasedin accordance with the security operation starting instruction issued bythe user or the completion of the use of the mobile terminal; the newlycreated and updated confidential data is written into the user datastoring area in the server and then erased from the terminal; and, whenabove described operations are not be able to perform, the confidentialdata is stored in the terminal by setting a sophisticated data lock withhigher security.

Further, the calculation control unit may be configured to include: aconfidential data managing function for putting a confidential flag tothe confidential data stored in the terminal data storing device, andcounting and managing the number of pieces of the data; and an updateddata managing function for adding an updated flag to the updatedconfidential data which is newly created and updated but not stored inthe server data storing device yet, and counting and managing the numberof pieces of the data (claim 5).

With this, the confidential data and the updated confidential data aremanaged easily, and the security operation can be facilitated.

Also, a security method according to another exemplary embodiment of theinvention may be configured to be a method for a communication systemwhich includes a plurality of mobile terminals containing terminal datastoring devices and a server containing a server data storing devicehaving a user data storing area storing user data including confidentialdata which is set in advance corresponding to each of the mobileterminals, where respective devices are communicable with each other,the method comprising: transferring user data between the user datastoring area and the terminal data storing device; starting a securityoperation for the confidential data based on a detection of either asecurity operation starting signal which is inputted from outside or anoperation completion signal indicating a lapse of a predetermined timeafter the mobile terminal completed the operation; checking a lineconnection state with the server at a time when the security operationis started; and executing a confidential data processing such as anerasing or transferring processing of the confidential data stored inthe terminal data storing device according to the line connection statejudged when judging this connection state and a history of theconfidential data.

Here, in the confidential data processing step, erasing the confidentialdata which is remained as being read out from the server data storingdevice, from among the confidential data stored in the terminal datastoring device; when the line to the server is judged to be in theconnection state in the connection state judging step, transferring theupdated confidential data newly created and updated in the mobileterminal to the server data storing device and erasing the updatedconfidential data from the terminal data storing device; and when theline to the server is judged not to be in the connection state in theconnection state judging step, storing the updated confidential datainto the terminal data storing device again after setting asophisticated data lock to the updated confidential data.

With this, a security method with which the data is not lost and theconfidential information can be secured from being read by others, evenif the mobile terminal is lost, can be realized by configuring themethod in such a manner as: storing the confidential data in the serveras far as the processing ability permits and reading out the data whenbeing used; when starting the security operation or completing theoperation, erasing or transferring the confidential data according tothe line connection state and the history of the confidential data; and,when the line to the server is not in the connection state, storing theconfidential data by setting the sophisticated data lock.

Also, a security program according to another exemplary embodiment ofthe invention is a program which may be configured to cause a computerprovided to the mobile terminal communicable with the server to execute:a security operation starting function for starting a security operationbased on a detection of either a security operation starting signalwhich is inputted from outside or an operation completion signalindicating a lapse of a predetermined time after the mobile terminalcompleted the operation; a connection state judging function forchecking a line connection state with the server at a time when thesecurity operation is started; and a confidential data processingfunction for erasing or transferring the confidential data according tothe line connection state judged with the connection state judgingfunction and a history of the confidential data set in advance.

Here, the confidential data processing function may be configured suchas: when the connection state judging function judges that the line isconnected, erasing the confidential data which is remained as being readout from the server; erasing the updated confidential data newly createdand updated in the mobile terminal from the terminal data storing deviceof the mobile terminal after transferring the updated confidential datato the server; and, when the line to the server is judged not to be inthe connection state in the connection state judging function and thedata is not able to be transferred to the server, storing the updatedconfidential data in the terminal data storing device again aftersetting a sophisticated data lock to the updated confidential data.

With this, it is possible to realize a program which causes a computerto execute security functions of: storing the confidential data in theserver as far as the processing ability permits and reading out the datawhen being used; erasing or transferring the confidential data whenstarting the security operation or completing the operation according tothe line connection state and the history of the confidential data; andstoring the confidential data in the terminal by setting thesophisticated data lock when the line to the server is not in theconnection state. Consequently, even if the mobile terminal is lost, thedata is not lost and the confidential information can be secured frombeing read by others.

While the invention has been described with reference to exemplaryembodiments (and examples) thereof, the invention is not limited tothese embodiments (and examples). Various changes in form and detailswhich are understood by those skilled in the art may be made within thescope of the present invention.

The present application claims priority based on Japanese PatentApplication No. 2007-028586 filed on Feb. 7, 2007, the entire disclosureof which is incorporated herein.

INDUSTRIAL APPLICABILITY

With the present invention, since the confidential data of the mobileterminal is stored in the server side and the information is securedfrom being leaked even when the mobile terminal is lost, the presentinvention is possible to be widely applied to industrial fields such asthe communication using the mobile terminal.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram showing a configuration of the first exemplaryembodiment of the communication system according to the invention;

FIG. 2 is an explanatory diagram showing a storing form of data to bestored in the terminal data storing device in the first exemplaryembodiment shown in FIG. 1;

FIG. 3 is a flowchart showing the read-out operation of the confidentialdata when the data transfer from the server to the mobile terminal isperformed by the indirect transfer function according to the firstexemplary embodiment of the invention;

FIG. 4 is a flowchart showing the write-in operation of the confidentialdata when the data transfer from the mobile terminal to the server isperformed by the indirect transfer function according to the firstexemplary embodiment of the invention;

FIG. 5 is a flowchart showing the read-out operation of the confidentialdata when the data transfer from the server to the mobile terminal isperformed by the indirect transfer function or the direct transferfunction according to the first exemplary embodiment of the invention;

FIG. 6 is a flowchart showing the write-in operation of the confidentialdata when the data transfer from the mobile terminal to the server isperformed by the indirect transfer function or the direct transferfunction according to the first exemplary embodiment of the invention;

FIG. 7 is a flowchart showing the security operation according to thesecond exemplary embodiment of the invention;

FIG. 8 is a block diagram showing the configuration according to thesecond exemplary embodiment of the invention; and

FIG. 9 is an operational flowchart showing a case in which the datatransfer from the mobile terminal to the server is performed at abackground of the normal operation according to the third exemplaryembodiment of the invention.

