Data terminal access control
An access restriction and terminal technology, applied in digital data authentication, electronic digital data processing, digital data processing components, etc., can solve the problems of not being able to develop uses as much as possible, leaking private information, deleting or recording information, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0015] In the following detailed description, a terminal in the form of a portable phone, more preferably a cellular / mobile phone, according to the present invention will be described by way of preferred embodiments. The term terminal as used herein includes all portable / mobile terminals that provide a processor and a user interface. Examples of other terminals falling within the term terminal as used herein are communication devices, PDAs, notebook PCs and desktop PCs.
[0016] Referring now to FIG. 1 , there is disclosed a mobile telephone 1 according to a preferred embodiment of the present invention.
[0017] The mobile phone 1 is of the so-called swivel type, having two housing parts that can be folded about a hinge 23 and swiveled about an axis of rotation 24 . A first housing part 5 containing a battery (not shown) is provided with 3 columns by 4 rows (ITU-T) of an alphanumeric keypad 2 and call handling keys 11 (on and off). The camera switch 21 and the volume switch...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 