throbber
(12) United States Patent
`US 10,212,586 B2
`(45) Date of Patent:
`Feb. 19, 2019
`Hirabayashi et al.
`
`(10) Patent No.:
`
`US010212586B2
`
`(54) MOBILE TERMINAL AND CONTROL
`METHOD THEREOF
`
`(71) Applicant: Maxell, Ltd., Kyoto (JP)
`
`(72)
`
`Inventors: Masayuki Hirabayashi, Yokohama
`(JP); Hideo Nishijima, Hitachinaka (JP)
`
`(73) Assignee: MAXELL, LTD., Kyoto (JP)
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 54 days.
`
`(21) Appl. No.: 13/874,535
`
`(22)
`
`Filed:
`
`May 1, 2013
`
`2007/0287423 A1 * 12/2007 Kakiuchi
`
`........................ 455/41 .2
`6/2006 Delalat
`2006/0128305 A1 *
`2006/0224882 A1 * 10/2006 Chin ....................... G06F 21/34
`713/150
`............... G06Q 20/32
`455/4ll
`6/2010 Satou ........................... 455/4l.2
`4/2011 Golder .............. 455/4ll
`8/2011 Friedlaender .......... G08C 17/02
`
`455/41 .2
`
`2010/0144275 A1 *
`2011/0086615 A1 *
`2011/0195665 A1 *
`
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`
`JP
`JP
`
`2002-183866 A
`2004-102682
`
`6/2002
`4/2004
`
`(Continued)
`
`OTHER PUBLICATIONS
`
`(65)
`
`(30)
`
`Prior Publication Data
`
`US 2013/0316644 A1
`
`Nov. 28, 2013
`
`Foreign Application Priority Data
`
`Office Action dated Mar. 3, 2015, which issued during the prosecu-
`tion of Japanese Patent Application No. 2012-117105, which cor-
`responds to the present application (partial English translation
`attached).
`
`May 23, 2012
`
`(JP) ................................. 2012-117105
`
`(Continued)
`
`(51)
`
`Int. Cl.
`H04W 12/06
`H04L 29/06
`(52) US. Cl.
`CPC ......... H04W12/06 (2013.01); H04L 63/0492
`(2013.01)
`
`(2009.01)
`(2006.01)
`
`(58) Field of Classification Search
`CPC .. H04W 12/06; H04W 12/00; H04L 63/0492;
`H04L 9/32; H04M 1/66; H04B 7/00
`USPC ................................................ 455/26.1, 41.2
`See application file for complete search history.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`2004/0046638 A1 *
`2006/0123242 A1*
`
`3/2004 Kawasaki
`6/2006 Merrem
`
`.................... 340/561
`E05B 73/0082
`
`713/186
`
`Primary Examiner 7 Dong-Chang Shiue
`(74) Attorney, Agent, or Firm 7 Baker Botts L.L.P.
`
`(57)
`
`ABSTRACT
`
`There is provided a mobile terminal capable of being
`protected against unauthorized use by a third party without
`using a dedicated key device. Aplurality of mobile terminals
`are previously registered mutually. When unlocked among
`them, one mobile terminal communicates with another
`mobile terminal in a communication range of short-range
`wireless communications, unlocks the above another mobile
`terminal, and when out of the communication range, locks it
`agam.
`
`20 Claims, 10 Drawing Sheets
`
`START
`
`
`
`8201
`was:
`12mm“ UNLOCJG}
`WHENUSERENTERS
`wasswoam
`V
`, $202
`SEMCHNWLETEWNN sMHE
`NE/GHWHCODTHRUJGHSHORT-WE
`
`MREESSCWMUNEATDNS
`
`
`5203
`SHOE/LE
`TEMNALARHELSI'EHED
`MOWLETERMNNJ
`
`
`
`
`
`
`
`
`
`rmwau Nsmuc'r.
`TOBELOCKEDBV
`EN
`
`V J:5204
`UNKXIKMDBlLETERMW/ILZ
`THROUGH5409mm;
`
`WlHELESSOOMMUMGATlmS
`
`
`
`
`
`
`NOTNeal
`TERMNAI.1 OPERATE!
`
`FORAavENLENGTH
`OF'HM
`
`
`LocksMDBLETEHMWALZ
`THROUGHSHORT-HMS:
`5207
`WEELESSCWMUNJCATDNS
`1 LocKMoEALETEHMmAu ~ $208
`
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 1
`
`IPR2020-00202
`Apple Inc. EX1001 Page 1
`
`

