Abstract:
PROBLEM TO BE SOLVED: To provide a method and a system for coordinating a virtual environment with a real environment.SOLUTION: In step 301, a transceiver is coupled to a person in the real world, such as staff at a trade show booth. In step 302, a position of the transceiver within the real environment is determined, and the position information is communicated to a virtual world server and/or a wormhole server, for production of a virtual environment. In step 303, a virtual environment is rendered (i.e., displayed) to a user by use of the position information from step 302. In optional step 304, a communication channel is opened between the real environment and the virtual environment. For instance, the communication may be established between the person in the real environment and the user of the virtual environment. Alternatively, the communication may be of an audio/visual presentation available in the real environment with the user of the virtual environment.
Abstract:
PROBLEM TO BE SOLVED: To provide a method of authorizing a secure sign-on.SOLUTION: The method includes: (A) a step in which a first device establishes a secure communication channel with a second device of the trusted group; (B) a step in which the first device receives an event from the second device of the trusted group via the secure communication channel; and (C) a step in which the event instructs the second device to be unlocked and unlocks the first device of the trusted group based on the event.
Abstract:
PROBLEM TO BE SOLVED: To provide a method and a system for adaptive networking that monitors a network resource of a network. SOLUTION: The method includes the steps of: automatically discovering a user by using traffic in a network; monitoring performance of an application associated with the user; examining the performance of the application; and controlling the traffic. The system is a system for adaptive networking. The system includes traffic comprising a plurality of subsets, wherein a first subset includes suspect traffic, resources for traffic, and a first device for receiving traffic, the first device being configured to categorize the received traffic and to arbitrarily assign the categorized traffic to the resources. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a temperature control system and a method that remove dust or debris from inside an electrical equipment chassis. SOLUTION: One or more fans are placed in or near the exterior of the chassis. The fans are operated either in reverse, forward, pulsing, or reverse pulsing modes to create turbulent air flow through the chassis. The change in air flow pattern helps dislodge dust and particles. Once airborne, the fans can exhaust the dust and particles out of the chassis. Further, some embodiments provide vanes or other elements to further direct air flow. The temperature control system can be used in any electrical equipment that is ventilated with fans. The temperature control system provides the advantage of a low cost and efficient method for ensuring that dust does not accumulate on components within a chassis. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To manage a plurality of communication sessions which are concurrently carried out via a graphical user interface. SOLUTION: A method has (A) a step of displaying a group of graphical elements connected relating to each communication session within a plurality of communication sessions which are concurrently carried out, in which the connected graphical elements display a structure of each communication sessions via the graphical user interface (GUI), and each communication session includes a plurality of communication users, and appearance of a group of the connected graphical elements is based on a communication mode, (B) a step of receiving a user input relating to one of the connected graphical elements, in which the user input has an action related to each communication session, and (C) the step of executing the action based on the received user input. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To allow a single machine to co-host multi SIP archive (SAR) applications offering SIP servlet based products.SOLUTION: A method includes the steps of (A) receiving a first message by a network interface of a first application server; (B) sending the first message to a route application router within the first application server; (C) receiving the first message by the route application router, and determining a sub-application router to successively analyze it; and (D) transferring the first message to the sub-application router, the sub-application router being present within the first application server.
Abstract:
PROBLEM TO BE SOLVED: To provide a method, apparatus and computer program product for maintaining port state tables in a forwarding plane of a network element. SOLUTION: The state of a first set of ports associated with a first Forwarding Data Unit (FDU) is periodically determined, the first FDU being one of a plurality of FDUs. The determined state is used to update a first port state table of the port state database associated with the first FDU. The determined state is transmitted to each of other FDUs on the network element to enable each of the other FDUs to store the state of the first set of ports in a port state database local to each of the other FDUs. The port state database is used by the forwarding plane to perform fast reroute of packets. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a multi-stage technique of establishing a plurality of secure strings of symbols. SOLUTION: In the first stage, the illustrative embodiment establishes a first-stage string of symbols with each other node. The first-stage strings are chosen from a first, small, key space, which means that the first-stage strings can be established more quickly than a key having high security from a large key space. The advantage of the first-stage strings is that it enables a user to transmit secure messages more quickly than messages protected with strings having high security. The disadvantage of the illustrative embodiment is that the first-stage strings are not as secure as strings from a larger key space. The disadvantage is mitigated, however, by the fact that the first-stage strings are only used for a short amount of time, that is, until the second-stage strings are established in the second stage. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide communication equipment whose interface is switched according to use environment (a use context). SOLUTION: A method for operating communication equipment containing a first and a second use context includes: (A) a step of operating the communication equipment based on operation parameters related to the first use context; (B) a step of determining that a context switching event has occurred, the context switching event being related to the second use context; and (C) a step of switching the second use context from an inactive state to an active state. Thereby, the communication equipment operates based on operation parameters related to the second use context. COPYRIGHT: (C)2011,JPO&INPIT