Abstract:
PROBLEM TO BE SOLVED: To enable the user of a personal computer connected to a network to know print costs depending on an environmental load in transmitting a print request to a printer connected to a network. SOLUTION: A management unit receives service request transmitted from a client unit, and the management unit estimates the change of an operational state associated with the execution of services about each of a plurality of server units, and the management unit gives priority to each of the plurality of server units on the basis of the change of the estimated operational state, and makes a storage device store the association of each priority with the identifier of each of the server units. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method which is useful for improving security, concerning to data stored in an external storage device of an information-processing device. SOLUTION: An external storage device includes an inputting/outputting interface for exchanging data with an information-processing device; a first storage area for storing data which are correlated with a first expiration date and a second expiration date; and a second storage area for storing a control program. The first expiration date is used under the conditions that one information-processing device be connected to the external storage device, and the second expiration date is used under the conditions that the other information-processing device be connected to the external storage device. The control program makes a processor execute the steps of establishing connections made through the inputting/outputting interface; a step of identifying either the first expiration date or the second expiration date, as an expiration date to be used to data, according to the information-processing devices connected, and a step of executings prescribed security protecting processings on the data, according to the expiration date identified. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a computer program for securely using a shared object in an arbitrary application while maintaining a predetermined confidentiality level, a shared object control device and a control method. SOLUTION: A plurality of divided areas are allocated to a temporary storage area in accordance with confidentiality level information. A storage area management table for storing pointer information and encryption key information of the divided areas in association with user identification information and the confidentiality level information. When receiving a read or write instruction through the temporary storage area, the pointer information is extracted on the basis of the user identification information of a user who instructs the read or write processing , and address information showing an object to be read or written is converted into the extracted pointer information. The confidentiality level information is specified on the basis of the extracted pointer information, information to be written is encrypted by using encryption key information corresponding to the confidentiality level information, or information to be read is decrypted. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To properly maintain the limitation of access to a file even after the file is transferred. SOLUTION: A system for setting the limitation of access to a file comprises a storage part for storing the hash value of second file and the limitation information indicating the limitation of access set before combined to the second file among at least one of the second files combined as a single first file in association with each other, a retrieval part for calculating the hash value of at least one of fourth files generated and retrieving the hash value corresponding to the calculated hash value from the storage part under the condition that the fourth files are generated by dividing a single third file, and a limitation set part for setting the limitation of access to the fourth file according to the limit information stored in the storage part in association with the retrieved hash value under the condition that the hash value corresponding to the hash value of the fourth file is retrieved. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a technology for rejecting or permitting access from an application program to a resource on the basis of the use environment or situation of an information processing apparatus. SOLUTION: This information processing apparatus is provided with: a detecting part for detecting the change of connecting state or use state of a device connected to the information processing apparatus; a selecting part for selecting resource access conditions to be applied to the information processing apparatus on the basis of the detected connecting state in response to the detection of the change of the connecting state; and a condition storage part for storing the selected resource access conditions. Furthermore, this information processing apparatus is provided with a capturing part for capturing a plurality of function call for resource access issued to an operating system by an application program; a deciding part for deciding the permission of the captured function call; and a control part for rejecting the function call. When the function call is captured, the permission is decided on the basis of the resource access conditions read from the condition storage part, and the function call is rejected in response to the decision of non-permission. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To obtain a method and a device which change the operation speed for a CPU in accordance with the residual quantity of unprocessed messages in a computer system including an operating system (OS), especially in a multitask operating system capable of simultaneously and parallelly processing plural jobs (tasks). SOLUTION: In this configuration, a computer including a processor capable of dynamically changing operation speeds includes (a) a program performing processing in a prescribed processing unit, (b) a means which calculates the time difference between preparation time in the prescribed processing unit and the present time (432) and (c) means (436, 450, etc)., which change the operation speed of the processor to be faster than the current one when the time difference is larger than a 1st value and change the operation speed of the processor to be slower than the current one when the time difference is smaller than a 2nd value.
