Abstract:
A method and system for forming a virtual network. The method comprises the steps of providing each of a plurality of mobile objects (102, 105) with a transceiver (104), and transmitting a cellular/radio signals from a source (101). At least a first (105) of the mobile objects is located in an area (100) where the transceiver (104) of the first mobile object (105) does not receive the signal directly from the source (101), while a second (102) of the mobile objects is in a position where the transceiver (104) of the second mobile object (102) receives the signal directly from the source (101). The transceiver (104) of the second mobile object (102) is used to receive the signal directly from the source (101) and to transmit the signal to the transceiver (104) of the first mobile object (105).
Abstract:
PROBLEM TO BE SOLVED: To provide a method of generating a virtual image according to a relative position of one or more of persons as objects browsing an existing image, for a special effect, to be superimposed to the existing image. SOLUTION: The image is generated to browse intensified reality. The objects are the persons existing in the vicinity of a transparent support body such as a screen and a window. The persons browse the intensified reality through the screen/window. A virtual object on the screen is prepared by a method to impart a real impression to the persons different each other browsing the same screen/window, and the virtual reality is generated to prepare the intensified reality for the one or plurality of browsing persons browsing the same real object. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide an information processing and displaying system which is embedded or house in a compact and portable article and projects data of high image quality or an image to be expressed to a separate screen or surface. SOLUTION: This processing device is a compact device including a device for expressing a text, image information and the data, incorporating the information processing and displaying system for projecting the video to the separate display surface, and incorporating a data display function. And also a method for using the compact information processing device incorporating a projector for projecting data to a separated surface is provided.
Abstract:
Miniature devices which incorporate data displaying features, incorporating an information processing and display system, which includes devices for the representation of textural and pictorial information and data, and which is adapted to project images onto a remote display surface. Also disclosed is a method for utilizing miniature information processing devices which incorporate projectors for projecting data onto remote surfaces.
Abstract:
An interface device for connecting to and retrieving data from a remote computer system, and method of compressing, decompressing and transferring data therefor. A user may set transfer constraints on the interface device. The interface device may be a web browser. The user selecting a web site requests data, normally image data from a remote computer system. The interface device includes a cache memory where generic objects may be stored. Each generic object corresponds to an original object in the requested data. Depending on the data transfer constraints, instead of retrieving the entire image, e.g., web page image, unaltered from the host system, a compact generic image is retrieved, initially, wherein generic objects are substituted for each corresponding original object. A pseudo-image is displayed, with the generic objects substituted for corresponding original objects. Subsequently received original objects may be substituted for generic objects as each original object is received.
Abstract:
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving each secure component to a different location which is substantially inaccessible to an unauthorized request; storing the secure components at the different locations for a period of time; repeating the moving and storing steps; moving all of the secure components to a single location in response to an authorized request; decrypting each of the secure components; and assembling the plurality of secure components to reconstruct the original data.
Abstract:
A method and system for forming a virtual network. The method comprises the steps of providing each of a plurality of mobile objects (102, 105) with a transceiver (104), and transmitting a cellular/radio signals from a source (101). At least a first (105) of the mobile objects is located in an area (100) where the transceiver (104) of the first mobile object (105) does not receive the signal directly from the source (101), while a second (102) of t he mobile objects is in a position where the transceiver (104) of the second mobile object (102) receives the signal directly from the source (101). The transceiver (104) of the second mobile object (102) is used to receive the signal directly from the source (101) and to transmit the signal to the transceiver (104) of the first mobile object (105).
Abstract:
Miniature devices which incorporate data displaying features, incorporating an information processing and display system, which includes devices for the representation of textural and pictorial information and data, and which is adapted to project images onto a remote display surface. Also disclosed is a method for utilizing miniature information processing devices which incorporate projectors for projecting data onto remote surfaces.
Abstract:
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving each secure component to a different location which is substantially inaccessible to an unauthorized request; storing the secure components at the different locations for a period of time; repeating the moving and storing steps; moving all of the secure components to a single location in response to an authorized request; decrypting each of the secure components; and assembling the plurality of secure components to reconstruct the original data.