U.S. patent application number 11/793767 was filed with the patent office on 2008-06-26 for backup system, relay device, information terminal, and backup device.
Invention is credited to Shogo Hamasaki, Kenji Hisatomi, Natsume Matsuzaki, Masao Nonaka, Kaoru Yokota.
Application Number | 20080155215 11/793767 |
Document ID | / |
Family ID | 36692357 |
Filed Date | 2008-06-26 |
United States Patent
Application |
20080155215 |
Kind Code |
A1 |
Matsuzaki; Natsume ; et
al. |
June 26, 2008 |
Backup System, Relay Device, Information Terminal, and Backup
Device
Abstract
To allow a user to easily back up data without anxiety, the
present invention provides a backup system that transfers data
transmitted by an information terminal device to a backup device
via at least one relay device that relays the data, the information
terminal device comprising: a storing unit operable to store the
data to be backed up; and a communication unit operable to
transmit, to the relay device, the data and transfer condition
information that indicates a condition to be satisfied by the relay
device and relates to protection of the data, the relay device
comprising: a device information storing unit operable to store
device information relating to transfer destination devices; a
receiving unit operable to receive the data and the transfer
condition information; and a transfer control unit operable to
select, from the transfer destination devices, a transfer
destination device that satisfies the condition indicated by the
received transfer condition information, and to control transfer of
the received data in accordance with the selection, and the backup
device comprising: a backup data receiving unit operable to receive
the data transferred by the relay device; and a backup data storing
unit operable to store the received data.
Inventors: |
Matsuzaki; Natsume; (Osaka,
JP) ; Yokota; Kaoru; (Hyogo, JP) ; Nonaka;
Masao; (Osaka, JP) ; Hamasaki; Shogo; (Osaka,
JP) ; Hisatomi; Kenji; (Osaka, JP) |
Correspondence
Address: |
WENDEROTH, LIND & PONACK L.L.P.
2033 K. STREET, NW, SUITE 800
WASHINGTON
DC
20006
US
|
Family ID: |
36692357 |
Appl. No.: |
11/793767 |
Filed: |
January 20, 2006 |
PCT Filed: |
January 20, 2006 |
PCT NO: |
PCT/JP2006/300868 |
371 Date: |
June 22, 2007 |
Current U.S.
Class: |
711/162 ;
711/E12.103 |
Current CPC
Class: |
G06F 11/1464 20130101;
G06F 11/1456 20130101; H04M 2250/64 20130101; G06F 11/1451
20130101; H04L 67/289 20130101 |
Class at
Publication: |
711/162 ;
711/E12.103 |
International
Class: |
G06F 12/16 20060101
G06F012/16 |
Foreign Application Data
Date |
Code |
Application Number |
Jan 21, 2005 |
JP |
2005-013629 |
Claims
1. A backup system that transfers data transmitted by an
information terminal device to a backup device via at least one
relay device that relays the data, the information terminal device
comprising: a storing unit operable to store the data to be backed
up; and a communication unit operable to transmit, to the relay
device, the data and transfer condition information that indicates
a condition to be satisfied by the relay device and relates to
protection of the data, the relay device comprising: a device
information storing unit operable to store device information
relating to transfer destination devices; a receiving unit operable
to receive the data and the transfer condition information; and a
transfer control unit operable to select, from the transfer
destination devices, a transfer destination device that satisfies
the condition indicated by the received transfer condition
information, and to control transfer of the received data in
accordance with the selection, and the backup device comprising: a
backup data receiving unit operable to receive the data transferred
by the relay device; and a backup data storing unit operable to
store the received data.
2. A relay device that relays data transmitted by an information
terminal device to a backup device, comprising: a device
information storing unit that stores device information relating to
devices as candidates for a transfer destination of the data; a
receiving unit operable to receive the data and transfer condition
information that indicates a condition to be satisfied by the relay
device and relates to protection of the data; and a transfer
control unit operable to select, from the candidates, a device that
satisfies the condition indicated by the received transfer
condition information, and to control transfer of the received data
in accordance with the selection.
3. The relay device of claim 2, wherein the condition indicated by
the transfer condition information is that a device is not in a
blacklist showing devices not permitted to be the transfer
destination, and the transfer control unit selects, from the
candidates, a device that is not in the blacklist.
4. The relay device of claim 2, wherein the device information
includes a reliability level for each of the candidates, the
transfer condition information indicates a threshold value of the
reliability level to be satisfied by the transfer destination, and
the transfer control unit selects, from the candidates, a device
that satisfies the threshold value.
5. The relay device of claim 2, wherein the transfer control unit
further includes a conversion processing subunit operable to
perform predetermined conversion processing on the data, and
transfers the data after performing the predetermined conversion
processing on the data.
6. The relay device of claim 5, wherein the transfer control unit
controls the transfer such that the data converted by the
conversion processing subunit is transferred to a device not
satisfying the condition indicated by the transfer condition
information.
7. The relay device of claim 5, wherein the predetermined
conversion processing performed by the conversion processing
subunit is insertion of an identifier of the relay device, as a
digital watermark, into the data.
8. The relay device of claim 2, wherein the receiving unit further
receives at least one of a transfer deadline, a data keep deadline
and a deletion deadline, if the receiving unit receives the
transfer deadline, the relay device controls the transfer, using
the transfer control unit, such that the data is received by the
backup device before the transfer deadline, if the receiving unit
receives the data keeping deadline, the relay device keeps the data
until the keeping deadline, and if the receiving unit receives the
deletion deadline, the transfer control unit deletes the data at
the deletion deadline.
9. The relay device of claim 2 further comprising: an exchange
information transmitting unit operable to create and transmit
exchange information indicating that the data received by the
receiving unit is kept in the relay device; and a transfer request
receiving unit operable to receive, from another device that has
received the exchange information, a request for transfer of the
data corresponding to the exchange information, wherein if the
transfer request receiving unit receives the transfer request, the
transfer control unit controls the transfer such that the data
relating to the transfer request is transmitted to said another
device.
10. An information terminal device that transmits data to a backup
device via at least one relay device that relays the data, the
information terminal device comprising: a storing unit operable to
store the data to be backed up; and a communication unit operable
to transmit, to the relay device, the data and transfer condition
information that indicates a condition to be satisfied by the relay
device and relates to protection of the data.
11. The information terminal device of claim 10, wherein the
storing unit further stores relay device information relating to
relay devices as candidates for a transfer destination of the data,
and the communication unit selects, from the candidates, a device
that satisfies the condition indicated by the condition
information, and transmits the data and the transfer condition
information in accordance with the selection.
12. The information terminal device of claim 10, wherein before
transmitting the data, the communication unit transmits first
transmission/reception condition information to a relay device, and
receives second transmission/reception condition information from
the relay device, and the information terminal device further
comprises a judging unit operable to judge whether the first
transmission/reception condition information and the second
transmission/reception condition information are substantially the
same, and if the judging unit judges affirmatively, the
communication unit transmits the data to the relay device.
13. The information terminal device of claim 12, wherein the first
transmission/reception condition information is associated with
transmission data that the information terminal device transmits,
the second transmission/reception condition information is
associated with reception data that the information terminal device
receives from the relay device, if the judging unit judges
affirmatively, the communication unit transmits the transmission
data to the relay device and receives the reception data from the
relay device, and the storing unit stores the received reception
data.
14. The information terminal device of claim 12, wherein each of
the first transmission/reception condition information and the
second transmission/reception condition information includes at
least one of a size of the data, a keeping deadline until which the
relay device or the information terminal device keeps the data, a
recording method for recording the data in a recording medium and
an incentive for keeping the data.
15. The information terminal device of claim 14, wherein the
incentive includes at least one of value information having a cash
value, relay device control information indicating a right to have
the relay device perform predetermined processing, and viewing
right information indicating a right to view a predetermined
content.
16. A backup device that receives data transmitted from an
information terminal device via the relay device of claim 9, the
backup device comprising: an exchange information receiving unit
operable to receive the exchange information from another device; a
transfer request transmitting unit operable to transmit a request
for transferring the data to the relay device that keeps the data;
a backup data receiving unit operable to receive the data relating
to the request; and a backup data storing unit operable to store
the received data.
17. An integrated circuit used for an information terminal device
that transmits data to a backup device via at least one relay
device that relays the data, the integrated circuit comprising: a
storing unit operable to store the data to be backed up; and a
communication unit operable to transmit the data and transfer
condition information that indicates a condition to be satisfied by
the relay device and relates to protection of the data.
18. A computer program for instructing an information terminal
device that stores data to be backed up to transmit the data to a
backup device via at least one relay device that relays the data,
the computer program comprising the step of transmitting the data
and transfer condition information that indicates a condition to be
satisfied by the relay device and relates to protection of the
data.
19. A backup method for transferring data transmitted by an
information terminal device to a backup device via at least one
relay device that relays the data, the backup method comprising:
the steps performed by the information terminal device of storing
the data to be backed up, and transmitting, to the relay device,
the data and transfer condition information that indicates a
condition to be satisfied by the relay device and relates to
protection of the data; the steps performed by the relay device of
storing device information relating to devices as candidates for a
transfer destination of the data, receiving the data and transfer
the condition information, and selecting, from the candidates, a
device that satisfies the condition indicated by the received
transfer condition information, and controlling the transfer of the
received data in accordance with the selection; and the steps
performed by the backup device of receiving the data transferred by
the relay device; and storing the received data.
20. A backup method for backing up data with use of a first
information terminal device and a second information terminal
device, the backup method comprising: a storing step of storing the
data to be backed up; and a communication step of transmitting the
data and transfer condition information that indicates a condition
to be satisfied by the relay device and relates to protection of
the data, wherein when performed by the first information terminal
device, the communication step further transmits first
transmission/reception condition information to the second
information terminal device and receives second
transmission/reception condition information from the second
information terminal device, before transmitting first data to the
second information terminal device, and when performed by the
second information terminal device, the communication step further
transmits the second transmission/reception condition information
to the first information terminal device and receives the first
transmission/reception condition information from the first
information terminal device, before transmitting the second data to
the first information terminal device, wherein the backup method
further comprises a judging step of judging whether the first
transmission/reception condition information and the second
transmission/reception condition information are substantially the
same, wherein when performed by the first information terminal
device, the communication step further transmits the first data to
the second information terminal device if the judging step judges
affirmatively, and when performed by the second information
terminal device, the communication step further transmits the
second data to the first information terminal device.
Description
TECHNICAL FIELD
[0001] The present invention relates to backup of data stored in
mobile communication devices, such as mobile phones.
BACKGROUND ART
[0002] In recent years, mobile communication devices such as mobile
phones have been improved in their processing capacity and
communication capacity. As a result of such improvements, mobile
communication devices are now capable of performing a various types
of processing and used for various purposes. For example,
camera-equipped mobile phones can be used for taking pictures of
friends of users and landscapes while traveling, and saving the
pictures such that the users can view the pictures anytime. With
camera-equipped mobile phones, it is also possible to exchange data
of saved still images and moving pictures among the users, using a
communications technology, such as infrared communication. The data
saved by the users themselves often reflects the users' personal
connections, users' preference, and so on. Therefore, such data is
valuable especially for the users concerned with the data.
[0003] However, as usually carried about by the users, mobile
communication devices are vulnerable to unforeseen circumstances,
such as loss due to users' carelessness. If a user loses a mobile
communication device, this also means that the user loses the data
valuable for the user.
[0004] To prevent data from being lost in unforeseen circumstances,
techniques for backing up data that is stored in a mobile
communication device are widely used.
[0005] For example, Patent Documents 1 and 2 listed below disclose
a technique for transferring data stored in a mobile phone to a
server setup in home or the like, when charging the mobile
phone.
[0006] Also, Patent Document 3 discloses a technique for performing
transmission and reception of data between a mobile phone and a
backup center via telephone lines, in order to back up text-based
data such as address data whose data size is smaller than still
image data and moving picture data.
Patent Document 1: Japanese Laid-open patent Application
Publication No. 2003-347988;
Patent Document 2: Japanese Laid-open patent Application
Publication No. 2002-33798;
Patent Document 3: Japanese Laid-open patent Application
Publication No. 2000-78070.
DISCLOSURE OF THE INVENTION
Problem to be Solved by the Invention
[0007] However, the technique disclosed by Patent Documents 1 and 2
can not start the data backup immediately if the user can not
charge the mobile communication device immediately, because the
backup is triggered by the charging. Especially while the user is
on a trip, the risk of the data loss increases as the period for
which the user can not charge the mobile communication device
increases.
[0008] Regarding the technique disclosed by Patent Document 3, the
backup can be completed without any serious problem if the data to
be backed up is comparatively small. However, if the only
communications means available for the backup is telephone lines
and accordingly it is difficult to transfer comparatively large
data such as still images and moving pictures in a short period,
unignorable problems might occur. For example, since it takes long
time to transfer data via telephone lines, an error might occur
halfway through the backup due to weak signal strength. Moreover,
if the telephone line is of a pay-as-you-go type, the cost can be
very high. Therefore, in view of practical use, it is difficult to
execute the backup.
[0009] Alternatively, it is possible to use network connection
services, such as a public wireless LAN network, to backup data.
Such services realize comparatively high-speed transfer of data to
backup devices.
[0010] However, in the network, the pathway to be used for
transferring data is usually determined by a router or the like.
Therefore, it is difficult for the users to predict which pathway
is to be used in transfer of the data.
[0011] This means that it is difficult for the users to predict to
whom the data will be exposed. Therefore, the users feel insecure
about transmitting data including personal information via a
network. Especially, regarding mobile communication devices
demanded to be smaller, it is sometimes difficult to take measures
to protect the data by encryption or the like, because of
functional constraint of the mobile communication devices. In such
a case, the users feel very insecure.
[0012] The object of the present invention is to provide a backup
system and a backup method that allow a user to easily back up data
without anxiety even if a mobile communication device such as a
mobile phone can not directly communicate with a backup device or a
transmission speed of a communication line between the
communication device and the backup device is not high enough to
transmit large data.
Means for Solving the Problems
[0013] To solve the above-described problems, the present invention
provides a backup system that transfers data transmitted by an
information terminal device to a backup device via at least one
relay device that relays the data, the information terminal device
comprising: a storing unit operable to store the data to be backed
up; and a communication unit operable to transmit, to the relay
device, the data and transfer condition information that indicates
a condition to be satisfied by the relay device and relates to
protection of the data, the relay device comprising: a device
information storing unit operable to store device information
relating to transfer destination devices; a receiving unit operable
to receive the data and the transfer condition information; and a
transfer control unit operable to select, from the transfer
destination devices, a transfer destination device that satisfies
the condition indicated by the received transfer condition
information, and to control transfer of the received data in
accordance with the selection, and the backup device comprising: a
backup data receiving unit operable to receive the data transferred
by the relay device; and a backup data storing unit operable to
store the received data.
[0014] The present invention also provides a relay device that
relays data transmitted by an information terminal device to a
backup device, comprising: a device information storing unit that
stores device information relating to devices as candidates for a
transfer destination of the data; a receiving unit operable to
receive the data and transfer condition information that indicates
a condition to be satisfied by the relay device and relates to
protection of the data; and a transfer control unit operable to
select, from the candidates, a device that satisfies the condition
indicated by the received transfer condition information, and to
control transfer of the received data in accordance with the
selection.
[0015] The present invention also provides an information terminal
device that transmits data to a backup device via at least one
relay device that relays the data, the information terminal device
comprising: a storing unit operable to store the data to be backed
up; and a communication unit operable to transmit, to the relay
device, the data and transfer condition information that indicates
a condition to be satisfied by the relay device and relates to
protection of the data.
ADVANTAGEOUS EFFECT OF THE PRESENT INVENTION
[0016] With the stated structure, even if the information terminal
device can not directly communicate with the backup device, the
user of the information terminal device can back up the data by
transmitting the data and the transfer condition information to the
relay device. Therefore, the user does not lose the data even if it
becomes impossible to use the information terminal device due to
lost of the information terminal device, for example.
[0017] Also, the relay device with the stated structure can receive
the transfer condition information with the transfer data, select
another relay device as a transfer destination device based on the
transfer condition information, and transmits the transfer data to
the transfer destination device. Therefore, it is possible to
perform the transfer with protecting the transfer data. In other
words, the user can transfer the data via a transfer pathway
limited by the user to protect the data.
[0018] Accordingly, the user can reduce the risk of an invasion of
privacy, and backup the data without anxiety.
[0019] Here, the condition indicated by the transfer condition
information may be that a device is not in a blacklist showing
devices not permitted to be the transfer destination, and the
transfer control unit may select, from the candidates, a device
that is not in the blacklist.
[0020] With the stated structure, the user can prevent the data to
be backed up from being relayed by an undesired relay device.
[0021] The device information may include a reliability level for
each of the candidates, the transfer condition information may
indicate a threshold value of the reliability level to be satisfied
by the transfer destination, and the transfer control unit may
select, from the candidates, a device that satisfies the threshold
value.
[0022] By performing the backup via the relay device having the
stated structure, it is possible to limit the transfer pathway
using only the reliability threshold value, instead of determining,
for each transfer destination device, whether to permit the device
to transfer the data. Therefore, this realizes the protection of
the transfer data easily. Also, the user can flexibly set the level
of the limitation of the transfer pathway depending on the data
content by changing the threshold value depending on the data
content.
[0023] For example, when transmitting data desired to be kept in
strict confidence, such as private picture data, it is possible to
strictly limit the pathway such that the data is relayed by only a
highly reliable device. On the other hand, when transmitting data
that can not be a disadvantage for the user even if it is exposed
to the public, such as landscape picture data, it is possible to
permit a relay device with low reliability to perform the
transfer.
[0024] The transfer control unit may further include a conversion
processing subunit operable to perform predetermined conversion
processing on the data, and may transfer the data after performing
the predetermined conversion processing on the data.
[0025] With the stated structure, it is possible to perform the
transfer of the data with strict protection.
[0026] The transfer control unit may control the transfer such that
the data converted by the conversion processing subunit is
transferred to a device not satisfying the condition indicated by
the transfer condition information.
[0027] With the stated structure, the predetermined conversion
processing is performed only in the case where the data is
transmitted to the device not satisfying the condition indicated by
the transfer condition information. Accordingly, while protecting
the data, it is possible to effectively process the data in
accordance with the reliability level of the transfer destination
device.
[0028] The predetermined conversion processing performed by the
conversion processing subunit may be insertion of an identifier of
the relay device, as a digital watermark, into the data.
[0029] With the stated structure, even if the data is used by an
unauthorized user, it is possible to track the unauthorized user,
using the watermark. As a result, it becomes easy to manage such an
unauthorized use of the data.
[0030] Meanwhile, if the transfer data is kept by the relay device
for a long time, there is a risk of leakage of the data due to
problems with the relay device. Also, if the user can not know when
the backup will be completed, the user feels insecure because he
can not confirm that the backup is surely executed. Therefore, the
time when the backup will be completed is of high interest to the
user.
[0031] For this reason, the receiving unit may further receive at
least one of a transfer deadline, a data keep deadline and a
deletion deadline, if the receiving unit receives the transfer
deadline, the relay device may control the transfer, using the
transfer control unit, such that the data is received by the backup
device before the transfer deadline, if the receiving unit receives
the data keeping deadline, the relay device may keep the data until
the keeping deadline, and if the receiving unit receives the
deletion deadline, the transfer control unit may delete the data at
the deletion deadline.
[0032] With the stated structure, in view of protection of the
data, it is possible to reduce the risk the relay device keeping
the data for a long time. Also, the user can know when the backup
will be completed at the latest. Therefore, the user can perform
the backup without anxiety.
[0033] The relay device may further comprise: an exchange
information transmitting unit operable to create and transmit
exchange information indicating that the data received by the
receiving unit is kept in the relay device; and a transfer request
receiving unit operable to receive, from another device that has
received the exchange information, a request for transfer of the
data corresponding to the exchange information, wherein if the
transfer request receiving unit receives the transfer request, the
transfer control unit may control the transfer such that the data
relating to the transfer request is transmitted to said another
device. Moreover, a backup device that receives data transmitted
from an information terminal device via the above-described relay
device may comprise: an exchange information transmitting unit
operable to receive the exchange information from another device; a
transfer request transmitting unit operable to transmit a request
for transferring the data to the relay device that keeps the data;
a backup data receiving unit operable to receive the data relating
to the request; and a backup data storing unit operable to store
the received data.
[0034] Since the relay device having the stated structure controls
transfer of the data on reception of a transfer request from
another device such as the backup device that has received the
identifier information, the device that has received the identifier
information can inquire of the relay device as to the data to be
backed up.
[0035] Meanwhile, according to the method for the back up described
above, the data stored in the information terminal device is backed
up by the aid of the relay device. In this method, the relay device
keeps the data transmitted by the information terminal device, and
performs processing for the relay operation, which means that the
resource of the relay device is consumed for the backup. In other
words the processing capacity of the relay device is used for the
backup of the data of the information terminal device in a
one-sided manner.
[0036] For this reason, before transmitting the data, the
communication unit may transmit first transmission/reception
condition information to a relay device, and receives second
transmission/reception condition information from the relay device,
and the information terminal device may further comprise a judging
unit operable to judge whether the first transmission/reception
condition information and the second transmission/reception
condition information are substantially the same, and if the
judging unit judges affirmatively, the communication unit may
transmit the data to the relay device.
[0037] With the stated structure, the information terminal device
exchanges the transmission/reception condition information with the
relay device, and judges whether to transfer the data based on
pieces of the transmission/reception condition information received
by the information terminal device and the relay device
respectively. Therefore, it is possible to control the backup by
mutual consent between the information terminal device and the
relay device.
[0038] The first transmission/reception condition information may
be associated with transmission data that the information terminal
device transmits, the second transmission/reception condition
information may be associated with reception data that the
information terminal device receives from the relay device, if the
judging unit judges affirmatively, the communication unit may
transmit the transmission data to the relay device and receives the
reception data from the relay device, and the storing unit may
store the received reception data.
[0039] The information terminal device with the stated structure
stores, when transmitting the transfer data to be backed up, the
data transmitted from the relay device. Therefore, it is possible
to perform the backup in a fair manner, without one-sidedly using
the processing capacity and the resource of one of information
terminal device and the relay device.
[0040] Each of the first transmission/reception condition
information and the second transmission/reception condition
information may include at least one of a size of the data, a
keeping deadline until which the relay device or the information
terminal device keeps the data, a recording method for recording
the data in a recording medium and an incentive for keeping the
data.
[0041] With the stated structure it is possible to judge whether to
transfer the data based on the combination of the plurality of
conditions. Therefore, it is possible to set the permissible range
to detail.
[0042] The incentive may include at least one of value information
having a cash value, relay device control information indicating a
right to have the relay device perform predetermined processing,
and viewing right information indicating a right to view a
predetermined content.
[0043] With the stated structure, it is possible to obtain the
predetermined right not only by performing the mutual backup but
also by keeping the backup data transmitted from another device as
party. Therefore, it is possible to encourage the user of a device
to keep data transmitted from another device.
[0044] The storing unit may further store relay device information
relating to relay devices as candidates for a transfer destination
of the data, and the communication unit may select, from the
candidates, a device that satisfies the condition indicated by the
condition information, and transmit the data and the transfer
condition information in accordance with the selection.
[0045] With the stated structure, it is possible to control the
transfer of the data in accordance with whether it is possible to
protect the data. Therefore, the user of the information terminal
device can perform the backup without anxiety.
[0046] The present invention may be an integrated circuit used for
an information terminal device that transmits data to a backup
device via at least one relay device that relays the data, the
integrated circuit comprising: a storing unit operable to store the
data to be backed up; and a communication unit operable to transmit
the data and transfer condition information that indicates a
condition to be satisfied by the relay device and relates to
protection of the data.
[0047] The present invention may also be a computer program for
instructing an information terminal device that stores data to be
backed up to transmit the data to a backup device via at least one
relay device that relays the data, the computer program comprising
the step of transmitting the data and transfer condition
information that indicates a condition to be satisfied by the relay
device and relates to protection of the data.
[0048] The present invention may also be a backup method for
transferring data transmitted by an information terminal device to
a backup device via at least one relay device that relays the data,
the backup method comprising: the steps performed by the
information terminal device of storing the data to be backed up,
and transmitting, to the relay device, the data and transfer
condition information that indicates a condition to be satisfied by
the relay device and relates to protection of the data; the steps
performed by the relay device of storing device information
relating to devices as candidates for a transfer destination of the
data, receiving the data and transfer the condition information,
and selecting, from the candidates, a device that satisfies the
condition indicated by the received transfer condition information,
and controlling the transfer of the received data in accordance
with the selection; and the steps performed by the backup device of
receiving the data transferred by the relay device; and storing the
received data.
[0049] The present invention may also be a backup method for
backing up data with use of a first information terminal device and
a second information terminal device, the backup method comprising:
a storing step of storing the data to be backed up; and a
communication step of transmitting the data and transfer condition
information that indicates a condition to be satisfied by the relay
device and relates to protection of the data, wherein when
performed by the first information terminal device, the
communication step further transmits first transmission/reception
condition information to the second information terminal device and
receives second transmission/reception condition information from
the second information terminal device, before transmitting first
data to the second information terminal device, and when performed
by the second information terminal device, the communication step
further transmits the second transmission/reception condition
information to the first information terminal device and receives
the first transmission/reception condition information from the
first information terminal device, before transmitting the second
data to the first information terminal device, wherein the backup
method further comprises a judging step of judging whether the
first transmission/reception condition information and the second
transmission/reception condition information are substantially the
same, wherein when performed by the first information terminal
device, the communication step further transmits the first data to
the second information terminal device if the judging step judges
affirmatively, and when performed by the second information
terminal device, the communication step further transmits the
second data to the first information terminal device.
BRIEF DESCRIPTION OF THE DRAWINGS
[0050] FIG. 1 shows an overall structure of a backup system 1000
according to the first embodiment of the present invention;
[0051] FIG. 2 is a functional block diagram of a mobile phone
100;
[0052] FIG. 3 is a functional block diagram of a mobile phone
200;
[0053] FIG. 4 is a functional block diagram of a backup server
300;
[0054] FIG. 5 is a functional block diagram of a backup server
900;
[0055] FIG. 6 is a table 600 showing transfer condition
information;
[0056] FIG. 7 is a table 700 showing reliability threshold
values;
[0057] FIG. 8 is a flowchart showing operations performed by an
information terminal device;
[0058] FIG. 9 is a flowchart showing operations performed by a
relay device;
[0059] FIG. 10 is a flowchart showing operations performed by a
backup device;
[0060] FIG. 11 shows an overall structure of a backup system 2000
according to the second embodiment of the present invention;
[0061] FIG. 12 is a functional block diagram of a mobile phone 210
according to the second embodiment;
[0062] FIG. 13 shows exchange information 1300;
[0063] FIG. 14 is a flowchart showing operations performed by a
relay device according to the second embodiment;
[0064] FIG. 15 is a functional block diagram of a mobile phone 500
having a mutual backup function;
[0065] FIG. 16 shows tables showing transmission/reception
condition information; and
[0066] FIG. 17 is a flowchart showing operations of mutual backup
performed by an information terminal device and another device.
EXPLANATION OF REFERENCES
[0067] 100, 200, 201, 210, 211: MOBILE PHONE [0068] 300, 301, 900:
BACKUP SERVER [0069] 11: IMAGE ACQUIRING UNIT [0070] 12: STORING
UNIT [0071] 13: BACKUP IMAGE SELECTING UNIT [0072] 14: TRANSFER
CONDITION INFORMATION SETTING UNIT [0073] 15: BACKUP INFORMATION
GENERATING UNIT [0074] 16: TRANSFER DESTINATION SELECTING UNIT
[0075] 17: TRANSFER DESTINATION AUTHENTICATING UNIT [0076] 18:
TRANSMITTING UNIT [0077] 21: TRANSMISSION SOURCE AUTHENTICATING
UNIT [0078] 22: RECEIVING UNIT [0079] 23: STORING UNIT [0080] 24:
CONTROL UNIT [0081] 25: TRANSFER DESTINATION SELECTING UNIT [0082]
26: TRANSFER DESTINATION AUTHENTICATING UNIT [0083] 27:
TRANSMITTING UNIT [0084] 28: EXCHANGE INFORMATION CREATING UNIT
[0085] 31: TRANSMISSION SOURCE AUTHENTICATING UNIT [0086] 32:
RECEIVING UNIT [0087] 33: STORING UNIT [0088] 34: CONTROL UNIT
[0089] 35: TRANSMISSION SOURCE SELECTING UNIT [0090] 36:
TRANSMISSION SOURCE AUTHENTICATING UNIT [0091] 37: TRANSMITTING
UNIT [0092] 51: TRANSMISSION SOURCE/DESTINATION SELECTING UNIT
[0093] 52: TRANSMISSION SOURCE/DESTINATION AUTHENTICATING UNIT
[0094] 54: TRANSMISSION/RECEPTION CONDITION CONTROL UNIT [0095] 55:
TRANSMISSION/RECEPTION CONDITION GENERATING UNIT [0096] 91:
TRANSMISSION SOURCE AUTHENTICATING UNIT [0097] 92: RECEIVING UNIT
[0098] 93: DATA EXTRACTING UNIT [0099] 94: STORING UNIT
BEST MODE FOR CARRYING OUT THE INVENTION
First Embodiment
[0100] The following describes the first embodiment of a backup
system according to the present invention.
<Overview>
[0101] In the backup system according to the present invention, an
information terminal device transmits data stored therein and is to
be backed up to a backup device via relay devices that relay the
data. In the first embodiment, it is assumed that the information
terminal device is a mobile phone. To back up the data stored in
the mobile phone in the backup device owned by the user of the
mobile phone, another backup device owned by a user of another
mobile phone relays the data. Note that the data to be backed up
is, for example, still images and moving pictures acquired by the
mobile phone using a camera function thereof. The following
describes the backup system in detail.
[0102] FIG. 1 shows an overall structure of the backup system 1000
according to the first embodiment of the present invention.
[0103] As FIG. 1 shows, the backup system 1000 includes a mobile
phone 100 as an information terminal device that transmits data to
be backed up to a backup device, a mobile phone 200 as a relay
device that relays the transmitted data, a backup server 300, a
mobile phone 201, a backup server 301, and a backup server 900 as
the backup device that backs up the data of the mobile phone
100.
[0104] The mobile phone 100 and the mobile phone 200 are connected
with each other via a communication path 20. In the same manner,
the mobile phone 200 and the backup server 300 are connected with
each other via a communication path 30, and the backup server 300
and the backup server 900 are connected with each other via a
communication path 90. Also, the mobile phone 100 and the mobile
phone 201 are connected with each other via a communication path
21, the mobile phone 201 and the backup server 301 are connected
with each other via a communication path 31, and the backup server
301 and the backup server 900 are connected with each other via a
communication path 91.
[0105] The following is a situation assumed in the first embodiment
where the backup is performed. First of all, it is assumed that a
user 1 as the user of the mobile phone 100 connects, usually when
he gets home, the mobile phone 100 with the backup server 900 set
up in his home to perform backup. The backup method used here is
such as those disclosed in Patent Documents 1 and 2, i.e.
transmitting backup data to the backup server 900 when the mobile
phone is connected with a battery charger. Note that it is also
assumed that the backup server 900 is connected with an external
network.
[0106] Here, if the user 1 is on a long-term trip with a user 2,
and can not use a high-speed network such as a broadband
communication network to have the mobile phone 100 connect with the
backup server 900 set up in his home, it is difficult to make
backup using the backup server 900. In such a case, the user 1
transfers the data to be backed up to the mobile phone 200 owned by
the user 2 accompanying the user 1, via the communication path
20.
[0107] The communication path 20 is, for example, a broadband
ad-hoc short-range wireless network such as Bluetooth, a USB
(Universal Serial Bus) connection and a wireless LAN (Local Area
Network), or a UWB (Ultra Wide Band), a PAN (Personal Area
Network), a wired connection, or a hand-to-hand transfer of an
external medium such as a recording medium.
[0108] In this way, by transferring backup data to the mobile phone
200, the user 1 can protect the backup data against loss even in
the case where the user 1 can not make backup using the backup
server 900 and loses the mobile phone 100.
[0109] If receiving the backup data of the mobile phone 100 by the
mobile phone 200, the user 2 connects the mobile phone 200 with the
backup server 300 owned by the user 2 when he gets home, to
transmit the backup data received from the mobile phone 100
together with the backup data of the mobile phone 200 itself to the
backup server 300 via the communication path 30. The backup server
300 is connected with a network. The backup server 300 transmits
the backup data of the mobile phone 100 to the backup server 900,
which is connected to the network as well, via the communication
path 90. The communication path 90 is, for example, a broadband
communication network using fiber optics, and it is assumed that
the communication path 90 can transfer data at a comparatively
high-speed. The broadband communication network is a communications
channel having a broad bandwidth. In recent years, carriers such as
ISPs (Internet Services Providers) have been offering flat-rate
pricing for internet access services. Therefore, the cost of the
data transmission via the communication path 90 is not a great
burden for the user 2.
[0110] The backup server 900 receives and records the backup data
of the mobile phone 100, which has been transmitted from the backup
server 300 via the communication path 90.
[0111] As described above, the user 1 can make backup using the
relay devices that relays the data via the communication path 20,
the communication path 30 and the communication path 90.
<Structure>
[0112] Next, the functional structure of each of the information
terminal device, the relay devices and the backup device included
in the backup system 1000 is explained. As described above, it is
assumed that the information terminal is the mobile phone 100.
Also, it is assumed that the relay devices are the mobile phone
200, the backup server 300 and so on, and the backup device is the
backup server 900.
<Information Terminal Device>
[0113] FIG. 2 is a functional block diagram of the mobile phone
100.
[0114] As FIG. 2 shows, the mobile phone 100 as an information
terminal device includes an image acquiring unit 11, a storing unit
12, a backup image selecting unit 13, a transfer condition setting
unit 14, a backup information generating unit 15, a transfer
destination selecting unit 16, a transfer destination
authenticating unit 17, and a transmitting unit 18. Each of the
components above is structured from, for example, a control circuit
including a CPU (Central Processing Unit), a ROM (Read Only
Memory), a RAM (Random Access Memory) and so on, and a
transmission/reception circuit for transmitting and receiving data.
The backup is performed by the components in accordance with a
computer program. The following describes the function of each
component.
[0115] The image acquiring unit 11 is a camera module or the like
that realizes the camera function of the mobile phone 100, and
acquires data such as still images and moving pictures.
[0116] The storing unit 12 stores the data acquired by the image
acquiring unit 11 using a storage medium such as a memory and a HDD
(Hard Disk Drive).
[0117] The backup image selecting unit 13 selects, from pieces of
the data stored in the storing unit 12, apiece of data to be
transferred by the relay devices and backed up.
[0118] The transfer condition setting unit 14 sets up transfer
condition information, which is explained in a later section.
[0119] The backup information generating unit 15 adds the transfer
condition information and so on to transfer data, that is, data
selected by the backup image selecting unit 13, to generate data to
be transmitted.
[0120] The transfer destination selecting unit 16 selects a
transfer destination with which the mobile phone 100 can connect
and communicate via a communication path.
[0121] The transfer destination authenticating unit 17
authenticates a device at a transfer destination to which the data
is transferred.
[0122] The transmitting unit 18 transmits the data to the device at
the transfer destination.
<Relay Device>
[0123] Next, the functional structure of the relay device is
explained.
[0124] FIG. 3 is a functional block diagram of the mobile phone
200.
[0125] As FIG. 3 shows, the mobile phone 200 includes a
transmission source authenticating unit 21, a receiving unit 22, a
storing unit 23, a control unit 24, a transfer destination
selecting unit 25, a transfer destination authenticating unit 26,
and a transmitting unit 27. Each of the components above is
structured from, for example, a control circuit including a CPU
(Central Processing Unit), a ROM (Read Only Memory), a RAM (Random
Access Memory) and so on, and a transmission/reception circuit for
transmitting and receiving data. The transfer of data to another
device via the relay device is performed by the components in
accordance with a computer program. The following describes the
function of each component.
[0126] The transmission source authenticating unit 21 authenticates
a device at a transmission source of data at the other end, at
reception of the data.
[0127] The receiving unit 22 receives data via a communication
path.
[0128] The storing unit 23 stores received data in a memory, HDD,
or the like.
[0129] The control unit 24 controls transmission of data to a
transfer destination device.
[0130] The transfer destination selecting unit 25 selects a
transfer destination with which the mobile phone 200 can directly
connect and communicate via a communication path.
[0131] The transfer destination authenticating unit 26
authenticates a device at a transfer destination to which data is
transferred. Note that any method may be used for the
authentication between devices. In this embodiment, a well-known
method such as challenge-response authentication is used. This is
same as to the other devices.
[0132] The transmitting unit 27 transmits data to a device at a
transfer destination.
[0133] FIG. 4 is a functional block diagram of the backup server
300. The backup server 300 has almost the same structure as the
mobile phone 200.
[0134] As FIG. 4 shows, the backup server 300 includes a
transmission source authenticating unit 31, a receiving unit 32, a
storing unit 33, a control unit 34, a transfer destination
selecting unit 35, a transfer destination authenticating unit 36,
and a transmitting unit 37.
[0135] Each of the components above achieves the function of the
corresponding component of the mobile phone 200. That is to say,
the transmission source authenticating unit 31 authenticates, in
the same manner as the transmission source authenticating unit 21,
a device at a transmission source of data at the other end, at
reception of the data. The transmission source authenticating unit
31, the receiving unit 32, the storing unit 33, the control unit
34, the transfer destination selecting unit 35, the transfer
destination authenticating unit 36, and the transmitting unit 37
have the same function as the transmission source authenticating
unit 21, the receiving unit 22, the storing unit 23, the control
unit 24, the transfer destination selecting unit 25, the transfer
destination authenticating unit 26, and the transmitting unit 27
respectively. Therefore, the explanations thereof are omitted
here.
<Backup Device>
[0136] Next, the functional structure of the backup device is
explained.
[0137] FIG. 5 is a functional block diagram of the backup server
900.
[0138] As FIG. 5 shows, the backup server 900 includes a
transmission source authenticating unit 91, a receiving unit 92, a
data extracting unit 93 and a storing unit 94. Each of the
components above is structured from, for example, a control circuit
including a CPU, a ROM, a RAM and so on, a reception circuit for
receiving data, and a large-capacity recording medium for storing
and accumulating data. The reception of data, extraction of
transfer data, and storage of the data is performed by the
components in accordance with a computer program.
[0139] The transmission source authenticating unit 91
authenticates, upon reception of data, a transmission source device
as the party of the communication.
[0140] The receiving unit 92 receives data via a communication
path.
[0141] The data extracting unit 93 extracts transfer data included
in data received by the receiving unit 92.
[0142] The storing unit 94 stores transfer data extracted by the
data extracting unit 93.
<Data>
[0143] Next, the above-described transfer condition information is
explained.
[0144] The transfer condition information is information indicating
conditions that should be satisfied by the relay devices when
relaying and transferring data. The transfer condition information
includes pieces of information used for protection of the transfer
data to be backed up. In this embodiment, the protection of the
transfer data means protection of privacy relating to the transfer
data.
[0145] The transfer condition information is transmitted with the
transfer data when the information terminal device transmits the
transfer data. The information terminal device can limit the
pathway to be used for the relay by performing the transfer in
accordance with the transfer condition information. Note that the
information terminal device also transmits predetermined
information required for executing the backup via the communication
paths in addition to the transfer condition information. The
predetermined information includes, specifically, transfer data
identifying information that identifies the transfer data, user
identifying information that identifies an owner of the transfer
data, address information indicating an address of the backup
device that is a destination of the transfer data, and so on.
[0146] The following describes the transfer condition information
in detail.
[0147] FIG. 6 is a table showing transfer condition information
600.
[0148] As FIG. 6 shows, the transfer condition information 600
includes a transfer deadline 61, a data keeping deadline 62, a
deletion deadline 63, an address notification necessity 64, a hop
number 65, a reliability threshold value 66 and a blacklist 67.
[0149] The transfer deadline 61 indicates a deadline for
transferring transfer data to the backup device. In FIG. 6, for
example, the transfer deadline 61 indicates that the transfer data
is to be transferred to the backup device before Jan. 1, 2005.
[0150] The data keeping deadline 62 indicates at least until when
the relay device that relays the transfer data should keep the
transfer data. After the data keeping deadline, the relay device
may delete the transfer data. If the deadline is set with use of
the data keeping deadline 62, it becomes unnecessary for the relay
device to endlessly keep the transfer data which will not be
collected. As a result, it becomes possible to effectively use a
storage area included in the relay device. In FIG. 6, for example,
the data keeping deadline 62 indicates that the transfer data
should be kept by the relay device until Mar. 1, 2005.
[0151] The deletion deadline 63 indicates a deadline at which
transfer data as a relay target should be deleted from each storing
unit of the relay device. With use of the deletion deadline 63, it
becomes possible to make it mandatory for the relay device to
delete transfer data at the dead line indicated by the deletion
deadline 63. As a result, if the user of the information terminal
device fails to collect the data to be backed up, the risk of a
violation of privacy due to the transfer data unnecessarily
remained in the relay device is reduced. In FIG. 6, for example,
the deletion deadline 63 is "not designated", which means that the
relay device is not required to delete transfer data.
[0152] The address notification necessity 64 indicates whether it
is necessary to notify the information terminal device that has
transmitted the transfer data of an address of the relay device
that has received the transfer data. If the user of the information
terminal device that has transmitted the transfer data is notified
of the address by the relay device, the information terminal device
can grasp which relay device keeps the transfer data. As a result,
even in the case of losing the information terminal device, the
user can collect the data to be backed up by inquiring the relay
device at the notified address. In FIG. 6, for example, the address
notification necessity 64 indicates "necessary". Therefore, upon
receiving the transfer data, the relay device notifies the
information terminal device of the address of the relay device
itself. If the address notification necessity 64 does not indicate
"necessary", the relay device is not required to notify the
information terminal device of the address.
[0153] The hop number 65 indicates the number of relay devices that
are permitted to relay the transfer data before the transfer data
reaches at the backup device. In other words, the hop number 65
indicates the upper limit of the number of transfers. With use of
the hop number 65, it is possible to prevent data transmission
using an unnecessarily long relay pathway. This reduces the risk of
leakage of transfer data to an extraneous user. In FIG. 6, for
example, the hop number 65 indicates "3", which means that the
upper limit of the number of transfers is three times.
[0154] The reliability threshold value 66 is information indicating
the lower limit of a reliability level of a transfer destination
device to which transfer of the transfer data is permitted. Here,
the reliability level of a transfer destination indicates how
reliable the device is. In this embodiment, the reliability level
is digitized. For example, the reliability level of a device that
is entirely reliable is 100, the reliability level of a device that
is not reliable at all is 0, and a reliability level of a device
that is not reliable very much is 20. Note, in this embodiment,
that the maximum value of the reliability level is 100, and the
minimum value of the reliability level is 0. A high reliability
level represents high reliability. The relay device stores values
of the reliability level respectively in association with transfer
destination devices. For example, the relay device stores a
reliability threshold value table 700 as shown in FIG. 7.
[0155] The reliability threshold value table 700 is described next.
The reliability threshold value table 700 includes a transfer
destination device name 71, a transfer destination device address
72 and a reliability level 73.
[0156] The transfer destination device name 71 indicates the name
of the device that is a destination of the transfer.
[0157] The transfer destination device address 72 indicates an
address of the transfer destination device.
[0158] The reliability level 73 indicates a reliability level of
the transfer destination device.
[0159] The relay device refers to the value indicated by the
reliability threshold value 66 included in the transfer condition
information 600 shown in FIG. 6, to control the transfer. In the
example of FIG. 6, the reliability threshold value 66 indicates a
value "80". This means that only devices whose reliability level is
not less than 80 are permitted to be a transfer destination.
[0160] Note that the value of the reliability level stored in each
relay device may be predetermined by the user, or set by the relay
device based on a history of communications with the transfer
destination device. The history is, specifically, the number of
transfers of transfer data to the transfer destination device, a
history of data transmission and reception, and soon. Furthermore,
the relay device may acquire the value of the reliability level
from another device. Also, as to the reliability level of the
transfer destination device not stored by the relay device, the
relay device may calculate the reliability level based on the
reliability level of each device on a pathway of the data to the
transfer destination device.
[0161] The blacklist 67 is information indicating devices that are
not permitted to be the transfer destination. Specifically, the
blacklist 67 indicates names and addresses of such devices. With
use of the blacklist 67, it becomes possible to avoid that the
transfer data is transferred to a device that is not desired, by
the information terminal device, to be a transfer destination. In
the example shown in FIG. 6, the blacklist 67 indicates that the
transfer data is not permitted to be transferred to a device
"Musashi005" and so on.
<Operations>
[0162] Operations performed by the information terminal device, the
relay device and the backup device are described next. As described
in the Overview, it is assumed that the information terminal device
is the mobile phone 100, the relay devices are the mobile phone 200
and the backup server 300, and the backup device is the backup
server 900.
<Operations of Information Terminal Device>
[0163] FIG. 8 is a flowchart showing operations performed by the
mobile phone 100 as the information terminal device.
[0164] Using the backup image selecting unit 13, the mobile phone
100 selects a piece of data to be backed up from pieces of data
that have been acquired by the image acquiring unit 11 and stored
in the storing unit 12 (Step. S81). Here, the data to be backed up
may be designated by the user.
[0165] Using the transfer condition setting unit 14, the mobile
phone 100 sets the transfer condition information for the selected
data to be backed up (Step S82). The transfer condition may be
manually set by the user, or automatically set by the mobile phone
100 in accordance with information relating to the data, such as
the date when the data is acquired.
[0166] Upon the setting of the transfer condition by the transfer
condition setting unit 14, the mobile phone 100 generates, using
the backup information generating unit 15, data to be transferred
to the relay device, based on predetermined information, such as a
transmission source address, an address of the backup device that
is the final destination and information identifying the data to be
backed up, and the transferred data to be backed up, and the
transferred condition information (Step S83).
[0167] After the generation of the data, the transfer destination
selecting unit 16 selects a transfer destination with which the
mobile phone 100 can directly connect and communicate via a
communication path. In this embodiment, it is assumed that the
mobile phone 100 selects the mobile phone 200. Upon selecting the
mobile phone 200, the mobile phone 100 authenticates the mobile
phone 200, using the transfer destination authenticating unit 17.
If the mobile phone 100 succeeds in mutual authentication with the
mobile phone 200, the mobile phone 100 transmits the data generated
by the backup information generating unit 15 to the mobile phone
200, using the transmitting unit 18, via the communication path 20
(Step S84).
<Operations of Relay Device>
[0168] FIG. 9 is a flowchart showing operations performed by each
relay device, such as the mobile phone 200. The following explains
specific operations of mobile phone 200 as well as general
operations performed by the relay device.
[0169] For receiving data, the relay device authenticates the
transmission source device, using the transmission source
authenticating unit 21.
[0170] If the relay device succeeds in the mutual authentication
with the transmission source device, the relay device receives the
data transmitted by the transmission source device via the
communication path, using the receiving unit 22. The received data
includes the transfer condition information and the transfer data
(Step S91).
[0171] The transfer data included in the data received from the
transmission source device is stored in the storing unit 23 (Step
S92).
[0172] When the transfer data is stored, the control unit 24
controls the transfer of the transfer data in accordance with the
transfer condition information. Specifically, if there is any
transfer destination device that satisfies the transfer condition
information among the devices that the mobile phone 200 can
communicate with, the control unit 24 selects a transfer
destination device to which the data is transferred, using the
transfer destination selecting unit 25 (Step S93). If not, the
control unit 24 does not select any transfer destination device. In
the case where the mobile phone 200 can directly communicate with
the backup device at a relatively high speed, e.g. more than a
predetermined transfer rate, the control unit 24 selects the backup
device as the transfer destination device.
[0173] Using the transfer condition information 600 shown in FIG.
6, the following specifically describes the operations performed by
the control unit 24 to control the transfer of the transfer data
based on the transfer condition information. Firstly, transfer
control using the hop number 65 is described. If the value
indicated by the hop number 65 is greater than "1", the control
unit 24 selects a transfer destination device, decrements the hop
number by one, and performs the transfer. If the hop number 65 is
not greater than "1", the control unit 24 does not perform the
transfer. In the example shown in FIG. 1, the mobile phone 100 as
the information terminal device firstly sets a value "3" to the hop
number 65. Then, the mobile phone 200 as the relay device
decrements the hop number 65 by one so as to be "2", and performs
the transfer. Further, the backup server 300 that has received the
transfer data whose hop number is "2" confirms that the hop number
is greater than "1", and then decrements the hop number by one so
as to be "1", and transfers the data to the backup server 900.
[0174] In the case of selecting a transfer destination device using
the reliability threshold value 66, the control unit 24 refers to
the reliability threshold value table 700 for example, and selects
a transfer destination device whose reliability level 73 is higher
than the reliability threshold value 66 included in the transfer
condition information. At such a selection of a transfer
destination device, the relay device may acquire a reliability
level of another device from outside and select the transfer
destination device based on the acquired level. Also, various
different methods may be used alternatively. In the case where the
value indicated by the reliability threshold value 66 is greater
than the predetermined value and a high reliability is demanded of
the transfer destination device, the control unit 24 may permit
only devices shown in a list of reliable transfer destination
devices prestored in the relay device or only devices shown in a
list stored in a highly reliable transfer destination device to
transfer the transfer data.
[0175] Further more, in addition to the determination as to whether
to permit the transfer, the transfer data may be converted based on
the reliability level of each transfer destination device. For
example, a predetermined code for tracking the transfer data may be
added to the transfer data if the data is to be transferred to a
device whose reliability level is smaller than the value indicated
by the reliability threshold value 66. The predetermined code is
used for finding a device from which the transfer data has been
leaked in the case of unauthorized use of the transfer data. For
addition of the predetermined code, techniques such as finger
printing and digital watermarking may be used. As other processing,
if the transfer data is image data, the data size may be reduced by
changing the image size. Or else, a filtering procedure such as
mosaic processing may be performed on a particular part of the
image, or the image may be deleted.
[0176] In the case where a device that is not permitted to be a
transfer destination is included in the black list 67, the control
unit 24 performs control not to select the device, and not to
transfer the transfer data to the device.
[0177] Again, with reference to FIG. 9, the following further
describes the relay device.
[0178] Upon selecting the transfer destination device, the relay
device controls the transfer of the data based on the result of the
selection. In other words, if there is a transfer destination
device that satisfies the transfer condition information, the relay
device authenticates the selected transfer destination device using
the transfer destination authenticating unit 26. If the relay
device succeeds in the mutual authentication with the transfer
destination device, the relay device transfers the transfer data
and the transfer condition information to the transfer destination
device via the communication path, using the transmitting unit 27.
If there is no transfer destination device that satisfies the
transfer condition information, the relay device does not transfer
the transfer data (Step S94).
[0179] If the address notification necessity 64 included in the
received transfer condition information indicates "necessary", the
relay device transmits, when receiving the transfer data, the
predetermined data that indicates that the transfer data has been
received to the address of the information terminal device at the
transmission source, or to the address of the backup device as the
transfer destination of the data. The predetermined data includes
the address of the relay device that has received the transfer
data. If the predetermined data is transferred to the address of
the backup device, even in the case where the user loses the
information terminal device, the user can collect the data to be
backed up by inquiring the relay device at the address received by
the backup device.
[0180] The relay device also controls transfer and storage of
transfer data in accordance with each of the transfer deadline 61,
the data keeping deadline 62 and the deletion deadline 63, which
are indicated by the transfer condition information. Also, each
relay device may confirm integrity of the transfer data before
storing the received data. To confirm the integrity, the relay
device may use a well-known technique. For example, the relay
device may add electronic signature to the transfer data and verify
the signature. Since the electronic signature is a well-known
technique, the explanation thereof is omitted here.
[0181] The operations performed by the relay device are described
above. The following more specifically explains the operations by
taking the mobile phone 200 as an example.
[0182] To receive data transmitted by the mobile phone 100, the
mobile phone 200 authenticates the mobile phone 100 as the
transmission source, using the transmission source authenticating
unit 21.
[0183] If the mutual authentication with the mobile phone 100
succeeds, the mobile phone 200 receives the data transmitted by the
mobile phone 100 via the communication path 20, using the receiving
unit 22 (Step S91).
[0184] The transfer data included in the data received by the
mobile phone 200 is stored by the storing unit 23 (Step S92).
[0185] Here, in this embodiment, it is assumed that a user 2 who is
an owner of the mobile phone 200 connects the mobile phone 200 to
the backup server 200 also owned by the user 2. The communications
between the backup server 300 and the mobile phone 200 are realized
by the techniques discloses by Patent Documents 1 and 2 for
example, by which the communications with the backup server 300
begin when the mobile phone 200 is connected to the battery
charger. And here, it is assumed that the backup server 300
satisfies the transfer condition information. In the example of
this embodiment, the control unit 24, selects the backup server 300
as the transfer destination device that satisfies the transfer
condition information, in accordance with the transfer condition
information (Step S93).
[0186] Upon selecting the backup server 300 to be the transfer
destination device, the control unit 24 authenticates the backup
server 300 using the transmission authenticating unit 26. If the
mutual authentication with the backup server 300 succeeds, the
control unit 24 transmits the transfer data and the transfer
condition information to the backup server 300 via the
communication path 30, using the transmitting unit 27 (Step
S94).
[0187] Note that the backup server 300 is capable of communicating
with the backup server 900, into which the data is backed up by the
user 1 as the owner of the mobile phone 100, via the communication
path 90. Therefore, in Step S93, the control unit 24 selects the
backup server 900 as the transfer destination device, and in Step
S94, transfers the data to the backup server 900.
<Operations of Backup Device>
[0188] The following describes operations performed by the backup
device.
[0189] FIG. 10 is a flowchart showing operations performed by the
backup server 900 as the backup device.
[0190] For receiving data, the backup server 900 authenticates the
transmission source device, using the transmission source
authenticating unit 91. If the mutual authentication with the
transmission source device succeeds, the backup server 900 receives
the data via the communication path, using the receiving unit 92
(Step S101).
[0191] The backup server extracts transfer data from the received
data, using the data extracting unit 93 (Step S102).
[0192] Upon extracting the transfer data, the backup server 900
stores the extracted data in the storing unit 94 (Step S103).
<Applications>
[0193] In this example, the data of the information terminal device
is transferred to the backup device. However, the present invention
is not limited to this embodiment, and various applications are
possible.
[0194] In the example above, only one pathway via the communication
path 20, the communication path 30, and the communication path 90
is described as the pathway for the backup. However, in addition to
this pathway, another pathway via the communication path 21, the
communication path 31 and the communication path 91 shown in the
same drawing may be used for the backup via the mobile phone 201
and the backup server 301. By using a plurality of pathways to back
up the data by the aid of the relay devices, it becomes possible to
more certainly transmit the data to the backup device. For example,
if identical copies of the data are transmitted via a plurality of
paths at the same time, even if the collection of the data fails as
to any of the paths, it is possible to collect the data from the
rest of the paths. Therefore, the backup of the data can be more
surely performed.
[0195] To more surely realize the privacy protection, it is
preferable that the transfer data is transferred via a
communication path that is predictable by the information terminal
device. As a result, it becomes possible to reduce the risk of
leakage of the transfer data to a communication path that is
unknown to the user of the information terminal device. For this
reason, the transfer destination authenticating unit of each of the
information terminal device and the relay device may select at
least one from previously-registered transfer destinations. Or,
reliability levels may be set for each device and stored
previously, and a device with the highest reliability level may be
selected by priority among devices satisfying the transfer
condition information.
[0196] Also, regarding a relay device that directly communicates
with the information terminal device and receives data the first,
the conditions indicated by the transfer condition information may
not be applied. This is because, in the case where the information
terminal device directly communicates with the relay device, the
information terminal device already recognizes which devices is the
transfer destination device, and the user of the information
terminal device does not suffer disadvantage relating to privacy
protection. Here, "not applying the transfer condition information"
means, specifically, that the information terminal device ignores
the blacklist 67 and the reliability threshold value 66, and
transmits the data. In addition to this, various cases can be
assumed. For example, the hop number 65 may not be decreased. Also,
the address may not be notified even if the address notification
necessity indicates "necessary".
[0197] Also, it can be assumed that the privacy is different for
each piece of the transfer data. For example, image data including
an image of a person has a high value especially for the person as
the object. Therefore, the information terminal device and the
relay devices may choose a different pathway for each piece of the
transfer data. For example, to transfer a certain piece of data by
the aid of users particularly relating to the data, the data is
transferred by the mobile phone 200 and the backup server 300 via
the communication path 20, the communication path 30, and the
communication path 90. On the other hand, another piece of data is
transferred by the mobile phone 201 and the backup server 301 via
the communication path 21, the communication path 31 and the
communication path 91, instead of the pathway including the
communication path 20 and so on.
[0198] To strengthen the privacy protection, one piece of a
transfer data may be divided into more than two pieces, and each
piece of data may be transferred via a different pathway. The
backup device can combine the pieces of data each received via the
different pathway, to obtain the original data to be backed up. In
this way, dividing the original data can prevent that the original
data is restored using the pieces of data. As a method for dividing
data into more than two pieces, the Threshold Secret Sharing Scheme
may be used, for example. If this method is used, even if some of
the pieces of data are lost in the course of the transfer, it is
possible for the backup device to restore the original data as long
as the number of existing pieces of data is more than the threshold
value relating to the secret sharing.
[0199] Meanwhile, as a method for selecting a piece of data to be
backed up, in addition to the example described in the explanation
of the operations performed by the information terminal device, the
data to be backed up may be selected in such a manner that only
data generated after the previously-performed backup is selected.
Also, if the data to be backed up is images, it is possible to
select, by priority, an image including a person as an object.
Furthermore, it is possible to add an execution priority to each
piece of data stored in the storing unit 12 of the information
terminal device, and the pieces of data are selected in the order
of the execution priority level by the backup image selecting unit
13. Also, the priority may be determined based on various types of
information, such as necessity of the backup, importance of the
data, whether the data has been already backed up or not, and the
time length elapsed from the backup performed the last time. For
example, a piece of data that has not ever been backed up may be
given a priority over a piece of data that has been backed up
recently.
[0200] The backup image selecting unit 13 can select, as data to be
backed up, not only the data acquired by the image acquiring unit
11 and stored in the storing unit 12, but also every piece of data
acquired by the mobile phone 100. For example, it may be data
acquired via a network or medium such as a recording medium, or
music data or movie data, or a commercial content distributed by a
content provider and acquired by the mobile phone 100. In the
above-described embodiment, since an example of backing up data
acquired by the user is explained, the transfer condition
information is explained as including information for protecting
privacy relating to the transfer data. However, in the case of
backing up a commercial content, the transfer condition information
indicates conditions to be satisfied for execution of the transfer,
and it may be determined by the content provider. Note that the
object of the present invention might not be the backup of the
data. In other words, the object may be to simply transfer data to
another device by the aid of the relay devices that relays the
data.
[0201] Also, in the above-described embodiment, the relay device
judges whether to delete the transfer data in accordance with each
of the transfer deadline 61, the data keeping deadline 62 and the
deletion deadline 63. However, the present invention is not limited
to this. The relay device may delete the transfer data stored
therein when receiving a predetermined signal from another device
such as the backup device. Such a signal may be transmitted from
said another device when said another device stores the transfer
data. This enables the relay device to confirm that the relay
device can delete the transfer data. Therefore, it becomes
unnecessary for the relay device to endlessly keep the transfer
data.
[0202] In the above described embodiment, when the information
terminal device begins the backup is not particularly limited. The
backup may be started at a user's instruction, or may be performed
periodically. Also, the execution of the backup may be
automatically prepared when a predetermined time elapses from the
time when the backup was performed the last time, and then
performed immediately after a transfer destination device is found.
Furthermore, a predetermined condition may trigger the preparation
for execution of the backup. For example, the preparation may start
when the user passes through the gate of his house, or when an
amount of data that has not been backed up reaches a predetermined
amount.
[0203] In addition to the above-described embodiment, to ensure the
privacy protection, the information terminal device and the relay
device may encrypt the data to be backed up before starting the
transmission, to reduce the risk that the data is referred from
outside. This encryption may be performed every time the transfer
is performed, and may be performed using a public key of the backup
device. Also, signature data or authentication code (Message
Authentication Code) may be added to the data at the time of the
transmission. It is possible to use public key cryptography for
this signature as well. As a result, it becomes possible to confirm
that the data in the backup device is not tampered or
counterfeited.
[0204] The relay device may transfer received data to another
device without change, or may change codec, if the data is image
data or moving picture data, or perform compensation, or change the
size or the bit rate before transferring the data. Also, the relay
device may add a digital watermark or information for tracking the
data to the data before transferring the data.
[0205] Note that a term "backup" generally means to transmit a copy
of the data to be backed up to the backup device with keeping the
original data in the information terminal device. However,
regarding the present invention, the information terminal device
may delete the data to be backed up stored in the storing unit 12
after transmitting the data. As a result, even in the case where
the remaining capacity of the storage area is small, it is possible
to make space for storing data.
Second Embodiment
[0206] The following describes another embodiment of the backup
system according to the present invention, with reference to the
drawings.
<Overview>
[0207] FIG. 11 shows an overall structure of a backup system 2000
according to the second embodiment of the present invention. The
second embodiment is different from the first embodiment in that
the relay devices such as a mobile phone 210 and a mobile phone
211, having substantially the same structure as the mobile phone
200 and the mobile phone 201, do not transfer data when receiving
the data from the mobile phone 100 as the information terminal
device, and instead, transmits exchange information indicating
which relay device stores the transfer data to a backup server 900
as the backup device via a communication path 50 and a
communication path 51. The mobile phone 210 and the mobile phone
211 are connected to the backup server 900 via the communication
path 50 and the communication path 51 respectively. Here, it is
assumed that the communication path 50 and the communication path
51 are telephone lines for example, and their communication speeds
are lower than that of the broadband network.
[0208] As a result, even if the user of the information terminal
device looses the information terminal device, it is possible to
collect the backup data by specifying the relay device that stores
the backup data based on the exchange information received by the
backup device, and having the relay device transfer the data.
[0209] The following mainly describes the differences from the
first embodiment.
<Structure>
[0210] The structure of the information terminal device is the same
as the first embodiment. Therefore, an explanation thereof is
omitted here, and the structure of the relay device is described
next.
[0211] FIG. 12 is a functional block diagram of a mobile phone 210
according to the second embodiment.
[0212] As FIG. 12 shows, the mobile phone 210 includes an exchange
information creating unit 28, which is not included in the mobile
phone 200 of the first embodiment. The components other than the
exchange information creating unit 28 are the same as the
components of the mobile phone 200. Therefore, the same reference
numbers are given to those components, and explanations thereof are
omitted here.
[0213] When the data transmitted from the information terminal
device is received by the receiving unit 22 and stored in the
storing unit 23, the exchange information creating unit 28 creates
the exchange information indicating which relay device stores the
transfer data. The exchange information is described later. The
exchange, information creating unit 28 transmits the created
exchange information to the backup device which is the final
transfer destination of the received data.
[0214] The structure of the mobile phone 211 is the same as the
mobile phone 210. Therefore, an explanation thereof is omitted
here.
[0215] The backup server 900 as the backup device receives, using
the receiving unit 92, the exchange information transmitted by the
mobile phone 210 via a communication path, and stores the received
exchange information in the storing unit 94.
<Data>
[0216] The following describes the exchange information.
[0217] FIG. 13 shows exchange information 1300. Note that FIG. 13
shows an example of the exchange information to be transmitted by
the mobile phone 210 as the relay device to the backup server 900
in the case where the data to be backed up is transmitted by the
mobile phone 100 to the mobile phone 210.
[0218] As FIG. 13 shows, the exchange information 1300 includes
backup source identifying information 131, keeping device
identifying information 132, a backup data ID 133, a backup data
amount 134, a keeping period 135, and a signature 136.
[0219] The backup source identifying information 131 includes an ID
of information terminal device that performs the backup, and an
address of the information terminal device. In the sample shown in
FIG. 13, the backup source identifying information 131 indicates
that the ID of the information terminal device is "Hanako001" and
the address of the information terminal device is
"123.456.789.001".
[0220] The keeping device identifying information 132 indicates an
ID of the relay device that has received the data from the
information terminal device and stores the data, and the address of
the relay device. In the example shown in FIG. 13, the keeping
device identifying information 132 indicates that the ID of the
relay device is "Musashi005" and the address of the relay device is
"456.789.012.345".
[0221] The backup data ID 133 is information for identifying data
backed up by the information terminal device, and indicates the
name of the data. In the example shown in FIG. 13, the backup data
ID 133 indicates two names, namely "Photo1.jpg" and "Photo2.jpg",
as data names.
[0222] The backup data amount 134 indicates the data amount of the
data backed up by the information terminal device. In the example
shown in FIG. 13, the data amount is "5 MB".
[0223] The keeping period 135 indicates a period for which the
relay device keeps the data to be backed up. In the example shown
in FIG. 13, the relay device keeps the data for four months from
Nov. 1, 2004 to Mar. 1, 2005.
[0224] The signature 136 indicates that the exchange information
1300 has been created by the relay device that stores the data. The
signature is generated by an RSA signature-method and so on, using
the private key of the relay device.
<Operations>
[0225] The following describes operations performed by each relay
device. Operations performed by the information terminal device are
the same as those of the first embodiment. Therefore, an
explanation thereof is omitted here.
[0226] FIG. 14 is a flowchart showing operations performed by the
relay device according to the second embodiment. In the example of
FIG. 14, the case where the relay device is the mobile phone 210 is
explained. Note that the backup device is the backup server
900.
[0227] Step S141 is for the same processing as Step S91 shown in
FIG. 9, and Step S142 is for the same processing as Step S92.
Therefore, explanations thereof are omitted here.
[0228] When the transfer data is stored in the storing unit 23 by
the processing in Step S142, the exchange information creating unit
28 creates exchange information, and transmits the created exchange
information to the backup server 900 via a communication path 50
(Step S143).
[0229] After transmitting the exchange information, if the relay
device receives an inquiry as to the transfer data from the backup
server 900, the relay device starts transfer of the transfer data
to the backup server 900 (Step S144). If the relay device does not
receives an inquire as to the transfer data from other devices such
as the backup server 900, the relay device keeps or deletes the
transfer data stored in the storing unit 23, in accordance with the
period shown by the keeping period 135.
[0230] Note that the size of the exchange information is smaller
than image data and so on. Therefore, even if the exchange
information is transmitted to the backup server 900 via a low-speed
communications line such as the communication path 50, load on the
line and the cost is low.
[0231] Meanwhile, upon receiving the exchange information via the
communication path 50, the backup server 900 stores the received
exchange information in the storing unit 94.
[0232] If the user of the information terminal device that backs up
the data in the backup server 900 loses the information terminal
device, the user requests the relay device that stores the transfer
data to transfer the transfer data based on the exchange
information stored in the backup server 900, and collects the data.
The method used for collecting the data is, for example, a method
using an IP address for using a network, or a method using a medium
such as a memory card.
[0233] In the second embodiment above, the relay device transmits
the created exchange information to the backup device. However, the
present invention is not limited to this. The relay device may
transmit the exchange information to a device other than the backup
device, such as the information terminal device. If this is the
case, the user of the information terminal device may keep the
received exchange information in a removable medium or the like.
This means that the user can keep the substation information
separately from the information terminal device. Also, the exchange
information may be transmitted from the information terminal device
to the backup device.
Third Embodiment
[0234] The following describes a backup system according to the
third embodiment.
<Overview>
[0235] The third embodiment is characterized by that when a mobile
phone transmits data to be backed up to another device, the mobile
phone also receives data to be backed up from the transfer
destination device.
[0236] Here, the both devices transmit and receive
transmission/reception condition information to and from each
other, and judge whether to perform mutual backup based on the
transmission/reception condition information.
[0237] With this structure, it is possible to prevent that only one
of the devices occupies the storage of the other device to back up
data, and the devices can perform mutual backup under a fair
condition. The following describes, as an example, a case where
mobile phones perform such mutual backup.
<Structure>
[0238] FIG. 15 is a functional block diagram of a mobile phone 500
which has a function of performing mutual backup. In this
embodiment, it is assumed that the mobile phone 500 and a mobile
phone having the same structure as the mobile phone 500 perform the
mutual backup.
[0239] As FIG. 15 shows, the mobile phone 500 includes an image
acquiring unit 11, a storing unit 12, a backup image selecting unit
13, a transfer condition information setting unit 14, a backup
information generating unit 15, a transmitting unit 18, a
transmission source/destination selecting unit 51, a transmission
source/destination authenticating unit 52, a receiving unit 53, a
transmission/reception condition control unit 54, and a
transmission/reception condition generating unit 55.
[0240] The image acquiring unit 11, the storing unit 12, the backup
image selecting unit 13, the transfer condition information setting
unit 14, and the backup information generating unit 15 are the same
as those of the mobile phone 100 in the first embodiment.
Therefore, explanations thereof are omitted here.
[0241] The transmitting unit 18 has a function of transmitting
data. For example, the transmitting unit 18 transmits data to be
backed up; transmission/reception condition information that
relates to the data to be backed up by the mobile phone 500 itself,
and so on. The transmission source/destination selecting unit 51
selects a mobile phone that performs the mutual backup.
[0242] The transmission source/destination authenticating unit 52
authenticates a mobile phone that performs the mutual backup.
[0243] The receiving unit 53 receives the data transmitted from the
mobile phone as the party of the mutual backup, or the
transmission/reception condition information transmitted from the
party.
[0244] The transmission/reception control unit 54 controls the
mutual backup with the mobile phone as the party, based on the
transmission/reception condition information that relates to the
data that is to be backed up by the mobile phone 500 itself and the
transmission/reception condition information that is transmitted
from the mobile phone as the party of the mutual backup.
[0245] The transmission/reception condition generating unit 55
generates the transmission/reception condition information that
relates to the data to be backed up by the mobile phone 500
itself.
<Data>
[0246] The following describes the transmission/reception condition
information.
[0247] FIG. 16 shows the transmission/reception condition
information. In the example of FIG. 16, a transmission condition
1600a represents transmission/condition information that relates to
data to be backed up by the mobile phone 500 itself. A reception
condition 1600b represents information that relates to the data to
be backed up by the party of the mutual backup. In this embodiment,
whether to execute the mutual backup is judged based on the
transmission/reception condition information transmitted by the
mobile phone 500 itself and the transmission/reception condition
information received from the party of the mutual backup.
[0248] As FIG. 16 shows, a data amount 161a included in the
transmission condition 1600a indicates an amount of data to be
backed up by the mobile phone 500 itself.
[0249] A recording method 162a indicates how the data to be backed
up by the mobile phone 500 should be recorded by the mobile phone
as the party. In the example shown in FIG. 16, "double recoding"
means that the data should be recorded at two locations.
[0250] A keeping deadline 163a indicates a deadline until which the
backup data is desired to be kept. In the example shown in FIG. 16,
the mobile phone as the party is desired to keep the data for four
months until Mar. 1, 2005.
[0251] A data amount 161b included in the reception condition 1600b
indicates an amount of data to be backed up by the mobile phone as
the party.
[0252] A recording method 162b indicates how the data to be backed
up by the mobile phone as the party should be recorded by the
mobile phone 500.
[0253] A keeping deadline 163b indicates a deadline until which the
backup data to be backed up by the party is desired to be kept by
the mobile phone 500. In the example shown in FIG. 16, the mobile
phone 500 is desired to keep the data for two months until Jan. 1,
2005.
<Operations>
[0254] FIG. 17 is a flowchart showing operations performed by the
information terminal device and another device for the mutual
backup. The example shown in FIG. 17 describes the operations up to
the exchange of the backup data performed by the mobile phone 500
and the mobile phone as the party. The operations for the transfer
of the data to the backup device performed after the data is
exchanged are the same as that of the relay device in the first
embodiment. Therefore, the explanations thereof are omitted
here.
[0255] As shown in FIG. 17, the mobile phone 500 selects data to be
backed up, using the backup image selecting unit 13 (Step S1701).
Regarding the selected data, the mobile phone 500 sets the transfer
condition, using the transfer condition setting unit 14, and
generates data to be transmitted to another device, using backup
information generating unit 15 (Step S1702).
[0256] After generating data to be transmitted, the mobile phone
500 generates the transmission/reception condition information
relating to the data to be backed up (Step S1703). More
specifically, the mobile phone 500 generates the transmission
condition 1600a shown in FIG. 16. On the other hand, the mobile
phone as the party generates the reception condition 1600b shown in
FIG. 16.
[0257] After both devices have generated the transmission/reception
condition information, the mobile phone 500 transmits the
transmission condition 1600a using the transmitting unit 18, and
receives the reception condition 1600b using the receiving unit 53
(Step S1704).
[0258] After exchanging the transmission/reception conditions, the
transmission/reception condition control unit 54 digitizes the
transmission/reception condition, and judges whether the
transmission/reception conditions are fair to both phones (Step
S1705).
[0259] As a method for the digitization, it is possible to digitize
the condition by calculating "required memory amount.times.period".
In the example of FIG. 16, according to the transmission condition
1600a transmitted by the mobile phone 500, the value of the
digitized transmission/reception condition is "5 MB.times.double
recording.times.four months=40". On the other hand, according to
the transmission condition 1600b received from the mobile phone as
the party, the value of the digitized transmission/reception
condition is "20 MB.times.single recording.times.2 months=40". In
this way, if the exchanged transmission/reception conditions are
digitized to the same value, the transmission/reception condition
control unit 54 judges that the backup is fair (Step S1705:
YES).
[0260] If judging that the backup is not fair, based on the
digitized transmission/reception conditions (Step S1705: NO), the
transmission/reception control unit 54 controls the
transmission/reception of data so that the mutual backup becomes
fair (Step S1706). For example, the size of the data to be backed
up by the mobile phone 500 is 10 MB, the value of the digitized
transmission condition is "10 MB.times.double recording.times.4
months=80". This is not equal to the value calculated by digitizing
the reception condition 1600b. Therefore, the
transmission/reception control unit 54 judges that this mutual
backup is not fair. In this case, the transmission/reception
control unit 54 sets 40 MB as the amount of data that the mobile
phone 500 receives from the mobile phone as the party. As a result,
the value calculated by digitizing the transmission/reception
condition information of the mobile phone as the party is "40
MB.times.single recording.times.2 months=80", which means that this
transmission/reception condition is fair.
[0261] After the transmission/reception condition control unit 54
has finished the control, the mobile phone 500 exchanges the backup
data with the mobile phone as the party (Step S1707).
[0262] The above is the backup system according to the third
embodiment. However, the present invention is not limited to this,
and various applications are possible.
[0263] For example, in the above-described example, Step S1705 of
FIG. 17 is explained that the transmission/reception conditions
exchanged between the mobile phone 500 and the party are digitized,
and if the values are the same, the transmission/reception
condition control unit 54 judges that the backup is fair. However,
the transmission/reception condition control unit 54 may judge that
the backup is fair not only in the case where the values are the
same, but also the case where the difference between the values is
less than a predetermined threshold value, or, for example, the
case where one of the values is not smaller than 70% and not more
than 130% of the other value, to relax the criterion for the
judgment.
[0264] Also, in the above-described embodiment, the mutual backup
is started when the transmission/reception conditions are regarded
as being fair. However, even if the transmission/reception
conditions are regarded as being fair, if the mobile phone as the
party does not satisfy the condition indicated by the transfer
condition information, the mutual backup may not be permitted. This
prevents data exchange with an undesired party.
[0265] Also, in the example above, if the values calculated by
digitizing the transmission/reception conditions are not the same,
the difference is controlled in Step S1706 such that the
transmission/reception conditions become fair, or if the difference
is within a certain range, the condition is regarded as being fair.
However, the present invention is not limited to this. For example,
the difference may be converted to a right or a voucher that can be
used for executing backup the next time. If this is the case, the
right or the voucher may be used for mutual backup not with the
mobile phone as the party with which the right or the voucher is
generated.
[0266] Furthermore, the difference may be converted to valuable
information or an incentive not relating to execution of the
backup. For example, the difference may be converted to value
information having a cash value, such as electronic money and
points. Also, it may be converted to a right to use processing
power or calculation power of other devices, or a right to use a
bandwidth broader than other devices, or a right to view a
commercial content such as moving pictures.
[0267] In addition to the above-described embodiments, the present
invention also includes a structure in which both devices store the
data to be backed up mutually without using the transfer condition
information.
[0268] Also, in the explanation of Step S1703, regarding the method
used by the transmission/reception condition generating unit 55 to
generate the transmission/reception condition information, it is
described that the transmission/reception condition generating unit
55 generates the transmission/reception condition information shown
in FIG. 16. However, the transmission/reception condition
information may be generated based on a user's input, or
automatically generated based on information relating to the data
to be backed up, such as the data amount.
[0269] Also, the transmission/reception condition information may
further include conditions relating to a recording medium that
stores the backup data, such as a reliability of a medium that
stores the backup data, or a security level of a storage
medium.
<Supplemental Description>
(Other Modifications)
[0270] The present invention is described based on the embodiments
above. However, the present invention is not limited to this. The
following are possible modifications.
(1) The above-described embodiments explain cases where the
information terminal device is a mobile phone. However, the present
invention is not limited to this. The information terminal device
may be a communication device having a communication function. The
communication device is, for example, a PDA (Personal Digital
Assistance), a personal computer or a palm top. (2) Each of the
above-described devices is specifically a computer system
structured from a microprocessor, a ROM, a RAM, a hard disk unit, a
display unit, a keyboard, a mouse, and so on. A computer program is
stored on the RAM or the hard disk unit. Each device carries out
functions as a result of the microprocessor operating in accordance
with the computer program. Here, a computer program is structured
by a combination of a plurality of instruction codes for
instructing a computer to achieve predetermined functions. (3) Part
or all of the components structuring the information terminal
device, the relay device, and the backup device may be a single
system LSI (Large Scale Integration). The system LSI is a
super-multifunctional LSI, which is manufactured by integrating a
plurality of components on a signal chip, and specifically is a
computer system structured by a microprocessor, a ROM, a RAM and so
on. A computer program is stored on the RAM. The system LSI carries
out functions as a result of the microprocessor operating in
accordance with the computer program. Each system LSI may be
separately realized as a single chip, or part or all of the System
LSI may be realized as a single chip. Note that though LSI is used
here, the circuit may be variously described as an IC, a system IC,
a super LSI or an ultra LSI depending on the level of
integration.
[0271] Note also that the technique used to make an integrated
circuit is not limited to the LSI technique. A special-purpose
circuit or a general-purpose processor may be used instead. It is
also possible to use LSI circuits such as the programmable FPGA
(Field Programmable Gate Array) whose configurations can be altered
after production or a reconfigurable processor whose circuit cell
connections and settings are configurable.
[0272] Moreover, if a technology to replace LSI emerges due to
progress in the field of semiconductor technology or due to the
derivation of another technology, such a technology may be used to
integrate the functional block. The use of biotechnology, and the
like is considered to be a possibility.
(4) The present invention may be the backup method described above.
Also, the present invention may be a computer program for realizing
the method using computer, or digital codes of the computer
program.
[0273] Further, the present invention may be the above-mentioned
computer program and the digital code recorded onto a recording
medium. Examples of such recording media include, a flexible disk,
a hard disk, a CD-ROM, a MO, a DVD, a DVD-ROM, a DVD-RAM, a BD
(Blu-ray Disc), a semiconductor memory and the like.
[0274] Further, the present invention may be realized such that the
computer program and the digital code are transmitted across
telecommunications networks, wired and wireless, such as the
Internet and the like.
[0275] Further, the present invention may be a computer system
having a microprocessor and a memory, the memory holding the
above-mentioned computer program and the microprocessor performing
operations according to the computer program.
(5) The present invention may include various combinations of the
embodiments and the modifications.
INDUSTRIAL APPLICABILITY
[0276] The backup system according to the present invention is
particularly useful for performing backup in an environment where
mobile communication devices such as mobile phones are used.
* * * * *