throbber
Case 5:19-cv-00036-RWS Document 442-2 Filed 07/24/20 Page 1 of 19 PageID #: 24399
`Case 5:19-cv-00036—RWS Document 442-2 Filed 07/24/20 Page 1 of 19 PageID #: 24399
`
`
`
`
`
`
`
`EXHIBIT 1
`
`EXHIBIT 1
`
`
`
`

`

`Case 5:19-cv-00036-RWS Document 442-2 Filed 07/24/20 Page 2 of 19 PageID #: 24400
`I 1111111111111111 1111111111 1111111111 1111111111 1111111111 lll111111111111111
`USO 102125 86B2
`
`c12) United States Patent
`Hira bayashi et al.
`
`US 10,212,586 B2
`(10) Patent No.:
`Feb.19,2019
`(45) Date of Patent:
`
`(54) MOBILE TERMINAL AND CONTROL
`METHOD THEREOF
`
`(71) Applicant: Maxell, Ltd., Kyoto (JP)
`
`(72)
`
`Inventors: Masayuki Hirabayashi, Yokohama
`(JP); Hideo Nishijima, Hitachinaka (.IP)
`
`(73) Assignee: MAXELL, LTD., Kyoto (JP)
`
`( *) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 54 days.
`
`(21) Appl. No.: 13/874,535
`
`(22) Filed:
`
`May 1, 2013
`
`(65)
`
`Prior Publication Data
`US 2013/0316644 Al
`Nov. 28, 2013
`
`(30)
`
`Foreign Application Priority Data
`
`May 23, 2012
`
`(JP) ................................. 2012-117105
`
`(51)
`
`Int. Cl.
`H04W 12106
`/JfJ4L 29/()6
`(52) U.S. Cl.
`CPC ......... H04W 12106 (2013.01); H04L 63/0492
`(2013.01)
`
`(2009.01)
`(2006.01)
`
`( 58) Field of Classification Search
`CPC .. H04W 12/06; H04W 12/00; H04L 63/0492;
`H04L 9/32; H04M 1/66; H04B 7/00
`USPC ................................................ 455/26.1, 41.2
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`2004/0046638 Al*
`2006/0123242 Al*
`
`3/2004 Kawasaki .................... 340/5.61
`6/2006 Merrern .............. E05B 73/0082
`713/186
`
`2007/0287423 Al* 12/2007 Kakiuchi
`
`......... 455/41.2
`2006/0128305 Al*
`6/2006 Delalat
`2006/0224882 Al* 10/2006 Chin ....................... G06F 21/34
`713/150
`G06Q 20/32
`455/411
`6/2010 Satou ........................... 455/41.2
`412011 Golder .......................... 455/411
`8/2011 Friedlaender .
`G08C 17/02
`455/41.2
`
`2010/0144275 Al*
`2011/0086615 Al*
`2011/0195665 Al*
`
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`
`JP
`JP
`
`6/2002
`2002-183866 A
`4/2004
`2004-102682
`(Continued)
`
`OTHER PUBLICATIONS
`
`Office Action dated Mar. 3, 2015, which issued during the prosecu(cid:173)
`tion of Japanese Patent Application No. 2012-117105, which cor(cid:173)
`responds to the present application (partial English translation
`attached).
`
`(Continued)
`
`Primary Examiner - Dong-Chang Shiue
`(74) Attorney, Agent, or Firm - Baker Botts L.L.P.
`
`(57)
`
`ABSTRACT
`
`There is provided a mobile terminal capable of being
`protected against unauthorized use by a third party without
`using a dedicated key device. A plurality of mobile terminals
`are previously registered mutually. When unlocked among
`them, one mobile terminal communicates with another
`mobile terminal in a commtmication range of short-range
`wireless commtmications, unlocks the above another mobile
`tem1inal, and when out of the communication range, locks it
`again.
`
`20 Claims, 10 Drawing Sheets
`
`<;~~!t~~
`
`N
`
`S206
`N ~~1~Ji~~>
`
`~RAllVENLENGTH....---(cid:173)
`CfTI~
`y
`
`LOCKSMOBLETERMINAl.2
`THROJGHSHORr.RANGE
`WFa.ESSCOMMUNiCATOi'•S
`
`-...S207
`
`I LOCKMOOLETF.FIMINAL 1 t'- S208
`
`(
`
`E~D
`
`)
`
`MAXELL_APPLE0000 168
`
`

