CA2214197C - Telephone set, communication system, and method of setting security functions in telephone set - Google Patents

Telephone set, communication system, and method of setting security functions in telephone set Download PDF

Info

Publication number
CA2214197C
CA2214197C CA002214197A CA2214197A CA2214197C CA 2214197 C CA2214197 C CA 2214197C CA 002214197 A CA002214197 A CA 002214197A CA 2214197 A CA2214197 A CA 2214197A CA 2214197 C CA2214197 C CA 2214197C
Authority
CA
Canada
Prior art keywords
call
setting
identification number
telephone set
telephone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CA002214197A
Other languages
French (fr)
Other versions
CA2214197A1 (en
Inventor
Bunji Ushida
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mitsubishi Electric Corp
Original Assignee
Mitsubishi Electric Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitsubishi Electric Corp filed Critical Mitsubishi Electric Corp
Publication of CA2214197A1 publication Critical patent/CA2214197A1/en
Application granted granted Critical
Publication of CA2214197C publication Critical patent/CA2214197C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/677Preventing the dialling or sending of predetermined telephone numbers or selected types of telephone numbers, e.g. long distance numbers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • H04M1/673Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Abstract

When setting a call, a telephone number, a discrimination code for discriminating a telephone number from an identification number, and an identification number to unlock specified call restriction are continuously inputted by way of key operations in a key entry section for forming call-setting information the identification number is determined from the call-setting information in the control section; and the determined identification number is collated with an identification number previously registered, and if the two identification numbers are identical to each other, the specified call restriction is unlocked with call setting executed.

