摘要:
The telematics service providing system generates a path from the departure point to the destination based on traffic information, generates guidance information for each guidance point where a turn to a direction that is different from the current progress direction of the client is needed on the generated path, clips a vicinity map covering a predetermined area with reference to the guidance point from the total map to generate a guidance point vicinity map, converts the generated guidance point vicinity map into a format displayable by the client, and provides the converted map to the client terminal. Accordingly, confusion caused by complex crossroads or paths that need consecutive and same direction turns may be prevented, the client terminal may not need a memory for storing large-volume geographic information data, and the client may not additionally need to upgrade the geographic information data.
摘要:
The telematics service providing system generates a path from the departure point to the destination based on traffic information, generates guidance information for each guidance point where a turn to a direction that is different from the current progress direction of the client is needed on the generated path, clips a vicinity map covering a predetermined area with reference to the guidance point from the total map to generate a guidance point vicinity map, converts the generated guidance point vicinity map into a format displayable by the client, and provides the converted map to the client terminal. Accordingly, confusion caused by complex crossroads or paths that need consecutive and same direction turns may be prevented, the client terminal may not need a memory for storing large-volume geographic information data, and the client may not additionally need to upgrade the geographic information data.
摘要:
Methods of managing a secure area in a secure storage device include conducting an authentication process between a host and the secure storage device while modifying a size of the secure area, backing up secure data to the host from the secure area after completing the authentication process, updating management information to modify a size of the secure area, and storing the secure data, which has been backed up to the host, into the secure area that is modified in size. Related storage devices are also disclosed.