摘要:
An Internet accessing system which allows automatic user login onto the Internet with the use of two cards and card readers. One card contains information about an Internet access point telephone number, the ID number of the user, and the password of the user. The second card contains information about the URL designating the location of the desired startup homepage. Upon insertion of the cards into the card readers, the user is automatically logged onto the Internet.
摘要:
A disclosed database access control apparatus generates and stores an access key based on a user ID of a user apparatus. Then, the database access control apparatus sends the access key to the user apparatus with an address of a proxy process server apparatus. The user apparatus sends the access key to the proxy process server apparatus when making a database access request, ad the proxy process server apparatus sends the access key to the database access control apparatus when making a database process request. When receiving the database process request, the database access control apparatus determines whether an access key the same as the access key received from the proxy process server apparatus is stored in the database access control apparatus, and accesses the database only if having the access key.
摘要:
The presentation of a contact point and contact normal line calculation method for processing/assembly apparatuses, having the ability to reduce contact point calculation errors due to errors in the force measurement device in both the direction of movement and the direction perpendicular to movement. The invention calculates the points and normal lines of contact between a tool and a product being processed by running, in order, a force application line calculation procedure to calculate the force application line from the signal output from the force measurement device; a intersection point calculation procedure to calculate the intersection point between the force application line and the tool by using information about the geometrical shape of tool; a dot product calculation procedure for determining the dot product between the translation velocity and the normal vector; a boundary distance calculation procedure to calculate the boundary distance to the boundary area; a force effect distance calculation procedure to calculate the force effect distance; and a function calculation procedure to calculate a function of the chosen points over the dot product, the force effect distance, and the boundary distance; taking the calculated function as a final determining function and taking the point within the chosen points which minimizes the final determining function and the corresponding normal vector as the contact point and contact normal line.
摘要:
A system management method is disclosed for associating a process object and a process with each node in a tree structure, and operating each node based on the tree structure so as to manage the process object and the process, including: registering a registered user that performs operations for a general node corresponding to the process object or for a function node corresponding to the process; setting the function node as a child node of the general node corresponding to the process object for which the process corresponding to the function node should be performed, and setting the general node as a parent node of the function node; setting registered user operation authority for each registered user; and, when execution of the process corresponding to the function node is requested by the registered user, causing the function node to execute the process only when the process is permitted by the registered user operation authority, of the registered user requesting the process, set in the general node that is a parent node of the function node.
摘要:
A database access control apparatus generates and stores an access key based on a user ID of a user apparatus. Then, the database access control apparatus sends the access key to the user apparatus with an address of a proxy process server apparatus. The user apparatus sends the access key to the proxy process server apparatus when making a database access request, and the proxy process server apparatus sends the access key to the database access control apparatus when making a database process request. When receiving the database process request, the database access control apparatus determines whether an access key same as the access key received from the proxy process server apparatus is stored in the database access control apparatus, and accesses the database only if having the access key.