Description

TELEPHONE SET, COMMUNICATION SYSTEM, AND METHOD OF SETTING SECURITY FUNCTIONS IN TELEPHONE SET
FIELD OF THE INVENTION
The present invention relates to a telephone set such as a portable telephone set or the like having security functions for-preventing a third party from unauthorized use thereof, a communication system with the security functions provided in a side of a network, and to a method of setting the security functions therein.
BAOKGROUND OF THE INVENTION
Provided in this type of telephone set is, generally, a security function (described as a locking function hereinafter) with which the telephone set is disabled to be used unless a correct identification number is inputted thereinto to prevent any person other than an authorized owner of the telephone set from using it without authorization.
Namely, the locking function is unlocked in response to input of the correct identification number thereinto.
As a conventional technology relating to this type of locking function, there is Japanese Patent Laid-Open Publication No. SHO 61- 236226. In this Publication, there is disclosed a technology that calls are transmitted from a mobile telephone set or received thereby by inputting an identification number thereto at the time of using the mobile telephone set and obtaining identification by collating it to the identificatio:z number previously stored therein.
There has been proposed a telephone set in which a security function is provided so that a particular number such as a telephone number for a long-distance call or the like (described as a cell-restricting function hereinafter) is restricted. In this case, the call-restricting function is also unlocked in response to input of a correct identification number thereinto.
In the conventional type of telephone set as disclosed in the publication, unlocking of a locking function and a call-restricting :function is first set according to input of an identificatuon number and call setting is carried out, which makes the operations complicated.
After tree cal:L is unlocked, and when prevention of unauthorized use of a telephone set or a restriction of particular number: are also required for the next use thereof, the locking function and the call-restricting function are necessary to be set aga_Ln, which makes the setting of a security function there_Ln troublesome.
SUMMARY OF THE INVENTION
According to t:he present invention, there is provided a telephone set comprising: a storage means for previously storing therein an identification number to unlock a specified call restriction; an inputting means for inputting call-setting information including a telephone number and an identification number when a call, is set; a discriminating means for discriminating the: telephone number from the identification number according to the call-setting information inputted by said inputting means; a verifying means for verifying the identification number discriminated by said discriminating means against the identification number previously stored by said storage means; and a call-setting control means for unlocking said specified call restriction only when it is determined that both the identification numbers are identified to each other by .said verifying means and executing the call setting according to the telephone number discriminated by said discriminating means.
Also according to the present invention, there is provided a communication system for executing communications according to a ca:l1 setting between a telephone set as a terminal and a bare station; wherein the telephone set comprises: an inputting means for inputting call-setting information including a telephone number and an identification number when a cal_L is set; and a transmitting means for transmitting the telephone number and the identification number to said base statuon according to the call-setting information inputted by said __nputt:ing means, and said base station comprises: a storage means for previously storing identification numbers each to unlock a specified call restriction; a receiving means for receiving the call-setting information transmitted form said transmitting means; a discriminating means for discriminating the identification number from the telephone number according to the call-setting information received by said receiving means; a verifying means for verifying the ident_Lfication number discriminated by said discriminating means against the identification number previously stored by said storage means; and a call-setting control means for unlocking said specified call restriction only when both the identification numbers are identified to each other by said verif=ying means and executing the call setting according to the telephone number discriminated by said discriminating means.
- 2a -According to the present invention, there is further provided a method of setting security functions in a telephone set comprising: a first step of inputting call-setting information inclu~~ing a telephone number and an identification number when a cal.1 is set; a second step of discriminating the telephone number :from the identification number according to the call-setting :information inputted in said first step; a third step of versifying the identification number discriminated in said second stE~p against the identification number previously prepared for unlocking the specified call restriction; and <~ fourth step of unlocking said specified call restriction only when both the identification numbers are identified to each other in said third step and executing the call setting according to the telephone number discriminated in said second step.
Embodiments o:f the present invention provide a telephone set and a communication system each in which setting - 2b -operations for a call following security functions can be simplified, and also a method of setting security functions in a telephone set.
Embodiments of the present invention further provide a telephone set a:zd a communication system in which setting operations for se~Jurity functions can be simplified and also a method of setting security functions in a telephone set.
With a -~elephone set according to an embodiment of the present invention, when setting a call, a user inputs call-setting information including a telephone number and an identification number; the identification number is determined from the call-seta:ing information and is collated to the previously registered identification number; and specified call restriction is un_Locked only when the inputted identification number and the previously registered one are identical, so that an input operation when setting a call is to be executed only once, which makes it poasible to simplify the operation for call setting.
With a t:elephone set according to an embodiment of the present invention, a telephone number and an identification number inputted a7_1 at once are discriminated from each other by checking a disc:rimin<~tion code, so that, when inputting call-setting informatlOTl, it is possible to continuously input a telephone number and an identification number by inputting a discrimination code.
With a telephone set according to an embodiment of the present invention, when an identification number is not determined, the user is asked to input the identification number again, so 'that, even if input miss for an identification number occurs or an identification number is not inputted, the user can complete input of correct information before call setting is executed, and with this feature, the necessity for retry of call setting can be eliminated.
With a -Telephone set according to an embodiment of the present inveni~ion, even if call restriction is once unlocked for execution of call setting, the call restrictions are automatically set again, so that it is possible to prevent a user from forgei~ting .execution of an operation for call restriction and also trouble for setting the call restriction again is saved, and with this feature it is possible to simplify an operat=ion for setting the security function while maintaining the security function.
With a communication system according to an embodiment of the present invention, when setting a call, a user inputs call-:~ettinc~ information including a telephone number and an identification number in the side of a telephone set; the call-setting information is transmitted to a base station; the base station receives the call-setting information, determines an identification number from the call-setting information to collate it to the previously registered identification number, <ind unlocks call restriction and executes call setting when the inputted identification number and the previously registered identification number are identical, so that an operation for inputting when setting a call is to be executed only once in the side of a telephone set, and with this feature the call setting operation following security functions on the system can be simplified.
With a communication system according to an embodiment of the present invention, a telephone number and an identification number inputted all at once in the side of a telephone set are discriminated by checking a discrimination code in the side of a base station, so that, when inputting call-setting information in the side of a telephone set, it becomes possible i~o continuously input a telephone number and an identification number on the condition that also a discrimination code is .inputted, so that collation of an identification nurnber and call setting can be executed in batch in the side of the base station.
With a c:ommun:ication system according to an embodiment of the present invention, when an identification number inputted in the aide of a telephone set can not be identified, a base station requests a user to input the identification number again, so that, even if a user makes a mistake in or forgets inputting an identification number, the user can complete a correct operation for inputting call-setting information, and with this feature, the necessity for executing an operation for call setting again on the system is eliminated.
With a communication system according to an embodiment of the present invention, even if call restriction is unlocked for e:Kecution of call setting, the call restriction is automatically ,set, so that a work load for a user to set call setting in a telephone set is eliminated and also trouble for setting the call restriction again in the side of a telephone set is saved, and with this feature the operation for setting security :Functions on the system can be simplified while maintaining the security functions.
With a method of setting security functions for a telephone set according to an embodiment of the present invention, call-setting information including a telephone number and an identification number is inputted when setting a call; the identif_Lcation number is determined from the call-setting information and collected to a previously registered identification nurnber; <~nd call restriction is unlocked and call setting is executed only when the inputted identification number and the previous:Ly registered one are identical, so that an operation for ~_nputt:ing when setting a call is to be executed only once, and with this feature the call setting operation following the security functions can be simplified.
With a method of setting security functions for a telephone set according to an embodiment of the present invention, a telephone number and an identification number inputted all at once are discriminated from each other by checking a discrimination code, so that a telephone number and an identification number can continuously be inputted on th~~ condition that also a discrimination code is inputted simultaneously.
With a method of setting security functions for a telephone set acc«rding to an embodiment of the present invention, when an identification number can not be determined, a user is prompted to input the identification number again, so that, even if a mistake occurs in inputting an identification number or an ideni~ification number is not inputted, the user can complete a correct operation for inputting call-setting information beforE~ call setting is executed, and with this feature the necessity to execute call setting again is eliminated.
With a method of setting security functions for a telephone set according to an embodiment of the present invention, even if: call restriction is unlocked once for execution of call settlIlg, the call restriction is automatically set again, so that a user is prevented from forgetting execution of an operation for setting the call restriction and also a work load for setting the call restriction again is saved, and with this feature an operation for setting the sE:curity functions can be simplified while maintaining the security functions.
Example" of embodiments of the present invention will now be described with reference to the accompanying drawings.
-BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1 is a block diagram showing internal configuration of a telephone set according to Embodiment 1 of the present invention;
Fig. 2 is a view showing an example of a format of data for call setting according to Embodiment 1;
Fig. 3 is a flow chart for explanation of call-setting operations according to Embodiment 1;
Fig. 4 is a view showing one example of a communication system according to Embodiment 2 of the present invention;
Fig. 5 is a block diagram showing internal configuration of a base station according to Embodiment 2;
Fig. 6 is a flow chart for explanation of call-setting operations according to Embodiment 2;
Fig. 7 is a flow chart for explanation of call-setting operations according to Embodiment 3 of the present invention;
Fig. 8 is a flow chart for explanation of call-setting operations according to Embodiment 4 of the present invention;
Fig. 9 is a flow chart for explanation of call-setting operations according to Embodiment 5 of the present invention;
Fig. 10 is a flow chart for explanation of call-setting operations according to Embodiment 6 of the present invention;
Fig. 11 is a flow chart for explanation of call-setting operations according to Embodiment 7 of the present invention;
and - g -Fig. 12 is a flow chart for explanation of call-setting operations according to Embodiment 8 of the present invention.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
Detailed description is made hereinafter for preferred embodiments of the telephone set, communication system, and method of setting security functions in a telephone set according to the present invention with reference to the related drawings.
The description made hereinafter assumes a case of a portable telephone set such as a PHS (Personal Handy Phone System) in which call setting is executed through a radio communication with a base station. Fig. 1 is a block diagram showing internal configuration of a telephone set according to Embodiment 1 of the present invention. The telephone set shown in Fig. 1 comprises units such as a control section 1, an ID
(identification number) storage section 2, a voice processing section 3, a radio section 4, an antenna 5, a key-entry section 6, a display section 7, a microphone 8, and a speaker 9 each connected to an internal bus 10 for transferring addresses, data, and control signals or the like therethrough.
The control section 1 comprises, although it is not shown herein, a CPU operating according to a control program, a ROM
for storing therein the control program, and a RAM used as a work area for the CPU, and controls each of the units connected to the internal bus 10 in accordance with the control program stored in the ROM_ It should be noted that a control program according to the flow chart shown in Fig. 3 is included in a call-setting program stored in the ROM. The contents of the control by this control section 1 cover an operation of verifying an identification number based on an identification number to be stored in the ID storage section 2, an operation of voice processing in the voice processing section 3, an operation of data transaction in the radio section 4, an operation of key entry through the key entry section 6, an operation of display in the display section 7, an operation of voice input through the microphone 8, and an operation of voice output through the speaker 9 or the like.
The ID storage section 2 is a memory, to prevent a third party from executing unauthorized use of a telephone set, for previously storing therein identification numbers each collated to an inputted identification number. The voice processing section 3 is an audio CODEC for modulating an speech signal inputted therein through the microphone 8 to output the signal to the radio section 4 and demodulating an speech signal (modulated signal) inputted from the radio section 4, when it is a voice communication, to output a voice to the speaker 9.
The radio section 4 is a radio unit connected to the antenna 5 for radio signal transaction through the antenna 5. The antenna 5 captures radio waves (radio signals) sent from a base station not shown herein, and sends out electric waves (radio signals) to the base station.
The key entry section 6 has keys such as numeric keys, a "~k" key 6a, a "SEND" key 6b, and function keys or the like, and supplies a key-entry signal detected according to an input operation through each key to the control section 1. It should be noted that the "~k" key 6a is used for inputting discrimination code for an identification number and the "SEND"
key 6b is used for instructing call setting at the time of setting a call.
The display section 7 is a display unit such as an LCD or an EL or the like, and displays input information through the key entry section 6, data received from the base station which is not shown herein, and a state how the telephone set is working. The microphone 8 is an input unit for supplying input voice to the voice processing section 3 as an speech signal, and the speaker 9 is an output unit for voice-outputting an speech signal received from the voice processing section 3.
Next description is made for call-setting information. Fig.
2 is a view showing an example of a format for call-setting information according to Embodiment 1, and the reference code DT indicates call-setting information, TEL indicates a telephone number, DC indicates discrimination code for discriminating a telephone number from an identification number, and ID indicates an identification number respectively.