`

`Case 5:19-cv-00036-RWS Document 442-2 Filed 07/24/20 Page 3 of 19 PageID #: 24401
`
`US 10,212,586 B2
`Page 2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`2012/0040611 Al*
`
`2/2012 Griffin
`
`2012/0280790 Al* 11/2012 Gerhardt .
`
`2013/0183936 Al*
`
`7/2013 Smtih
`
`H04W 52/0254
`455/41.1
`G07C 9/00309
`340/5.61
`H04W 12/06
`455/411
`
`FOREIGN PATENT DOCUMENTS
`
`JP
`JP
`JP
`JP
`
`2006-285965 A
`2006285965 A
`2008-227758 A
`2010-086281 A
`
`10/2006
`* 10/2006
`9/2008
`4/2010
`
`G06F 21/34
`
`OTHER PUBLICArIONS
`
`Office Action dated Jun. 30, 2015, which issued during the pros(cid:173)
`ecution of Japanese Patent Application No. 2012-117105, which
`corresponds to the present application (partial English translation
`attached).
`Office Action dated Feb. 28. 2017, which issued during the pros(cid:173)
`ecution of Japanese Patent Application No. 2015-241178, which
`corresponds to the present application (English translation attached).
`
`* cited by examiner
`
`MAXELL_APPLE0000 169
`
`

`

`Case 5:19-cv-00036-RWS Document 442-2 Filed 07/24/20 Page 4 of 19 PageID #: 24402
`
`N
`cc
`'""" N u. QC)
`'N
`'""" =
`
`O's
`
`r:,J
`~
`
`0
`~ .....
`0
`.....
`('!) a
`rJl =(cid:173)
`
`\0
`0 .....
`N
`\0
`.....
`O"'
`('!)
`"1'j
`
`~
`
`~ = ~
`
`~
`~
`~
`•
`00
`
`e •
`
`MOBILE TERMINAL
`
`MOBILE TERMINAL
`
`STORAGE
`
`UNIT
`
`OPERATING
`
`UNIT
`
`DISPLAY UNIT
`
`24
`
`23
`
`22
`
`STORAGE
`
`UNIT
`
`OPERATING
`
`UNIT
`
`DISPLAY UNIT
`
`14
`
`13
`
`12
`
`CONTROLLER
`
`21
`
`CONTROLLER
`
`1 1
`
`~ m
`:s:
`
`r
`r
`
`WIRELESS COMMUN~ COMMUNICATIONS
`
`WIRELESS
`25
`
`SHORT-RANGE
`
`26
`
`UNIT
`
`CATION UNIT
`
`COMMUNICATIONS WIRELESSCOMMUNI(cid:173)
`
`SHORT-RANGE
`16
`
`11
`
`WIRELESS
`15
`
`CATION UNIT
`
`MOBILE BASE STATION .-----+-------'-------------.
`
`FIG. 1
`
`I(cid:141) "
`
`""O r m
`
`"O
`
`0
`-..,J
`0 ......
`0
`0
`0
`
`

`

`Case 5:19-cv-00036-RWS Document 442-2 Filed 07/24/20 Page 5 of 19 PageID #: 24403
`
`U.S. Patent
`
`Feb.19,2019
`
`Sheet 2 of 10
`
`US 10,212,586 B2
`
`FIG. 2
`START
`
`N
`
`S202
`SEARCH MOBILE TERMINALS IN THE
`NEIGHBORHOOD THROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`S204
`UNLOCK MOBILE TERMINAL 2
`THROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`N
`
`y
`
`N
`
`LOCKS MOBILE TERMINAL 2
`THROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`S207
`
`LOCKMOBILETERMINAL 1
`
`S208
`
`END
`
`MAXELL_APPLE0000 171
`
`

`

`Case 5:19-cv-00036-RWS Document 442-2 Filed 07/24/20 Page 6 of 19 PageID #: 24404
`
`U.S. Patent
`
`Feb.19,2019
`
`Sheet 3 of 10
`
`US 10,212,586 B2
`
`FIG. 3
`
`START
`
`N
`
`y
`
`y
`
`y
`
`ISMOBILE
`TERMINAL2
`INSTRUCTED TO BE LOCKED
`BY MOBILE TERMINAL 1 THROUGH
`SHORT-RANGE WIRELESS
`COMMUNICA-
`TIONS?
`y
`
`N
`
`y
`
`LOCK MOBILE TERMINAL2
`
`S307
`
`END
`
`y
`
`MAXELL_APPLE0000 172
`
`

