摘要:
A method and an apparatus for estimating a location of a terminal are provided. The method includes: receiving at least one base station signal from each of at least one base station; computing received signal information with respect to the received signal; and estimating the location of the terminal based on signal transmission direction information associated with the base station and the computed received signal information. The present invention can accurately estimate the location of the terminal based on directional information of base station signals.
摘要:
The present invention relates to a method for providing Social Network Service (SNS) on the Internet and a system using the same. The present invention is characterized by creating a user tag list constructed with tags that are acquired by a user terminal; forming a social network between the user and other users, based on tags of the user tag list; and creating a diary based on the user tag list and social network associated with tags of the user tag list.While the present invention enables a user to create a diary about one's own life, the present invention provides a social network service (SNS) by utilizing tagging information in the created diary to form a new social network with people or specialists who have the same interests.
摘要:
A carrier sense relationship and an interference relationship between logical links in a shared, broadcast, medium network are determined. Bandwidth for each of the links is estimated based on the carrier sense relationship and the interference relationship.
摘要:
A carrier sense relationship and an interference relationship between logical links in a shared, broadcast, medium network are determined. Bandwidth for each of the links is estimated based on the carrier sense relationship and the interference relationship.
摘要:
Channel assignment for access points (APs) in a wireless network includes determining a bottleneck client in an interference relationship, and determining a channel assignment for the APs that maximizes a normalized throughput of the bottleneck client. The normalized throughput is assigned to the bottleneck client, and the bottleneck client is assigned to a fixed set.
摘要:
A tag authentication method, and a tag and reader performing the method are provided. The tag authentication method, including: a reader generating a first random number and transmitting the first random number to a tag; the reader receiving a second random number and a first verification value from the tag; the reader computing a second verification value based on the first random number and the second random number; and the reader comparing the first verification value and the second verification value.
摘要:
An apparatus for inputting a user password, includes an interface receiving a command. Further, the apparatus for inputting the user password includes a control unit setting a target based on the command from the interface, receiving and storing a password character, and determining that authentication is successes only when the set target and the password character are positioned at a same coordinate on a skin image. Furthermore, the apparatus for inputting the user password includes a display unit connected to the interface to display the skin image of the interface that is transmitted from the control unit.
摘要:
A mobile privacy protection system using a proxy, a proxy device, and a mobile privacy protection method are provided. The mobile privacy protection system includes: an electronic tag to store predetermined tag information; a proxy device to adjust a privacy level of the electronic tag; and a home server to create new tag information in response to a request from the proxy device wherein the new tag information is used to adjust the privacy level.
摘要:
A tag authentication method, and a tag and reader performing the method are provided. The tag authentication method, including: a reader generating a first random number and transmitting the first random number to a tag; the reader receiving a second random number and a first verification value from the tag; the reader computing a second verification value based on the first random number and the second random number; and the reader comparing the first verification value and the second verification value.
摘要:
A key calculation method and a shared key generation method, the key calculation method including: generating two keys to perform a key calculation; calculating a first value based on coefficients having an identical coefficient value among coefficients included in each of the two keys; and performing a coordinates operation or an exponentiation operation based on the first value, wherein the calculating of the first value is performed with respect to each of coefficient values included in the two keys, excluding 0.