US 12,169,585 B2
Mobile information terminal and control method thereof
Kazuhiko Yoshizawa, Oyamazaki (JP); and Yasunobu Hashimoto, Oyamazaki (JP)
Assigned to MAXELL, LTD., Kyoto (JP)
Filed by MAXELL, LTD., Kyoto (JP)
Filed on Feb. 3, 2023, as Appl. No. 18/105,527.
Application 18/105,527 is a continuation of application No. 16/761,775, granted, now 11,593,524, previously published as PCT/JP2018/006839, filed on Feb. 26, 2018.
Prior Publication US 2023/0177215 A1, Jun. 8, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/62 (2013.01); G06F 21/00 (2013.01); G06F 21/44 (2013.01); G06F 21/45 (2013.01); G06F 21/60 (2013.01)
CPC G06F 21/629 (2013.01) [G06F 21/44 (2013.01); G06F 21/45 (2013.01); G06F 21/604 (2013.01)] 14 Claims
OG exemplary drawing
 
1. A mobile information terminal having a lock state in which the mobile information terminal requires a user authentication process to transition to an unlock state, the mobile information terminal comprising:
an operating interface, in the unlock state, configured to receive:
a first operation to designate any of applications including a first application and a second application that is different from the first application;
a second operation to impose restrictions on execution of any of the applications; and
a third operation to remove the restrictions on the execution of the any of the applications;
a controller configured to:
perform a first user authentication process to authenticate the user in the lock state;
after the user is authenticated at the first user authentication process,
(1) execute the first application in the unlock state in response to the operating interface receiving the first operation to designate the first application, and
(2) restrict the execution of the second application in the unlock state, in response to the operating interface receiving (i) the first operation not to designate the second application but to designate the first application and (ii) the second operation to impose the restrictions on the execution of the second application;
perform a second user authentication process to authenticate the user without transition to the lock state from the unlock state, in response to the operating interface receiving, in the unlock state, the third operation to remove the restrictions on the execution of the second application; and
after the user is authenticated at the second user authentication process, execute the second application in the unlock state.