`

`Case 5:19-cv-00036-RWS Document 442-2 Filed 07/24/20 Page 7 of 19 PageID #: 24405
`
`U.S. Patent
`
`Feb.19,2019
`
`Sheet 4 of 10
`
`US 10,212,586 B2
`
`FIG. 4
`
`START
`
`N
`
`y
`
`y
`
`y
`
`S403
`SEARCH MOBILE TERMINALS
`IN THE NEIGHBORHOOD
`THROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`S405
`UNLOCK MOBILE TERMINAL 2
`THROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`N
`
`y
`
`N
`
`ISMOBILE
`TERMINAL 1 INSTRUCTED
`TOBE LOCKED THROUGH
`SHORT-RANGE WIRELESS
`COMMUNICATIONS?
`
`y
`
`LOCK MOBILE TERMINAL 1
`
`S411
`
`END
`
`LOCK MOBILE TERMINAL2
`THROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`S408
`
`MAXELL_APPLE0000 173
`
`

`

`Case 5:19-cv-00036-RWS Document 442-2 Filed 07/24/20 Page 8 of 19 PageID #: 24406
`
`U.S. Patent
`
`Feb.19,2019
`
`Sheet 5 of 10
`
`US 10,212,586 B2
`
`FIG. 5
`
`START
`
`N
`
`y
`
`y
`
`y
`
`S503
`SEARCH MOBILE TERMINALS
`IN THE NEIGHBORHOOD
`THROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`S505
`UNLOCK MOBILE TERMINAL 1
`THROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`N
`
`y
`
`N
`
`ISMOBILE
`TERMINAL 2 INSTRUCTED
`TO BE LOCKED THROUGH
`SHORT-RANGE WIRELESS
`COMMUNICATIONS?
`
`y
`
`LOCKMOBILETERMINAL2
`
`S511
`
`END
`
`LOCK MOBILE TERMINAL 1
`THROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`S508
`
`MAXELL_APPLE0000 17 4
`
`

`

`Case 5:19-cv-00036-RWS Document 442-2 Filed 07/24/20 Page 9 of 19 PageID #: 24407
`
`U.S. Patent
`
`Feb.19,2019
`
`Sheet 6 of 10
`
`US 10,212,586 B2
`
`START
`
`FIG. 6
`
`y
`
`S602
`
`N
`
`y
`
`y
`
`N
`
`ISMOBILE
`TERMINAL 1 INSTRUCTED
`TO BE LOCKED THROUGH
`SHORT-RANGE WIRELESS
`COMMUNICATIONS?
`
`y
`
`LOCKMOBILETERMINAL 1
`
`S613
`
`END
`
`S603
`SEARCH MOBILE TERMINALS
`IN THE NEIGHBORHOOD
`THROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`S604
`
`DISPLAY CONFIRMATION
`SCREEN IN WHICH MOBILE
`TERMINAL 2 IS UNLOCKED
`S606
`
`UNLOCK MOBILE TERMINAL 2
`THROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`N
`
`N
`
`y
`
`LOCK MOBILE TERMINAL 2
`THROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`S610
`
`MAXELL_APPLE0000 175
`
`

`

`Case 5:19-cv-00036-RWS Document 442-2 Filed 07/24/20 Page 10 of 19 PageID #: 24408
`
`U.S. Patent
`
`Feb.19,2019
`
`Sheet 7 of 10
`
`US 10,212,586 B2
`
`FIG. 7
`
`1
`
`MOBILE TERMINAL 2 IS DETECTED.
`
`73
`
`IS MOBILE TERMINAL 2 UNLOCKED?
`
`NOT
`UNLOCK
`
`~-~
`L_)(~_)L_)
`
`DD (cid:143)
`DD (cid:143)
`(cid:143) DD
`DD (cid:143)
`DD (cid:143)
`
`MAXELL_APPLE0000 176
`
`

`

`Case 5:19-cv-00036-RWS Document 442-2 Filed 07/24/20 Page 11 of 19 PageID #: 24409
`
`U.S. Patent
`
`Feb. 19,2019
`
`Sheet 8 of 10
`
`US 10,212,586 B2
`
`START
`
`FIG. 8
`
`SEARCH MOBILE TERMINALS
`IN THE NEIGHBORHOOD
`THROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`S801
`
`N
`
`S803
`
`S805
`
`REQUEST USER TO ENTER
`SIMPLE PASSWORD
`
`REQUEST USER TO ENTER
`COMPLICATED PASSWORD
`
`N
`
`N
`
`y
`
`UNLOCKMOBILETERMINAL 1 S807
`
`y
`
`N
`
`y
`
`LOCK MOBILE TERMINAL 1
`
`S810
`
`END
`
`MAXELL_APPLE0000 177
`
`

