摘要:
A video display system is disclosed which has a video signal source for supplying the video signal of odd fields and even fields which are interlaced with each other, a first set of display cells for the odd fields, a second set of display for the even fields and arranged alternately with the first set of display cells in an interlaced fashion, a first circuit for supplying the video signal of the odd fields to the first set of display cells during the odd fields, and a second circuit for supplying the video signal of the even fields to the second set of display cells during the even fields. In this case, the first circuit includes a latching circuit for latching the video signal of the odd fields and supplying the latched signal to the first set of display cells during the even fields, and the second circuit includes a latching circuit for latching the video signal of the even fields and supplying the latched signal to the second set of display cells during the odd fields.
摘要:
A rotary pulse switch is disclosed in which contact pairs each consisting of a movable contact and a fixed contact are disposed along a radial face of the rotor so as to be closer to the center than the outer circumferential edge of the rotor. In this way, the width of a case into which the contact pairs fit can be made only slightly larger than the diameter of the rotor. A contact operating member for pushing a movable contact extends from the side of an operating member disposed in the proximity of the outer circumferential surface of the rotor between the two contact pairs and at substantially the same height as a projection of the operating member. Thus, the height of the case can also be reduced.
摘要:
In an electronic device, a slider is disposed in an insertion opening of a housing of a card edge connector. The slider is movable with an insertion operation of a circuit board into the insertion opening from an initial position before the circuit board is inserted to an insertion completed position where the insertion operation of the circuit board is completed by being pushed by the circuit board. When the slider is at the initial position, terminal projections are supported on a support surface of the slider in a resiliently deformed condition so that contacts are separated from an electrode-formed surface of the circuit board. When the slider is at the insertion completed position, the terminal projections are completely separated from the slider and in a state of applying a spring back force of resilient deformation to the circuit board through the contacts.
摘要:
A wiring board of the present invention comprises a plurality of device formation areas each for mounting a semiconductor chip thereon, and two or more slits formed in an area which comes into contact with a molding die when the wiring board is placed in a cavity of the molding die for forming a sealant to collectively cover the plurality of device formation areas.
摘要:
A method for providing attribute data. A request is received from a user device for a virtual ID token relating to attribute information pertaining to a subscriber associated with the user device. Responsive to the request for the virtual ID token, a data record is read from a database. The data record includes L attributes of the subscriber. L is at least 2. The data record is provided to the user device. A selection of M attributes of the L attributes is received from the user device. M is less than L. A virtual record including the M attributes selected from the data record is generated. The virtual record includes a virtual ID (VID) for identifying the virtual record. The generated virtual record is stored in the database. The virtual ID token is provided to the user device. The virtual ID token includes the VID.
摘要:
A method is provided to process data so that the data can be externally stored with minimized risk of information leakage. A framework (virtual execution framework) based on virtual machines (VMs) is utilized as a substitute for a trusted institution. Encryption of consolidated data can reduce risk of information leakage and enhance security. Since the virtual execution framework can control connection and direction of communication, financial institutions are allowed to apply encryption to data on their own, which makes the data further appropriate for external storage. By allowing financial institutions to apply their own decryption, it is possible to prevent one of two financial institutions from retrieving externally stored data into the external execution framework without intervention of the other. Additionally, associated acting subjects can be provided with freedom depending on the degree of information leakage risk.
摘要:
A computer-readable recording medium stores therein an information search program that causes a computer to search for text items described in a text file. The information search program causes the computer to execute receiving input of a search keyword; searching an index file for a writing keyword that includes the search keyword, the index file including writing keywords described, for respective entries, in an order identical to the order in which the text items are described in the text file; identifying an entry that corresponds to the writing keyword retrieved at the searching; and outputting the identified entry.
摘要:
A database system, a computer executable method, a computer executable program for the database system, and a method for updating an indexing tables in a database system To provide a database system, a computer executable method, a computer executable program for the database system, and a method for updating an indexing tables in a database system. The database system comprises a database storing item tables of items appended by timestamps. Each of items is further categorized by timestamp into said tables, and said item tables being indexed by indexing data. The database system further comprises an indexing table for said indexing data, listing the earliest timestamp of said item table together with said indexing data and a system manager for searching said item tables using said indexing table and a maintenance module for said indexing table.
摘要:
Effective utilization of a database while protecting a data provider's privacy is accomplished by an access control system which controls access to a database in which open information and secret information about a data provider are stored while being related to each other has an output request acquisition section which obtains an output request for output of information generated by accessing the database, a plural-term output authorization section which prohibits output of information generated by combining the open information and the secret information in output information requested to be output according to the output request, and which permits output of information generated by using the secret information without using the open information, and an output section which outputs the information in the output information permitted by the plural-term output authorization section to be output.
摘要:
A computer for a service provider receives from each member of two groups who is a user of a service via a mediating computer, a priority list in which member IDs of the other group is permuted in the priority order of a user and processing information that are encrypted so as not to be decrypted by the mediating computer. The ID of the priority list is encrypted with an encrypting key that is common to all members. The computer for a service provider performs matching, with ID in the priority list being left encrypted when the list is decrypted. The computer for a service provider decrypts the processing information, makes it in a state in which the matching result can be decrypted based on the processing information by only a person concerned, and sends it to each member via the mediating computer.