会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明专利
    • PROTOCOL CONVERTER
    • JPH04363944A
    • 1992-12-16
    • JP1643291
    • 1991-02-07
    • TOSHIBA CORP
    • MORI SUSUMU
    • H04L29/06
    • PURPOSE:To ensure the safety of a network resulting from the device of the system such that a packet exchange network of the X.25 system is used as a public line network and a reply is sent from a secondary station when an XID request is outputted from a primary station even if the protocol converter connects to the packet exchange network and accommodates the secondary station. CONSTITUTION:The protocol converter 3 interposed between a secondary station 4 and a public line (packet network 2) to implement protocol conversion between the secondary station 4 and the public line is featured to be provided with a storage section storing a station ID of the secondary station 4 and an XID reply section implementing an XID reply based on the station ID stored in the storage section in place of the secondary station 4.
    • 4. 发明专利
    • INFORMATION MANAGEMENT SYSTEM
    • JP2000010928A
    • 2000-01-14
    • JP16892098
    • 1998-06-16
    • TOSHIBA CORP
    • MORI SUSUMU
    • G06F12/00G06F15/00G06F21/20
    • PROBLEM TO BE SOLVED: To eliminate the setting error of access limit that is caused by a rewrite error, etc., and to prevent unreasonable leakage of the information having high secrecy by automatically rewriting the contents of a staff information table on the relevant day when the department name of each member of the staff is changed based on the scheduled changes in the staff which are previously inputted. SOLUTION: An access control system 3 refers to the contents of the scheduled changes in the staff written into a latest department information table 5 of a personnel management system 2 every day and at a fixed time. The contents of a staff information table 7 where the department names of each member of the staff are registered are changed based on the referred contents of the table 5. Then the contents of limit which are defined for each member of the staff to utilize a work system 4 are changed. Thus, it's possible to prevent the unreasonable leakage of the information which are registered into an application server device.