VIRTUAL COOPERATIVE NETWORK FORMED BY LOCAL CLIENTS IN ZONES WITHOUT CELLULAR SERVICES
    1.
    发明公开
    VIRTUAL COOPERATIVE NETWORK FORMED BY LOCAL CLIENTS IN ZONES WITHOUT CELLULAR SERVICES 审中-公开
    虚拟合作网络,通过当地的客户区域,而国产手机服务

    公开(公告)号:EP1384336A4

    公开(公告)日:2009-08-05

    申请号:EP01990170

    申请日:2001-12-12

    Applicant: IBM

    CPC classification number: H04B7/2606 H04W16/26

    Abstract: A method and system for forming a virtual network. The method comprises the steps of providing each of a plurality of mobile objects (102, 105) with a transceiver (104), and transmitting a cellular/radio signals from a source (101). At least a first (105) of the mobile objects is located in an area (100) where the transceiver (104) of the first mobile object (105) does not receive the signal directly from the source (101), while a second (102) of the mobile objects is in a position where the transceiver (104) of the second mobile object (102) receives the signal directly from the source (101). The transceiver (104) of the second mobile object (102) is used to receive the signal directly from the source (101) and to transmit the signal to the transceiver (104) of the first mobile object (105).

    Method, system and computer program for generating virtual image according to position of browsing person
    2.
    发明专利
    Method, system and computer program for generating virtual image according to position of browsing person 审中-公开
    方法,系统和计算机程序根据浏览人员的位置生成虚拟图像

    公开(公告)号:JP2008108246A

    公开(公告)日:2008-05-08

    申请号:JP2007251593

    申请日:2007-09-27

    Abstract: PROBLEM TO BE SOLVED: To provide a method of generating a virtual image according to a relative position of one or more of persons as objects browsing an existing image, for a special effect, to be superimposed to the existing image. SOLUTION: The image is generated to browse intensified reality. The objects are the persons existing in the vicinity of a transparent support body such as a screen and a window. The persons browse the intensified reality through the screen/window. A virtual object on the screen is prepared by a method to impart a real impression to the persons different each other browsing the same screen/window, and the virtual reality is generated to prepare the intensified reality for the one or plurality of browsing persons browsing the same real object. COPYRIGHT: (C)2008,JPO&INPIT

    Abstract translation: 要解决的问题:提供一种根据作为浏览现有图像的对象的一个​​或多个人的相对位置产生虚拟图像的方法,用于特殊效果,以叠加到现有图像上。

    解决方案:图像生成以浏览激化的现实。 物体是存在于诸如屏幕和窗口的透明支撑体附近的人。 人们通过屏幕/窗口浏览强化的现实。 屏幕上的一个虚拟物体是通过一种方法来准备一个真正的印象给彼此不同的人浏览同一个屏幕/窗口,并且虚拟现实是为了准备一个或多个浏览人 相同的真实物体 版权所有(C)2008,JPO&INPIT

    5.
    发明专利
    未知

    公开(公告)号:FR2797699B1

    公开(公告)日:2003-06-13

    申请号:FR0007854

    申请日:2000-06-20

    Applicant: IBM

    Abstract: An interface device for connecting to and retrieving data from a remote computer system, and method of compressing, decompressing and transferring data therefor. A user may set transfer constraints on the interface device. The interface device may be a web browser. The user selecting a web site requests data, normally image data from a remote computer system. The interface device includes a cache memory where generic objects may be stored. Each generic object corresponds to an original object in the requested data. Depending on the data transfer constraints, instead of retrieving the entire image, e.g., web page image, unaltered from the host system, a compact generic image is retrieved, initially, wherein generic objects are substituted for each corresponding original object. A pseudo-image is displayed, with the generic objects substituted for corresponding original objects. Subsequently received original objects may be substituted for generic objects as each original object is received.

    6.
    发明专利
    未知

    公开(公告)号:AT463016T

    公开(公告)日:2010-04-15

    申请号:AT07728015

    申请日:2007-04-12

    Applicant: IBM

    Abstract: A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving each secure component to a different location which is substantially inaccessible to an unauthorized request; storing the secure components at the different locations for a period of time; repeating the moving and storing steps; moving all of the secure components to a single location in response to an authorized request; decrypting each of the secure components; and assembling the plurality of secure components to reconstruct the original data.

    VIRTUAL COOPERATIVE NETWORK FORMED BY LOCAL CLIENTS IN ZONESWITHOUT CELLULAR SERVICES

    公开(公告)号:CA2443090A1

    公开(公告)日:2002-10-17

    申请号:CA2443090

    申请日:2001-12-12

    Applicant: IBM

    Abstract: A method and system for forming a virtual network. The method comprises the steps of providing each of a plurality of mobile objects (102, 105) with a transceiver (104), and transmitting a cellular/radio signals from a source (101). At least a first (105) of the mobile objects is located in an area (100) where the transceiver (104) of the first mobile object (105) does not receive the signal directly from the source (101), while a second (102) of t he mobile objects is in a position where the transceiver (104) of the second mobile object (102) receives the signal directly from the source (101). The transceiver (104) of the second mobile object (102) is used to receive the signal directly from the source (101) and to transmit the signal to the transceiver (104) of the first mobile object (105).

    10.
    发明专利
    未知

    公开(公告)号:DE602007005635D1

    公开(公告)日:2010-05-12

    申请号:DE602007005635

    申请日:2007-04-12

    Applicant: IBM

    Abstract: A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving each secure component to a different location which is substantially inaccessible to an unauthorized request; storing the secure components at the different locations for a period of time; repeating the moving and storing steps; moving all of the secure components to a single location in response to an authorized request; decrypting each of the secure components; and assembling the plurality of secure components to reconstruct the original data.

Patent Agency Ranking