摘要 |
PROBLEM TO BE SOLVED: To solve the problem in which: most of information communication terminals have taken security measures using software, and have not taken security measures using hardware; there is a risk of unauthorized access if an impersonator with malicious intent has seized an information communication terminal.SOLUTION: An information communication terminal comprises: a detection unit that inputs and outputs a signal or power to/from an input/output unit or a main circuit unit, detects abnormality from the state of input/output of the signal or power, and generates a signal or power on the basis of the detection of abnormality; and a physical contact control unit that controls a contact or moving mechanism of a switch on the basis of the signal or power generated by the detection unit, and performs processing to change the operation state of the main circuit unit or to destroy the main circuit unit.SELECTED DRAWING: Figure 2 |