`

`Case 5:19-cv-00036-RWS Document 442-2 Filed 07/24/20 Page 12 of 19 PageID #: 24410
`
`U.S. Patent
`
`Feb.19,2019
`
`Sheet 9 of 10
`
`US 10,212,586 B2
`
`FIG. 9
`
`START
`
`N
`
`N
`
`SEARCH MOBILE TERMINALS
`IN THE NEIGHBORHOOD
`THROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`S901
`
`S902
`
`y
`
`UNLOCK MOBILE TERMINAL 1
`
`S903
`
`S904
`
`y
`
`LOCK MOBILE TERMINAL 1
`
`S905
`
`END
`
`MAXELL_APPLE0000 178
`
`

`

`Case 5:19-cv-00036-RWS Document 442-2 Filed 07/24/20 Page 13 of 19 PageID #: 24411
`
`U.S. Patent
`
`Feb.19,2019
`
`Sheet 10 of 10
`
`US 10,212,586 B2
`
`FIG. 10
`
`START
`
`SEARCH MOBILE TERMINALS
`IN THE NEIGHBORHOOD
`THROUGH SHORT-RANGE
`WIRELESS COMMUNICATIONS
`
`S1001
`
`N
`
`N
`
`S1002
`
`S1003
`
`y
`
`y
`
`GIVE WARNING TO USER
`
`S1004
`
`END
`
`MAXELL_APPLE0000 179
`
`

`

`Case 5:19-cv-00036-RWS Document 442-2 Filed 07/24/20 Page 14 of 19 PageID #: 24412
`
`US 10,212,586 B2
`
`1
`MOBILE TERMINAL AND CONTROL
`METHOD THEREOF
`
`INCORPORATION BY REFERENCE
`
`The present application claims priority from Japanese
`application JP2012-117105 filed on May 23, 2012, the
`content of which is hereby incorporated by reference into
`this application.
`
`BACKGROUND OF THE INVENTION
`
`2
`mobile terminals are previously registered mutually. When
`unlocked among them, one mobile tenninal connnunicates
`with another mobile terminal in a communication range of
`the short-range wireless communications, unlocks the above
`5 another mobile terminal, and when out of the communica(cid:173)
`tion range, locks it again.
`According to the present invention, for example, when
`one mobile terminal is unlocked among a plurality of mobile
`tem1inals, another mobile terminal can be unlocked.
`Other objects, features and advantages of the invention
`will become apparent from the ti.Jllowing description of the
`embodiments of the invention taken in conjunction with the
`accompanying drawings.
`
`10
`
`]be present invention relates to a mobile terminal and a
`control method thereof.
`As a background art of this technical field, JP-A-2004- 15
`102682 is disclosed. In its publication, a problem will be
`described as below. "According lo the conventional schemes
`described above, therefore, the user of the terminal device
`needs to make a complex action in order to prevent a third
`party from making unauthorized use of the terminal device. 20
`If the user has inadvertently made the password known or
`lost the terminal device together with the ID card, then it is
`impossible to reliably prevent unauthorized use of the ter(cid:173)
`minal device by a third party."
`A method for solving this problem will be described as 25
`below. "There is provided a terminal lock system for veri(cid:173)
`fying that the user of a terminal device is a person with the
`legitimate right to use the tenninal device for thereby
`protecting the terminal device against unauthorized use by a
`third party, the terminal lock system comprising a key device 30
`and a terminal-associated device. The key device is portable
`and has a radio communication means for performing short(cid:173)
`range wireless communications. The terminal-associated
`device requests a connection to the key device through the
`short-range wireless communications, and inhibits the ter- 35
`minal device which is combined with the terminal-associ(cid:173)
`ated device from being used if information of the key device
`which is confirmed as being connected to the terminal(cid:173)
`associated device does not agree with infomrntion registered
`in the terminal-associated device, or if the terminal-associ- 40
`ated device is not confirmed as being connected to the key
