Abstract:
PURPOSE: To easily structure a shape model on which the intension of a designer is faithfully reflected without restrictions on operation such as input order when the shape model is generated and corrected. CONSTITUTION: Geometric elements (plane, side, vertex, etc.) and geometric restrictions among them (size, angle, etc.) are inputted, a dependency relational expression generating mechanism 7 of a geometric inference part 3 generates a by directional dependency relational expression for those geometric elements, and a dependency order calculating mechanism 8 automatically calculates a dependency state (dependency order data). Then a geometric attribute calculating mechanism 9 determines the attribute values of the geometric elements and a modeler 4 generates and outputs the shape model to a display device 6. At the time of correction, a contradiction detecting and eliminating mechanism 10 calculates geometric elements to be altered by using the memory dependency order data to determine their attribute values. Further, excessive geometric restrictions and contradiction are detected and an eliminating means is displayed on the display device 6.
Abstract:
PROBLEM TO BE SOLVED: To mechanically perform process management of a work process or the like, in development of a complicated system including various components of hardware, software or the like. SOLUTION: The system includes: a configuration information acquisition part 120 acquiring configuration information including information about constituent elements of a development target in a project described by SysML (Systems Modeling Language) or the like and information about dependency relationship between the constituent elements; a work item determination part 130, a detailed item determination part 140, and a scheduled day determination part 150 determining work items and execution order of work based on the configuration information acquired by the configuration information acquisition part 120; and a WBS (Work Breakdown Structure) storage part 500 performing the management as definition information of the work process. The work item determination part 130 determines the work item related to a leaf constituent element that is the constituent element not including the other constituent elements among the constituent elements, and determines the work item related to connection relationship between the leaf constituent elements when all of the plurality of constituent elements included in one prescribed constituent element are the leaf constituent elements. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To authenticate an ownership relating to a product/service managed by an identifier such as RFID while keeping security for the product/service. SOLUTION: The present invention provides an apparatus for authenticating an ownership using an identifier of a product, first identification information for authenticating an ownership held in a terminal of an owner authorized for the product, and second identification information for authenticating the right for the identifier of the product stored in a product database (DB). The apparatus comprises: a means for receiving the identifier and the first identification information; a means for acquiring the second identification information from the product DB; and a means for determining whether authorized or not from the first identification information and the second identification information. A hash value obtained by a unidirectional hash function is used as an identification key of the identification information. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To prevent the determination of a policy from being a bottleneck in an information system. SOLUTION: An access management system is provided with an access execution device which permits access to a database when an access request satisfies access permission conditions, and a policy determination device which determines whether the access request satisfies the access permission conditions. The access execution device stores determination result information including the result of the determination of the access permission conditions and determines that the access request satisfies the access permission conditions when the determination result information has a preliminarily determined inclusive relationship to the access request, and receives the result of the determination of the access permission conditions to the access request from the policy determination device when the determination result information is determined not to have inclusive relationship to the access request, and then permits the access to the database when the access request is determined to satisfy the access permission conditions. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To realize a list matching which secures safety in information exchange and which has good performance efficiency and high usefulness. SOLUTION: A list which is the object of the list matching is expressed by a polynomial with the element item of the list as a root. Then, polynomials generated by each object list are added by a method of distributed secret calculation, etc. A list with the root of a polynomial which is the result of this addition as the element item is restored and outputted as the list of common items. COPYRIGHT: (C)2003,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide a ciphering method and its deciphering method by which information can be deciphered by the cooperation of terminal devices belonging to a subset selected as a reception group with each other. SOLUTION: A transmitting person and receiving persons transmit and receive the information through a network. This transmitting person distributes distribution information ciphered by using a group key so that the distribution information can be deciphered by the cooperation of the optional number of receivers with each other, to the receiving persons belonging to the prescribed reception group. The receiving persons receive the ciphered data from the transmitting person, exchange partial information on this ciphered data among a plurality of the receiving persons belonging to the reception group to obtain deciphering information for deciphering this ciphered data, and decipher the distribution information by using this decoding information.
Abstract:
PROBLEM TO BE SOLVED: To enable the safe preservation of transaction information in an electronic commercial transaction on a network by preparing a session key for enciphering the transaction information, enciphering the transaction information while using the session key, and sending the enciphered transaction information to a preserving server on the network. SOLUTION: A session key 620 is prepared for enciphering a transaction log 610, and a transaction log 615 is provided by enciphering the transaction log 610 while using this session key. Next, key recovery information 640 for recovering this session key 620 is prepared while using key recovery techniques. Further, the session key 620 is enciphered while using a secret key 650 in a master card 600 and a session key 625 is provided. Then, these three, namely, the enciphered transaction log 615, the key recovery information 640 for recovering the session key 620 and the enciphered session key 625 are sent to a preserving server 380.
Abstract:
PROBLEM TO BE SOLVED: To find out a component which may be a failure cause at high probability without retrieving all component data of the whole products. SOLUTION: Component data in a component tree distributed from a set of existing failure products are successively accessed and component attribute values having high degrees of support out of the failure products are extracted. In this process, a partial set of components used for the failure products is also found out. These component attribute values having the high degrees of support and the set of components used for the failure products are expressed as a tree using component types as nodes. Then as to two component attribute values having high degrees of support on the tree of component types, the information gain of a rule that the adoption of the two component attribute values may cause a failure is calculated. The calculation is locally applied to a common master component of two components and the master component having fixed information gain is outputted as a failure cause. How to select these two component attributes, component attributes are successively evaluated from component attributes with a nearer distance and setting two component attributes detected as a failure cause at first as candidates of the failure cause. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a system for tracing a cause of an event occurred to a product produced in a production process chain. SOLUTION: The system includes a storage part for storing a virtual attribute to be associated with a corresponding second product; a receiving part for receiving information for specifying a third product in which the event occurred; a correlation calculation part for calculating the correlation coefficient with the third product, in which the third product is specified by the information for each kind of the second products used for the third product, and a group of the second product having the common virtual attribute; and a cause specification part for specifying the second product belonging to the kind of the second product in which the maximum correlation coefficient is calculated as the cause of the event. COPYRIGHT: (C)2008,JPO&INPIT