Abstract:
PROBLEM TO BE SOLVED: To provide a security association for apparatuses. SOLUTION: Steps forming symmetrical keys between distributed devices include a step which forms public values or private values of at least one device, a step which imports the public values from another device through out-of-band mechanism, and a step which forms private values corresponding to local devices and private values as function values received from other devices. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a location service and method for providing a location aware computing device extensible by allowing different types of location awareness providers to operate with the service. SOLUTION: The method comprises functions of receiving a request for a location context, acquiring data associated with a current location from one or more location detecting devices, reconciling the acquired data for any inconsistencies concerning the current location by applying either or both of a hierarchical process and a metric process, and generating a location object accessible to applications. The service comprises a location management component configured to route location data, a fuser engine configured to receive location reports generated from the location data, to reconcile conflicts between the location reports and to generate a location object, and a location application programming interface (API) coupled to the location management component to transmit the location object from the fuser engine to an application. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a new power management system that determines when and how long to switch a network interface of a wireless device into a low-power state without causing excessive delay in network traffic. SOLUTION: The power management system for use in the wireless device reduces the power consumption of the network interface module 201 of the wireless device by selectively putting the network interface module into a low-power state for an idle time. The length of the idle time is calculated such that the amount of delayed traffic data accumulated is expected to be less than or equal to a preselected threshold when the network interface module is put in the low-power state for the calculated idle time. The amount of delayed traffic data as a function of the idle time is modeled using average inter-arrival and service rates that are derived from traffic statistics data. COPYRIGHT: (C)2004,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To improve an automation level when a computer system prepares to access to a network. SOLUTION: When a computer system receives a certification from a server and try to get a permission of accessing to a first network and if the access to the first network is not permitted, the system gets a permission of accessing to a second network for downloading a file necessary for accessing to the first network. A first schema base document including a user input information is transferred to the server. When the server determines the appropriateness of the user input information, the system can receive the second schema document including an instruction of the permission of accessing to the first network. A third schema base document is executed in the computer system and the computer system is constituted to fit to the access to the first network. COPYRIGHT: (C)2004,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a method and a system for positioning a mobile computer to set up a radio communication session with a radio access point of a computer network. SOLUTION: The strength of a radio signal passing between the mobile computer and each of a plurality of radio access points of a network including an access point with which the mobile computer sets up the session is measured at a plurality of time intervals. Next, the measured strength value is weighted with factors such as whether or not the mobile computer sets up the communication session with the access point whose sample is obtained and how much time the sample passes. With respect to respective positions, the strength values obtained to the access points at the positions and weighted are totalized. A position having the highest total is regarded as a position of the mobile computer. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide a method and system for managing power consumption in a portable computing device having a network interface module.SOLUTION: A power management module receives inputs from other modules and determines whether the network interface module is to be put in a doze state for a predetermined number of beacon intervals to conserve power consumption in the network interface module. The network interface module in a device that is associated with a network is put in the doze state after an event has occurred including when a scan has been performed, after a delayed sleep timer has expired, and after a beacon transmission has been completed and no traffic is buffered for the device. The delayed sleep-time is set based on the estimated round trip time of a packet.
Abstract:
PROBLEM TO BE SOLVED: To provide a method for setting up and managing secure data/audio/video links with secure key exchanges, authentication and authorization.SOLUTION: The invention enables establishment of a secure link with limited privileges using the machine identifier of a trusted machine. This is particularly useful if the user of the machine does not have a user identifying information suitable for authentication in the machine. Furthermore, the presentation of default user identifying information by a user advantageously initiates intervention by a system administrator instead of a blanket denial. This decentralized procedure allows new users access to the network without having to physically access a centralized facility to present their credentials. Another embodiment of the invention enables a remote user to connect to a secure network with limited privileges.
Abstract:
PROBLEM TO BE SOLVED: To provide a method and a system for controlling electric power consumption in a mobile computing device that has a network interface module. SOLUTION: A power management module receives an input from another module, and determines whether to put the network interface module in a doze state during an interval corresponding to a predetermined number of beacons to prevent a waste in electric power consumption in a network interface module. As for a network interface module of a device that is related to a network, after an event including the time of scanning occurs, after a delay sleep timer times out and after transmission of a beacon is completed and when traffic is not buffered for the device, the network interface module is put in the doze state. A delay sleep time is set based on an estimated round trip time of a packet. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method and a system for mutually connecting two or more computing devices by using high-speed wireless bus. SOLUTION: A first computing device detects that there is a second computing device over a wireless network. A wireless bridge is formed between the first computing device and the second computing device. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a system for more efficiently and securely authenticating a computing system. SOLUTION: A client receives a limited usage (for example, single usage) certificate and transmits the limited usage certificate to a server through a secure link. The server provides an additional certificate (for subsequent authentication) and transmits the additional certificate to the client through the secure link. In another embodiment, the computing system uses an expandable protocol to automatically negotiate an authenticating method. An authenticating method to be mutually arranged is selected, and secure authentication is performed by a tunnel key to be used to encrypt (and later decrypt) authentication contents to be transferred between the client and the server. The tunnel key is derived from a shared secret key (e.g., session key) and a nansu. COPYRIGHT: (C)2005,JPO&NCIPI