`US 10,212,586 B2
`(45) Date of Patent:
`Feb. 19, 2019
`Hirabayashi et al.
`
`(10) Patent No.:
`
`US010212586B2
`
`(54) MOBILE TERMINAL AND CONTROL
`METHOD THEREOF
`
`(71) Applicant: Maxell, Ltd., Kyoto (JP)
`
`(72)
`
`Inventors: Masayuki Hirabayashi, Yokohama
`(JP); Hideo Nishijima, Hitachinaka (JP)
`
`(73) Assignee: MAXELL, LTD., Kyoto (JP)
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 54 days.
`
`(21) Appl. No.: 13/874,535
`
`(22)
`
`Filed:
`
`May 1, 2013
`
`2007/0287423 A1 * 12/2007 Kakiuchi
`
`........................ 455/41 .2
`6/2006 Delalat
`2006/0128305 A1 *
`2006/0224882 A1 * 10/2006 Chin ....................... G06F 21/34
`713/150
`............... G06Q 20/32
`455/4ll
`6/2010 Satou ........................... 455/4l.2
`4/2011 Golder .............. 455/4ll
`8/2011 Friedlaender .......... G08C 17/02
`
`455/41 .2
`
`2010/0144275 A1 *
`2011/0086615 A1 *
`2011/0195665 A1 *
`
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`
`JP
`JP
`
`2002-183866 A
`2004-102682
`
`6/2002
`4/2004
`
`(Continued)
`
`OTHER PUBLICATIONS
`
`(65)
`
`(30)
`
`Prior Publication Data
`
`US 2013/0316644 A1
`
`Nov. 28, 2013
`
`Foreign Application Priority Data
`
`Office Action dated Mar. 3, 2015, which issued during the prosecu-
`tion of Japanese Patent Application No. 2012-117105, which cor-
`responds to the present application (partial English translation
`attached).
`
`May 23, 2012
`
`(JP) ................................. 2012-117105
`
`(Continued)
`
`(51)
`
`Int. Cl.
`H04W 12/06
`H04L 29/06
`(52) US. Cl.
`CPC ......... H04W12/06 (2013.01); H04L 63/0492
`(2013.01)
`
`(2009.01)
`(2006.01)
`
`(58) Field of Classification Search
`CPC .. H04W 12/06; H04W 12/00; H04L 63/0492;
`H04L 9/32; H04M 1/66; H04B 7/00
`USPC ................................................ 455/26.1, 41.2
`See application file for complete search history.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`2004/0046638 A1 *
`2006/0123242 A1*
`
`3/2004 Kawasaki
`6/2006 Merrem
`
`.................... 340/561
`E05B 73/0082
`
`713/186
`
`Primary Examiner 7 Dong-Chang Shiue
`(74) Attorney, Agent, or Firm 7 Baker Botts L.L.P.
`
`(57)
`
`ABSTRACT
`
`There is provided a mobile terminal capable of being
`protected against unauthorized use by a third party without
`using a dedicated key device. Aplurality of mobile terminals
`are previously registered mutually. When unlocked among
`them, one mobile terminal communicates with another
`mobile terminal in a communication range of short-range
`wireless communications, unlocks the above another mobile
`terminal, and when out of the communication range, locks it
`agam.
`
`20 Claims, 10 Drawing Sheets
`
`START
`
`
`
`8201
`was:
`12mm“ UNLOCJG}
`WHENUSERENTERS
`wasswoam
`V
`, $202
`SEMCHNWLETEWNN sMHE
`NE/GHWHCODTHRUJGHSHORT-WE
`
`MREESSCWMUNEATDNS
`
`
`5203
`SHOE/LE
`TEMNALARHELSI'EHED
`MOWLETERMNNJ
`
`
`
`
`
`
`
`
`
`rmwau Nsmuc'r.
`TOBELOCKEDBV
`EN
`
`V J:5204
`UNKXIKMDBlLETERMW/ILZ
`THROUGH5409mm;
`
`WlHELESSOOMMUMGATlmS
`
`
`
`
`
`
`NOTNeal
`TERMNAI.1 OPERATE!
`
`FORAavENLENGTH
`OF'HM
`
`
`LocksMDBLETEHMWALZ
`THROUGHSHORT-HMS:
`5207
`WEELESSCWMUNJCATDNS
`1 LocKMoEALETEHMmAu ~ $208
`
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 1
`
`IPR2020-00202
`Apple Inc. EX1001 Page 1
`
`
`
`US 10,212,586 B2
`
`Page 2
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`2012/0040611 A1*
`
`2/2012 Grilfin .............. H04W 52/0254
`455/4l.l
`2012/0280790 A1* 11/2012 Gerhardt ............ G07C 9/00309
`340/561
`7/2013 Smtih ................... H04W 12/06
`455/411
`
`2013/0183936 A1*
`
`FOREIGN PATENT DOCUMENTS
`
`JP
`JP
`JP
`JP
`
`10/2006
`2006-285965 A
`2006285965 A * 10/2006
`2008-227758 A
`9/2008
`2010-086281 A
`4/2010
`
`............. G06F 21/34
`
`OTHER PUBLICATIONS
`
`Office Action dated Jun. 30, 2015, which issued during the pros-
`ecution of Japanese Patent Application No. 2012-117105, which
`corresponds to the present application (partial English translation
`attached).
