Abstract:
PROBLEM TO BE SOLVED: To provide a method of securing safety of a communication terminal when the communication terminal is connected to a terminal user identification module. SOLUTION: In the method of securing safety of the communication terminal 1 connected to the terminal user identification module 2 includes execution of checking procedure 10. The terminal 1 transmits 11 terminal identification information to the identification module 2 connected with the terminal 1 and the identification module 2 compares 22 the received identification information from the terminal 1 with identification information stored in a memory 31, transmits result of the comparison to the terminal 1 and sets an internal checking indicator (LOCK) if the identification information stored in the identification module 2 corresponds to information of the terminal. The indicator indicates that the terminal 1 has already been identified by the identification module 2. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To effectively apply error correction to a block small in the size of an order. SOLUTION: The error correction coding method is characterized in that at least two different sections of a prescribed element code are used, arrival vectors (s 2 , s 3 ) are related to start state vectors (s 0 , s 1 ) according to vectors (b 0 , b 1 , b 2 , b 3 ) of a branch label for defining a code word, and the two sections of the element code differ when the sequence and / or function of the element of the vectors of the branch label is changed. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To make it possible to incorporate a public key type authentication active mechanism in an application deploying a number of chips in a wired logic chip. SOLUTION: An input parameter includes a public key p in a process in which a pseudo random number so called a probability variable r unique to transaction is generated by a chip using a pseudo random number generator 7, a process in which the parameter is connected to the probability variable r by a mathematical relation formula, and is stored in a data memory of a chip in a process in which a parameter x is transmitted from the chip to the application, a process in which a serial function 10 has the probability variable r unique to the transaction and a private key s as input parameters, and a parameter y composes an authentication value V in a process in which the parameter y is calculated using the serial function 10, and a process in which the authentication value V is confirmed by the application. COPYRIGHT: (C)2004,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To achieve the high-speed operation of a cryptography method using a result of index calculation which is denoted as gx and calculates modulo n, in a smart card including a CPU in a contact type smart card or a non-contact type smart card and a combination card (that is, a card having two modes of a contact operation and a non-contact operation).SOLUTION: By executing pre-calculations in the smart card, the high-speed operation is achieved. That is, a CPU (microprocessor UC) of the smart card executes the pre-calculations in an input/output standby period. The method uses an algorithm based on discrete logarithm.
Abstract:
PROBLEM TO BE SOLVED: To mitigate congestion in access networks by controlling communications bandwidth used by mobile nodes.SOLUTION: A telecommunications system provides mobile internet protocol related communications services to mobile nodes 26, 28 via a plurality of access networks 20, 22, 24. A mobility manager 40 directs a change of affiliation of a first mobile node between the access networks, or a change of communications session level of the mobile node, in accordance with the congestion state of the access networks, the link quality currently experienced by the mobile node, applications server messages and the level of service quality to which the first mobile node has subscribed. A quality of service for communications sessions of a mobile node can be maintained even on unregulated access networks, such as WLANs independently of a Mobile IP v4/v6 stack.
Abstract:
PROBLEM TO BE SOLVED: To provide a technique related to a communication system that is not affected by a change of an IP address of a mobile node and the operation thereof is stabilized.SOLUTION: An application program 410 is operable to provide a communications session using an internet protocol address information. An operating system 420 is operable to monitor the internet protocol address information and to inform the application program of a change of internet protocol address information. The application program is arranged to adapt the communications session in accordance with the change of internet protocol address information. As a result of the operating system informing the application program of a change of the internet protocol address information, the application program can adapt the operation of the communications session to reduce a likelihood of the communications session being affected when the IP address changes.
Abstract:
PROBLEM TO BE SOLVED: To provide a method of controlling an entity of a remote network from a local network.SOLUTION: The method includes the steps of receiving a first request via a control interface complying with a first protocol usable to control the entity from a source network by using a roaming relay module (DMS-R2), sending a second request to be converted into at least one third request complying with the first protocol by a source relay module (DMS-R1) from the roaming relay module (DMS-R2) to the source relay module (DMS-R1), and sending the second request to be converted into at least one third request complying with the first protocol by the source relay module (DMS-R1) from the roaming relay module (DMS-R2) to the source relay module (DMS-R1).
Abstract:
PROBLEM TO BE SOLVED: To simply and remotely modify an optional graphic scene. SOLUTION: In a method for changing a graphic scene displayed on a screen of a terminal, the graphic scene comprises a set of graphic objects, the graphic objects are used in the terminal so as to configure an image to be displayed on the screen by corresponding to the graphic scene, and each graphic object is defined by a field. The method includes a step of transmitting a data signal to modify the graphic scene. The data signal includes frames for updating the graphic scene, and some of the frames include a replacement command to replace the existing graphic scene with a new graphic scene. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To solve the problems that information management of data retrieval or the like cannot be sufficiently performed because an information management unit is fixed to "time" or the like in the conventional behavior management application and that a great management burden and data conversion burden occur because a plurality of applications have to be used together for behavior management. SOLUTION: A data processing means 11 of a behavior management system 1 divides inputted behavior information into person information, place information, time information, content information and media information constituting the behavior information, makes these information have a correlation by using a reference value, and saves the information in a behavior database 12, wherein a central system collectively manages the information to thereby manage the information by an optional management axis without fixing a management axis to "time". COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To allow a user of a pocket computer to obtain a work environment suitable for each predetermined context of use. SOLUTION: The pocket computer comprises a plurality of programs 30 and data 40, and loadings of and access to the programs and data are managed by an operating system 10. The pocket computer comprises a part 50 for selecting one of at least two predefined contexts of use, and a use context database 20 that comprises a list of associated programs and data for each predefined context of use. In response to the selection of a context of use, the operating system 10 interrogates the context database 20 in order to activate from the plurality of programs and data only programs and data associated with the context in the context data base. COPYRIGHT: (C)2005,JPO&NCIPI