The call-setting information DT is input information for setting a call with a party ofcall connection (a called party or a party of data communications) and has a format comprising a telephone number TEL, discrimination code DC, and an identification number ID. It should be noted that the discrimination code DC indicates data inputted through operation of the "~k" key 6a in the key entry section 6.
Next description is made for operations. Fi-g. 3 is a flow chart for explanation of call-setting operations according to Embodiment 1. In the operations, it is assumed that the power sour-ce has already been turned ON so that a call or a data communication is ready to be executed.
When a call is to be set, at first, call-setting information is inputted through key operations in the key entry section 6 in the order of a telephone number TEL, discrimination code DC, and an identification number ID (step S1). The control section 1 confirms an end of inputting the call-setting information according to the operation of the "SEND" key 6b in the key entry section 6.
When a telephone number TEL of "123-456-7890" and an identification number ID of "1111" are to be inputted, at first, input of numbers in the order of 1, 2, 3 ~~~ 9, 0 with the ten key, input of discrimination code with the "~k" key 6a, and further input of numbers in the order of 1, 1, 1, 1 with the numeric keys may successively be executed. Then, when the "SEND" key 6b is operated, data "1234567890 * 1111" which has been inputted before the "SEND" key is operated is stored in the RAM of the control section 1 as call-setting information DT. Description is made hereinafter for the operations according to this example.
Before call setting is executed, the discrimination code DC (~k) is detected from the call-setting information DT
inputted in step S1. Namely, input of the identification number ID is checked. When the discrimination code DC (*) is detected in this detecting operation, it is determined according to the detected discrimination code DC (~k) that, in the inputted call-setting information DT, the data inputted before the discrimination code DC (*) is a telephone number TEL
and the data inputted after the discrimination code DC (*) is an identification number ID. With this determination, the call-setting information DT is separated into the telephone number TEL (1234567890) and the identification number ID
(1111) , and each of the numbers is stored in the RAM of the control section 1 as one unit of discrete data respectively.
When the discrimination code DC is not detected from the inputted call-setting information DT, it is determined that an identification number ID does not exist in the call-setting information DT, which makes it impossible to discriminate the telephone number from the identification number (step S2).
Accordingly, when an identification number ID is present therein (step S3), the identification number ID previously stored in the ID storage section 2 and the identification number ID discriminated in step S2 are collated with each other (step S4). As a result, if the identification number in the ID
storage section 2 is "1111", both of the numbers are identical to each other (step S5), and in this case, the functional restriction for call setting previously set in the telephone set is unlocked (step S6). It should be noted that the functional restriction for this call setting includes a locking function for call setting to prevent a third party from executing unauthorized use of a telephone set and a restricting function of particular numbers (a telephone number with which a long-distance call will be made or the like). With either of the functions, effects as security functions can be achieved.
As described above, when the functional restriction for call setting is unlocked, the telephone number TEL discriminated in step S2 is read out from the RAM, and the call setting is executed according to the telephone number TEL (step S7).
When discrimination can not be executed in step S2 and existence of an identification number in data is not recognized in step S3, or when the identification number in the ID storage section 2 is "2222" which indicates that both identification numbers are not identical to each other, it is determined that the current request for call setting does not satisfy the necessary conditions. As a result, the call setting requested by the user is refused (e.g. the locking function) or restricted (e. g. the function of restricting a particular number) according to the functional restriction for call setting preset in the telephone set (step S8).
It should be noted that, for the functional restriction for call setting, a flag, for instance, may be provided in the control section 1 so that the CPU can determine the data by correlating an ON/OFF state of the flag with a setting/
unlocking state of the restriction thereof respectively.
Accordingly, when a functional restriction in call setting is set, the flag is set to be ON and when the restriction is unlocked, the flag is reset to be OFF.
As described above, with Embodiment 1, call-setting information DT including a telephone number TEL and an identification number ID is inputted into a telephone set at the time of setting a call, the identification number ID is determined from the call-setting information DT and collated with the previously stored identification number, and only when it is determined that both the identification numbers are identical to each other, the specified call restriction is unlocked and call setting is executed, so that input at the time of setting a call can be executed with one operation, which makes it possible to simplify the operations for call setting following the security functions.
Also, a telephone number TEL and an identification number ID inputted with one operation can be discriminated from each other with discrimination code DC, so that a telephone number TEL as well as an identification number ID can continuously be inputted if the discrimination code DC is inputted therebetween at the time of inputting call-setting information DT into a telephone set.
In the embodiment 1, an identification number is verified at the side of a telephone set, but like in Embodiment 2 as described below, an identification number may be verified at the side of a network. It should be noted that, in Embodiment 2, a telephone set is also configured by the blocks (Refer to Fig. 1), like in Embodiment l, including the key-entry section 6 through which call-setting information DT (Refer to Fig. 2) can be obtained by successively inputting a telephone number TEL, discrimination code DC, and an identification number ID
to the telephone set.
At first, description is made for a communication system according to Embodiment 2. Fig. 4 is a view showing one example of communication system according to Embodiment 2 of the present invention. The communication system shown in Fig.
4 comprises a base station 100 positioned at the side of a network NET as well as a telephone set (only one unit of telephone set 200 is shown herein as an example) connected to each other through radio communications. Provided in the base station 100 is an identification-number DB (database) 101, and in this communication system, a verifying function of identification numbers is added to the base station 100.
Next detailed description is made for the base station 100.
Fig. 5 is a block diagram showing internal configuration of the base station 100 according to Embodiment 2. The base station 100 shown in Fig. 5 comprises units such as the identification-number DB 101, a control unit 102, a radio unit 103, an antenna 104 each connected to a bus 105.
The identification-number DB 101 previously stores therein telephone numbers correlated with identification numbers respectively each subscribing to the communication system. As an example, a telephone number of "012-345-6789" is stored therein correlated with an identification number of "2222", so that it is a must that the identification number of "2222" is included in the call-setting information by the originating user to execute the call setting. Similarly, a telephone number of "345-678-9012" is stored therein correlated with an identification number of "3333", so that it is also a must that the identification number of "3333" is included in the call-setting information by the originating user to execute the call setting.
The control unit 102 incorporates therein a microcomputer and controls radio communications with each telephone set within an area of which the base station 100 is in charge. This control unit 102 stores therein, for instance, a program for call setting following the flow chart shown in Fig. 6, and the call setting is performed according to this call-setting program.
The radio unit 103 is a unit connected to the antenna 104 for radio-signal transaction through the antenna 104. The antenna 104 captures radio waves (radio signals) sent from each telephone set (e.g. from the telephone set 200) and sends out radio waves (radio signals) to each of the telephone sets (e. g.
to the telephone set 200).
Next description is made for operations. Fig. 6 is a flow chart for explanation of the operations of call setting according to Embodiment 2. When a call is to be set, like in Embodiment l, in the telephone set 200, at first, call-setting information is inputted through key operations in the key entry section 6 in _the order of a telephone number TEL, discrimination code DC, and an identification number ID. The control section 1 confirms an end of inputting the call-setting information DT according to the operation of the "SEND" key 6b in the key entry section 6. .
Then, the call-setting information DT inputted in the side of the telephone set 200 is transmitted from the telephone set 200 to the base station 100. The telephone set 200 ends all the processing for call setting allocated to the terminal side by operating this transmission. Namely, in Embodiment 2, the identifying operation of identification numbers before call setting is executed is allocated to the base station 100.

In the base station 100, a request for call setting is received according to reception of the call-setting information DT from the telephone set 100 (step S21). Then, before the call setting is executed, discrimination code DC is detected from the call-setting information DT received in step 521. When the discrimination code DC is detected in this detecting operation, it is determined according to the detected discrimination code DC that, in the inputted call-setting information DT, the data arranged before the discrimination code DC is a telephone number TEL and the data arranged after the discrimination code DC is an identification number ID. With this determination, the inputted call-setting information DT is separated into the telephone number TEL and the identification number ID, and each of the numbers is stored in the RAM of the control unit 102 as one unit of discrete data respectively.
When the discrimination code DC is not detected from the received call-setting information DT, it is determined that an identification number ID does not exist in the call-setting information DT, which makes it impossible to discriminate the telephone number from the identification number (step S22).
Accordingly, when an identification number ID is present therein (step S23), the identification number previously stored in the identification-number DB 101 and the identification number ID discriminated in step S22 are verified against each other (step S24). Herein, the identification number used for verification in the identification-number DB 101 is the identification number correlated with the telephone number TEL
discriminated in step S22 stored therein because telephone numbers TEL are correlated with identification numbers ID one by one.
As a result of the verification therebetween, when it is determined that the identification numbers are identified to each other (step S25), the functional restriction for call setting (the locking function and function of restricting particu7~ar numbers each described in Embodiment 1) preset in the side of the base station 100 is unlocked (step S26).
As described above, when the functional restriction for call setting is unlocked, the telephone number TEL discriminated in step S22 is read out from the RAM, and the call setting is executed according to the telephone number TEL (step S27).
When discrimination can not be executed in step S22 and existence of an identification number in data is not recognized in step 523, or when the identification numbers are not identified to each other, it is determined that the current request for call setting from the telephone set 200 does not satisfy the necessary conditions. As a result, the call setting requested by the originating user (the telephone set 200) is refused (e. g. the locking function) or restricted (e. g.
the function of restricting a particular number) according to the functional restriction for call setting preset in the base station 100 (step S28).
As described above, with Embodiment 2, the side of the telephone set 200 inputs call-setting information including a telephone number and an identification number at the time of setting a call to transmit the data to the base station, and the base station 100 receives the call-setting information, discriminates an identification number from the call-setting information to be verified against the previously stored identification number, and only when it is determined that both the identification numbers are identified to each other, the specified call restriction is unlocked to execute the call setting, so that an inputting operation at the time of setting a call in the side of the telephone set 200 can be executed with one operation, which makes it possible to simplify operations for call setting following the security functions on the system.
In Embodiment l, the call setting is restricted or refused when an identification number is not present in call-setting information, however, like in Embodiment 3 described below, re-entry of an identification number may be requested to the user just in case it is failed to be inputted or some other reason.
A telephone set according to Embodiment 3 is configured by the blocks shown in Fig. 1 like that in Embodiment 1, so that the same reference numerals are assigned to the units corresponding to those in Fig. l, and description on the configuration and the functions is omitted herein.
Next description is made for operations. In this description on the operations, the same step numbers are assigned to each of the processing corresponding to those in Embodiment 1, so that description thereof is omitted herein, and description is made herein only for different processing therefrom.
Fig. 7 is a flow chart for explanation of operations for call setting according to Embodiment 3 of the present invention. In Embodiment 3, like in Embodiment 1, the operations from step Sl to step S8 are executed, however, when existence of an identification number can not be recognized in data, re-entry of an identification number is requested to the user.
Namely, when existence of an identification number ID
therein could not be recognized in data in step S3, the processing shifts to step S9 and requests input of the identification number to the user before the operation is shifted to execution of the call setting. There are used methods, for this request, of displaying the request indicating re-entry of the identification number by the useron the display section 7 as a message thereto, of outputting it through the speaker 9 as an aural guidance, or of outputting it through the speaker 9 as a notice sound.
After this operation, when the key operation by the user is detected, the received characters are accepted as an identification number (step S10). However, when the telephone set is made to execute other function with the function keys, other processing corresponding to the function keys is executed by departing from the flow chart shown in Fig. 7.
When reception of the identification number could be recognized in step 511, the processing shifts to step S4, and the identification numbers are verified against each other as described above. After this operation and on, the same processing as that in Embodiment 1 is executed. It should be noted that the code "~k" has to be provided in front of a numeric array of the identification number to recognize an identification number. Namely, to input an identification number, the user has to input the discrimination code "~k"
beforehand, so that the characters following the discrimination code-"~k" can be recognized as an identification number.
when reception of the identification number could not be recognized in step 511, the processing shifts to step S8, and the call setting is restricted or refused as described above.
As described above, with Embodiment 3, an identification number is inputted again in a case where an identification number can not be discriminated from the data, so that correct input can be completed before the call setting is executed even if an identification number is incorrectly inputted or an identification number is failed to be inputted, which makes it possible to prevent call setting from being re-set before its start.
In Embodiment 2, the call setting is restricted or refused in the base station when an identification number is not present in call-setting information, however, like in Embodiment 4 described below, the base station may request re-entry of an identification number to the telephone set just in case it is failed to be inputted or some other reason.
A base station and a telephone set according to Embodiment 4 are configured by the blocks shown in Fig. 4 and Fig. 5 like those in Embodiment 2, so that the same reference numerals are assigned to the units corresponding to those in Fig. 4 and Fig.
5, and description on the configuration and the functions is omitted herein.
Next description is made for operations. In this description on the operations, the same step numbers are assigned to each of the processing corresponding to those in Embodiment 2, so that description thereof is omitted herein, and description is made herein only for different processing therefrom.
Fig. 8 is a flow chart for explanation of operations for call setting according to Embodiment 4 of the present invention. In Embodiment 4, like in Embodiment 2, the operations from step S21 to step S28 are executed, however, when existence of an identification number can not be recognized in data in the base station, re-entry of an identification number is requested to the telephone set of the originating user.
Namely, when existence of an identification number ID
therein could not be recognized in data in step 523, the processing shifts to step S29 and requests input of the identification number to the telephone set of the originating user before the operation is shifted to execution of the call setting. The telephone set having received the request therefrom uses methods, to notice it to the user, of displaying the request indicating re-entry of the identification number by the user on the display section 7 as a message thereto, of outputting it through the speaker 9 as an aural guidance, or of outputting it through the speaker 9 as a notice sound.
After this operation, when an identification number is transmitted from the telephone set of the originating user, the received characters are accepted as an identification number (step S30). However, when the line is requested to be disengaged or the like from the telephone set, other processing in response to the request is executed by departing from the flow chart shown in Fig. 8.
When reception of the identification number could be recognized in step 531, the processing shifts to step 524, and the identification numbers are verified against each other as described above. After this operation and on, the same processing as that in Embodiment 1 is executed. It should be noted that the code "*" has to be provided in front of a numeric array of the identification number to recognize the identification number, and for this reason, to input an identification number by the originating user, the user has to input the discrimination code "*" beforehand, so that the characters following the discrimination code "*" constitute an identification number.
When reception of the identification number could not be recognized in step 531, the processing shifts to step 528, and the call setting is restricted or refused as described above.
As described above, with Embodiment 4, the telephone number as well as the identification number inputted with one operation in the side of the telephone set are discriminated from each other with the discrimination code in the side of the base station, so that, when call-setting information is to be inputted in the side of the telephone set, an telephone number as well as an identification number can continuously be inputted if the discrimination code is inputted therebetween, so that the side of the base station can process verification of the identification number as well as call setting as a single unit.
In Embodiment l, there is not described in detail on re-setting of restriction of the functions needed after the functional restriction has been unlocked for execution of call setting, however, like in Embodiment 5 described below, restriction of the functions may be programmed to automatically be re-set after execution of the call setting.
A telephone set according to Embodiment 5 is configured by the blocks shown in Fig. 1 like that in Embodiment 1, so that the same reference numerals are assigned to the units corresponding to those in Fig. 1, and description on the configuration and the functions is omitted herein.
Next description is made for operations. In this description on the operations, the same step numbers are assigned to each of the processing corresponding to those in Embodiment 1, so that description thereof is omitted herein, and description is made herein only for different processing therefrom.
Fig. 9 is a flow chart for explanation of operations for call setting according to Embodiment 5 of the present invention. In Embodiment 5, like in Embodiment 1, the operations from step Sl to step S8 are executed, however, the telephone set has processing for re-setting the functional restriction therefor after the call setting is executed.
After the functional restriction is unlocked in step 6, and when the call setting starts to be executed in step 7, the unlocked state thereof is maintained during the execution.
Then, when a call or a data communication is ended according to the call setting (step S12), the processing shifts to step S13 to re-set the functional restriction. With this re-setting, the functional restriction having been set before being unlocked in step S6 is recovered.

As described above, with Embodiment 5, even if call restriction is unlocked once for execution of call setting, the call restriction is programmed to automatically be re-set after its being unlocked, so that it will not be failed to set the call restriction and inconvenience due to re-setting of the call restriction can be eliminated, which makes it possible to simplify the setting operations for security functions under such a condition that the security functions have been assured during the operations.
In Embodiment 2, there is not described in detail on re-setting of restriction of the functions needed after the functional restriction has been unlocked for execution of call setting, however, like in Embodiment 6 described below, restriction of the functions may be programmed to automatically be re-set after execution of the call setting.
A base station 100 and a telephone set 200 according to Embodiment 6 are configured by the blocks shown in Fig. 4 and Fig. 5 like those in Embodiment 2, so that the same reference numerals are assigned to the units corresponding to those in Fig. 4 and Fig. 5, and description on the configuration and the functions is omitted herein.
Next description is made for operations. In this description on the operations, the same step numbers are assigned to each of the processing corresponding to those in Embodiment 2, so that description thereof is omitted herein, and description is made herein only for different processing therefrom.
Fig. 10 is a flow chart for explanation of operations for call setting according to Embodiment 6 of the present invention. In Embodiment 6, like in Embodiment 2, the operations from step S21 to step S28 are executed, however, the telephone set has processing for re-setting the functional restriction therefor after the call setting is executed.
After the functional restriction is unlocked in step 526, and when the call setting starts to be executed in step 527, the unlocked state thereof is maintained during the execution.
Then, when a call or a data communication is ended according to the call setting (step S32), the processing shifts to step S33 to re-set the functional restriction_ With this re-setting, the functional restriction having been set before being unlocked in step S26 is recovered.
As described above, with Embodiment 6, even if call restriction is unlocked once for execution of call setting, the call restriction is programmed to automatically be re-set after its being unlocked, so that setting the call restriction is not a load on the side of the telephone set and inconvenience due to re-setting of the call restriction can also be eliminated therein, which makes it possible to simplify the setting operations for security functions under such a condition that the security functions have been assured during the operations on the system.

Herein, combination of the invention according to Embodiment 3 and that according to Embodiment 5 is made as an invention according to Embodiment 7, and re-entry of an identification number may be requested to the user just in case it is failed to be inputted or some other reason anc~ t-rA f,~nr.t; ~n~, restriction may automatically be re-set after execution of the call setting.
A telephone set according to Embodiment 7 is configured by the blocks shown in Fig. 1 like that in Embodiment l, so that the same reference numerals are assigned to the units corresponding to those in Fig. 1, and description on the configuration and the functions is omitted herein.
Next description is made for operations. In this description on the operations, the same step numbers are assigned to each of the processing corresponding to those in Embodiments 1, 3, 5, so that description thereof is omitted herein, and description is made herein only for different processing therefrom.
Fig. 11 is a flow chart for explanation of operations for call setting according to Embodiment 7 of the present invention. In Embodiment 7, like in Embodiments l, 3, 5, the operations from step S1 to step S13 are included.
Namely, when existence of an identification number ID could not be recognized in data in step S3, the processing shifts to step S9 and requests input of the identification number to the user before the operation is shifted to execution of the call setting. There are used methods, for this request, of displaying the request indicating re-entry of the identification number by the user on the display section 7 as a message thereto, of outputting it through the speaker 9 as an aural guidance, or of outputting it through the speaker 9 as a notice sound.
After this operation, when the key operation by the user is received, the received characters are accepted as an identification number (step S10). When reception of the identification number could be recognized in step 511, the processing shifts to step S4, and the identification numbers are verified against each other as described above.
After the call setting is executed in step 7, and when a call or a data communication is ended (step S12), the processing shifts to step S13 to re-set the functional restriction. With this re-setting, the functional restriction having been set before being unlocked in step S6 is recovered.
It should be noted that, when reception of the identification number could not be recognized in step 511, the processing shifts to step S8, and the call setting is restricted or refused as described above.
As described above, with Embodiment 7, an identification number is inputted again when an identification number can not be discriminated from the data, so that correct input can be completed before the call setting is executed even if an identification number is incorrectly inputted or an identification number is failed to be inputted, which makes it possible to prevent call setting from being re-set before its start.
Also, even if call restriction is unlocked once for execution of call setting, the call restriction is programmed to automatically be re-set after its being unlocked, so that the call restriction is not failed to be set in the telephone set and inconvenience due to re-setting of the call restriction can also be eliminated therein, which makes it possible to simplify the setting operations for security functions under such a condition that the security functions have been assured during the operations.
Herein, combination of the invention according to Embodiment 4 and that according to Embodiment 6 is made as an invention according to Embodiment 8, and re-input of an identification number may be requested to the telephone set just in case it is failed to be inputted or some other reason and the functional restriction may automatically be re-set after execution of the call setting.
A base station and a telephone set according to Embodiment 8 are configured by the blocks shown in Fig. 4 and Fig. 5 like those in Embodiment 2, so that the same reference numerals are assigned to the units corresponding to those in Fig. 4 and Fig.
5, and description on the configuration and the functions is omitted herein.
Next description is made for operations. In this description on the operations, the same step numbers are assigned to each of the processing corresponding to those in Embodiment 2, 4, 6, so that description thereof is omitted herein, and description is made herein only for different processing therefrom.
Fig. 12 is a flow chart for explanation of operations for call setting according to Embodiment 8 of the present invention. In Embodiment 8, like in Embodiment 2, 4, 6, the operations from step S21 to step S33 are included.
Namely, when existence of an identification number ID
therein could not be recognized in data in step 523, the processing shifts to step S29 and requests transmission thereto of the identification number to the telephone set of the originating user before the operation is shifted to execution of the call setting. After this operation, when an identification number is received from the telephone set thereof, the received characters are accepted as an identification number (step S30). When reception of the identification number could be recognized in step 531, the processing shifts to step 524, and the identification numbers are verified against each other as described above.
After the call setting is executed in step 527, and when a call or a data communication is ended (step S32), the processing shifts to step S33 to re-set the functional restriction. With this re-setting, the functional restriction having been set before its being unlocked in step S26 is recovered.
It should be noted that, when reception of the identification number could not be recognized in step 531, the processing shifts to step S28, and the call setting is restricted or refused as described above.
As described above, with Embodiment 8, the base station requests to the telephone set to input an identification number again when an identification number can not be discriminated from the data, so that correct input can be completed before the call setting is executed even if an identification number is incorrectly inputted or an identification number is failed to be inputted, which makes it possible to prevent call setting from being re-set before its start on the system.
Also, even if call restriction is unlocked once for execution of call setting, the call restriction is programmed to automatically be re-set after its being unlocked, so that setting of the call restriction is not a load on the side of the telephone set 200 and inconvenience due to re-setting of the call restriction can also be eliminated therein, which makes it possible to simplify the setting operations for security functions under such a condition that the security functions have been assured during the operations on the system.
In the embodiments 1 to 8, the "~k" key 6a is used as discrimination code, however, any key such as a key "~$" or the like- may be used therefor so long as it is a key which can discriminate between a telephone number TEZ and an identification number ID, namely a key other than ten key.
Also, in the embodiments 1 to 8, the discrimination code is set to one character of "*°' obtained by one operation, however, it may comprises a plurality of characters, and in this case, there occur a plurality of combinations thereof as discrimination code. For this reason, call setting can be executed only when correct discrimination code and a correct identification number are inputted to a telephone set, which makes it possible to improve security effects thereof.
As described above, with the present invention, when setting a call, a user inputs call-setting information including a telephone number and an identification number; the identification number is determined from the call-setting information and is collated to the previously registered identification number; and specified call restriction is unlocked only when the inputted identification number and the previously registered one are identical. With this feature, there is provided the effect that an input operation when setting a call is to be executed only once and it is possible to simplify the operation for call setting.
With another feature of the present invention, a telephone number and an identification number inputted all at once are discriminated from each other by checking a discrimination code, and with this feature there is provided the effect that, when inputting call-setting information, it is possible to continuously input a telephone number and an identification number by inputting a discrimination code therebetween.
With another feature of the present invention, when an identification number is not determined, the user is asked to input the identification number again, so that, even if input miss for an identification number occurs or an identification number is not inputted, the user can complete input of correct information before call setting is executed, and with this feature, there is provided the effect that the necessity for retry of call setting can be eliminated.
with another feature of the present invention, even if call restriction is once unlocked for execution of call setting, the call restrictions are automatically set again, so that it is possible to prevent a user from forgetting execution of an operation for call restriction and also trouble for setting the cal restriction again is saved, and with this feature there is provided the effect that it is possible to simplify an operation for setting the security function while maintaining the security function.
With another feature of the present invention, when setting a call, a user inputs call-setting information including a telephone number and an identification number in the side of a telephone set; the call-setting information is transmitted to a base station; the base station receives the call-setting information, determines an identification number from the call-setting information to collate it to the previously registered identification number, and unlocks call restriction and executes call setting when the inputted identification number and the previously registered identification number are identical, so that an operation for inputting when setting a call is to be executed only once in the side of a telephone l0 set, and with this feature there is provided the effect that it is possible to obtain a communication system in which the call setting operation following security functions on the system can be simplified_ With another feature of the present invention, a telephone number and an identification number inputted all at once in the side of a telephone set are discriminated by checking a discrimination code in the side of a base station, so that, when inputting call-setting information in the side of a telephone set, it becomes possible to continuously input an telephone number and an identification number on the condition that also a discrimination code is inputted, and with this feature there is provided the effect that verification of an identification number and call setting can be executed in batch in the side of the base station.
With another feature of the present invention, when an identification number inputted in the side of a telephone set can not be identified, a base station requests a user to input the identification number again, so that, even if an user makes a mistake in or forgets inputting an identification number, the user can complete a correct operation for inputting call-setting information, and with this feature, there is provided the effect that it is possible to obtain a communication system in which the necessity for executing an operation for call setting again on the system is eliminated.
With another feature of the present invention, even if call restriction is unlocked for execution of call setting, the call restriction is automatically set, so that a work load for a user to set call setting in a telephone set is eliminated and also trouble for setting the call restriction again in the side of a telephone set is saved, and with this feature there is provided the effect that it is possible to obtain a communication system in which the operation for setting security functions on the system can be simplified while maintaining the security functions.
With another feature of the present invention, call-setting information including a telephone number and an identification number is inputted when setting a call: the identification number is determined from the call-setting information and collected to a previously registered identification number; and call restriction is unlocked and call setting is executed only when the inputted identification number and the previously registered one are identical, so that an operation for inputting when setting a call is to be executed only once, and with this feature there is provided the effect that it is possible to provide a security function setting method for a telephone set in which the call setting operation following the security functions can be simplified.
With another feature of the present invention, a telephone number and an identification number inputted all at once are discriminated from each other by checking a discrimination code, so that it is possible to obtain a security function setting method for a telephone set in which a telephone number and an identification number can continuously be inputted on the condition that also a discrimination code is inputted simultaneously.
With another feature of the present invention, when an identification number can not be determined, a user is prompted to input the identification number again, so that, even if a mistakes occurs in inputting an identification number or an identification number is not inputted, the user can complete a correct operation for inputting call-setting information before call setting is executed, and with this feature there is provided to obtain a security function setting method for a telephone set in which the necessity to execute call setting again is eliminated.

With anther feature of the present invention, even if call restriction is unlocked once for execution of call setting, the call restriction is automatically set again, so that a user is prevented from forgetting execution of an operation for setting the call restriction and also a work load for setting the call restriction again is saved, and with this feature there is provided the effect that it is possible to obtain a security function setting method for a telephone set in which an operation for setting the security functions can be simplified while maintaining the security functions.
This application is based on Japanese patent application No.
HEI 9-68091 filed in the Japanese Patent Office on March 21, 1997, the entire contents of which are hereby incorporated by reference.
Although the invention.has been described with respect to a specific embodiment for a complete and clear disclosure, the appended claims are not to be thus limited but are to be construed as embodying all modifications and alternative constructions that may occur to one skilled in the art which fairly fall within the basic teaching herein set forth.

Claims (18)

WHAT IS CLAIMED IS:
1. A telephone set comprising:
a storage means for previously storing therein an identification number to unlock a specified call restriction;
an inputting means for inputting call-setting information including a telephone number and an identification number when a call is set;
a discriminating means for discriminating the telephone number from the identification number according to the call-setting information inputted by said inputting means;
a verifying means for verifying the identification number discriminated by said discriminating means against the identification number previously stored by said storage means;
and a call-setting control means for unlocking said specified call restriction only when it is determined that both the identification numbers are identified to each other by said verifying means and executing the call setting according to the telephone number discriminated by said discriminating means.
2. A telephone set according to claim 1 further comprising:
an identification-number inputting means for inputting an identification number once again into the telephone set when an identification number can not be discriminated from the data by said discriminating means.
3. A telephone set according to claim 1 further comprising:
a call-restriction re-setting means for re-setting a call restriction after the call setting is executed by said call- setting control means
4. A telephone set according to claim 1; wherein said inputting means inputs discrimination code into the telephone set to discriminate a telephone number from an identification number as said call-setting information, and said discriminating means discriminates one from the other according to the discrimination code inputted by said inputting means.
5. A telephone set according to claim 4 further comprising:
an identification-number inputting means for inputting an identification number once again into the telephone set when an identification number can not be discriminated from the data by said discriminating means.
6. A telephone set according to claim 4 further comprising:
a call-restriction re-setting means for re-setting a call restriction after the call setting is executed by said call-setting control means.
7. A communication system for executing communications according to a call setting between a telephone set as a terminal and a base station; wherein the telephone set comprises:
an inputting means for inputting call-setting information including a telephone number and an identification number when a call is set; and a transmitting means for transmitting the telephone number and the identification number to said base station according to the call-setting information inputted by said inputting means, and said base station comprises:
a storage means for previously storing identification numbers each to unlock a specified call restriction;
a receiving means for receiving the call-setting information transmitted from said transmitting means;
a discriminating means for discriminating the identification number from the telephone number according to the call-setting information received by said receiving means;
a verifying means for verifying the identification number discriminated by said discriminating means against the identification number previously stored by said storage means;
and a call-setting control means for unlocking said specified call restriction only when both the identification numbers are identified to each other by said verifying means and executing the call setting according to the telephone number discriminated by said discriminating means
8. A communication system according to claim 7 further comprising:
an identification-number requesting means for requesting an identification number once again to said telephone set when an identification number can not be discriminated from the data by said discriminating means.
9. A communication system according to claim 7 further comprising:
a call-restriction re-setting means for re-setting a call restriction after the call setting is executed by said call-setting control means.
10. A communication system according to claim 7; wherein said inputting means inputs discrimination code into the telephone set to discriminate a telephone number from an identification number as said call-setting information, and said discriminating means discriminates one from the other according to the discrimination code obtained through said inputting means, transmitting means, and receiving means.
11. A communication system according to claim 10 further comprising:
an identification-number requesting means for requesting an identification number once again to said telephone set when an identification number can not be discriminated from the data by said discriminating means.
12. A communication system according to claim 10 further comprising:
a call-restriction re-setting means for re-setting a call restriction after the call setting is executed by said call-setting control means.
13. A method of setting security functions in a telephone set comprising:
a first step of inputting call-setting information including a telephone number and an identification number when a call is set;
a second step of discriminating the telephone number from the identification number according to the call-setting information inputted in said first step;
a third step of verifying the identification number discriminated in said second step against the identification number previously prepared for unlocking the specified call restriction; and a fourth step of unlocking said specified call restriction only when both the identification numbers are identified to each other in said third step and executing the call setting according to the telephone number discriminated in said second step.
14. A method of setting security functions in a telephone set according to claim 13 further comprising:
a fifth step of inputting an identification number once again into the telephone set when an identification number can not be discriminated from the data in said second step.
15. A method of setting security functions in a telephone set according to claim 13 further comprising: a sixth step of re-setting the call restriction after the call setting is executed in said fourth step.
16. A method of setting security functions in a telephone set according to claim 13; wherein, in said first step, discrimination code to discriminate a telephone number from an identification number as said call-setting information is inputted into the telephone set, and in said second step, discrimination of one from the other is executed according to the discrimination code inputted in said first step.
17. A method of setting security functions in a telephone set according to claim 16 further comprising:
a fifth step of inputting an identification number once again into the telephone set when an identification number can not be discriminated from the data in said second step.
18. A method of setting security functions in a telephone set according to claim 16 further comprising: a sixth step of re-setting the call restriction after the call setting is executed in said fourth step.
CA002214197A 1997-03-21 1997-08-28 Telephone set, communication system, and method of setting security functions in telephone set Expired - Fee Related CA2214197C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP9-068091 1997-03-21
JP9068091A JPH10271208A (en) 1997-03-21 1997-03-21 Telephone system, communication system, and security function setting method for telephone system

Publications (2)

Publication Number Publication Date
CA2214197A1 CA2214197A1 (en) 1998-09-21
CA2214197C true CA2214197C (en) 2000-09-05

Family

ID=13363729

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002214197A Expired - Fee Related CA2214197C (en) 1997-03-21 1997-08-28 Telephone set, communication system, and method of setting security functions in telephone set

Country Status (3)

Country Link
US (1) US6253095B1 (en)
JP (1) JPH10271208A (en)
CA (1) CA2214197C (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7003790B1 (en) * 1998-01-31 2006-02-21 Sony Corporation Broadcast-program selection history information acquisition apparatus and its method
US6738616B1 (en) * 1999-03-15 2004-05-18 Bellsouth Intellectual Property Corporation Automatic telephone service forwarding device
JP3466999B2 (en) * 2000-07-13 2003-11-17 キヤノン株式会社 Wireless communication system, wireless communication device, and control method thereof
JP3994033B2 (en) * 2002-01-17 2007-10-17 株式会社エヌ・ティ・ティ・ドコモ Mobile device, call control method, and call control method

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2104347A (en) * 1981-06-19 1983-03-02 Interaction Resources Limited Improvements in or relating to telephone sets
GB2133250B (en) * 1982-12-31 1986-01-08 Oki Electric Ind Co Ltd A telephone-call prohibit circuit
JPS61236226A (en) 1985-04-12 1986-10-21 Hitachi Ltd System for preventing illegal use by mobile set
JPS61244157A (en) 1985-04-20 1986-10-30 Hashimoto Corp Automatic easy-to-operate sound recording and reproducing device for telephone set
GB8516398D0 (en) * 1985-06-28 1985-07-31 Newell T J Telephone line access control
US4965459A (en) * 1989-05-26 1990-10-23 Murray Thorntone E Telephone line security system
FR2649842B1 (en) * 1989-07-17 1994-04-08 Alcatel Cit ACCESS NETWORK FOR WIRELESS TELEPHONY SERVICE
FR2662878B1 (en) * 1990-05-30 1994-03-25 Alcatel Cit METHOD FOR ACCESSING A WIRELESS TELEPHONY SERVICE.
US5200995A (en) * 1990-12-24 1993-04-06 Gaukel John J Universal outgoing call restriction circuit
US5850599A (en) * 1992-09-25 1998-12-15 Ecs Enhanced Cellular Systems Manufacturing Inc. Portable cellular telephone with credit card debit system
JP2902249B2 (en) * 1993-01-21 1999-06-07 富士通株式会社 How to prevent unauthorized use of mobile phone terminals
US5444764A (en) * 1993-07-01 1995-08-22 Motorola, Inc. Method of providing a subscription lock to a radiotelephone system
EP0726006B1 (en) * 1993-10-28 2002-12-18 Maldes Phoenix Limited Telephone bar device
JP3286925B2 (en) * 1994-06-30 2002-05-27 富士通株式会社 Mobile device and dial lock setting method for the mobile device
US5903833A (en) * 1996-08-30 1999-05-11 Telefonaktiebolaget L M Ericsson Method and apparatus for routing calls by remote control
US5884193A (en) * 1997-02-03 1999-03-16 Qualcomm Incorporated System and method for call restriction in a wireless communication device

Also Published As

Publication number Publication date
JPH10271208A (en) 1998-10-09
CA2214197A1 (en) 1998-09-21
US6253095B1 (en) 2001-06-26

Similar Documents

Publication Publication Date Title
EP1601216B1 (en) Mobile communication terminal
US6081704A (en) Mobile radio communication device
US6895223B2 (en) Mobile communications system and operation method thereof
US4939768A (en) Car telephone equipment having automatic calling function
JP2001230858A (en) Mobile phone system and mobile phone
JPH09182158A (en) Portable telephone unit
CA2214197C (en) Telephone set, communication system, and method of setting security functions in telephone set
JP2000002029A (en) Electronic lock system
JPH11331366A (en) Portable telephone set
US6903651B2 (en) Method of unlocking electronic lock
JP2003056232A (en) Unlocking method and lock control device
US6097940A (en) Vehicle information communication system
JP2003163971A (en) Mobile radio communication equipment and method for processing to lock
EP0873032A1 (en) Authentication system for a mobile telephone
JP2002161656A (en) Entering/leaving managing system and method for controlling the same
EP0786913A2 (en) Radio call receiver
JP2904052B2 (en) Password verification method
JP2895038B1 (en) Mobile communication terminal and method for restricting unauthorized use thereof
WO1995024107A1 (en) Cellular telephone fraud control system and method
GB2285200A (en) An analogue mobile telephone system
JP3478240B2 (en) Wireless communication system and mobile terminal
JPH06291835A (en) Portable telephone system
KR100312231B1 (en) Lock function establishment/release method for mobile radio telephone
JPH08336183A (en) Rejecting system to clone terminal in mobile radio communication system
JP2000308134A (en) Communication equipment and portable terminal

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed
MKLA Lapsed

Effective date: 20030828