`

`US 10,212,586 B2
`
`Page 2
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`2012/0040611 A1*
`
`2/2012 Grilfin .............. H04W 52/0254
`455/4l.l
`2012/0280790 A1* 11/2012 Gerhardt ............ G07C 9/00309
`340/561
`7/2013 Smtih ................... H04W 12/06
`455/411
`
`2013/0183936 A1*
`
`FOREIGN PATENT DOCUMENTS
`
`JP
`JP
`JP
`JP
`
`10/2006
`2006-285965 A
`2006285965 A * 10/2006
`2008-227758 A
`9/2008
`2010-086281 A
`4/2010
`
`............. G06F 21/34
`
`OTHER PUBLICATIONS
`
`Office Action dated Jun. 30, 2015, which issued during the pros-
`ecution of Japanese Patent Application No. 2012-117105, which
`corresponds to the present application (partial English translation
`attached).
`Office Action dated Feb. 28, 2017, which issued during the pros-
`ecution of Japanese Patent Application No. 2015-241178, which
`corresponds to the present application (English translation attached).
`
`* cited by examiner
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 2
`
`IPR2020-00202
`Apple Inc. EX1001 Page 2
`
`

`

`U.S. Patent
`
`Feb. 19, 2019
`
`Sheet 1 of 10
`
`US 10,212,586 B2
`
`www.mm; F.OE
`
`
`
`www.mszm02<umOIw
`
`w02<muEOIw
`
`
`
`
`
`wzorEQZDEEOo2232200wwmfimg
`
`
`
`
`
`2232.200mwmjmm;m20§<o_233=>_00
`
`rm
`
`
`
`:2::2:20:20
`
`
`
`
`
` :.223zo_._.<o:2:
`
`:2:.523
`
`
`
`
`
` who/2220502F<mmmoEmijmhzoo
`
`:23:2:
`
`
`
` wo<m0502§<me0Emijmhzoo
`
`
`
`.Zzzzmmc.BEDS.
`
`
`
`.3222mem.=mO§
`
`
`
`29.2.5mm<mmemo:
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 3
`
`IPR2020-00202
`Apple Inc. EX1001 Page 3
`
`

`

`U.S. Patent
`
`Feb. 19, 2019
`
`Sheet 2 of 10
`
`US 10,212,586 B2
`
`FIG. 2
`
`S20 1
`
`
`IS MOBILE
`
`
`TERMINAL1 UNLOCKED
`
`
`WHEN USER ENTERS
`
`
`PASSWORD?
`
`
`3202
`
` Y
`
`SEARCH MOBILE TERMINALS IN THE
`NEIGHBORHOOD THROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`$203
`
`
`
`IS MOBILE
`
`
`TERMINALA REGISTERED
`MOBILE TERMINAL?
`
`
`
`UNLOCK MOBILE TERMINAL 2
`TH ROUGH SHORT-RAN GE
`WIRELESS COMMUNICATIONS
`
`
`
`
`
`
`
`8205
`
`
`IS MOBILE
`TERMINAL1 INSTRUCTED
`TO BE LOCKED BY
`USER?
`
`
`
`
` IS NOT MOBILE
`TERMINAL 1 OPERATED
`
`
`FOR A GIVEN LENGTH
`OF TIME?
`
`
`
`LOCKS MOBILE TERMINAL 2
`
`,
`
`TH ROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`S 207
`
`LOCK MOBILE TERMINAL 1
`
`S 208
`
`END
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 4
`
`IPR2020-00202
`Apple Inc. EX1001 Page 4
`
`

`

`U.S. Patent
`
`Feb. 19, 2019
`
`Sheet 3 of 10
`
`US 10,212,586 B2
`
`FIG. 3
`
`
`
`S301
`IS MOBILE
`
`TERMINAL 2 UNLOCKED
`
`
`WHEN USER ENTERS
`
`PASSWORD?
`
`
`
`
`IS MOBILE
`TERMINAL 2 UNLOCKED
`
`
`TH ROUGH SHORT-RAN GE
`
`WIRELESS COMMUNI-
`CATIONS?
`
`
`
`$303
`
`
`
`IS MOBILE
`IS MOBILE
`
`TERMINAL2 OUT OF
`TERMINAL2 INSTRUCTED
`
`
`
`COMMUNICATION
`TO BE LOCKED BY
`
`
`
`'ANGE?
`USER?
`
`
`
`
`
`
`
`
`
` IS NOT MOBILE
`IS MOBILE
`
`
`TERMINAL 2
`
`
`TERMINAL 2 OPERATED
`
`INSTRUCTED TO BE LOCKED
`
`
`FOR A GIVEN LENGTH
`BY MOBILE TERMINAL 1 TH ROUGH
`
`
`
`OF TIME?
`SHORT-RANGE WIRELESS
`
`COMMUNICA-
`TIONS?
`
`
`
`
`
`LOCK MOBILE TERMINAL 2
`
`
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 5
`
`IPR2020-00202
`Apple Inc. EX1001 Page 5
`
`

