Abstract:
Provided is a mobile phone including: a transceiver for receiving voice and data signals from outside; a voice processing part for demodulating the voice signal input from the transceiver and outputting the voice signal as a voice, and modulating a voice received from outside and converting the voice into a voice signal; a control part for processing the voice signal and the data signal received from the transceiver; a display part controlled by the control part to display a vector graphic; a memory for storing an operating program of the control part and a system program; a vector graphic processing part for producing and modulating a vector graphic in response to control of the control part and outputting the vector graphic to the display part; and a button including an input part for transmitting an input from outside to the control part, the input part performing the function of connecting to a wireless Internet service when pressed and controlling the size of the vector graphic when rolled.
Abstract:
A face feature extraction apparatus and method are provided. The face feature extraction apparatus for used in a two-dimensional (2D) face identification system includes: a local base vector generator generating a plurality of local base vectors to extract features of portions of a face from input 2D face image data of users; a local base vector selector selecting a predetermined number of local base vectors suitable for the face identification from the plurality of local base vectors generated by the local base vector generator; and a local base vector overlapper overlapping the local base vectors selected by the local base vector selector and generating a smaller number of overlapped local base vectors than the selected local base vectors. Thus, 2D face identification system having high face identification rate can be provided.
Abstract:
A method and device for local domain management are provided and include a local domain authority device. The local domain authority (LDA) device includes a location limited channel (LLC) interface for transmitting and receiving information of devices which are positioned within a limited location and a (LDA) module for authenticating a device which is selected as a member of a domain from the devices, transmitting device authentication information corresponding to the domain, to the authenticated device via the LLC interface, and registering the authenticated device as a member of the domain. The method and device provide an easy and secure means for domain management.
Abstract:
The present invention relates to a process for the preparation of 4-aminomethyl-3-alkoxyiminopyrrolidine methanesulfonate, a key intermediate of quinolone antibiotics. According to the process of the present invention, the total number of steps has been shortened to 2-3 steps, the solid separation is not required, and the use of costly chemicals, particularly (BOC)2O (t-butoxycarbonyl anhydride), several organic solvents and reactants, is eliminated.
Abstract:
A face feature extraction apparatus and method are provided. The face feature extraction apparatus for used in a two-dimensional (2D) face identification system includes: a local base vector generator generating a plurality of local base vectors to extract features of portions of a face from input 2D face image data of users; a local base vector selector selecting a predetermined number of local base vectors suitable for the face identification from the plurality of local base vectors generated by the local base vector generator; and a local base vector overlapper overlapping the local base vectors selected by the local base vector selector and generating a smaller number of overlapped local base vectors than the selected local base vectors. Thus, 2D face identification system having high face identification rate can be provided.
Abstract:
A traffic information service apparatus using an ad-hoc network and a method for controlling the same. The apparatus provides an ad-hoc network between vehicles and roadside devices, and collects/provides traffic information using the ad-hoc network. The method for providing a user with traffic information, comprising the steps of a) allowing vehicles to broadcast their registration messages to create an ad-hoc network, and creating the ad-hoc network between the vehicles on the basis of the registration messages, b) allowing a Road Side Equipment (RSE) to receive the registration messages broadcast from the vehicles, and collecting traffic information from the registration messages, and c) allowing the RSE to transmit the traffic information to a traffic information service center.
Abstract:
Disclosed are a method and apparatus capable of reducing the number of computations required to generate a digital signature by a digital signature generator. A digital signature generator generates a code word for a received message by a function F for generating a code word having a set weight value and generates a digital signature based on the generated code word and an inverse of a public parity check matrix H, the parity check matrix H is one way function. A digital signature receiver converts the received message using the function F for generating a code word, and multiplies a public parity check matrix H by a received digital signal, the public parity check matrix H is a one way function, and comparing the converted value with the multiplication result.
Abstract:
A system to output an icon in response to a hot-key input, including a microcomputer to sense an instruction input through a hot-key and to output a scan code corresponding to the instruction, a keyboard launcher to receive the scan code from the microcomputer, to analyze the scan code, and to generate a message that requests an output of a hot-key icon indicating the operation of the hot-key based on the analyzed scan code, a system basic input/output system (BIOS) to provide information required to output the hot-key icon, and a display manager to receive the message generated by the keyboard launcher and to output the hot-key icon based on the information received from the system BIOS.
Abstract:
An authentication method and system are provided for devices in a home network. The device authentication method includes: storing a secret key list that contains IDs of computationally weak devices without public key operational capabilities, each ID being provided from the respective computationally weak device, and secret keys corresponding to the IDs; receiving session information including a session from a computationally weak device; operating the session information based on the secret key list, and authenticating the computationally weak device; if the computationally weak device is authenticated, generating authentication acknowledgement information about the session information and the authentication of the computationally weak device, and transmitting the information to a general device with public key operational capabilities; and at the general device, carrying out an operation on the received session information and extracting the session.
Abstract:
A device and method for verifying the integrity of a memory in a remote device are provided. An exemplary memory integrity verification method compares, based on a verification parameter received from a verifier, the time for retrieving data block of a memory of a remote device with a maximum threshold time allowed to read the memory, and transmits to the verifier a remote verification code and a data status according to the result of comparison so that the verifier can verify the integrity of the memory. Instead of relying on the verifier, the remote device provides data status information for integrity verification by using the memory retrieval time. As a result, accurate integrity verification is provided, and no independent hardware is required to verify integrity.