Abstract:
PROBLEM TO BE SOLVED: To provide a method for determining at least one second document of a set of documents in a second language having the same textual content as a first document in a first language. SOLUTION: The method includes steps for: generating a first histogram, the first histogram being indicative of the textual content of a first document; generating a second histogram for each document of a set of documents, each second histogram being indicative of the textual content of a document of the set of documents; comparing each second histogram with the first histogram to determine at least one histogram from a plurality of second histograms which match the first histogram; and identifying at least one second document as the document having the at least one histogram. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method of generating a virtual image according to a relative position of one or more of persons as objects browsing an existing image, for a special effect, to be superimposed to the existing image. SOLUTION: The image is generated to browse intensified reality. The objects are the persons existing in the vicinity of a transparent support body such as a screen and a window. The persons browse the intensified reality through the screen/window. A virtual object on the screen is prepared by a method to impart a real impression to the persons different each other browsing the same screen/window, and the virtual reality is generated to prepare the intensified reality for the one or plurality of browsing persons browsing the same real object. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving each secure component to a different location which is substantially inaccessible to an unauthorized request; storing the secure components at the different locations for a period of time; repeating the moving and storing steps; moving all of the secure components to a single location in response to an authorized request; decrypting each of the secure components; and assembling the plurality of secure components to reconstruct the original data.
Abstract:
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving each secure component to a different location which is substantially inaccessible to an unauthorized request; storing the secure components at the different locations for a period of time; repeating the moving and storing steps; moving all of the secure components to a single location in response to an authorized request; decrypting each of the secure components; and assembling the plurality of secure components to reconstruct the original data.
Abstract:
A method for separating a dividable computer device into multiple sub-computers may include receiving, by the dividable computer device, a command to separate a sub-computer from the dividable computer device. The method may also include detecting by the dividable computer device separation of the sub-computer and reconfiguring the dividable computer device for operation without the separated sub-computer in response to each sub-computer being separated.
Abstract:
A method for separating a dividable computer device into multiple sub-computers comprises receiving a command to separate a sub-computer from the dividable computer; the dividable computer detecting the separation of the sub-computer; and reconfiguring the dividable computer for operation without the sub-computer. Preferably, options for selection for association with the sub-computer to be separated are presented to the user. Predetermined features/functionalities may be loaded onto the sub-computer based on options related to entered characteristics of the user and/or a list of users. There may be a notification that the sub-computer is configured and ready for separation, whilst the reconfiguring may involve adjusting the display to minimize an effect of the separated computer. The sub-computer may be provided with a virtual operating system and/or may operate independently from the dividable computer. Separated sub-computers may be wirelessly connected to share resources. Each sub-computer may have processing unit, memory and interface connector.