REFERENCE NUMERALS

-   -   1, 5 Mobile terminal    -   2, 6 Server    -   3, 7 Communication network    -   11, 51 Data processing device    -   12, 52 Data access managing device    -   13, 53 User interface device    -   14, 54 Terminal data storing device    -   15, 55 Terminal communication device    -   16, 56 Connection state judging device    -   17, 57 Security operation start device    -   22, 62 Server data access managing device    -   23, 63 Server data storing device    -   24, 64 Server communication device

1-20. (canceled)
 21. A communication system including a mobile terminalfor performing a communication and a server for managing informationneeded for the communication performed by the mobile terminal, wherein:the server transfers, responding to a request from the mobile terminal,communication information managed by the server to the requesting mobileterminal, and stores and manages collectively the communicationinformation transferred from the requesting mobile terminal; and themobile terminal judges a communication state with the server, receivesthe communication information from the server based on the judgmentresult, and makes the server manage the communication informationcollectively when the communication is completed.
 22. The communicationsystem as claimed in claim 21, wherein the mobile terminal performscommunication by storing and managing the communication informationreceived from the server based on the request sent to the servertemporarily, and transfers information related to the communication tothe server when the communication is completed.
 23. The communicationsystem as claimed in claim 21, wherein the mobile terminal transfers thecommunication information including information updated with thecommunication to the server.
 24. The communication system as claimed inclaim 21, wherein the mobile terminal transfers the communicationinformation to the server when the communication is completed and asecurity operation is started.
 25. The communication system as claimedin claim 21, wherein the mobile terminal erases the communicationinformation stored in the mobile terminal after transferring thecommunication information to the server.
 26. The communication system asclaimed in claim 21, wherein the mobile terminal transfers informationwhich is designated as confidential data by the user to the server asthe communication information.
 27. A mobile terminal which performscommunication based on communication information managed by a server,wherein the mobile terminal judges a communication state with theserver, receives the communication information from the server based onthe judgment result, and makes the server manage the communicationinformation collectively when the communication is completed.
 28. Themobile terminal as claimed in claim 27, wherein the mobile terminalperforms communication by storing and managing the communicationinformation received from the server based on the request to the servertemporarily, and transfers information related to the communication tothe server when the communication is completed.
 29. The mobile terminalas claimed in claim 27, wherein the mobile terminal transfers thecommunication information including information updated with thecommunication to the server.
 30. The mobile terminal as claimed in claim27, wherein the mobile terminal transfers the communication informationto the server when the communication is completed and a securityoperation is started.
 31. The mobile terminal as claimed in claim 27,wherein the mobile terminal erases the communication information storedin the mobile terminal after transferring the communication informationto the server.
 32. The mobile terminal as claimed in claim 27, whereinthe mobile terminal transfers information which is designated asconfidential data by the user to the server as the communicationinformation.
 33. A computer readable recording medium storing a securityprogram causing a microprocessor of a mobile terminal, which performscommunication based on communication information managed by a server, toexecute: a function of judging a communication state with the server andreceiving the communication information from the server based on thejudgment result; and a function of transferring the communicationinformation to the server when the communication is completed.
 34. Thecomputer readable recording medium storing a security program as claimedin claim 33, causing the microprocessor to execute: a function ofperforming communication by storing and managing the communicationinformation received from the server based on the request to the servertemporarily; and a function of transferring information related to thecommunication to the server when the communication is completed.
 35. Thecomputer readable recording medium storing a security program as claimedin claim 33, causing the microprocessor to execute: a function ofmanaging information updated with the communication, and including theupdated information into the communication information.
 36. The computerreadable recording medium storing a security program as claimed in claim33, causing the microprocessor to execute: a function of transferringthe communication information to the server when the communication iscompleted and a security operation is started.
 37. The computer readablerecording medium storing a security program as claimed in claim 33,causing the microprocessor to execute: a function of erasing thecommunication information stored in the mobile terminal aftertransferring the communication information to the server.
 38. Thecomputer readable recording medium storing a security program as claimedin claim 33, causing the microprocessor to execute: a function oftransferring information which is designated as confidential data by theuser to the server as the communication information.
 39. A communicationmethod of performing a communication using a mobile terminal, bycombining the mobile terminal for performing a communication and aserver for managing information needed for the communication performedby the mobile terminal, comprising: transferring communicationinformation managed by the server responding to a request from themobile terminal to the requesting mobile terminal, storing and managingthe communication information transferred from the requesting mobileterminal collectively by the server; and judging a communication statewith the server by the mobile terminal, transferring the communicationinformation from the server to the mobile terminal based on the judgmentresult, and managing the communication information by the servercollectively when the communication by the mobile terminal is completed.40. The communication method as claimed in claim 39, comprising erasingthe communication information stored in the mobile terminal aftertransferring the communication information to the server.