`Office Action dated Feb. 28, 2017, which issued during the pros-
`ecution of Japanese Patent Application No. 2015-241178, which
`corresponds to the present application (English translation attached).
`
`* cited by examiner
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 2
`
`IPR2020-00202
`Apple Inc. EX1001 Page 2
`
`
`
`U.S. Patent
`
`Feb. 19, 2019
`
`Sheet 1 of 10
`
`US 10,212,586 B2
`
`www.mm; F.OE
`
`
`
`www.mszm02<umOIw
`
`w02<muEOIw
`
`
`
`
`
`wzorEQZDEEOo2232200wwmfimg
`
`
`
`
`
`2232.200mwmjmm;m20§<o_233=>_00
`
`rm
`
`
`
`:2::2:20:20
`
`
`
`
`
` :.223zo_._.<o:2:
`
`:2:.523
`
`
`
`
`
` who/2220502F<mmmoEmijmhzoo
`
`:23:2:
`
`
`
` wo<m0502§<me0Emijmhzoo
`
`
`
`.Zzzzmmc.BEDS.
`
`
`
`.3222mem.=mO§
`
`
`
`29.2.5mm<mmemo:
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 3
`
`IPR2020-00202
`Apple Inc. EX1001 Page 3
`
`
`
`U.S. Patent
`
`Feb. 19, 2019
`
`Sheet 2 of 10
`
`US 10,212,586 B2
`
`FIG. 2
`
`S20 1
`
`
`IS MOBILE
`
`
`TERMINAL1 UNLOCKED
`
`
`WHEN USER ENTERS
`
`
`PASSWORD?
`
`
`3202
`
` Y
`
`SEARCH MOBILE TERMINALS IN THE
`NEIGHBORHOOD THROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`$203
`
`
`
`IS MOBILE
`
`
`TERMINALA REGISTERED
`MOBILE TERMINAL?
`
`
`
`UNLOCK MOBILE TERMINAL 2
`TH ROUGH SHORT-RAN GE
`WIRELESS COMMUNICATIONS
`
`
`
`
`
`
`
`8205
`
`
`IS MOBILE
`TERMINAL1 INSTRUCTED
`TO BE LOCKED BY
`USER?
`
`
`
`
` IS NOT MOBILE
`TERMINAL 1 OPERATED
`
`
`FOR A GIVEN LENGTH
`OF TIME?
`
`
`
`LOCKS MOBILE TERMINAL 2
`
`,
`
`TH ROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`S 207
`
`LOCK MOBILE TERMINAL 1
`
`S 208
`
`END
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 4
`
`IPR2020-00202
`Apple Inc. EX1001 Page 4
`
`
`
`U.S. Patent
`
`Feb. 19, 2019
`
`Sheet 3 of 10
`
`US 10,212,586 B2
`
`FIG. 3
`
`
`
`S301
`IS MOBILE
`
`TERMINAL 2 UNLOCKED
`
`
`WHEN USER ENTERS
`
`PASSWORD?
`
`
`
`
`IS MOBILE
`TERMINAL 2 UNLOCKED
`
`
`TH ROUGH SHORT-RAN GE
`
`WIRELESS COMMUNI-
`CATIONS?
`
`
`
`$303
`
`
`
`IS MOBILE
`IS MOBILE
`
`TERMINAL2 OUT OF
`TERMINAL2 INSTRUCTED
`
`
`
`COMMUNICATION
`TO BE LOCKED BY
`
`
`
`'ANGE?
`USER?
`
`
`
`
`
`
`
`
`
` IS NOT MOBILE
`IS MOBILE
`
`
`TERMINAL 2
`
`
`TERMINAL 2 OPERATED
`
`INSTRUCTED TO BE LOCKED
`
`
`FOR A GIVEN LENGTH
`BY MOBILE TERMINAL 1 TH ROUGH
`
`
`
`OF TIME?
`SHORT-RANGE WIRELESS
`
`COMMUNICA-
`TIONS?
`
`
`
`
`
`LOCK MOBILE TERMINAL 2
`
`
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 5
`
`IPR2020-00202
`Apple Inc. EX1001 Page 5
`
`
`
`U.S. Patent
`
`Feb. 19, 2019
`
`Sheet 4 of 10
`
`US 10,212,586 B2
`
`FIG. 4
`
`
`S401
`IS MOBILE
`
`TERMINALI UNLOCKED
`
`
`WHEN USER ENTERS
`
`PASSWORD?