`

`U.S. Patent
`
`Feb. 19, 2019
`
`Sheet 4 of 10
`
`US 10,212,586 B2
`
`FIG. 4
`
`
`S401
`IS MOBILE
`
`TERMINALI UNLOCKED
`
`
`WHEN USER ENTERS
`
`PASSWORD?
`
`
`
`
`SEARCH MOBILE TERMINALS
`IN THE NEIGHBORHOOD
`TH ROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`8403
`
`
`IS MOBILE
`TERMINALI UNLOCKED
`S404
`
`
`TH ROUGH SHORT-RANGE
`
`IS MOBILE
`
`WIRELESS COMMUNI—
`N
`TERMINALAREGISTERED
`
`
`CAT‘ONS?
`MOBILE TERMINAL?
`
`
` UNLOCK MOBILE TERMINAL 2
`WIRELESS COMMUNICATIONS
`TH ROUGH SHORT-RANGE
`
`
`
`
`
`IS MOBILE
`IS MOBILE
`
`
`TERMINAL 1 OUT OF
`TERMINAL 1 INSTRUCTED
`
`
`
`COMMUNICATION
`TO BE LOCKED BY
`
`
`
`' ANGE?
`USER?
`
`
`
`
`
`
`
`IS NOT MOBILE
`
`
`TERMINAL I OPERATED
` IS MOBILE
`
`FOR A GIVEN LENGTH
`
`TERMINALI INSTRUCTED
`
`
`OF TIME?
`TO BE LOCKED THROUGH
`
`
`
`SHORT-RANGE WIRELESS
`
`
`COMMUNICATIONS?
`
`
`
`
`LOCK MOBILE TERMINAL 2
`
`THROUGH SHORT-RANGE
`
`WIRELESS COMMUNICATIONS
`
`
`
`8408
`
`LOCK MOBILE TERMINAL 1
`
`S41 1
`
`END
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 6
`
`IPR2020-00202
`Apple Inc. EX1001 Page 6
`
`

`

`U.S. Patent
`
`Feb. 19, 2019
`
`Sheet 5 of 10
`
`US 10,212,586 B2
`
`FIG. 5
`
`8501
`IS MOBILE
`
`
`
`
`PASSWORD?
`8503
`
`SEARCH MOBILE TERMINALS
`
`
`IN THE NEIGHBORHOOD
`
`THROUGH SHORT-RANGE
`
`WIRELESS COMMUNICATIONS
`
`
`IS MOBILE
`
`8504
`TERMINAL2 UNLOCKED
`
`
`THROUGH SHORT-RANGE
`
`
`Is MOBILE
`
`
`WIRELESS COMMUNI-
`TERMINAL A REGISTERED
`CATIONS?
`
`
` MOBILE TERMINAL?
`
`
`
`UNLOCK MOBILE TERMINAL 1
`
`TH ROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`
`
`IS MOBILE
`
`
`IS MOBILE
`
`TERMINAL 2 OUT OF
`TERMINAL 2 INSTRUCTED
`
`
`
`COMMUNICATION
`TO BE LOCKED BY
`
`
`
`RANGE?
`USER?
`
`
`
`
`
`
`
`
`
`IS NOT MOBILE
`
`TERMINAL 2 OPERATED
`
`
` IS MOBILE
`FOR AGIVEN LENGTH
`TERMINAL 2 INSTRUCTED
`
`
`
`OF TIME?
`TO BE LOCKED THROUGH
`
`
`
`SHORT-RANGE WIRELESS
`
`
`COMMUNICATIONS?
`
`
`
`LOCK MOBILE TERMINAL 1
`TH ROUGH SHORT-RANGE
`
`WIRELESS COMMUNICATIONS
`
`
`
`8508
`
`LOCK MOBILE TERMINAL2
`
`851 1
`
`END
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 7
`
`IPR2020-00202
`Apple Inc. EX1001 Page 7
`
`

`

`U.S. Patent
`
`Feb. 19, 2019
`
`Sheet 6 of 10
`
`US 10,212,586 B2
`
`F'G- 6
`
`
`8601
`IS MOBILE
`
`
`TERMINALI UNLOCKED
`
`
`8603
`WHEN USER ENTERS
`
`
`PASSWORD?
`SEARCH MOBILE TERMINALS
`
`
`IN THE NEIGHBORHOOD
`
`THROUGH SHORT-RANGE
`
`WIRELESS COMMUNICATIONS
`
`
`
`8604
`IS MOBILE
`
`
`ISMOBILE
`TLEBI‘IEIILSIII’IITOSITBE
`
`
`WIRELESSCOMMUNI—
`TERMINALA REGISTERED
`N
`
`
`
`
`
` CATIONS?
`MOBILE TERMINAL?
`
`
`
`
`
`DISPLAY CONFIRMATION
`
`
`SCREEN IN WHICH MOBILE
`TERMINAL 2 IS UNLOCKED
`
`
`
`
` IS MOBILE
`TERMINAL 2 INSTRUCTED
`
`TO BE UNLOCKED BY
`
`USER?
`
`
`UNLOCK MOBILE TERMINAL 2
`TH ROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`
`
`
`
`
`
`IS MOBILE
`IS MOBILE
`
`
`TERMINAL 1 OUT OF
`TERMINAL I INSTRUCTED
`
`
`
`COMMUNICATION
`TO BE LOCKED BY
`
`
`
`RANGE?
`USER?
`
`
`
`
`
`IS NOT MOBILE
`
`
`IS MOBILE
`TERMINAL 1 INSTRUCTED
`nggyfiéfififigfi”
`
`
`
`
`
`TO BE LOCKED THROUGH
`OF TIME?
`
`
`
`SHORT-RANGE WIRELESS
`'
`COMMUNICATIONS?
`
`
`
`
`LOCK MOBILE TERMINAL 2
`TH ROUGH SHORT-RANGE
`
`WIRELESS COMMUNICATIONS
`
`
`
`8610
`
`END
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 8
`
`IPR2020-00202
`Apple Inc. EX1001 Page 8
`
`

