Abstract:
PURPOSE:To speed up processing by obtaining m-pieces of sums of products through an adder operating like a pipeline while mXn pieces of data are inputted. CONSTITUTION:An exclusive hardware to perform the addition of a floating point is provided, and in addition, it is constituted so as to be divided into plural stages to operate like the pipeline. Further, by arranging an arithmetic calculating part 20 capable of the multiplication of the floating point in series with the adder 22, the convolution of floating point data can be performed by letting the data pass through a processing unit 16 one time. Since the sets of operands coming into the adder 22 continuously are independent of each other, the adder 22 can add them by using the respective stages of the pipeline to the full. Thus, the operation of the sum of products by the data of floating point expression can be executed without lowering pipeline performance, and the processing can be speeded up.
Abstract:
PROBLEM TO BE SOLVED: To provide a portable terminal device which even when data having a hierarchical data structure is displayed, can discriminate to which layer data a touch operation to a touch panel shows an operation instruction directed, and is caused to execute a prescribed function.SOLUTION: A portable terminal device having a touch panel on a display screen, includes: a depressed operation detection part for detecting a depressed operation applied to a prescribed area on the display screen; a sweep operation detection part for detecting a sweep operation applied to another area of the display screen; and a terminal data processing part for discriminating a layer of data to be operated on the basis of the presence or absence of the depressed operation detected by the depressed operation detection part, and executing processing to data of the discriminated layer on the basis of a content of the sweep operation detected by the sweep operation detection part.
Abstract:
PROBLEM TO BE SOLVED: To provide a user authentication control device, a user authentication device, a data processing device, and a user authentication control method or the like capable of keeping a balance between convenience and safety for a user by controlling an authentication interval or an effective period of authentication in accordance with communication speed.SOLUTION: A user authentication control device controls an effective period of authentication in a user authentication device incorporated in a data processing device connected through a network with a server device. The user authentication control device includes data flow amount acquisition means for measuring the amount of data flow communicated through the network with the server device and effective period determining means for determining the effective period of authentication by the amount of data flow and a factor determined on the basis of the server device or importance of data in the server device, and defines as the expiration of the effective period the time when the cumulative total of the amount of data flow exceeds a predetermined prescribed amount.
Abstract:
PROBLEM TO BE SOLVED: To obtain a group behavior management system and a group behavior management program capable of easily managing behaviors pertaining to comparatively short distances of a group composed of a plurality of persons. SOLUTION: In a house, a confirming apparatus 204 is arranged, and a designated operation control section 228 controls a locking device 203, for example, to perform a predetermined operation such as locking of doors, when a short range radio communication section 225 becomes unable to receive short-range radio in all group user terminals 206P, 206M, 206T, 206H whose IDs have been registered in a registered individual ID holding section 226. Management is also possible, when communication with all user terminals 206 can be performed by using a short range radio communication technique, or when a part is lacking. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To inexpensively realize hiding (unreadableness) of the processing program content on a program storage device in software in a platform independent shape for preventing the processing content from being analyzed by a user and a malicious attacker in an information processor for executing processing by the software. SOLUTION: A program forming device 201 forms a self-restorable program incorporated with inverse conversion processing for inversely converting the content of a conversion place into the original form by operating before executing at least the conversion place at execution time in a user computer 221 on a main program of converting at least a part into a decoding difficult state by reversible conversion processing, and preserves this program in an object preserving part 222 of the user computer 221. The self-restorable program can execute expected operation of one's own program by restoring the conversion place on a main storage 223 by itself when the program is started. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide a fingerprint identifying method and a device conducting accurate personal confirmation at a high speed by using a partial image group of a fingerprint obtained by the relative motion between a small-area sensor and a finger. SOLUTION: When the whole image is reconstituted from a partial image column inputted from a frame input section 50, an optimum position calculating section 55 collates partial images with the fingerprint image (template image) of a user stored in a template image storage section 52 to determine a position having highest similarity. An image synthesizing section 60 repeats a process for connecting each partial image to a partial synthesized image stored in a partial synthesized image storage section 53 to obtain a synthesized image. A collated feature extracting section 62 extracts a feature from the synthesized image, a fingerprint feature collating section 63 collates the feature with the feature of the template image in a template collated feature storage section 54, thereby personal confirmation can be conducted at a high speed, with a stable collating action guaranteed.