`
`
`
`
`SEARCH MOBILE TERMINALS
`IN THE NEIGHBORHOOD
`TH ROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`8403
`
`
`IS MOBILE
`TERMINALI UNLOCKED
`S404
`
`
`TH ROUGH SHORT-RANGE
`
`IS MOBILE
`
`WIRELESS COMMUNI—
`N
`TERMINALAREGISTERED
`
`
`CAT‘ONS?
`MOBILE TERMINAL?
`
`
` UNLOCK MOBILE TERMINAL 2
`WIRELESS COMMUNICATIONS
`TH ROUGH SHORT-RANGE
`
`
`
`
`
`IS MOBILE
`IS MOBILE
`
`
`TERMINAL 1 OUT OF
`TERMINAL 1 INSTRUCTED
`
`
`
`COMMUNICATION
`TO BE LOCKED BY
`
`
`
`' ANGE?
`USER?
`
`
`
`
`
`
`
`IS NOT MOBILE
`
`
`TERMINAL I OPERATED
` IS MOBILE
`
`FOR A GIVEN LENGTH
`
`TERMINALI INSTRUCTED
`
`
`OF TIME?
`TO BE LOCKED THROUGH
`
`
`
`SHORT-RANGE WIRELESS
`
`
`COMMUNICATIONS?
`
`
`
`
`LOCK MOBILE TERMINAL 2
`
`THROUGH SHORT-RANGE
`
`WIRELESS COMMUNICATIONS
`
`
`
`8408
`
`LOCK MOBILE TERMINAL 1
`
`S41 1
`
`END
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 6
`
`IPR2020-00202
`Apple Inc. EX1001 Page 6
`
`
`
`U.S. Patent
`
`Feb. 19, 2019
`
`Sheet 5 of 10
`
`US 10,212,586 B2
`
`FIG. 5
`
`8501
`IS MOBILE
`
`
`
`
`PASSWORD?
`8503
`
`SEARCH MOBILE TERMINALS
`
`
`IN THE NEIGHBORHOOD
`
`THROUGH SHORT-RANGE
`
`WIRELESS COMMUNICATIONS
`
`
`IS MOBILE
`
`8504
`TERMINAL2 UNLOCKED
`
`
`THROUGH SHORT-RANGE
`
`
`Is MOBILE
`
`
`WIRELESS COMMUNI-
`TERMINAL A REGISTERED
`CATIONS?
`
`
` MOBILE TERMINAL?
`
`
`
`UNLOCK MOBILE TERMINAL 1
`
`TH ROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`
`
`IS MOBILE
`
`
`IS MOBILE
`
`TERMINAL 2 OUT OF
`TERMINAL 2 INSTRUCTED
`
`
`
`COMMUNICATION
`TO BE LOCKED BY
`
`
`
`RANGE?
`USER?
`
`
`
`
`
`
`
`
`
`IS NOT MOBILE
`
`TERMINAL 2 OPERATED
`
`
` IS MOBILE
`FOR AGIVEN LENGTH
`TERMINAL 2 INSTRUCTED
`
`
`
`OF TIME?
`TO BE LOCKED THROUGH
`
`
`
`SHORT-RANGE WIRELESS
`
`
`COMMUNICATIONS?
`
`
`
`LOCK MOBILE TERMINAL 1
`TH ROUGH SHORT-RANGE
`
`WIRELESS COMMUNICATIONS
`
`
`
`8508
`
`LOCK MOBILE TERMINAL2
`
`851 1
`
`END
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 7
`
`IPR2020-00202
`Apple Inc. EX1001 Page 7
`
`
`
`U.S. Patent
`
`Feb. 19, 2019
`
`Sheet 6 of 10
`
`US 10,212,586 B2
`
`F'G- 6
`
`
`8601
`IS MOBILE
`
`
`TERMINALI UNLOCKED
`
`
`8603
`WHEN USER ENTERS
`
`
`PASSWORD?
`SEARCH MOBILE TERMINALS
`
`
`IN THE NEIGHBORHOOD
`
`THROUGH SHORT-RANGE
`
`WIRELESS COMMUNICATIONS
`
`
`
`8604
`IS MOBILE
`
`
`ISMOBILE
`TLEBI‘IEIILSIII’IITOSITBE
`
`
`WIRELESSCOMMUNI—
`TERMINALA REGISTERED
`N
`
`
`
`
`
` CATIONS?
`MOBILE TERMINAL?
`
`
`
`
`
`DISPLAY CONFIRMATION
`
`
`SCREEN IN WHICH MOBILE
`TERMINAL 2 IS UNLOCKED
`
`
`
`
` IS MOBILE
`TERMINAL 2 INSTRUCTED
`
`TO BE UNLOCKED BY
`
`USER?