`

`U.S. Patent
`
`Feb. 19, 2019
`
`Sheet 7 of 10
`
`US 10,212,586 B2
`
`FIG. 7
`
`MOBILE TERMINAL 2 IS DETECTED.
`
`73
`
`IS MOBILE TERMINAL 2 UNLOCKED?
`
`74
`
`UNLOCK
`
`76
`
`NOT
`
`UNLOCK
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 9
`
`IPR2020-00202
`Apple Inc. EX1001 Page 9
`
`

`

`U.S. Patent
`
`Feb. 19, 2019
`
`Sheet 8 of 10
`
`US 10,212,586 B2
`
`F'G- 8
`
`S801
`
`
`
`SEARCH MOBILE TERMINALS
`IN THE NEIGHBORHOOD
`TH ROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`
`
`
`
`
`S802
`
`
`N
`IS MOBILE
`
`TERMINAL A REGISTERED
`MOBILE TERMINAL?
`
`
`
`S805
`
`REQUEST USER TO ENTER
`COMPLICATED PASSWORD
`
`
`. ISSIMPLEPASSWORD
`
`
`IS COMPLICATED
`PASSWORD ENTERED?
`
`ENTERED?
`
`$806
`
`
`
`IS MOBILE
`
`
`
`TERMINAL1 INSTRUCTED
`TO BE LOCKED BY
`
`USER?
`
`
`
`IS NOT MOBILE
`
`TERMINALI OPERATED
`FOR AGIVEN LENGTH
`
`OF TIM E?
`
`
`LOCK MOBILE TERMINAL 1
`
`881 0
`
`END
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 10
`
`IPR2020-00202
`Apple Inc. EX1001 Page 10
`
`

`

`U.S. Patent
`
`Feb. 19, 2019
`
`Sheet 9 0f 10
`
`US 10,212,586 B2
`
`FIG. 9
`
`
`
`
`
`
`SEARCH MOBILE TERMINALS
`IN THE NEIGHBORHOOD
`TH ROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`
`
`3901
`
`
`
`IS MOBILE
`TERMINAL A REGISTERED
`
`
`MOBILE TERMINAL?
`
`
`$902
`
` Y
`
`
`
`UNLOCK MOBILE TERMINAL 1
`
`8903
`
`'OBILETERMINAL 1 OUT OF
`
`8904
`
`
`
`
`
`
`COMMUNICATION
`RANGE?
`
`
`
`Y
`
`LOCK MOBILE TERMINAL 1
`
`$905
`
`
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 11
`
`IPR2020-00202
`Apple Inc. EX1001 Page 11
`
`

`

`U.S. Patent
`
`Feb. 19, 2019
`
`Sheet 10 of 10
`
`US 10,212,586 B2
`
`FIG. 10
`
`
`
`
`
`SEARCH MOBILE TERMINALS
`IN THE NEIGHBORHOOD
`THROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`
`
`81001
`
` IS MOBILE
`
`TERMINAL A REGISTERED
`
`
`MOBILETERMINAL?
`
`
`
`31 002
`
`
` IS MOBILE
`TERMINAL 1 OUT OF
`
`COMMUNICATION
`RANGE?
`
`
`
`81003
`
`
`
`GIVE WARNING TO USER
`
`81004
`
`
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 12
`
`IPR2020-00202
`Apple Inc. EX1001 Page 12
`
`