Abstract:
PROBLEM TO BE SOLVED: To provide a user authentication device with which the security of an entire system can be improved without cost increase caused by large-scale additional hardware introduction even when the quality of biometrics input data such as fingerprints is poor and there is a user unsuitable for collation. SOLUTION: When a feature extracting part 12 for fingerprint collation discriminates features are not sufficient and the inputted fingerprints are not successfully authenticated in a user authentication result determining part 15, the input of fingerprints is requested from a fingerprint input request part 20 to the user. When the request fingerprint input is performed from the fingerprint input part 21, a substitutive authentication in a substitutive authentication part 22 is permitted. Corresponding to the result of the substitutive authentication in the substitutive authentication part 22, the result is displayed on a service permission or refusal display part 24. An image inputted from the fingerprint input part 11 or 21 is stored in a substitutive authentication means user information preserving part 23.
Abstract:
PROBLEM TO BE SOLVED: To prevent data from being illegally decoded by another person by providing a processor for binding a scholar feature vector from biometrics data, a processing for calculating a key to be used for cipher decoding processing, based on the feature vector, a processor for decoding data by using the key, etc. SOLUTION: A cryptograph key calculation part 4 calculates a cipher decoding key for decoding data based on the scholar feature vector called a fingerprint characteristic value bound by a fingerprint characteristic value calculation part 3. A data enciphering part 5 executes enciphering processing by using the calculated key, and the obtained cipher is stored in an enciphered data storing part 6. In decoding the stored enciphered data, a user inputs the same fingerprint to a fingerprint sensor 10 and the fingerprint characteristic value is similarly calculated. Based on the characteristic value, the part 4 calculates a key to be used for decoding and a data decoding part 7 executes decoding processing by using the stored enciphered data and this key.
Abstract:
PROBLEM TO BE SOLVED: To reduce the burden of a user in the stop/restart of use of a device and to smoothly perform stop/restart by preserving peculiar user information on the device for each identified user corresponding to the user. SOLUTION: When the instruction of stop is received from a stop managing part 11, in a peculiar user information storage part 13, an input fingerprint feature received from a feature extracting part 12 is stored corresponding to the peculiar information of the user on an information processor 1. When the instruction of restart is received from the stop managing part 11, registered fingerprint feature groups are outputted to a one-to-multiple collating part 14 and based on the collated result, the peculiar user information corresponding to the registered fingerprint feature having highest similarity to the input fingerprint feature is selected and outputted to a peculiar user information processing part 15. The peculiar user information processing part 15 receives the selected peculiar user information from the user information storage part 13 and performs the transmission/presentation of peculiar information to the user, setting in the information processor 1 or communication to the other device group corresponding to the contents of that information.
Abstract:
PROBLEM TO BE SOLVED: To accelerate narrowing processing without degrading precision in narrowing by reducing the number of cards to be defined as the object of similarity evaluation in narrowing processing. SOLUTION: In order to reduce the quantity of arithmetic required for the detailed collation of finger in the identification of fingerprint card, the features of patterns are extracted from a file (F) side + finger card registered in a data based and an applied search (S) side card and the similarity of features is evaluated so that the F side cards to be defined as the object of detailed collation can be narrowed. In this case, while using feature information such as the combination of patterns provided from fingerprints, F side data are registered in an F side card feature storage part 3 while being divided into clusters, only the cluster having no contradication with the feature of S side data is selected by an F side card cluster selecting part 4, and the F side data registered there are defined as the object of similarity evaluation to be executed by a fingerprint card discriminating device 8.