Abstract:
PROBLEM TO BE SOLVED: To provide a method of determining user availability on the basis of the manner in which a person uses a computing device that is associated with a communication terminal. SOLUTION: Specifically, the present technology is for a method in which a communications terminal determines whether a user is available to accept an incoming invitation to participate in a communication session based on: (1) a characteristic of the use of a software application, (2) a characteristic of the use of a resource of a terminal, (3) a sensor input, (4) a characteristic of the incoming invitation or (5) any optional combination of (1), (2), (3) and (4). COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide communications in general, and, more particularly, advanced availability detection. SOLUTION: A communication terminal determines whether or not a user is available to accept an incoming invitation to participate in a communication session based on: (1) a characteristic of the use of a software application component, (2) a characteristic of the use of a resource of a terminal, (3) a sensor input, (4) a characteristic of the incoming invitation or (5) any combination of (1), (2), (3) and (4). COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a mechanism for monitoring the status of a transporting object (radio responsive article) in a transport vehicle. SOLUTION: A transporting object monitoring system includes (A) the transport vehicle, (B) a first radio responsive article (that responds to a first inquiry regarding the status of the first radio responsive article), wherein the first inquiry is formatted according to a first protocol, (C) a first radio responsive article sensor (for performing detection when the first radio responsive article is in the transport vehicle), (D) a second sensor (for detecting a first status of the transport vehicle), (E) and a proxy (for responding with the status of the transport vehicle when the first radio responsive article is in the transport vehicle with regard to the first inquiry about the status of the first radio responsive article). COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method, device and program for imposing random delay so that hidden terminal collision is avoided in a radio mesh network. SOLUTION: Disclosed are the method, device and program for imposing the random delay so that the hidden terminal collision is avoided in the radio mesh network. A packet is transferred from a first node to a second node along a multihop route to an address node. The second node refrains from transferring the packet to a hop subsequent to the multihop route during a predetermined delay period of time. After the predetermined delay period of time, the packet is then transferred by the second node to the hop subsequent to the multihop route. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a device and a method for detecting intrusion into a VoIP system without using any attack signature databases. SOLUTION: The present invention is executed based on the observation that some VoIP-related protocols (Session Initiation Protocol (SIP)) are simple enough to be represented by a finite-state machine (FSM) of compact size. The finite-state machine (FSM) is maintained to each session/node/protocol and their combinations, and an illegal state or an illegal state transition, which might be the result of a malicious attack, is flagged as a potential intrusion. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a business development system and a computer implementation method for a company.SOLUTION: A business development system for a company is provided. The business development system includes a target search module for searching for a potential target in a promotion activity designed to obtain a reward point and intervening in the target. The business development system further includes a strategy determination module for analyzing a situation for determining an appropriate character and determining a dialogue strategy to approach the potential target. The business development system further includes a strategy execution module for making a contract with the potential target through dialogue by applying the determined character and strategy for the purpose of engaging the potential target in the promotion activity. The business development system includes a strategy sharing module for storing information related to the dialogue with the potential target in an experience database.
Abstract:
PROBLEM TO BE SOLVED: To achieve the establishment of a WebRTC dialog session traversing an enterprise network boundary while surely allowing the WebRTC dialog session to observe one or more enterprise policies.SOLUTION: A method for applying an enterprise policy to a WebRTC dialog session includes receiving a WebRTC session description object destined to a reception side device with a transmission side device as an originating source via security-protected network connection by the distributed policy execution agent of the reception side device. This method further includes determining one or more enterprise policies on the basis of the WebRTC session description object by the distributed policy execution agent. This method further includes applying one or more enterprise policies to the WebRTC session description object.