`

`US 10,212,586 B2
`
`1
`MOBILE TERMINAL AND CONTROL
`METHOD THEREOF
`
`INCORPORATION BY REFERENCE
`
`The present application claims priority from Japanese
`application JP2012-117105 filed on May 23, 2012,
`the
`content of which is hereby incorporated by reference into
`this application.
`
`BACKGROUND OF THE INVENTION
`
`The present invention relates to a mobile terminal and a
`control method thereof.
`
`As a background art of this technical field, JP-A-2004-
`102682 is disclosed. In its publication, a problem will be
`described as below. “According to the conventional schemes
`described above, therefore, the user of the terminal device
`needs to make a complex action in order to prevent a third
`party from making unauthorized use of the terminal device.
`If the user has inadvertently made the password known or
`lost the terminal device together with the ID card, then it is
`impossible to reliably prevent unauthorized use of the ter-
`minal device by a third party.”
`A method for solving this problem will be described as
`below. “There is provided a terminal lock system for veri-
`fying that the user of a terminal device is a person with the
`legitimate right
`to use the terminal device for thereby
`protecting the terminal device against unauthorized use by a
`third party, the terminal lock system comprising a key device
`and a terminal-associated device. The key device is portable
`and has a radio communication means for performing short-
`range wireless communications. The terminal-associated
`device requests a connection to the key device through the
`short-range wireless communications, and inhibits the ter-
`minal device which is combined with the terminal-associ-
`
`ated device from being used if information of the key device
`which is confirmed as being connected to the terminal-
`associated device does not agree with information registered
`in the terminal-associated device, or if the terminal-associ-
`ated device is not confirmed as being connected to the key
`device through the short-range wireless communications.”
`
`SUMMARY OF THE INVENTION
`
`In JP-A-2004-102682, the following advantage will be
`described. “With the above arrangement, when the user who
`is carrying the key device moves away from the terminal
`device combined with the terminal-associated device until
`
`the terminal-associated device and the key device are no
`longer capable of connecting to each other based on a
`short-range wireless communication technique, the termi-
`nal-associated device locks the terminal device against use.
`The terminal lock system thus authenticates the user without
`the need for asking the user to make any action, and reliably
`protects the terminal device against unauthorized use by a
`third party.”
`However, the user needs to always carry the dedicated key
`device having a communication function when using the
`terminal device.
`
`In view of the foregoing, it is an object of the present
`invention to provide a convenient mobile terminal and
`control method thereof capable of being protected against
`unauthorized use by a third party without using the dedi-
`cated key device.
`The object of the present invention can be attained by the
`following technical proposal: For example, a plurality of
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`
`mobile terminals are previously registered mutually. When
`unlocked among them, one mobile terminal communicates
`with another mobile terminal in a communication range of
`the short-range wireless communications, unlocks the above
`another mobile terminal, and when out of the communica-
`tion range, locks it again.
`According to the present invention, for example, when
`one mobile terminal is unlocked among a plurality of mobile
`terminals, another mobile terminal can be unlocked.
`Other objects, features and advantages of the invention
`will become apparent from the following description of the
`embodiments of the invention taken in conjunction with the
`accompanying drawings.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a block diagram illustrating a configuration of a
`mobile terminal according to a first embodiment;
`FIG. 2 is a flowchart illustrating operations for locking
`and releasing a mobile terminal 1 according to a first
`embodiment;
`FIG. 3 is a flowchart illustrating operations for locking
`and releasing a mobile terminal 2 according to a first
`embodiment;
`FIG. 4 is a flowchart illustrating operations for locking
`and releasing a mobile terminal 1 according to a second
`embodiment;
`FIG. 5 is a flowchart illustrating operations for locking
`and releasing a mobile terminal 2 according to a second
`embodiment;
`FIG. 6 is a flowchart illustrating operations for locking
`and releasing a mobile terminal 1 according to a third
`embodiment;
`FIG. 7 is a display example illustrating a liquid crystal
`panel of a mobile terminal according to a third embodiment;
`FIG. 8 is a flowchart illustrating operations for locking
`and releasing a mobile terminal 1 according to a fourth
`embodiment;
`FIG. 9 is a flowchart illustrating operations for locking
`and releasing a mobile terminal 1 according to a fifth
`embodiment; and
`FIG. 10 is a flowchart illustrating a warning operation of
`a mobile terminal 1 according to a sixth embodiment.
`
`DESCRIPTION OF THE EMBODIMENTS
`
`Hereinafter, preferred embodiments of the present inven-
`tion will be described with reference to the accompanying
`drawings of the embodiments.
`
`First Embodiment
`
`FIG. 1 is a block diagram illustrating a configuration of a
`mobile terminal according to a first embodiment of the
`present invention. The mobile terminals 1 and 2 each have
`a radio communication function, and transmit and receive a
`variety of information to and from a mobile base station 3.
`Further, the mobile terminals 1 and 2 each have a function
`of performing short-range wireless communication between
`mobile terminals, and can transmit and receive a variety of
`information between the mobile terminals 1 and 2 by using
`the function. Examples of the short-range wireless commu-
`nication include Bluetooth (trademark), infrared rays, and
`Wi-Fi Direct.
`A controller 11 controls each unit of the mobile terminal
`
`1. The controller 11 is configured by a CPU (Central
`Processing Unit), an arbitrary control circuit, or a dedicated
`circuit such as an ASIC.
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 13
`
`IPR2020-00202
`Apple Inc. EX1001 Page 13
`
`

