Abstract:
PURPOSE:To speed up a processing, by arranging a numeric function arithmetic processor in parallel with an integer arithmetic processor and a floating point arithmetic processor, and operating it independently in parallel with them. CONSTITUTION:Each token outputted from a data memory 14 is inputted to either an integer arithmetic processor queue 24, a floating point arithmetic processor queue 25, or a numeric function arithmetic processor queue 26 corresponding to its processing code, and is inputted to succeeding integer arithmetic processor 20, floating point arithmetic processor 21, and numeric function arithmetic processor 22. Even while the numeric function arithmetic processor 22 occupies hardware by one of data by performing a repetitive processing with a variable time, the integer arithmetic processor 20 and the floating point arithmetic processor 21 receive the supply of input tokens from a buffer queue 15 corresponding to them, and are operated in parallel. In such a way, a fast processing can be realized.
Abstract:
PURPOSE:To reduce a token flow rate and to realize a fast operation, by generating the access address of a function table by performing an arithmetic operation by using a systemizer different in each token. CONSTITUTION:When the sum of vector data with length of N is obtained, a pair of tokens with the length of N that is attached on the vector data are used. Those tokens are provided with the systemizers other than link table addresses and data values, and after the same function table base address is obtained by referring to a link table 12, the access address of a function address table 13 can be obtained by performing the arithmetic operation of the function table base address and the systemizer at a function table address generation part 20. In such a way, it is possible to perform the preceding and succeeding processings continuously with an intermediate processing only by sending N tokens for one time to an arithmetic part, and to reduce a load on a program and to realize the fast processing.
Abstract:
PURPOSE:To process data having accuracy of two-word quantity without changing the bit width of the data value, by providing a double-accuracy processing and controlling unit which processes double-accuracy data composed of continuous two words together with a processor unit. CONSTITUTION:In the case of the operation of data which requires the accuracy of two-word length, the data are given to this device after dividing them into continuous two words and a bit which indicates that the data are to be processed in the unit of the two words with double accuracy is given to the first one of each two words. Each data circulate the ring bus of the device and are successively calculated by a processor unit 6, but, when it is indicated that the data and continuous data are of double accuracy by the bit of the data, calculated results of the first word which are necessary for calculating the next coming second word are given through a double-accuracy processing and controlling unit 7 which holds the internal state of the processor unit 6 and double-accuracy calculation is executed. Therefore, processes by double- accuracy data can be executed while the bit width and function of conventional data value are maintained.
Abstract:
PROBLEM TO BE SOLVED: To provide a user authentication control device, a user authentication device, a data processing device, and a user authentication control method or the like capable of keeping a balance between convenience and safety for a user by controlling an authentication interval or an effective period of authentication in accordance with communication speed.SOLUTION: A user authentication control device controls an effective period of authentication in a user authentication device incorporated in a data processing device connected through a network with a server device. The user authentication control device includes data flow amount acquisition means for measuring the amount of data flow communicated through the network with the server device and effective period determining means for determining the effective period of authentication by the amount of data flow and a factor determined on the basis of the server device or importance of data in the server device, and defines as the expiration of the effective period the time when the cumulative total of the amount of data flow exceeds a predetermined prescribed amount.
Abstract:
PROBLEM TO BE SOLVED: To provide a portable terminal capable of surely preventing leak of internal data with no burden on a user, and to provide a data storage method, and a data storage program. SOLUTION: The portable terminal comprises a connecting state determination means which determines whether the connecting state with a storage destination computer is a data-storable state or not; a data processing means which performs, based on the determination result by the connecting state determination means, processing of storage object data designated as data to which access by others should be prevented; and a storage means for temporarily storing the storage object data. The data processing means stores the storage object data in the storage means when the connecting state determination means determines that the state is not the data-storable state. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide an authentication method which is easily achieved in a portable terminal and can improve the accuracy of authentication, and to provide an authenticating apparatus and a computer program. SOLUTION: The authenticating apparatus is equipped with: an imaging apparatus 3 for converting an iconography represented on the surface of a card D into image data; a reference image storing part 6 for storing the image data converted by the imaging apparatus 3; a reference image registering part 5 for registering the image data photographed by the imaging apparatus 3 as a reference image into the reference image storing part 6; a similarity determination part 8 for comparing image data photographed by the imaging apparatus 3 separately from the reference image with the reference image to determine the similarity of the two images; and an authentication processing part 9 for permitting the usage of a function of equipment 1 when the similarity between the image data determined by the similarity determination part 8 and the reference image is larger than a prescribed value. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a content delivery system that can set a user interface for reduced operational complexity to a user and easy use by the user. SOLUTION: The content delivery system has a content delivery server 20 and a shared terminal 60 connected thereto via a network 30. The content delivery server 20 has a registered user information table 26 registering user IDs and user fingerprint data associated together, a terminal customization setting data table 27 registering terminal setting data in association with the user IDs, a collation part 23a for acquiring the corresponding user ID from the registered user information table 26 according to user fingerprint data received from the shared terminal 60, and reading the corresponding terminal setting data from the terminal customization setting data table 27 according to the acquired user ID, and a terminal customization command part 25 for transmitting the read terminal setting data to the shared terminal 60. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide an information processing apparatus in which a user himself/herself is capable of decrypting contents of file only by inputting biometrics data without saving a cryptographic key when encrypting the contents. SOLUTION: An intrinsic value peculiar for an individual is calculated from the inputted biometrics data and based upon the intrinsic value, a key to be used for encrypting the file is calculated. In decryption, only when one and the same biometrics is inputted, the same key is calculated, thereby decrypting the file. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide a low cost and low overhead fingerprint authenticating method for determining the suitability of an input image to a fingerprint sensor from the widely ranged points of view only by software, and authenticating the fingerprint by combining it with a characteristic collation result. SOLUTION: The spacial frequency analysis of an input image is used for determining the suitability of an input image to a fingerprint sensor. At first, the Fourier conversion image(middle stage) of an input image(upper stage) is calculated. It is detected that a spot (A) corresponding to the cyclic structure of a ridge and a spot (B) corresponding to a structure whose cycle is smaller than that of the ridge due to sweat duct prongs clearly appear in the Fourier conversion image corresponding to a fingerprint real spacial image obtained under proper conditions. The mean strength (a) or distribution (b) of a frequency band including the frequencies of the spots A and B are used in featured values to be used for determining the suitability of the input image so that it is possible to determine whether or not the input image is suitable. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide a system which safely distributes contents through a network. SOLUTION: A user terminal 10 equipped with a fingerprint sensor 11 is connected to a content distributing server 20 through the network 30. The content distributing server 20 has at lest a registered user information table 26 in which personal information on users, user IDs, and fingerprint feature information are related and registered, a finger print collating part 23 which reads fingerprint feature information on a content distribution requester out of the registered user information table 26 according to the user ID of the requester and collates the fingerprint feature information with the fingerprint feature information on the content distribution requester inputted from a user terminal 10, and a specific content distribution part 24 which distributes requested contents to the user terminal 10 only when the collation is valid.