摘要:
When an application originates a call to a certain communication node, an application manager refers to history of outgoing/incoming call data and/or telephone directory data to determine whether the call origination processing should be granted. If the telephone number of the communication node for which call organization is to be performed is included in the history of outgoing/incoming calls and/or the telephone directory data, then the call origination processing may be granted because the number may be considered a number with which communication was made in the past or may be recognized as a valid number to communicate with.
摘要:
An application title, storage location information, and a download flag F is stored in an application control table TBL provided in table area 14b of EEPROM 14 of mobile phone MS. The download flag F indicates whether the application is a downloaded application. When downloading an application from IP server W, CPU 11 changes the download flag corresponding to the application to “1”. When executing the application, CPU 11 reads out the download flag F corresponding to the application and displays a predetermined image on a liquid crystal display MS4 when the download flag F has a value of “1”.
摘要:
An image output device inputs content information, generates a barcode by encoding input content information, and outputs print data so that a sign visually indicating a property of the content information is printed adjacent to the generated barcode or by superimposing the sign on the generated barcode.
摘要:
An image output device inputs content information, generates a barcode by encoding input content information, and outputs print data so that a sign visually indicating a property of the content information is printed adjacent to the generated barcode or by superimposing the sign on the generated barcode.
摘要:
In a communication terminal device, in a case where the arrangement of the windows is changed in a list screen, an overhead screen is initially displayed, in which the list screen is overviewed, and the arrangement of the windows is subsequently changed in the overhead screen, and a magnified screen (original screen) of the overhead screen, in which the arrangement of the windows has been changed, is displayed last, as described in the foregoing. By displaying a magnified image, it is possible to make windows better visible in a small display area of a mobile phone. Also, in a case where a window exists that cannot be displayed in a magnified screen, by displaying an overhead screen, it becomes possible for a user to recognize a fact that a window that cannot be displayed exists in a magnified screen, and also recognize a position of the window.
摘要:
With regard to data, stored in mobile phone 40, whose a security level is high and contents whose copyrights are protected, mobile phone 40 encapsulates data and contents, and includes the encapsulated data or the encapsulated contents. Further, mobile phone 40 processes the encapsulated data as a perfect encapsulated object utilizing only a method which is not authorized access to the encapsulated data by an executed program (E.g. Downloaded Java Applications). Java AP downloaded to mobile phone 40 instructs a perfect encapsulated object to process the encapsulated data in the perfect encapsulated object by using a method belonging to the perfect encapsulated object. Therefore, this invention makes it possible to ensure securities for programs to be provided through the network without losing diversifications of programs.
摘要:
A terminal device in which basic information and detailed information of each a plurality of application programs are stored in a different storage area for each application program, and that prohibits access to each storage area by other application programs, is caused to execute the processes of displaying a window that includes the basic information of each application program, and, if a cursor is moved to the display position of one of the pieces of basic information, reading out, from the appropriate storage areas, the detailed information of a first application program corresponding to the basic information where the cursor is positioned and the detailed information of a second application program whose basic information is displayed adjacent to the basic information of the first application program, and displaying the detailed information of the first application program.
摘要:
An information-processing device comprises: a display control that controls display positions of first and second information images in a display area of a display means for displaying an image, instructions are received for causing the first information image to move in a given direction. A display control executes a first process that, during a period in which the instruction is received, causes the first information image to move and a second process that, in a case where the first information image comes into contact with the second information image as a result of the movement caused by the first process and is further moved after the contact, causes the second information image to move in a direction different from the direction of movement of the first information image, such that the second information image does not overlap the first information image.
摘要:
Provided is a setup that allows a user to view, after the fact, the circumstances of communication within a virtual space with other users who were previously present at the same place as the user. When a user designates a previous day and time, the circumstances in the virtual space for said designated day and time are reproduced. When the avatar of the user appears and is caused to speak in the reproduced virtual space, the history content is changed as though the speech actually occurred in the virtual space on that day and time. In this way, the user can read, alter the fact, the circumstances of communication within a virtual space with other users who were previously present at the same place as the user.
摘要:
With regard to data, stored in mobile phone 40, whose a security level is high and contents whose copyrights are protected, mobile phone 40 encapsulates data and contents, and includes the encapsulated data or the encapsulated contents. Further, mobile phone 40 processes the encapsulated data as a perfect encapsulated object utilizing only a method which is not authorized access to the encapsulated data by an executed program (E.g. Downloaded Java Applications). Java AP downloaded to mobile phone 40 instructs a perfect encapsulated object to process the encapsulated data in the perfect encapsulated object by using a method belonging to the perfect encapsulated object. Therefore, this invention makes it possible to ensure securities for programs to be provided through the network without losing diversifications of programs.