Abstract:
PROBLEM TO BE SOLVED: To provide a differentiating technology and a means for tracking and charging with respect to this kind of technology usage. SOLUTION: A system is provided with at least one differentiating, chargeable technology. A method of selling and pricing the system is disclosed to allow the system to be sold at a reduced initial purchase price. The performance by a user of the system of the chargeable technology is tracked and charged for on a per-usage basis. The system and the method are disclosed for tracking, recording, and reporting data regarding the performance of the chargeable technology. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a data processing system and a method protecting a USB device to enable the USB device to be available only by a connected computer system. SOLUTION: The USB device is not connected with any computer systems until it is used for the first time. When the USB device is used and connected with a specific computer system for the first time, it is connected with the specific computer system included in the data processing system. The USB device is initially incapacitated and turns to be available by responding only to the connection with the connected computer system. The USB device and the connected computer system are connected by using a pair of the encryption keys. Here the connected computer system memorizes the first key and the USB device memorizes the second key.
Abstract:
PROBLEM TO BE SOLVED: To make a server remote-access to assets information of a radio client computer system. SOLUTION: The system is constituted of a server and an access point, connected to a network and a mobile system to be radio-connected, and the access point receives and stores an information acquiring request of the mobile system. The mobile system periodically supplies electric power to a radio NIC from a power down state and conducts polling of the access point, in order to discover the stored information acquiring request. The mobile system takes out the information requested by a non-volatile storage of the mobile system keeping the power down state, except at polling and responds to the stored request by transmitting via the radio NIC. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a system and method for ensuring that a wireless device remains within an authorized spectrum while supporting passive scanning. SOLUTION: A wireless device operating under the IEEE 802.11 specifications passively scans for a wireless access point coupled to a network backbone, wherein the scanning is performed using a default set of channels. The wireless device then utilize a country code provided from a wireless access point to determine if the wireless device is legally authorized to communicate with the selected access point with wireless signal channels in addition to the default set of channels. The wireless device then communicate with the selected access point utilizing any of the default set of channels and any one of wireless signal channels in addition to the default set of channels. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To reduce the number of network experts for supporting the movement of a computer terminal by storing new setting in the computer terminal for connecting the computer terminal to a data transmission network. SOLUTION: A server 14 is provided with a terminal 14a connected thereto and a table storing addresses and a data transmission network 16 is provided with the server 14 connected thereto, respective terminals and a table 16a having related servers thereof. When a personal computer or terminal 5 moves from a certain position on the server to the other server, tables at respective positions are updated so as to appropriately send data packets. Namely, it is stored when the terminal is disconnected from the network, data are not erroneously sent and when the terminal or packet is added to the network in new setting, a new address can be applied.
Abstract:
PROBLEM TO BE SOLVED: To provide a system and method capable of balancing the load among blade servers. SOLUTION: When a first blade server that is servicing a client computer becomes congested, service is transferred to a second blade server potential in a different blade center. In this case, the first blade and client are frozen, and then a pointer to the currently addressed location in a client's virtual storage and an exact memory map in the first blade server that is associated with the client computer are sent to the second blade server along with a client's IP address. These are used to reconstruct the state of the first blade in the second blade, at which time the second blade resumes service to the client. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a system by which a subsystem is autonomously and primarily jointed to a given motherboard, and is made inoperable when jointed to other motherboards. SOLUTION: The subsystem that has a constrained information space for storing a code is uniquely jointed to a system that has a structure to generate a unique code for identifying the system and transmit it to the information storage space in the subsystem though a connection. When the subsystem is connected to the system, the system writes the unique code of the system in the information storage space in the subsystem if information is not contained in the information storage space in the subsystem. If information is contained in the information storage space, the information is compared with the unique code in the system. The system is made operable only when the information in the information storage space matches the unique code generated by the system. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a data processing system and a data processing method for restoring the basic password of a client computer system remotely. SOLUTION: When the basic password is not correctly inputted, a user cannot access the client computer system in a complete form. The client computer system is connected to a server computer system by using a network. The input of the basic password is requested from the user before the client computer system completes a boot process. An inquiry-type password method is supplied in response to the input error of the basic password. The basic password can be restored in response to the normal performance of the inquiry-type password method. The basic password can be restored from the server computer system by the client computer system before the boot process is completed by using the inquiry-type password method by the client computer system.
Abstract:
PROBLEM TO BE SOLVED: To efficiently and effectively protect a computer system which is being shipped by disabling the use at a shipping point through an RFID(radio frequency discrimination) interface and enabling the use at a reception point. SOLUTION: A chassis 19 has a base and a rear panel 17 and has an open bay 22 sectioned so as to receive a data storage device such as a disk drive 23. An antenna 109 is fitted extending to outside the computer 12 so as to gather radiations having predefinition characteristics. The antenna 109 allows supply to the computer system through the RFID interface 59 showing the radiations having the predefinition characteristics nearby the computer system. The computer system is made unusable at the shipping point through this RFID interface 59 and usable at the reception point through the RFID interface 59 to enhance the security in the transportation.