`
`
`UNLOCK MOBILE TERMINAL 2
`TH ROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`
`
`
`
`
`
`IS MOBILE
`IS MOBILE
`
`
`TERMINAL 1 OUT OF
`TERMINAL I INSTRUCTED
`
`
`
`COMMUNICATION
`TO BE LOCKED BY
`
`
`
`RANGE?
`USER?
`
`
`
`
`
`IS NOT MOBILE
`
`
`IS MOBILE
`TERMINAL 1 INSTRUCTED
`nggyfiéfififigfi”
`
`
`
`
`
`TO BE LOCKED THROUGH
`OF TIME?
`
`
`
`SHORT-RANGE WIRELESS
`'
`COMMUNICATIONS?
`
`
`
`
`LOCK MOBILE TERMINAL 2
`TH ROUGH SHORT-RANGE
`
`WIRELESS COMMUNICATIONS
`
`
`
`8610
`
`END
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 8
`
`IPR2020-00202
`Apple Inc. EX1001 Page 8
`
`
`
`U.S. Patent
`
`Feb. 19, 2019
`
`Sheet 7 of 10
`
`US 10,212,586 B2
`
`FIG. 7
`
`MOBILE TERMINAL 2 IS DETECTED.
`
`73
`
`IS MOBILE TERMINAL 2 UNLOCKED?
`
`74
`
`UNLOCK
`
`76
`
`NOT
`
`UNLOCK
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 9
`
`IPR2020-00202
`Apple Inc. EX1001 Page 9
`
`
`
`U.S. Patent
`
`Feb. 19, 2019
`
`Sheet 8 of 10
`
`US 10,212,586 B2
`
`F'G- 8
`
`S801
`
`
`
`SEARCH MOBILE TERMINALS
`IN THE NEIGHBORHOOD
`TH ROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`
`
`
`
`
`S802
`
`
`N
`IS MOBILE
`
`TERMINAL A REGISTERED
`MOBILE TERMINAL?
`
`
`
`S805
`
`REQUEST USER TO ENTER
`COMPLICATED PASSWORD
`
`
`. ISSIMPLEPASSWORD
`
`
`IS COMPLICATED
`PASSWORD ENTERED?
`
`ENTERED?
`
`$806
`
`
`
`IS MOBILE
`
`
`
`TERMINAL1 INSTRUCTED
`TO BE LOCKED BY
`
`USER?
`
`
`
`IS NOT MOBILE
`
`TERMINALI OPERATED
`FOR AGIVEN LENGTH
`
`OF TIM E?
`
`
`LOCK MOBILE TERMINAL 1
`
`881 0
`
`END
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 10
`
`IPR2020-00202
`Apple Inc. EX1001 Page 10
`
`
`
`U.S. Patent
`
`Feb. 19, 2019
`
`Sheet 9 0f 10
`
`US 10,212,586 B2
`
`FIG. 9
`
`
`
`
`
`
`SEARCH MOBILE TERMINALS
`IN THE NEIGHBORHOOD
`TH ROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`
`
`3901
`
`
`
`IS MOBILE
`TERMINAL A REGISTERED
`
`
`MOBILE TERMINAL?
`
`
`$902
`
` Y
`
`
`
`UNLOCK MOBILE TERMINAL 1
`
`8903
`
`'OBILETERMINAL 1 OUT OF
`
`8904
`
`
`
`
`
`
`COMMUNICATION
`RANGE?
`
`
`
`Y
`
`LOCK MOBILE TERMINAL 1
`
`$905
`
`
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 11
`
`IPR2020-00202
`Apple Inc. EX1001 Page 11
`
`
`
`U.S. Patent
`
`Feb. 19, 2019
`
`Sheet 10 of 10
`
`US 10,212,586 B2
`
`FIG. 10
`
`
`
`
`
`SEARCH MOBILE TERMINALS
`IN THE NEIGHBORHOOD
`THROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`
`
`81001
`
` IS MOBILE
`
`TERMINAL A REGISTERED
`
`
`MOBILETERMINAL?
`
`
`
`31 002
`
`
` IS MOBILE
`TERMINAL 1 OUT OF
`
`COMMUNICATION
`RANGE?
`
`
`
`81003
`
`
`
`GIVE WARNING TO USER
`
`81004
`
`
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 12
`
`IPR2020-00202
`Apple Inc. EX1001 Page 12
`
`
`
`US 10,212,586 B2
`
`1
`MOBILE TERMINAL AND CONTROL
`METHOD THEREOF
`
`INCORPORATION BY REFERENCE
`
`The present application claims priority from Japanese
`application JP2012-117105 filed on May 23, 2012,
`the
`content of which is hereby incorporated by reference into
`this application.
`
`BACKGROUND OF THE INVENTION
`
`The present invention relates to a mobile terminal and a
`control method thereof.
