With commands from a terminal divided into a command to designate an access area and a command to gain access, the terminal adds verification data of the terminal to an argument of the command to gain access, and it is thereby possible to verify the identity of a terminal application that issues the command to designate an access area, a terminal application that issues the command to gain access, and a terminal application that holds a verification key.

 
Web www.patentalert.com

< Profile-driven data layout optimization

> RAID stripe layout scheme

> Method and system for scalable video data width

~ 00531