`

`US 10,212,586 B2
`
`3
`A display unit 12 of the mobile terminal 1 is configured,
`for example, by a liquid crystal panel, and displays a variety
`of information. An operating unit 13 is configured, for
`example, by a push-button switch or a touch panel, and an
`instruction of a user is transferred to the controller 11. A
`
`wireless communications unit 15 and a short-range wireless
`communication unit 16 are each configured by a communi-
`cation circuit including an encoding circuit and a decoding
`circuit in addition to an antenna. The wireless communica-
`tions unit 15 communicates with the mobile base station 3.
`
`The short-range wireless communication unit 16 controls
`short-range wireless communications and communicates,
`for example, with the mobile terminal 2.
`A storage unit 14 stores a program or various kinds of
`setting information for controlling a mobile terminal, and a
`password for unlocking a mobile terminal.
`A controller 21, a display unit 22, an operating unit 23, a
`storage unit 24, and a wireless communications unit 25 of
`the mobile terminal 2 are the same as the controller 11, the
`display unit 12, the operating unit 13, the storage unit 14,
`and the wireless communications unit 15 of the mobile
`
`terminal 1, and therefore, descriptions will not be repeated
`here. A short-range wireless communication unit 26 controls
`short-range wireless communications, and communicates,
`for example, with the mobile terminal 1.
`Next, descriptions will be made about operations which
`are set until the mobile terminal 2 is unlocked after the
`mobile terminal 1 is unlocked.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`In addition, the locked state of the present embodiment is
`a state in which functions or operations of part or the whole
`of a mobile terminal are limited.
`
`30
`
`When the user refers to the display unit 12 of the mobile
`terminal 1 and operates the operating unit 13 so as to release
`a locked state,
`the mobile terminal 1 searches whether
`another mobile terminal is in a short-distance communica-
`
`tion range capable of performing short-range wireless com-
`munications. The mobile terminal
`1
`further confirms
`
`is the mobile terminal 2 being a previously
`whether it
`registered mobile terminal. When the mobile terminal 1
`confirms that information stored in the storage unit 14 is
`matched with that of the storage unit 24 and it
`is the
`previously registered mobile terminal, the mobile terminal 2
`is unlocked.
`
`The mobile terminals 1 and 2 are supposed to transit to a
`locked state when not operated for a given length of time
`and, for example, a password is supposed to need to be
`entered in order to release the locked state. The given length
`of time is, for example, thirty seconds. Further, the mobile
`terminals 1 and 2 are previously registered so as to be
`mutually locked and unlocked through short-range wireless
`communications.
`
`An example where the mobile terminals 1 and 2 each have
`a radio communication function with the mobile base station
`3 is illustrated. Further, the mobile terminal 1 and/or mobile
`terminal 2 may each have a wireless LAN (Local Area
`Network) function, and transmit and receive a variety of
`information to and from a wireless LAN router.
`
`35
`
`40
`
`45
`
`50
`
`55
`
`FIG. 2 is a flowchart illustrating operations of locking and
`unlocking the mobile terminal 1 according to the first
`embodiment.
`
`60
`
`the mobile terminal 1 confirms
`First, at step $201,
`whether to be unlocked when the user enters a password.
`The mobile terminal 1 continues to wait for unlocking until
`the locked state is released, and when it is unlocked, the
`process proceeds to step 8202. An example where the user
`enters a password is described here, and biometrics authen-
`tication may be further used.
`
`65
`
`4
`
`the mobile terminal 1 searches mobile
`At step $202,
`terminals in the neighborhood through short-range wireless
`communications. For example, the mobile terminal 1 trans-
`mits radio waves used for the short-range wireless commu-
`nications and searches for a mobile terminal in which the
`
`short-range wireless communications are established by
`receiving the radio waves.
`At step $203, the mobile terminal 1 determines whether
`there is a mobile terminal in the neighborhood and it is the
`previously registered mobile terminal, and switches the
`process. If so, the process advances to step $204. If not, the
`process proceeds to step 8205.
`At step $204, the mobile terminal 1 unlocks the previ-
`ously registered mobile terminal 2 through the short-range
`wireless communications. For example, the mobile terminal
`1 transmits a signal for instructing the mobile terminal 2 to
`be unlocked thereto. Here, the mobile terminals 1 and 2 are
`supposed to be previously registered mutually by the same
`user.
`
`At step $205, the mobile terminal 1 confirms whether to
`be instructed to be locked by the user. If so, the process
`proceeds to step 8207. At step $206, the mobile terminal 1
`further confirms whether not to be operated for a given
`length of time. If not, the process proceeds to step $207. If
`so, the process returns to step 8205.
`At step $207, the mobile terminal 1 locks the previously
`registered mobile terminal 2 through the short-range wire-
`less communications. For example, the mobile terminal 1
`transmits a signal for instructing the mobile terminal 2 to be
`locked thereto.
`
`At step $208, the mobile terminal 1 is locked.
`FIG. 3 is a flowchart illustrating operations for locking
`and unlocking the mobile terminal 2 according to the first
`embodiment.
`
`the mobile terminal 2 confirms
`First, at step S301,
`whether to be unlocked when the user enters a password. If
`so, the process proceeds to step S303. At step S302, the
`mobile terminal 2 further confirms whether to be unlocked
`
`through the short-range wireless communications. If so, the
`process proceeds to step S305. If not, the process returns to
`step S301.
`At step S303, the mobile terminal 2 confirms whether to
`be instructed to be locked by the user. If so, the process
`proceeds to step S307. At step S304, the mobile terminal 2
`further confirms whether not to be operated for a given
`length of time. If not, the process proceeds to step S307. If
`so, the process returns to step S303.
`At step S305, the mobile terminal 2 confirms whether to
`be out of the communication range of the short-range
`wireless communications with the mobile terminal 1. If so,
`the process proceeds to step S307. At step S306, the mobile
`terminal 2 further confirms whether to be instructed to be
`
`locked by the mobile terminal 1 through the short-range
`wireless communications. If so, the process proceeds to step
`S307. If not, the process returns to step S305.
`At step S307, the mobile terminal 2 is locked.
`In addition, the mobile terminal 1 may detect that the
`short-range wireless communications established with the
`mobile terminal 2 is broken, and transmit a signal for
`instructing the mobile terminal 2 to be locked thereto
`immediately before the communication is broken.
`In the first embodiment of the present invention, a plu-
`rality of mobile terminals are previously registered mutually
`through the above configuration. When one mobile terminal
`is unlocked among them, another mobile terminal
`is
`unlocked in the communication range of the short-range
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 14
`
`IPR2020-00202
`Apple Inc. EX1001 Page 14
`
`