`device through the short-range wireless communications."
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a block diagram illustrating a configuration of a
`mobile terminal according to a first embodiment;
`FIG. 2 is a flowchart illustrating operations for locking
`and releasing a mobile terminal 1 according lo a first
`embodiment;
`FIG. 3 is a flowchart illustrating operations for locking
`and releasing a mobile terminal 2 according to a first
`embodiment;
`FIG. 4 is a flowchart illustrating operations for locking
`and releasing a mobile terminal 1 according to a second
`embodiment;
`FIG. 5 is a flowchart illustrating operations for locking
`and releasing a mobile terminal 2 according to a second
`embodiment;
`FIG. 6 is a flowchart illustrating operations for locking
`and releasing a mobile terminal 1 according to a third
`embodiment;
`FIG. 7 is a display example illustrating a liquid crystal
`panel of a mobile tem1inal according to a third embodiment;
`FIG. 8 is a flowchart illustrating operations for locking
`and releasing a mobile terminal 1 according to a ti.Jurth
`embodiment;
`FIG. 9 is a flowchart illustrating operations for locking
`and releasing a mobile tenninal 1 according to a fifth
`embodiment; and
`FIG. 10 is a flowchart illustrating a warning operation of
`a mobile terminal 1 according to a sixth embodiment.
`
`SUMMARY OF THE INVENTION
`
`DESCRIPTION OF THE EMBODIMENTS
`
`45
`
`In JP-A-2004-102682, the following advantage will be
`described. "With the above arrangement, when the user who
`is carrying the key device moves away from the terminal
`device combined with the terminal-associated device until
`the tem1inal-associated device and the key device are no 50
`longer capable of connecting lo each other based on a
`short-range wireless communication technique. the tem1i(cid:173)
`nal-associated device locks the terminal device against use.
`The terminal lock system thus authenticates the user without
`the need for asking the user to make any action, and reliably 55
`protects the tem1inal device against unauthorized use by a
`third party."
`However, the user needs to always carry the dedicated key
`device having a communication function when using the
`terminal device.
`In view of the foregoing, it is an object of the present
`invention to provide a convenient mobile terminal and
`control method thereof capable of being protected against
`unauthorized use by a third party without using the dedi(cid:173)
`cated key device.
`The object of the present invention can be attained by the
`following technical proposal: For example, a plurality of
`
`Hereinafter, preferred embodiments of the present inven(cid:173)
`tion will be described with reference to the accompanying
`drawings of the embodiments.
`
`First Embodiment
`
`FIG. 1 is a block diagram illustrating a configuration of a
`mobile terminal according to a first embodiment of the
`present invention. The mobile terminals 1 and 2 each have
`a radio communication function, and transmit and receive a
`variety of information to and from a mobile base station 3.
`Further, the mobile terminals 1 and 2 each have a function
`of performing short-range wireless conmumication between
`mobile terminals, and can transmit and receive a variety of
`60 information between the mobile terminals 1 and 2 by using
`the fi.mction. Examples of the short-range wireless commu(cid:173)
`nication include Bluetooth (trademark), infrared rays, and
`Wi-Fi Direct.
`A controller 11 controls each unit of the mobile terminal
`65 1. The controller 11 is configured by a CPU (Central
`Processing Unit). an arbitrary control circuit, or a dedicated
`circuit such as an ASIC.
`
`MAXELL_APPLE0000 180
`
`

