Abstract:
PROBLEM TO BE SOLVED: To easily correspond to requests from each user for a system and a method for automatically calling receivers, an alarm engine and a starting station used in the system, and alarm processing executed in the system. SOLUTION: The system for automatically calling a set of receivers has the alarm engine 4, which sets a plurality of calls for the set of receivers in accordance with alarm processing that specifies transitions, that have at least one condition between a plurality of steps of calling with respect to the set of receivers. The alarm processing is stored inside a file 14 that can be changed independently from the alarm engine. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide techniques associated with a communication system that operates stably, without being affected by a change of the IP address of a mobile node. SOLUTION: In a communication system wherein an application program (410) uses Internet protocol address information to provide a communication session and an operating system (420) monitors the Internet protocol address information and informs the application program of a change of the Internet protocol address information, the application program is configured to adapt the communication session in response to the change of the Internet protocol address information and as a result of causing the operating system to inform the application program of the change of the Internet protocol address information, the application program adapts the action of the communication session so as to reduce the possibility for the communication session to be affected if the IP address is changed. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To distribute a content and to manage the right of the content, by a method of high cost efficiency. SOLUTION: The system is provided with an application device AD and a smart card access device 22 which accesses a smart card 20, and the system is operable to safely communicate content access data to the smart card 20 via a communication network by encrypting the content access data by using a key KC which is preliminarily stored in the smart card 20 and is known to a trusted server TS, and the smart card 20 decrypts the content access data encrypted by using the key KC, and the system is operable to store the content access data in the smart card 20. In the server TS, a trusted player accesses right management data provided with content access data of the smart card 20 to perform reproduction or the like of the content in accordance with the right management data. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a passive card without contact and a station which electromagnetically couples with the passive card without contact. SOLUTION: The component coil L2 of the passive card without contact CSC receives energy by induction, and at the same time, bidirectionally transfers with the station of a signal representative of data. The passive card without contact CSC, for example, electromagnetically couples with a remote station SD through a magnetic field CM of 5 gauss or more. The remote station supplies electric power to the passive card without contact, and at the same time performs the data exchange function. During the operation time, the passive card without contact is apart by a distance of an order of 2 millimeter from a solenoid L1 of the station and the axis. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To represent the effects on a received signal of a radio communications channel having L paths with a reduced computational effort. SOLUTION: The method is achieved by transforming the representation of a channel into a simplified representation. The method comprises generating a plurality of complex zero mean gaussian random variables each having a predetermined variance, and summing the variables, to form a representation of the signal received via a radio communications channel. The predetermined variance of each variable is calculated from the eigen-values of a matrix formed from the correlation coefficients and a channel correlation matrix which includes the average attenuation of each of the L-paths. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To equally access transmission resources at any channel regardless of random distribution of changes in transmission states of channels by selecting a channel in the best transmission state out of a plurality of transmission channels for a time division multiple access protocol. SOLUTION: A periodical instruction on a transmission quality of each of channels is received with respect to the channel, these instructions for the channels in a time window are stored, and at least one channel with a best present transmission quality instruction position in relation to the transmission quality which is stored in the time window with respect to the channel, is selected. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To ensure quality of service without distinctly differentiating a real-time flow and a data flow. SOLUTION: An apparatus for processing a packet 20 of a flow on network includes a scheduling means 28 for scheduling packets in a queue according to fair queuing using priority algorithm. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a technique for watermarking in a video sequence with enhanced robustness, as compared to the techniques according to prior art. SOLUTION: A method for watermarking in the video image sequence includes the execution steps (11-16) for obtaining a watermarked motion vector, by inserting at least one watermark-in bit in at least one motion vector 51 obtained by the motion estimation between two images in the sequence concerned. The motion vector 51 is identified by a coordinate of the motion vector concerned in a reference space partitioned to complementary zones (Z1, Z2) of two types, each having an identifiable binary value related to the motion vector 51. In this insertion step, as necessary, the coordinate of the motion vector 51 is corrected, and as a result, the vector is positioned to lie within a binary value zone, corresponding to the watermark-in bit to be inserted. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a transmission constitution for moving picture data and a method for easily constituting the moving picture data. SOLUTION: A graphic scene to be converted into a moving picture is preloaded in an image constitution means 15 in a form of a set of objects, and at least some of the objects have identification information of themselves, and the moving picture data of the graphic scene are constituted so as to be suitable for constitution of image 16 displayable on at least one screen. This method comprises such a stage that a single moving image mask is provided for the image constitution means 15 prior to the graphic scene to be converted into the moving picture, and a basic mask is allocated to at least one object; and a stage that to correct the object, a dynamic characterizing field of the object of the moving picture data, which includes a picture frame, is updated by a decoder 14 according to the order set by the moving image mask. COPYRIGHT: (C)2004,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To suppress the quality from being inevitably lowered by a jitter phenomenon in a network and particularly to temporarily suppress the influence of a severe fault caused by the network. SOLUTION: A received digital data packet includes data describing a continuous time segment of a signal stream to be restored like a voice, for example. An element resulting from the received packet is recorded in a buffer memory (6) composed of a FIFO mode. A burst of a packet fulfilling the condition of a certain burst size is transcendentally detected on the basis of reception delay evaluated with respect to the reception of the first packet in the burst. Contents of the buffer memory are controlled by disclosing the detection of the burst fulfilling the condition of the size. COPYRIGHT: (C)2004,JPO&NCIPI