摘要 |
<P>PROBLEM TO BE SOLVED: To make a password input by a user hardly leak to a third person by making it difficult for a third person to specify a character string configuring an input password since the third person is not able to recognize a depth position associated with an input character. <P>SOLUTION: A portable telephone set 10 executes authentication processing based on an authentication password and an input password. Soft keys (68) with different depth of a character input key are displayed on a 3D display 30, and an operation to the character input key is detected by a touch panel 38 and a touch control circuit 36 installed on the 3D display 30. For example, when the character input key of "E" is operated while displayed at the front position, the character of "E" and the front position are stored so as to be associated with each other. When a front position key is operated by a user, only the character of "E" with which the front position has been associated is determined as a character string configuring the input password. <P>COPYRIGHT: (C)2012,JPO&INPIT |