Abstract:
PROBLEM TO BE SOLVED: To refer to a performance index, to control the operation speed of a processor and to reduce power consumption by referring to a user mode instruction number executed in prescribed time and changing the operation speed of the processor. SOLUTION: Clock signals inputted to a CPU 3 are controlled by a controller 11. The control of the clock signals is executed by changing the frequency of the clock signals and stopping the supply of the clock signals if the CPU 3 can comply with it. The controller 11 observes the operation of the CPU 3 and monitors input from a sensor 13. For the observation of the CPU 3, for instance, a cache error rate, the number of access to a non-cacheable memory, an I/O instruction ratio or the like, a total execution instruction number per unit time and the execution instruction number of a user mode are considered. An I/O instruction or the like is executed in a system mode and discriminated from the user mode. By using the information, the controller 11 controls the operation of a clock oscillator 9 and the CPU 3.
Abstract:
PROBLEM TO BE SOLVED: To reduce the power of a computer. SOLUTION: This computer is provided with main execution applications 42-46, resource manager 10 for examining the using situations of inspected devices, and policy manager 20 for receiving job type decision information related with the main execution applications and the using situations of the inspected devices from the resource manager 10, and deciding a job type corresponding to the job type decision information among job types preliminarily decided for the main execution applications. Then, the resource manager 10 receives the job type corresponding to the job type decision information from the policy manager 20, and sets the parameters of controlled devices 32-40 preliminarily decided for the job type in the controlled devices. Also, the job type communicated from the policy manager can be a job type name or the group of the operation modes of the controlled devices.
Abstract:
Computervorrichtung, die mit einer virtualisierten Umgebung ausgestattet ist,in der eine virtuelle Maschine in einem Host-Betriebssystem eingerichtet wird, wobei sich ein erster Sicherheitsagent im Host-Betriebssystem befindet und wobei sich ein zweiter Sicherheitsagent in einem Gast-Betriebssystem der virtuellen Maschine befindet, wobeider erste Sicherheitsagent Folgendes aufweist:einen Zugangskontrollabschnitt zum Steuern des Zugriffs durch eine Anwendung im Host-Betriebssystem;einen ersten Darstellungsbefehl-Hook-Abschnitt zum selektiven Hooken eines von einer Anwendung einer virtuellen Maschine ausgegebenen Bildschirmdarstellungsbefehls; undeinen Verschlüsselungsverarbeitungs-Abschnitt zum Ausführen einer Verschlüsselungsverarbeitung des vom ersten Darstellungsbefehl-Hook-Abschnitt gehookten Bildschirmdarstellungsbefehls mit Hilfe eines Verschlüsselungssystems mit allgemeinem Schlüssel; undwobei der zweite Sicherheitsagent Folgendes aufweist:einen Zugangskontrollabschnitt zum Steuern eines Zugriffs durch eine Anwendung im Gast-Betriebssystem;einen zweiten Darstellungsbefehl-Hook-Abschnitt zum selektiven Hooken eines von einer Anwendung im Gast-Betriebssystem ausgegebenen Bildschirmdarstellungsbefehls; undeinen Verschlüsselungsverarbeitungs-Abschnitt zum Ausführen einer Verschlüsselungsverarbeitung des vom zweiten Darstellungsbefehl-Hook-Abschnitt gehookten Bildschirmdarstellungsbefehls mit Hilfe eines Verschlüsselungssystems mit allgemeinem Schlüssel.
Abstract:
In aggregating application functions on multi-access edge computing (MEC) hosts across multiple carriers, a system associated with a particular application receives performance data from a first and second MEC hosts.The first MEC host is deployed on a first network carrier and coupled to first user terminals.The second MEC host is deployed on a second network carrier and coupled to second user terminals. The particular application is installed on the first and second MEC hosts. The system determines whether the performance data from the second MEC host exceeds a threshold value. If so, the system sends instructions to the second MEC host to aggregate function(s) of the particular application to the first MEC host. As a result, each of the first and second user terminals connect to the first MEC host to receive content for the particular application.