Abstract:
PROBLEM TO BE SOLVED: To improve an automation level when a computer system prepares to access to a network. SOLUTION: When a computer system receives a certification from a server and try to get a permission of accessing to a first network and if the access to the first network is not permitted, the system gets a permission of accessing to a second network for downloading a file necessary for accessing to the first network. A first schema base document including a user input information is transferred to the server. When the server determines the appropriateness of the user input information, the system can receive the second schema document including an instruction of the permission of accessing to the first network. A third schema base document is executed in the computer system and the computer system is constituted to fit to the access to the first network. COPYRIGHT: (C)2004,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a simple and easy method of configuring a thin client device for network connectivity. SOLUTION: A computer-readable portable media device is used for transferring network settings and other configuration data to a thin client network device to simplify the task of configuring the thin client device for network connectivity and other functions. A configuration program on a personal computer assists a user in creating configuration data, including network settings, for the thin client device, generates an XML file containing the configuration data, and writes the XML file into the portable media device. The portable media device is then attached to the thin client device. The thin client device detects the portable media device and automatically loads the configuration data from the XML file. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a XML schema for a network device constitution. SOLUTION: A constitution setting file is generated by using an extensible markup language (XML) schema. A wireless constitution XML schema defines a XML file for constituting wireless network setting on a wireless device. A wide area network (WAN) constitution schema defines the XML file for constituting a WAN device. A local area network (LAN) constitution schema defines the XML file for constituting a LAN device. A broadband modem constitution schema defines the XML file for constituting a broadband modem device. A device constitution schema defines the XML file for reporting the constitution of the device. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
A memory device may comprise a nonvolatile computer readable medium, a near field communication wireless transmitter, a nonvolatile near field communication tag memory, a data input device and a controller. The nonvolatile computer readable medium is adapted to store data in a data block format. The near field communication wireless transmitter is adapted to wireless transmit data to an external near field communication receiver. The nonvolatile near field communication tag memory is adapted to store data in a tag memory format.
Abstract:
A computer system attempts to authenticate with a server to gain authorization to access a first network. It is determined by the server that the computer system is not authorized to access the first network. The computer system is given authorization to access a second network for at least the purpose of downloading files (e.g., signup and configuration files) needed to access the first network. A user-interface for receiving user-entered signup information is automatically presented at the computer system. A first schema-based document including user-entered information is transferred to the server. If the server determines that the user-entered information is appropriate, a second-schema document, which includes an indication of authorization to access the first network (e.g., a user-identifier and password), is received. A third schema-based document is executed at the computer system to compatible configure the computer system for accessing the first network.
Abstract:
A computer system attempts to authenticate with a server to gain authorization to access a first network. It is determined by the server that the computer system is not authorized to access the first network. The computer system is given authorization to access a second network for at least the purpose of downloading files (e.g., signup and configuration files) needed to access the first network. A user-interface for receiving user-entered signup information is automatically presented at the computer system. A first schema-based document including user-entered information is transferred to the server. If the server determines that the user-entered information is appropriate, a second-schema document, which includes an indication of authorization to access the first network (e.g., a user-identifier and password), is received. A third schema-based document is executed at the computer system to compatible configure the computer system for accessing the first network.
Abstract:
A computer system attempts to authenticate with a server to gain authorization to access a first network. It is determined by the server that the computer system is not authorized to access the first network. The computer system is given authorization to access a second network for at least the purpose of downloading files (e.g., signup and configuration files) needed to access the first network. A user-interface for receiving user-entered signup information is automatically presented at the computer system. A first schema-based document including user-entered information is transferred to the server. If the server determines that the user-entered information is appropriate, a second-schema document, which includes an indication of authorization to access the first network (e.g., a user-identifier and password), is received. A third schema-based document is executed at the computer system to compatible configure the computer system for accessing the first network.
Abstract:
A computer system attempts to authenticate with a server to gain authorization to access a first network. It is determined by the server that the computer system is not authorized to access the first network. The computer system is given authorization to access a second network for at least the purpose of downloading files (e.g., signup and configuration files) needed to access the first network. A user-interface for receiving user-entered signup information is automatically presented at the computer system. A first schema-based document including user-entered information is transferred to the server. If the server determines that the user-entered information is appropriate, a second-schema document, which includes an indication of authorization to access the first network (e.g., a user-identifier and password), is received. A third schema-based document is executed at the computer system to compatible configure the computer system for accessing the first network.
Abstract:
A computer system attempts to authenticate with a server to gain authorization to access a first network. It is determined by the server that the computer system is not authorized to access the first network. The computer system is given authorization to access a second network for at least the purpose of downloading files (e.g., signup and configuration files) needed to access the first network. A user-interface for receiving user-entered signup information is automatically presented at the computer system. A first schema-based document including user-entered information is transferred to the server. If the server determines that the user-entered information is appropriate, a second-schema document, which includes an indication of authorization to access the first network (e.g., a user-identifier and password), is received. A third schema-based document is executed at the computer system to compatible configure the computer system for accessing the first network.
Abstract:
A computer system attempts to authenticate with a server to gain authorizati on to access a first network. It is determined by the server that the computer system is not authorized to access the first network. The computer system is given authorization to access a second network for at least the purpose of downloading files (e.g., signup and configuration files) needed to access the first network. A user-interface fo r receiving user- entered signup information is automatically presented at the computer system . A first schema-based document including user-entered information is transferred to t he server. If the server determines that the user-entered information is appropriate, a second-schema document, which includes an indication of authorization to access the first network (e.g., a user-identifier and password), is received. A third schema-based document is executed at the computer system to compatible configure the computer system for accessin g the first network.