`

`US 10,212,586 B2
`
`5
`wireless communications. When out of the communication
`
`range, the another mobile terminal can be locked again.
`In the present embodiment, an example where two mobile
`terminals are locked and unlocked is described; similarly,
`three or more mobile terminals can be further locked and
`unlocked.
`
`Second Embodiment
`
`FIG. 4 is a flowchart illustrating operations for locking
`and unlocking the mobile terminal 1 according to a second
`embodiment of the present invention. The mobile terminal
`has the same configuration as that of the first embodiment,
`and therefore descriptions will not be repeated here.
`First, at step S401,
`the mobile terminal 1 confirms
`whether to be unlocked when the user enters a password. If
`so, the process proceeds to step S403. At step S402, the
`mobile terminal 1 further confirms whether to be unlocked
`
`through the short-range wireless communications. If so, the
`process proceeds to step S409.
`Steps S403 to S408 are the same as steps $202 to $207 of
`FIG. 2, and therefore descriptions will not be repeated here.
`At step S409, the mobile terminal 1 confirms whether to
`be out of the communication range of the short-range
`wireless communications with the mobile terminal 2. If so,
`the process proceeds to step S411. At step S410, the mobile
`terminal 1 further confirms whether to be instructed to be
`
`locked through the short-range wireless communications. If
`so, the process proceeds to step S411. If not, the process
`returns to step S409.
`At step S411, the mobile terminal 1 is locked.
`FIG. 5 is a flowchart illustrating operations for locking
`and unlocking the mobile terminal 2 according to the second
`embodiment.
`
`the mobile terminal 2 confirms
`First, at step $501,
`whether to be unlocked when the user enters a password. If
`so, the process proceeds to step 8503. At step $502, the
`mobile terminal 2 further confirms whether to be unlocked
`
`through the short-range wireless communications. If so, the
`process proceeds to step $509.
`Steps $503 and 8504 are the same as steps S403 and S404
`of FIG. 4, and therefore descriptions will not be repeated
`here.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`At step $505, the mobile terminal 2 unlocks the previ-
`ously registered mobile terminal 1 through the short-range
`wireless communications.
`
`45
`
`At step $506, the mobile terminal 2 confirms whether to
`be instructed to be locked by the user. If so, the process
`proceeds to step 8508. At step $507, the mobile terminal 2
`further confirms whether not to be operated for a given
`length of time. If not, the process proceeds to step 8508.
`At step $508, the mobile terminal 2 locks the previously
`registered mobile terminal 1 through the short-range wire-
`less communications.
`
`At step $509, the mobile terminal 2 confirms whether to
`be out of the communication range of the short-range
`wireless communications with the mobile terminal 1. If so,
`the process proceeds to step 8511. At step $510, the mobile
`terminal 2 further confirms whether to be instructed to be
`
`locked through the short-range wireless communications. If
`so, the process proceeds to step $511. If not, the process
`returns to step 8509.
`At step $511, the mobile terminal 2 is locked.
`In the second embodiment of the present invention, a
`plurality of mobile terminals are previously registered mutu-
`ally through the above configuration. When one mobile
`terminal is unlocked among them, another mobile terminal
`
`50
`
`55
`
`60
`
`65
`
`6
`is unlocked in the communication range of the short-range
`wireless communications. When out of the communication
`
`range, the another mobile terminal can be locked again.
`First, any mobile terminal may be unlocked. Even if any
`mobile terminal is unlocked, another mobile terminal can be
`unlocked, and therefore the mobile terminal of the second
`embodiment
`is more convenient
`than that of the first
`embodiment.
`
`In the present embodiment, an example where two mobile
`terminals are locked and unlocked is described; similarly,
`three or more mobile terminals can be further locked and
`unlocked.
`
`Third Embodiment
`
`FIG. 6 is a flowchart illustrating operations for locking
`and unlocking the mobile terminal 1 according to a third
