Patents Assigned to Fujitsu Broad Solution & Consulting Inc.
-
Patent number: 8448223Abstract: A security management program stored in a computer-readable recording medium causes a computer to perform the following steps (1) to (4). (1) A security manager authenticates an authentication target with a prepared authentication method in response to a login request from the authentication target. (2) An application execution unit outputs an authentication request in response to an application execution request which is output from the security manager after the authentication succeeds. (3) A database access unit authenticates the authentication target with the authentication method in response to the authentication request. (4) In response to a database access request from the application execution unit, the database access unit accesses a database in a portable terminal device depending on the authentication performed by the database access unit.Type: GrantFiled: May 26, 2010Date of Patent: May 21, 2013Assignee: Fujitsu Broad Solution & Consulting Inc.Inventor: Yasuhiko Awamoto
-
Patent number: 8146074Abstract: A computer-readable recording medium containing an application management program for automatically performing version management to surely manage versions of a client application that communicates with a server application. A communication request monitor acquires a communication request issued from a terminal device to a server, and extracts version information of a client application from the communication request. An upgrade determination unit determines whether the extracted version information shows the latest version, and determines that upgrade is necessary if the version is not the latest version. A setting file transmitter sends the communication request to the server if the upgrade determination unit does not determine that the upgrade is necessary. If the upgrade is necessary, on the contrary, the setting file transmitter discards the communication request and sends the client application setting file for the latest version to the terminal device sending the communication request.Type: GrantFiled: February 28, 2007Date of Patent: March 27, 2012Assignees: Fujitsu Limited, Fujitsu Broad Solution & Consulting, Inc.Inventors: Yoshiyuki Ito, Soichi Nishiyama, Yasuhiko Awamoto
-
Publication number: 20110196898Abstract: A database management program capable of joining three or more tables in a manner that the storage capacity of a memory is more efficiently used. The database management program is configured (programmed) as a program that creates some working tables (WT2-WT4) which hold the information (record identifiers in each table) with which a table in which two tables are joined can be created, and then, by collecting required item values from each table based on the information in the working tables, creates the table whose creation is instructed.Type: ApplicationFiled: June 6, 2008Publication date: August 11, 2011Applicant: FUJITSU BROAD SOLUTION & CONSULTING INC.Inventor: Yoshinori Hiyori
-
Patent number: 7961871Abstract: A process, a device, and a computer-readable medium storing a program, for encryption. A conversion table having regions each of which stores 2i character codes associated with index values is provided, where i is a natural number predetermined for each region, the 2i character codes are defined in a predetermined character encoding scheme, and the index values have a minimum necessary bit length for uniquely identifying the 2i character codes within each region. First character codes constituting a plaintext are converted into index values by reference to respectively corresponding regions of the conversion table. Then, the index values are encrypted without changing the bit lengths, and the encrypted values are converted into second character codes associated with index values identical to the encrypted values by reference to the respectively corresponding regions of the conversion table, a sequence of the second character codes is outputted as an encrypted text.Type: GrantFiled: October 10, 2007Date of Patent: June 14, 2011Assignee: Fujitsu Broad Solution & Consulting Inc.Inventors: Shigeyuki Okubo, Ryota Akiyama
-
Publication number: 20080144809Abstract: A process, a device, and a computer-readable medium storing a program, for encryption. A conversion table having regions each of which stores 2i character codes associated with index values is provided, where i is a natural number predetermined for each region, the 2i character codes are defined in a predetermined character encoding scheme, and the index values have a minimum necessary bit length for uniquely identifying the 2i character codes within each region. First character codes constituting a plaintext are converted into index values by reference to respectively corresponding regions of the conversion table. Then, the index values are encrypted without changing the bit lengths, and the encrypted values are converted into second character codes associated with index values identical to the encrypted values by reference to the respectively corresponding regions of the conversion table, a sequence of the second character codes is outputted as an encrypted text.Type: ApplicationFiled: October 10, 2007Publication date: June 19, 2008Applicant: FUJITSU BROAD SOLUTION & CONSULTING INC.Inventors: Shigeyuki Okubo, Ryota Akiyama
-
Publication number: 20070274494Abstract: A computer-readable recording medium having recorded therein a telephone-call connection program for controlling telephone calling with the schedule of the other party of a call and a call importance level therefor being taken into account. A connection-request receiving block extracts a transmission-source telephone number and a transmission-destination telephone number and identifies the other party of the call from the transmission-destination telephone number. Then, a call-importance-level determination block determines the call importance level of the call for the other party of the call. A schedule determination block determines whether the current time falls in a response-rejection time zone of the other party of the call. A connection determination block determines according to the response-rejection time zone and the call importance level whether telephone calling is necessary.Type: ApplicationFiled: December 22, 2006Publication date: November 29, 2007Applicants: FUJITSU LIMITED, FUJITSU BROAD SOLUTION & CONSULTING, INC.Inventors: Yasuhiko Awamoto, Soichi Nishiyama, Rieko Ohba, Chizu Tuge, Yoshihiko Ueno
-
Publication number: 20070147323Abstract: The following are provided: a data communication system, a relay apparatus, and a portable terminal apparatus in which when a mobile portable terminal apparatus such as a mobile telephone displays a screen based on display screen definition data received from the central apparatus, the exception handling of the data communication can be dynamically changed according to the communication environment of the portable terminal apparatus. The central apparatus adds, to the display screen definition data, communication control data where an exception handling procedure for communication between the portable terminal apparatus and the central apparatus is set. The portable terminal apparatus displays an image based on the display screen definition data received from the central apparatus, and performs data communication with the central apparatus according to the communication control data extracted from the display screen definition data.Type: ApplicationFiled: November 22, 2006Publication date: June 28, 2007Applicants: FUJITSU LIMITED, FUJITSU BROAD SOLUTION & CONSULTING INC.Inventors: Kazuki Matsui, Hideto Kihara, Soichi Nishiyama, Yasuhiko Awamoto, Hiroshi Kokubo, Chizu Tuge, Yoshiyuki Ito, Norie Tachibana
-
Publication number: 20070064946Abstract: A computer-readable recording medium recording a character code encryption program capable of encrypting character codes without changing the data length. When plaintext is input, a plaintext encoder converts character codes included in the plaintext to corresponding numerical values. Then, an encryptor successively acquires the numerical values of the individual character codes, obtained by the plaintext encoder, to encrypt the first numerical value into an encrypted value with an identical number of bits, by using an initial value set in a register, and then to encrypt the rest of the input numerical values by alternately repeating updating of the register value by using at least part of the encrypted value and encryption of the numerical value by using the updated register value. A character code generator converts the individual encrypted values obtained by the encryptor to corresponding character codes, thereby generating ciphertext.Type: ApplicationFiled: December 1, 2005Publication date: March 22, 2007Applicant: FUJITSU BROAD SOLUTION & CONSULTING INC.Inventors: Shigeyuki Ohkubo, Ryota Akiyama, Toshihiro Suzuki, Yuji Miyamoto, Takaoki Sasaki