`
`As a background art of this technical field, JP-A-2004-
`102682 is disclosed. In its publication, a problem will be
`described as below. “According to the conventional schemes
`described above, therefore, the user of the terminal device
`needs to make a complex action in order to prevent a third
`party from making unauthorized use of the terminal device.
`If the user has inadvertently made the password known or
`lost the terminal device together with the ID card, then it is
`impossible to reliably prevent unauthorized use of the ter-
`minal device by a third party.”
`A method for solving this problem will be described as
`below. “There is provided a terminal lock system for veri-
`fying that the user of a terminal device is a person with the
`legitimate right
`to use the terminal device for thereby
`protecting the terminal device against unauthorized use by a
`third party, the terminal lock system comprising a key device
`and a terminal-associated device. The key device is portable
`and has a radio communication means for performing short-
`range wireless communications. The terminal-associated
`device requests a connection to the key device through the
`short-range wireless communications, and inhibits the ter-
`minal device which is combined with the terminal-associ-
`
`ated device from being used if information of the key device
`which is confirmed as being connected to the terminal-
`associated device does not agree with information registered
`in the terminal-associated device, or if the terminal-associ-
`ated device is not confirmed as being connected to the key
`device through the short-range wireless communications.”
`
`SUMMARY OF THE INVENTION
`
`In JP-A-2004-102682, the following advantage will be
`described. “With the above arrangement, when the user who
`is carrying the key device moves away from the terminal
`device combined with the terminal-associated device until
`
`the terminal-associated device and the key device are no
`longer capable of connecting to each other based on a
`short-range wireless communication technique, the termi-
`nal-associated device locks the terminal device against use.
`The terminal lock system thus authenticates the user without
`the need for asking the user to make any action, and reliably
`protects the terminal device against unauthorized use by a
`third party.”
`However, the user needs to always carry the dedicated key
`device having a communication function when using the
`terminal device.
`
`In view of the foregoing, it is an object of the present
`invention to provide a convenient mobile terminal and
`control method thereof capable of being protected against
`unauthorized use by a third party without using the dedi-
`cated key device.
`The object of the present invention can be attained by the
`following technical proposal: For example, a plurality of
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`
`mobile terminals are previously registered mutually. When
`unlocked among them, one mobile terminal communicates
`with another mobile terminal in a communication range of
`the short-range wireless communications, unlocks the above
`another mobile terminal, and when out of the communica-
`tion range, locks it again.
`According to the present invention, for example, when
`one mobile terminal is unlocked among a plurality of mobile
`terminals, another mobile terminal can be unlocked.
`Other objects, features and advantages of the invention
`will become apparent from the following description of the
`embodiments of the invention taken in conjunction with the
`accompanying drawings.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a block diagram illustrating a configuration of a
`mobile terminal according to a first embodiment;
`FIG. 2 is a flowchart illustrating operations for locking
`and releasing a mobile terminal 1 according to a first
`embodiment;
`FIG. 3 is a flowchart illustrating operations for locking
`and releasing a mobile terminal 2 according to a first
`embodiment;
`FIG. 4 is a flowchart illustrating operations for locking
`and releasing a mobile terminal 1 according to a second
`embodiment;
`FIG. 5 is a flowchart illustrating operations for locking
`and releasing a mobile terminal 2 according to a second
`embodiment;
`FIG. 6 is a flowchart illustrating operations for locking
`and releasing a mobile terminal 1 according to a third
`embodiment;
`FIG. 7 is a display example illustrating a liquid crystal
`panel of a mobile terminal according to a third embodiment;
`FIG. 8 is a flowchart illustrating operations for locking
`and releasing a mobile terminal 1 according to a fourth
`embodiment;
`FIG. 9 is a flowchart illustrating operations for locking
`and releasing a mobile terminal 1 according to a fifth
`embodiment; and
`FIG. 10 is a flowchart illustrating a warning operation of
`a mobile terminal 1 according to a sixth embodiment.
`
`DESCRIPTION OF THE EMBODIMENTS
`
`Hereinafter, preferred embodiments of the present inven-
`tion will be described with reference to the accompanying
`drawings of the embodiments.
`
`First Embodiment
`
`FIG. 1 is a block diagram illustrating a configuration of a
`mobile terminal according to a first embodiment of the
`present invention. The mobile terminals 1 and 2 each have
`a radio communication function, and transmit and receive a
`variety of information to and from a mobile base station 3.
`Further, the mobile terminals 1 and 2 each have a function
`of performing short-range wireless communication between
`mobile terminals, and can transmit and receive a variety of
`information between the mobile terminals 1 and 2 by using
`the function. Examples of the short-range wireless commu-
`nication include Bluetooth (trademark), infrared rays, and
`Wi-Fi Direct.
`A controller 11 controls each unit of the mobile terminal
`
`1. The controller 11 is configured by a CPU (Central
`Processing Unit), an arbitrary control circuit, or a dedicated
`circuit such as an ASIC.