`embodiment of the present invention. The mobile terminal
`has the same configuration as that of the first embodiment,
`and therefore descriptions will not be repeated here.
`Steps S601 to S604 are the same as steps S401 to S404 of
`FIG. 4, and therefore descriptions will not be repeated here.
`At step S605, the mobile terminal 1 displays a confirma-
`tion screen in which the mobile terminal 2 is unlocked. A
`
`display example will be described later.
`At step S606, the mobile terminal 1 confirms whether the
`user instructs the mobile terminal 2 to be unlocked. If so, the
`process advances to step S607. If not, the process proceeds
`to step S608.
`Steps S608 to S613 are the same as steps S406 to S411 of
`FIG. 4, and therefore descriptions will not be repeated here.
`FIG. 7 is a display example illustrating a liquid crystal
`panel of the mobile terminal 1 at the time of detecting the
`mobile terminal 2 through the short-range wireless commu-
`nications at step S605 of FIG. 6. A detection report of the
`mobile terminal 2, a selection button, and non-selection
`button of the unlocking are displayed on the liquid crystal
`panel. When detecting the mobile terminal 2 through the
`short-range wireless communications, the mobile terminal 1
`transits to an unlocking selection mode. On the liquid crystal
`panel 73, an unlocking selection button 74 and an unlocking
`non-selection button 76 are displayed. When the user pushes
`a push-button switch 75 corresponding to the unlocking
`selection button 74, the mobile terminal 2 is unlocked. When
`the user pushes a push-button switch 77 corresponding to the
`unlocking non-selection button 76, the mobile terminal 1
`releases the unlocking selection mode and returns to a
`normal mode.
`
`invention, a
`In the third embodiment of the present
`plurality of mobile terminals are previously registered mutu-
`ally through the above configuration. When one mobile
`terminal is unlocked among them, another mobile terminal
`is unlocked in the communication range of the short-range
`wireless communications. When out of the communication
`
`range, the another mobile terminal can be locked again.
`Further, upon detection of another mobile terminal, the
`user can select whether to unlock it.
`
`Fourth Embodiment
`
`FIG. 8 is a flowchart illustrating operations for locking
`and unlocking the mobile terminal 1 according to a fourth
`embodiment of the present invention. The mobile terminal
`has the same configuration as that of the first embodiment,
`and therefore descriptions will not be repeated here.
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 15
`
`IPR2020-00202
`Apple Inc. EX1001 Page 15
`
`

`

`US 10,212,586 B2
`
`7
`First, at step $801, the mobile terminal 1 searches mobile
`terminals in the neighborhood through the short-range wire-
`less communications.
`
`At step $802, the mobile terminal 1 determines whether
`there is a mobile terminal in the neighborhood and it is the
`previously registered mobile terminal, and switches the
`process. If so, the process advances to step $803. If not, the
`process proceeds to step 8805.
`At step $803, the mobile terminal 1 requests the user to
`enter a simple password, and continues to wait until it is
`correctly entered at step $804. When the simple password is
`entered, the process proceeds to step 8807.
`At step $805, the mobile terminal 1 requests the user to
`enter a complicated password, and continues to wait until it
`is correctly entered at step $806. When the complicated
`password is entered, the process proceeds to step $807.
`The simple password is, for example, a three-character
`number, and the complicated password is, for example, a
`ten-character number. That is, strengths of both passwords
`are different from each other.
`
`At step $807, the mobile terminal 1 is unlocked. Here, the
`mobile terminals 1 and 2 are supposed to be previously
`registered mutually by the same user.
`At step $808, the mobile terminal 1 confirms whether to
`be instructed to be locked by the user. If so, the process
`proceeds to step 8810. At step $809, the mobile terminal 1
`further confirms whether not to be operated for a given
`length of time. If not, the process proceeds to step 8810.
`At step $810,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket