Abstract:
PROBLEM TO BE SOLVED: To provide a transfer method allowing input of highly-confidential information securely and exchange of it via a network, without being captured by malicious software so as to securely reflect the information on a computer. SOLUTION: Upon transfer of encrypted information from a server to a computer, the transferred information is stored in a memory of the computer, which is shifted into a suspend state, is immediately returned therefrom, and is shifted and controlled with a BIOS. Then, the information stored in the memory is decrypted and processed, processing information generated based on the processed information is encrypted, the computer is shifted and controlled with an OS, and the encrypted processing information is transferred to the server. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method for computing manufacturability of a lithographic mask to be used for manufacturing a semiconductor device. SOLUTION: Target edge pairs are selected from the mask layout data of a lithographic mask for computinging a manufacturing penalty as an index indicating the difficulty of manufacturing in making a lithographic mask. The mask layout data includes polygons, and each polygon has a large number of edges. Each target edge pair is defined by two edges of edges of one or more of the polygons. The manufacturability of the lithographic mask, including the manufacturing penalty in making the lithographic mask, is determined. Determining the manufacturing penalty is based on the target edge pairs selected. Determining the manufacturability of the lithographic mask uses continuous differentiability of the maufacturability defined on a continuous scale. The manufacturability of the lithographic mask is output. The manufacturability of the lithographic mask is dependent on the manufacturing penalty in making the lithographic mask. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To surely select a target hot spot to be selected. SOLUTION: On the assumption that a specification error is generated at the time of selecting a target hot spot to be selected, a pointer 4 having an area is used for rounding the specification error. A pointing area including the target hot spot is determined by using the pointer 4. Then hot spots overlapped with the pointing area are listed up. Then the listed-up hot spots are displayed by an enlarged display state. Finally the target hot spot 2 is selected from the enlarged hot spots.
Abstract:
PROBLEM TO BE SOLVED: To reduce a risk that a password or the like may be acquired by a malicious user while making it possible to perform domain logon utilizing a cache within a registry. SOLUTION: Processed password information corresponding to user identification information is read out from a secured storage area in which GINA (Graphical Identification and Authentication) to be a part of Windows (R) is and written in the registry. After completing authentication concerned with domain logon, the password information written in the registry is erased. Consequently, user's password information is not left in the registry and is not stored as a system file. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a mask design method, a program thereof, and a mask design system.SOLUTION: The mask design system according to the present invention includes: an optimization unit 120 having a global mask optimization section 122 and a global light source optimization section 123; and an optical domain simultaneous optimization unit (FDJO) 124. The optimization unit 120 performs a non-linear optimization for an optical domain representation of a mask pattern under a constraint condition that a value of a negative deviation of the object domain representation at a prescribed evaluation point of a restored object domain representation is smaller than a value of a predetermined negative threshold of the evaluation point.
Abstract:
PROBLEM TO BE SOLVED: To provide a computer in which passwords of a magnetic disk device and a BIOS (Basic Input/Output System) for protecting security can be shared among a plurality of users, and a shared password management method. SOLUTION: An internal key is encrypted using an external key that can be input only by the users concerned, and the shared passwords are further encrypted using the internal key. The encrypted internal key and shared passwords are stored in a nonvolatile storage means to which read prohibition can be set. Consequently, if the user knows his/her external key, the user can use the computer without knowing the shared passwords and can change the shared passwords. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a device which doesn't affect or limit a design very much and excels in operationality, a wrist watch-type device, a control method of a device and a transfer method of a pointer. SOLUTION: A wristwatch type device 10 comprises an image sensor 14. When the wristwatch type device 10 is moved, a display position of a pointer P on a display screen of the display 12 is changed based on the moved vector of an image caught by the image sensor 14. By allowing touch sensors 15A and 15B laid in the circumference of the display 12 to function as switches, the image sensor 14 is started when the touch sensors 15A and 15B are touched.
Abstract:
PROBLEM TO BE SOLVED: To make clear the relation of a power control signal and power consumption by detecting the change of the power control signal, storing it in a storage device, periodically measuring a signal concerning the power consumption of the components of a prescribed computer and signal concerning the power consumption of the entire computer and storing them in the storage device. SOLUTION: A power control signal 123 and a power signal 125 of a computer 100 as an object to be checked are inputted to an analyzer 113, the power control signal is monitored at every timing of a timer of the analyzer 113, and the change of the power control signal is recorded. Similarly, the power signal is monitored at every timing of the timer, and the power consumption is recorded. A memory 117 records data from a signal monitor 115, and the contents in the memory 117 are processed by a visualizing processor 119 and displayed on a display device 121. On the display device 121, the change of the power control signal and the change of power consumption are displayed on the same time base or the change of the contents of the power control instruction and the change of power consumption are displayed on the same time base.
Abstract:
PROBLEM TO BE SOLVED: To provide a method for computing manufacturability of a lithographic mask to be used for fabricating a semiconductor device. SOLUTION: A set of a plurality of target edges is selected from mask layout data of a lithographic mask (402). Then, target edge pairs are selected from the selected set of target edges (404). The manufacturability of the lithographic mask, including the manufacturing penalty in making the lithographic mask, is computed based on the target edge pairs selected (406). The manufacturability of the lithographic mask is output (408). The manufacturability of the lithographic mask is dependent on the manufacturing penalty in making the lithographic mask. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a new input/output device which adds/helps the function of a PC main body when it is connected to the PC main body and which operates like a conventional PDA in the state of being cut off from the PC main body. SOLUTION: An input/output device 120 to which this invention is applied operates in an independent state and operates in cooperation with a PC main body 110 also in the state of being housed in the PC main body 110. The device 120 consists of a display screen 310 comprising a touch panel, etc., a display screen 330 which is seen from outside even in a state where the cover of the PC main body is closed, a port 452 for exchanging data in the case of being housed in the PC main body 110, and a transmitter/receiver 462 for radio communication.