`

`Case 5:19-cv-00036-RWS Document 442-2 Filed 07/24/20 Page 15 of 19 PageID #: 24413
`
`US 10,212,586 B2
`
`3
`A display unit 12 of the mobile tern1inal 1 is configured,
`for example, by a liquid crystal panel, and displays a variety
`of information. An operating unit 13 is configured. for
`example, by a push-button switch or a touch panel, and an
`instruction of a user is transferred to the controller 11. A 5
`wireless communications unit 15 and a short-range wireless
`communication unit 16 are each configured by a communi(cid:173)
`cation circuit including an encoding circuit and a decoding
`circuit in addition to an antenna. The wireless communica-
`tions unit 15 communicates with the mobile base station 3. 10
`The short-range wireless communication unit 16 controls
`short-range wireless conmmnications and communicates,
`for example, with the mobile terminal 2.
`A storage unit 14 stores a program or various kinds of
`setting information for controlling a mobile terminal, and a
`password fix unlocking a mobile terminal.
`A controller 21, a display unit 22, an operating unit 23, a
`storage unit 24, and a wireless conmmnications unit 25 of
`the mobile terminal 2 are the same as the controller 11. the
`display unit 12, the operating unit 13, the storage unit 14, 20
`and the wireless communications unit 15 of the mobile
`terminal 1, and therefore, descriptions will not be repeated
`here. A short-range wireless communication unit 26 controls
`short-range wireless communications, and communicates,
`for example, with the mobile terminal 1.
`Next, descriptions will be made about operations which
`are set until the mobile terminal 2 is unlocked after the
`mobile lenninal 1 is unlocked.
`In addition, the locked state of the present embodiment is
`a state in which functions or operations of part or the whole
`of a mobile terminal are limited.
`When the user refers to the display unit 12 of the mobile
`terminal 1 and operates the operating tmit 13 so as to release
`a locked state. the mobile terminal 1 searches whether
`another mobile tern1inal is in a short-distance communica- 35
`tion range capable of performing short-range wireless com(cid:173)
`tenninal 1 further confirms
`munications. The mobile
`whether it is the mobile tern1inal 2 being a previously
`registered mobile terminal. When the mobile terminal 1
`confirms that information stored in the storage unit 14 is 40
`matched with that of the storage unit 24 and it is the
`previously registered mobile terminal, the mobile terminal 2
`is unlocked.
`The mobile terminals 1 and 2 are supposed to transit lo a
`locked state when not operated for a given length of time
`and, for example, a password is supposed to need to be
`entered in order to release the locked state. The given length
`of time is, for example, thirty seconds. Further, the mobile
`terminals 1 and 2 are previously registered so as lo be
`mutually locked and unlocked through short-range wireless
`communications.
`An example where the mobile terminals 1 and 2 each have
`a radio conmmnication function with the mobile base station
`3 is illustrated. Further, the mobile terminal 1 and/or mobile
`terminal 2 may each have a wireless LAN (Local Area
`Network) function, and transmit and receive a variety of
`information to and from a wireless LAN router.
`FIG. 2 is a flowchart illustrating operations oflocking and
`unlocking the mobile terminal 1 according to the first
`embodiment.
`First, at step S201, the mobile terminal 1 confirms
`whether to be unlocked when the user enters a password.
`The mobile terminal 1 continues to wait for unlocking until
`the locked slate is released, and when it is unlocked, the
`process proceeds lo step S202. An example where the user
`enters a password is described here, and biometrics authen(cid:173)
`tication may be further used.
`
`4
`At step S202, the mobile terminal 1 searches mobile
`terminals in the neighborhood through short-range wireless
`conmmnications. For example, the mobile terminal 1 trans(cid:173)
`mits radio waves used for the short-range wireless commu(cid:173)
`nications and searches for a mobile terminal in which the
`short-range wireless conmmnications are established by
`receiving the radio waves.
`At step S203, the mobile terminal 1 determines whether
`there is a mobile terminal in the neighborhood and it is the
`previously registered mobile terminal, and switches the
`process. If so, the process advances to step S204. If not, the
`process proceeds to step S205.
`At step S204, the mobile terminal 1 unlocks the previ-
`15 ously registered mobile tenninal 2 through the short-range
`wireless communications. For example, the mobile terminal
`1 transmits a signal for instructing the mobile terminal 2 to
`be unlocked thereto. Here, the mobile terminals 1 and 2 are
`supposed to be previously registered mutually by the same
`user.
`At step S205, the mobile terminal 1 confirms whether to
`be instructed lo be locked by the user. If so, the process
`proceeds to step S207. At step S206, the mobile terminal 1
`further confirms whether not to be operated for a given
`25 length of time. If not, the process proceeds to step S207. If
`so, the process returns to step S205.
`At step S207, the mobile terminal 1 locks the previously
`registered mobile tenninal 2 through the short-range wire(cid:173)
`less communications. For example, the mobile tenninal 1
`30 transmits a signal for instructing the mobile terminal 2 to be
`locked thereto.
`At step S208, the mobile terminal 1 is locked.
`FIG. 3 is a flowchart illustrating operations for locking
`and unlocking the mobile terminal 2 according to the first
`embodiment.
`First, at step S301, the mobile terminal 2 confinns
`whether to be unlocked when the user enters a password. If
`so, the process proceeds to step S303. At step S302. the
`mobile tern1inal 2 further confirms whether to be unlocked
`through the short-range wireless communications. If so, the
`process proceeds to step S305. If not, the process returns to
`step S301.
`At step S303, the mobile terminal 2 confirms whether to
`be instructed to be locked by the user. If so, the process
`45 proceeds to step S307. At step S304, the mobile terminal 2
`further confirms whether not to be operated for a given
`length of time. If not, the process proceeds to step S307. If
`so, the process returns to step S303.
`Al step S305, the mobile terminal 2 confirms whether to
`50 be out of the communication range of the short-range
`wireless communications with the mobile terminal 1. If so,
`the process proceeds to step S307. At step S306. the mobile
`terminal 2 further confirms whether to be instructed to be
`locked by the mobile tenninal 1 through the short-range
`55 wireless connnunications. If so, the process proceeds to step
`S307. If not, the process returns lo step S305.
`At step S307, the mobile terminal 2 is locked.
`In addition, the mobile terminal 1 may detect that the
`short-range wireless communications established with the
`60 mobile tern1inal 2 is broken, and transmit a signal fix
`instructing the mobile terminal 2 to be locked thereto
`inm1ediately before the communication is broken.
`In the first embodiment of the present invention, a plu(cid:173)
`rality of mobile terminals are previously registered mutually
`65 through the above configuration. When one mobile terminal
`is unlocked among them, another mobile terminal is
`unlocked in the conmmnication range of the short-range
`
`MAXELL_APPLE0000 181
`
`

`

`Case 5:19-cv-00036-RWS Document 442-2 Filed 07/24/20 Page 16 of 19 PageID #: 24414
`
`US 10,212,586 B2
`
`5
`wireless communications. When out of the communication
`range, the another mobile terminal can be locked again.
`In the present embodiment, an example where two mobile
`terminals are locked and unlocked is described; similarly,
`three or more mobile terminals can be further locked and
`unlocked.
`
`Second Embodiment
`
`FIG. 4 is a flowchart illustrating operations for locking
`and unlocking the mobile terminal 1 according to a second
`embodiment of the present invention. The mobile terminal
`has the same configuration as that of the first embodiment,
`and therefore descriptions will not be repeated here.
`First, at step S401, the mobile terminal 1 confirms 15
`whether to be unlocked when the user enters a password. If
`so. the process proceeds to step S403. At step S402, the
`mobile terminal 1 further confirms whether to be unlocked
`through the short-range wireless connnunications. If so, the
`process proceeds to step S409.
`Steps S403 to S408 are the same as steps S202 lo S207 of
`FIG. 2, and therefore descriptions will not be repeated here.
`At step S409, the mobile terminal 1 confirms whether to
`be out of the communication range of the short-range
`wireless communications with the mobile terminal 2. If so,
`the process proceeds to step S411. At step S410, the mobile
`terminal 1 further confirms whether to be instructed to be
`locked through the short-range wireless communications. If
`so, the process proceeds to step S411. If not, the process
`returns to step S409.
`At step S411, the mobile terminal 1 is locked.
`FIG. 5 is a flowchart illustrating operations for locking
`and unlocking the mobile terminal 2 according to the second
`embodiment.
`First, al step S501, the mobile tem1inal 2 confirms
`whether lo be unlocked when the user enters a password. If
`so, the process proceeds to step S503. Al step S502. the
`mobile terminal 2 further confirms whether to be unlocked
`through the short-range wireless communications. If so, the
`process proceeds to step S509.
`Steps S503 and S504 are the same as steps S403 and S404
`of FIG. 4, and therefore descriptions will not be repeated
`here.
`At step SS0S. the mobile terminal 2 unlocks the previ(cid:173)
`ously registered mobile terminal 1 through the short-range
`wireless communications.
`At step S506, the mobile terminal 2 confim1s whether to
`be instrncted to be locked by the user. If so, the process
`proceeds to step S508. At step S507, the mobile terminal 2
`further confinns whether not to be operated for a given
`length of time. If not. the process proceeds to step S508.
`At step S508, the mobile terminal 2 locks the previously
`registered mobile terminal 1 through the short-range wire(cid:173)
`less conmmnications.
`At step S509, the mobile terminal 2 confirms whether to
`be out of the connnunicalion range of the short-range
`wireless connnunications with the mobile terminal 1. If so,
`the process proceeds to step S511. At step S510, the mobile
`terminal 2 further confirms whether to be instructed to be
`locked through the short-range wireless communications. If 60
`so, the process proceeds to step S511. If not, the process
`returns to step S509.
`Al step S511, the mobile terminal 2 is locked.
`In the second embodiment of the present invention, a
`plurality of mobile terminals are previously registered mulu- 65
`ally through the above configuration. When one mobile
`terminal is unlocked among them, another mobile terminal
`
`6
`is unlocked in the communication range of the short-range
`wireless communications. When out of the connnunication
`range, the another mobile terminal can be locked again.
`First, any mobile terminal may be unlocked. Even if any
`5 mobile terminal is unlocked, another mobile terminal can be
`unlocked. and therefore the mobile terminal of the second
`embodiment is more convenient than that of the first
`embodiment.
`In the present embodiment, an example where two mobile
`10 terminals are locked and unlocked is described; similarly,
`three or more mobile terminals can be further locked and
`unlocked.
`
`Third Embodiment
`
`35
`
`FIG. 6 is a flowchart illustrating operations for locking
`and unlocking the mobile terminal 1 according to a third
`embodiment of the present invention. The mobile terminal
`20 has the same configuration as that of the first embodiment,
`and therefore descriptions will not be repeated here.
`Steps S601 to S604 are the same as steps S401 to S404 of
`FIG. 4, and therefore descriptions will not be repeated here.
`At step S605, the mobile terminal 1 displays a confirma-
`25 tion screen in which the mobile terminal 2 is unlocked. A
`display example will be described later.
`At step S606, the mobile terminal 1 confirms whether the
`user instrncts the mobile terminal 2 to be unlocked. If so, the
`process advances to step S607. If not, the process proceeds
`30 to step S608.
`Steps S608 to S613 are the same as steps S406 lo S411 of
`FIG. 4, and therefore descriptions will not be repeated here.
`FIG. 7 is a display example illustrating a liquid crystal
`panel of the mobile terminal 1 at the time of detecting the
`mobile terminal 2 through the short-range wireless commu-
`nications at step S605 of FIG. 6. A detection report of the
`mobile terminal 2, a selection button, and non-selection
`button of the unlocking are displayed on the liquid crystal
`40 panel. When detecting the mobile terminal 2 through the
`short-range wireless communications, the mobile tem1inal 1
`transits to an unlocking selection mode. On the liquid crystal
`panel 73. an unlocking selection button 74 and an unlocking
`non-selection button 76 are displayed. When the user pushes
`45 a push-button switch 75 corresponding to the unlocking
`selection button 74, the mobile terminal 2 is unlocked. When
`the user pushes a push-button switch 77 corresponding to the
`unlocking non-selection button 76, the mobile terminal 1
`releases the unlocking selection mode and returns to a
`50 normal mode.
`In the third embodiment of the present invention, a
`plurality of mobile terminals are previously registered mutu(cid:173)
`ally through the above configuration. When one mobile
`terminal is unlocked among them. another mobile terminal
`55 is unlocked in the conmmnication range of the short-range
`wireless communications. When out of the communication
`range, the another mobile terminal can be locked again.
`Further, upon detection of another mobile terminal, the
`user can select whether lo unlock it.
`
`Fourth Embodiment
`
`FIG. 8 is a flowchart illustrating operations for locking
`and unlocking the mobile terminal 1 according to a fourth
`embodiment of the present invention. The mobile terminal
`has the same configuration as that of the first embodiment,
`and therefore descriptions will not be repeated here.
`
`MAXELL_APPLE0000 182
`
`

`

`Case 5:19-cv-00036-RWS Document 442-2 Filed 07/24/20 Page 17 of 19 PageID #: 24415
`
`US 10,212,586 B2
`
`8
`previously registered mobile terminal, and switches the
`process. If so, the process proceeds to step S903. If not, the
`process returns to step S901.
`Al step S903, the mobile terminal 1 is unlocked. Here, the
`5 mobile terminals 1 and 2 are supposed to be previously
`registered mutually by the same user.
`At step S904, the mobile terminal 1 confirms whether to
`be out of the communication range of the short-range
`wireless communications with the mobile terminal 2. The
`mobile terminal 1 continues to wait until out of the com(cid:173)
`munication range. When the mobile terminal 1 is out of the
`communication range, the process proceeds to step S905.
`At step S905, the mobile terminal 1 is locked.
`Operations for locking and unlocking the mobile terminal
`2 are the same as those of the mobile terminal 1.
`In the fifth embodiment of the present invention, a plu(cid:173)
`rality of mobile terminals are previously registered mutually
`through the above configuration. When in the communica(cid:173)
`tion range of the short-range wireless communications. they
`20 are mutually unlocked. When out of the communication
`range, they are locked again. Therefore, the mobile terminal
`of the present embodiment is more convenient than those of
`the first and second embodiments.
`In the present embodiment, an example where two mobile
`terminals are locked and unlocked is described; similarly.
`three or more mobile terminals can be further locked and
`unlocked.
`
`Sixth Embodiment
`
`7
`First, at step S801, the mobile terminal 1 searches mobile
`terminals in the neighborhood through the short-range wire(cid:173)
`less communications.
`Al step S802, the mobile terminal 1 determines whether
`there is a mobile terminal in the neighborhood and it is the
`previously registered mobile terminal, and switches the
`process. If so, the process advances to step S803. If not, the
`process proceeds to step S805.
`At step S803, the mobile terminal 1 requests the user to
`enter a simple password, and continues to wail until it is 10
`correctly entered al step S804. When the simple password is
`entered, the process proceeds to step S807.
`At step S805. the mobile terminal 1 requests the user to
`enter a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket