摘要 |
PROBLEM TO BE SOLVED: To provide a mobile terminal which properly protects information by judging its state by itself in case of an operation by a third person with malicious intent. SOLUTION: If a user leaves the mobile terminal 100 behind somewhere and then the third person with malicious intent gets and operates the mobile terminal, an input section (including an authentication means) 105 is used to perform collation with authentication information of the regular owner, a history of failures in authentication is stored, and information regarding authentication is acquired. It is judged whether authentication ended in failure more than a designated number of times exists (step S22) and when authentication ended more than the designated number of times exists and it is judged that the person who operates the mobile terminal is not the regular owner (step S22: Yes), the mobile terminal enters a self-erasing state to completely erase its data, thereby preventing the data from leaking (step S16). COPYRIGHT: (C)2007,JPO&INPIT
|