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 13
`
`IPR2020-00202
`Apple Inc. EX1001 Page 13
`
`
`
`US 10,212,586 B2
`
`3
`A display unit 12 of the mobile terminal 1 is configured,
`for example, by a liquid crystal panel, and displays a variety
`of information. An operating unit 13 is configured, for
`example, by a push-button switch or a touch panel, and an
`instruction of a user is transferred to the controller 11. A
`
`wireless communications unit 15 and a short-range wireless
`communication unit 16 are each configured by a communi-
`cation circuit including an encoding circuit and a decoding
`circuit in addition to an antenna. The wireless communica-
`tions unit 15 communicates with the mobile base station 3.
`
`The short-range wireless communication unit 16 controls
`short-range wireless communications and communicates,
`for example, with the mobile terminal 2.
`A storage unit 14 stores a program or various kinds of
`setting information for controlling a mobile terminal, and a
`password for unlocking a mobile terminal.
`A controller 21, a display unit 22, an operating unit 23, a
`storage unit 24, and a wireless communications unit 25 of
`the mobile terminal 2 are the same as the controller 11, the
`display unit 12, the operating unit 13, the storage unit 14,
`and the wireless communications unit 15 of the mobile
`
`terminal 1, and therefore, descriptions will not be repeated
`here. A short-range wireless communication unit 26 controls
`short-range wireless communications, and communicates,
`for example, with the mobile terminal 1.
`Next, descriptions will be made about operations which
`are set until the mobile terminal 2 is unlocked after the
`mobile terminal 1 is unlocked.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`In addition, the locked state of the present embodiment is
`a state in which functions or operations of part or the whole
`of a mobile terminal are limited.
`
`30
`
`When the user refers to the display unit 12 of the mobile
`terminal 1 and operates the operating unit 13 so as to release
`a locked state,
`the mobile terminal 1 searches whether
`another mobile terminal is in a short-distance communica-
`
`tion range capable of performing short-range wireless com-
`munications. The mobile terminal
`1
`further confirms
`
`is the mobile terminal 2 being a previously
`whether it
`registered mobile terminal. When the mobile terminal 1
`confirms that information stored in the storage unit 14 is
`matched with that of the storage unit 24 and it
`is the
`previously registered mobile terminal, the mobile terminal 2
`is unlocked.
`
`The mobile terminals 1 and 2 are supposed to transit to a
`locked state when not operated for a given length of time
`and, for example, a password is supposed to need to be
`entered in order to release the locked state. The given length
`of time is, for example, thirty seconds. Further, the mobile
`terminals 1 and 2 are previously registered so as to be
`mutually locked and unlocked through short-range wireless
`communications.
`
`An example where the mobile terminals 1 and 2 each have
`a radio communication function with the mobile base station
`3 is illustrated. Further, the mobile terminal 1 and/or mobile
`terminal 2 may each have a wireless LAN (Local Area
`Network) function, and transmit and receive a variety of
`information to and from a wireless LAN router.
`
`35
`
`40
`
`45
`
`50
`
`55
`
`FIG. 2 is a flowchart illustrating operations of locking and
`unlocking the mobile terminal 1 according to the first
`embodiment.
`
`60
`
`the mobile terminal 1 confirms
`First, at step $201,
`whether to be unlocked when the user enters a password.
`The mobile terminal 1 continues to wait for unlocking until
`the locked state is released, and when it is unlocked, the
`process proceeds to step 8202. An example where the user
`enters a password is described here, and biometrics authen-
`tication may be further used.
`
`65
`
`4
`
`the mobile terminal 1 searches mobile
`At step $202,
`terminals in the neighborhood through short-range wireless
`communications. For example, the mobile terminal 1 trans-
`mits radio waves used for the short-range wireless commu-
`nications and searches for a mobile terminal in which the
`
`short-range wireless communications are established by
`receiving the radio waves.
`At step $203, the mobile terminal 1 determines whether
`there is a mobile terminal in the neighborhood and it is the
`previously registered mobile terminal, and switches the
`process. If so, the process advances to step $204. If not, the
`process proceeds to step 8205.
`At step $204, the mobile terminal 1 unlocks the previ-
`ously registered mobile terminal 2 through the short-range
`wireless communications. For example, the mobile terminal
`1 transmits a signal for instructing the mobile terminal 2 to
`be unlocked thereto. Here, the mobile terminals 1 and 2 are
`supposed to be previously registered mutually by the same
`user.
`
`At step $205, the mobile terminal 1 confirms whether to
`be instructed to be locked by the user. If so, the process
`proceeds to step 8207. At step $206, the mobile terminal 1
`further confirms whether not to be operated for a given
`length of time. If not, the process proceeds to step $207. If
`so, the process returns to step 8205.
`At step $207, the mobile terminal 1 locks the previously
`registered mobile terminal 2 through the short-range wire-
`less communications. For example, the mobile terminal 1
`transmits a signal for instructing the mobile terminal 2 to be
`locked thereto.
`
`At step $208, the mobile terminal 1 is locked.
`FIG. 3 is a flowchart illustrating operations for locking
`and unlocking the mobile terminal 2 according to the first
`embodiment.
`
`the mobile terminal 2 confirms
`First, at step S301,
`whether to be unlocked when the user enters a password. If
`so, the process proceeds to step S303. At step S302, the
`mobile terminal 2 further confirms whether to be unlocked
`
`through the short-range wireless communications. If so, the
`process proceeds to step S305. If not, the process returns to
`step S301.
`At step S303, the mobile terminal 2 confirms whether to
`be instructed to be locked by the user. If so, the process
`proceeds to step S307. At step S304, the mobile terminal 2
`further confirms whether not to be operated for a given
`length of time. If not, the process proceeds to step S307. If
`so, the process returns to step S303.
`At step S305, the mobile terminal 2 confirms whether to
`be out of the communication range of the short-range
`wireless communications with the mobile terminal 1. If so,
`the process proceeds to step S307. At step S306, the mobile
`terminal 2 further confirms whether to be instructed to be
`
`locked by the mobile terminal 1 through the short-range
`wireless communications. If so, the process proceeds to step
`S307. If not, the process returns to step S305.
`At step S307, the mobile terminal 2 is locked.
`In addition, the mobile terminal 1 may detect that the
`short-range wireless communications established with the
`mobile terminal 2 is broken, and transmit a signal for
`instructing the mobile terminal 2 to be locked thereto
`immediately before the communication is broken.
`In the first embodiment of the present invention, a plu-
`rality of mobile terminals are previously registered mutually
`through the above configuration. When one mobile terminal
`is unlocked among them, another mobile terminal
`is
`unlocked in the communication range of the short-range
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 14
`
`IPR2020-00202
`Apple Inc. EX1001 Page 14
`
`
`
`US 10,212,586 B2
`
`5
`wireless communications. When out of the communication
`
`range, the another mobile terminal can be locked again.
`In the present embodiment, an example where two mobile
`terminals are locked and unlocked is described; similarly,
`three or more mobile terminals can be further locked and
`unlocked.
`
`Second Embodiment
`
`FIG. 4 is a flowchart illustrating operations for locking
`and unlocking the mobile terminal 1 according to a second
`embodiment of the present invention. The mobile terminal
`has the same configuration as that of the first embodiment,
`and therefore descriptions will not be repeated here.
`First, at step S401,
`the mobile terminal 1 confirms
`whether to be unlocked when the user enters a password. If
`so, the process proceeds to step S403. At step S402, the
`mobile terminal 1 further confirms whether to be unlocked
`
`through the short-range wireless communications. If so, the
`process proceeds to step S409.
`Steps S403 to S408 are the same as steps $202 to $207 of
`FIG. 2, and therefore descriptions will not be repeated here.
`At step S409, the mobile terminal 1 confirms whether to
`be out of the communication range of the short-range
`wireless communications with the mobile terminal 2. If so,
`the process proceeds to step S411. At step S410, the mobile
`terminal 1 further confirms whether to be instructed to be
`
`locked through the short-range wireless communications. If
`so, the process proceeds to step S411. If not, the process
`returns to step S409.
`At step S411, the mobile terminal 1 is locked.
`FIG. 5 is a flowchart illustrating operations for locking
`and unlocking the mobile terminal 2 according to the second
`embodiment.
`
`the mobile terminal 2 confirms
`First, at step $501,
`whether to be unlocked when the user enters a password. If
`so, the process proceeds to step 8503. At step $502, the
`mobile terminal 2 further confirms whether to be unlocked
`
`through the short-range wireless communications. If so, the
`process proceeds to step $509.
`Steps $503 and 8504 are the same as steps S403 and S404
`of FIG. 4, and therefore descriptions will not be repeated
`here.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`At step $505, the mobile terminal 2 unlocks the previ-
`ously registered mobile terminal 1 through the short-range
`wireless communications.
`
`45
`
`At step $506, the mobile terminal 2 confirms whether to
`be instructed to be locked by the user. If so, the process
`proceeds to step 8508. At step $507, the mobile terminal 2
`further confirms whether not to be operated for a given
`length of time. If not, the process proceeds to step 8508.
`At step $508, the mobile terminal 2 locks the previously
`registered mobile terminal 1 through the short-range wire-
`less communications.
`
`At step $509, the mobile terminal 2 confirms whether to
`be out of the communication range of the short-range
`wireless communications with the mobile terminal 1. If so,
`the process proceeds to step 8511. At step $510, the mobile
`terminal 2 further confirms whether to be instructed to be
`
`locked through the short-range wireless communications. If
`so, the process proceeds to step $511. If not, the process
`returns to step 8509.
`At step $511, the mobile terminal 2 is locked.
`In the second embodiment of the present invention, a
`plurality of mobile terminals are previously registered mutu-
`ally through the above configuration. When one mobile
`terminal is unlocked among them, another mobile terminal
`
`50
`
`55
`
`60
`
`65
`
`6
`is unlocked in the communication range of the short-range
`wireless communications. When out of the communication
`
`range, the another mobile terminal can be locked again.
`First, any mobile terminal may be unlocked. Even if any
`mobile terminal is unlocked, another mobile terminal can be
`unlocked, and therefore the mobile terminal of the second
`embodiment
`is more convenient
`than that of the first
`embodiment.
`
`In the present embodiment, an example where two mobile
`terminals are locked and unlocked is described; similarly,
`three or more mobile terminals can be further locked and
`unlocked.
`
`Third Embodiment
`
`FIG. 6 is a flowchart illustrating operations for locking
`and unlocking the mobile terminal 1 according to a third
`embodiment of the present invention. The mobile terminal
`has the same configuration as that of the first embodiment,
`and therefore descriptions will not be repeated here.
`Steps S601 to S604 are the same as steps S401 to S404 of
`FIG. 4, and therefore descriptions will not be repeated here.
`At step S605, the mobile terminal 1 displays a confirma-
`tion screen in which the mobile terminal 2 is unlocked. A
`
`display example will be described later.
`At step S606, the mobile terminal 1 confirms whether the
`user instructs the mobile terminal 2 to be unlocked. If so, the
`process advances to step S607. If not, the process proceeds
`to step S608.
`Steps S608 to S613 are the same as steps S406 to S411 of
`FIG. 4, and therefore descriptions will not be repeated here.
`FIG. 7 is a display example illustrating a liquid crystal
`panel of the mobile terminal 1 at the time of detecting the
`mobile terminal 2 through the short-range wireless commu-
`nications at step S605 of FIG. 6. A detection report of the
`mobile terminal 2, a selection button, and non-selection
`button of the unlocking are displayed on the liquid crystal
`panel. When detecting the mobile terminal 2 through the
`short-range wireless communications, the mobile terminal 1
`transits to an unlocking selection mode. On the liquid crystal
`panel 73, an unlocking selection button 74 and an unlocking
`non-selection button 76 are displayed. When the user pushes
`a push-button switch 75 corresponding to the unlocking
`selection button 74, the mobile terminal 2 is unlocked. When
`the user pushes a push-button switch 77 corresponding to the
`unlocking non-selection button 76, the mobile terminal 1
`releases the unlocking selection mode and returns to a
`normal mode.
`
`invention, a
`In the third embodiment of the present
`plurality of mobile terminals are previously registered mutu-
`ally through the above configuration. When one mobile
`terminal is unlocked among them, another mobile terminal
`is unlocked in the communication range of the short-range
`wireless communications. When out of the communication
`
`range, the another mobile terminal can be locked again.
`Further, upon detection of another mobile terminal, the
`user can select whether to unlock it.
`
`Fourth Embodiment
`
`FIG. 8 is a flowchart illustrating operations for locking
`and unlocking the mobile terminal 1 according to a fourth
`embodiment of the present invention. The mobile terminal
`has the same configuration as that of the first embodiment,
`and therefore descriptions will not be repeated here.
`
`|PR2020-00202
`
`Apple Inc. EX1001 Page 15
`
`IPR2020-00202
`Apple Inc. EX1001 Page 15
`
`
`
`US 10,212,586 B2
`
`7
`First, at step $801, the mobile terminal 1 searches mobile
`terminals in the neighborhood through the short-range wire-
`less communications.
`
`At step $802, the mobile terminal 1 determines whether
`there is a mobile terminal in the neighborhood and it is the
`previously registered mobile terminal, and switches the
`process. If so, the process advances to step $803. If not, the
`process proceeds to step 8805.
`At step $803, the mobile terminal 1 requests the user to
`enter a simple password, and continues to wait until it is
`correctly entered at step $804. When the simple password is
`entered, the process proceeds to step 8807.
`At step $805, the mobile terminal 1 requests the user to
`enter a complicated password, and continues to wait until it
`is correctly entered at step $806. When the complicated
`password is entered, the process proceeds to step $807.
`The simple password is, for example, a three-character
`number, and the complicated password is, for example, a
`ten-character number. That is, strengths of both passwords
`are different from each other.
`
`At step $807, the mobile terminal 1 is unlocked. Here, the
`mobile terminals 1 and 2 are supposed to be previously
`registered mutually by the same user.
`At step $808, the mobile terminal 1 confirms whether to
`be instructed to be locked by the user. If so, the process
`proceeds to step 8810. At step $809, the mobile terminal 1
`further confirms whether not to be operated for a given
`length of time. If not, the process proceeds to step 8810.
`At step $810,