摘要:
A user system for a distributed network whereby a user system which is not provided with a distributed application platform can be connected to a distributed network. A user information unit incorporates therein physical points corresponding to stream and network flow endpoints, respectively. A flow endpoint control channel connects a user signaling unit to the user information unit. The user signaling unit includes distributed communication control means, distributed network service controller, and information unit controller for controlling the user information unit by means of a flow endpoint control signal. The user information unit includes physical point linking unit, and flow endpoint control signal processing unit which cooperates with the user signaling unit by means of the flow endpoint control signal.
摘要:
A context information collection and distribution system registers read identification information in a computer device that manages and controls an RFID tag reading device and is located in a lowest hierarchy in wide area network topology. The computer device located in the lowest hierarchy in the wide area network topology notifies a computer device located in a higher management domain hierarchy that the computer device located in the lowest hierarchy manages read identification information of a target. Further, the computer device located in the management domain hierarchy notifies a computer device located in much higher ID system hierarchy that the computer device located in the hierarchy just under the management domain hierarchy manages the read identification information of the target.
摘要:
Communication terminals are provided with a short range wireless communication interface. Some communication terminals are also provided with a long range wireless communication interface. A communication terminal having both interfaces is determined to become a segment manager by a plurality of communication terminals. A segment manager and its neighboring communication terminals constitute a segment and communicate with each other via the short range wireless communication interface. A segment manager distributes segment information and collects terminal information from communication terminals that belong to its own segment. The segment managers communicate with each other via the long range wireless communication interface. The segment managers exchange the terminal information related to each segment. Communication within a segment is performed through that segment alone via the short range wireless communication interface. Communication toward the outside of that segment is performed via the short range wireless communication interface and the long range wireless communication interface.
摘要:
A network system which provides each terminal user with differentiated service, dynamically changing service profiles even in the middle of a communication session. A service control database maintains service profile definitions. When a mobile node registers with a foreign agent to initiate a conmiunication session, a service profile setting controller in the mobile node's home server sets up a service profile for the mobile user. When an event occurs within a service profile updating controller, it indicates that some control condition specified in the service profile is met. The service profile updating controller then makes access to the service control database to obtain a new service profile and the mobile node's foreign server forwards it to the foreign agent, to which the mobile node is attached. The service profile that has been established in relevant network nodes, including the home agent and foreign agent, is dynamically updated with the new one.
摘要:
The forklift controller changes the speed of the actuator, corresponding to the operational angle of the lift lever, and then changes the vehicle speed, corresponding to the amount of depression of an accelerator. This allows the controller to control the throttle opening corresponding to the operational angle of the lift lever, and together controls the amount of depression of the accelerator. During running without being loaded, the forklift controller changes the vehicle speed, corresponding to the amount of depression of the accelerator, and together determines the number of revolutions of the engine to the throttle opening so that the optimum fuel consumption can be obtained. The controller controls the throttle opening and speed ratio so that the vehicle speed and number of revolutions of the engine can be controlled.
摘要:
The present invention is an authentication method for disclosing identification data of an object and authenticating when referring to data of the object corresponding to the identification data based on the identification data and can associate a tag device and data of a referring entity and authenticate that data of the tag device is referred by a proper referring entity by generating a third value by conducting a predetermined calculation with a temporary first value indicating a most recent referral to the identification data of the object and a temporary reference second value issued to a referring entity of the identification data for each referral, and authenticating a relationship between the object and the referring entity by verifying the third value.
摘要:
In a system including a first unit retaining a first identifier and a second unit retaining a second identifier for reading out the first identifier from the first unit to transmit, as cooperation information, a combination of the first identifier and the second identifier, for managing the cooperation information, a cooperation information managing apparatus receives the cooperation information and registers the second identifier included in the cooperation information and a group of a plurality of first identifiers including the first identifier included in the cooperation information in a state associated with each other. For managing objects to be used by a user, this enables managing the objects as an aggregation without handling the objects individually, thereby realizing efficient management from a user's point of view.
摘要:
Linked with a position registration procedure in a mobile IP, the invention provides a VPN setting service using an IP Sec. tunnel between optional terminals without requiring these terminals to have a specific VPN function. This service is provided by a mobile terminal, authentication servers, a VPN database, and network apparatuses. A home authentication server extracts from the VPN database the VPN information of a user who has requested the authentication at the time of making a position registration request from the mobile terminal. The home authentication server then posts the VPN information to each network apparatus using a predetermined position registration message and an authentication response message. Based on the posted VPN information, the network apparatuses set a VPN path by the IP Sec. to between a home network apparatus and an external network apparatus, between the home network apparatus and a predetermined network apparatus, and/or the external network apparatus and the predetermined network apparatus, respectively.
摘要:
In a system including a first unit retaining a first identifier and a second unit retaining a second identifier for reading out the first identifier from the first unit to transmit, as cooperation information, a combination of the first identifier and the second identifier, for managing the cooperation information, a cooperation information managing apparatus receives the cooperation information and registers the second identifier included in the cooperation information and a group of a plurality of first identifiers including the first identifier included in the cooperation information in a state associated with each other. For managing objects to be used by a user, this enables managing the objects as an aggregation without handling the objects individually, thereby realizing efficient management from a user's point of view.
摘要:
An authentication method is disclosed that makes the identification information of an object public and performs authentication in referring, from the identification information, to the information of the object corresponding to the identification information. The method includes generating a third value through a predetermined operation of a temporary first value generated every time the identification information is referred to and a temporary second value generated for a referrer to the identification information; encrypting the third value by first and second different encryption methods; decrypting the third value encrypted by the first encryption method in a tag device attached to the object; and decrypting the third value encrypted by the second encryption method in an apparatus managing the information of the object, and comparing the third value decrypted in the apparatus with the third value decrypted in the tag device, thereby verifying the relationship between the object and the referrer thereto.