This patent application is based on and claims priority pursuant to 35 U.S.C. §119(a) to Japanese Patent Application No. 2016-081302, filed on Apr. 14, 2016 in the Japan Patent Office, the entire disclosure of which is hereby incorporated by reference herein.
The present disclosure relates to an information apparatus, a method for managing communication, and a non-transitory computer-readable medium.
At offices, only certain users identified with a user identifier and a password can use information apparatuses such as multifunction peripherals. By contrast, at facilities such as libraries and municipal offices, a large number of users use the information apparatuses, and its use is temporary in many cases. In this case, if permission to use the information apparatus is given on a user-by-user basis, a burden on the users or administrators could increase. To address this issue, information apparatuses are known that include an address filtering function, enabling identification of terminals that can use the apparatuses based on an address such as an IP address. The address filtering function can eliminate the necessity of registration and management of the user identifiers and passwords for only temporary use of printing functions, while preventing the information terminal from being used by any terminal other than specified terminals.
This address filtering function has no problem at the start of operation. However, after some time since the start of operation, it becomes difficult to distinguish terminals that are still in use from terminals that are no longer in use. The address filtering function gives an exceptional permission for use to a certain apparatus. For this reason, it is preferable to invalidate the permission for use given to a terminal that is no longer in use in a timely manner.
An information apparatus to communicate with one or more communication counterparts includes a memory and circuitry. The memory is configured to store an elapsed time condition in association with identification information for each of the one or more communication counterparts. The circuitry is configured to measure an elapsed time from the last time when communication took place with the communication counterpart for each of the one or more communication counterparts. The circuitry is further configured to extract identification information for which the measured elapsed time satisfies the elapsed time condition stored in the memory. The circuitry is further configured to determine whether to restrict communications between the information apparatus and at least one of the communication counterparts corresponding to the extracted identification information.
A more complete appreciation of the embodiments and many of the attendant advantages and features thereof can be readily obtained and understood from the following detailed description with reference to the accompanying drawings, wherein:
The accompanying drawings are intended to depict embodiments of the present invention and should not be interpreted to limit the scope thereof. The accompanying drawings are not to be considered as drawn to scale unless explicitly noted.
In describing embodiments illustrated in the drawings, specific terminology is employed for the sake of clarity. However, the disclosure of this specification is not intended to be limited to the specific terminology so selected and it is to be understood that each specific element includes all technical equivalents that have a similar function, operate in a similar manner, and achieve a similar result.
As used herein, the singular forms “a”, “an”, and “the” are intended to include the multiple forms as well, unless the context clearly indicates otherwise.
Hereinafter, a description is given of an example in which a multifunction peripheral 110 is an example of an information apparatus.
In the usage environment 100 illustrated in
The MFP 110 is an information apparatus that provides a user with various image services such as printing, scanning, and facsimile communication. Examples of the user terminal 150 and the user terminal 160 include a general-purpose computer such as a desktop computer, a laptop computer, and a tablet computer and a mobile information terminal. When the user wants to print out something, the user operates any one of the user terminals 150 and the user terminal 160 to send a print job to the MFP 110. Further, when the user wants to perform scan transmission, the user operates the MFP 110 to request a scan job that instructs a transfer of scanned images to a shared folder on the user terminal 150 or the user terminal 160 that the user uses.
Although in
Examples of the administrator terminal 190 include a general-purpose computer such as a desktop computer, a laptop computer, and a tablet computer and a mobile information terminal. The administrator uses the administrator terminal 190 to access the MFP 110 to configure various settings of the MFP 110 or to receive various notifications from the MFP 110.
In the usage environment 100, the MFP 110 includes an IP address filtering function that implements access restriction based on an IP address allocated to each terminal such that one or more specific user terminals 150, user terminals 160, and administrator terminals 190 can communicate with the MFP 110. The IP address filtering function may be referred to as just an “IP filtering function” hereinafter. Further, in the following description, the user terminal 150 and the user terminal 160 may be collectively referred to as an “external apparatus”, in order to simplify the description.
This IP filtering function requires a group of IP addresses to be registered first. After some time since the registration and start of operation, it becomes difficult for the administrator to distinguish terminals that are still in use from terminals that are no longer in use in a simple manner. In some cases, more than 100 terminals are registered depending on a size of facilities. The larger number of terminals registered, the more difficult the management. The IP filtering function is a function that gives an exceptional permission for use to a certain terminal. For this reason, it is preferable to invalidate the permission for use given to a terminal that is no longer in use in a timely manner.
To address this issue, the MFP 110 according to the present embodiment records a communication status in association with each of the IP addresses of the user terminals 150 and the user terminals 160 as communication counterparts, and measures a time elapsed since the latest communication with the communication counterpart. The MFP 110 extracts, from the registered IP addresses, an IP address for which the measured elapsed time satisfies a predetermined condition that triggers a determination as to whether to restrict communication with the communication counterpart. Further, the MFP 110 determines whether to restrict the communication with the communication counterpart corresponding to the extracted IP address or permit the continuation of the communication. When the MFP 110 determines that the communication with the communication counterpart corresponding to the extracted IP address should be restricted, the MFP 110 may delete the IP address from a whitelist as permission information defining the IP addresses of the communication counterparts from which transmission data is permitted. In addition, the MFP 110 may send, to the administrator terminal 190, a request requesting the administrator to confirm whether the communication should be restricted as needed.
This configuration enables an efficient specification of the IP address of the communication counterpart that is no longer in use based on the predetermined condition and a timely determination as to whether to restrict the communication with the communication counterpart corresponding to the specified IP address.
Hereinafter, a detailed description is given of an access management function implemented by the MFP 110 according to the present embodiment with reference to
The functional block 210 of the MFP 110 illustrated in
The scanner unit 214 includes an image reading unit and performs image reading in image processing services such as copying and scanning. The print unit 216 includes an image forming unit and performs image formation in image processing services such as copying and printing. The operation unit 218 includes a touch panel operated by a user of the MFP 110. The operation unit 218 provides a user interface that accepts various user operations such as a login operation, a job execution instruction, and a logout operation via a panel. The basic processing unit 212 controls an entire operation of the MFP 110 including the scanner unit 214, the print unit 216, and the operation unit 218.
Although
The access manager 226 is implemented by, for example, a network interface card (NIC) and manages communications between the MFP 110 and the external apparatus. In the present embodiment, the access manager 226 implements the IP filtering function to determine whether the external apparatus is a permitted communication counterpart when data communication between the MFP 110 and the external apparatus occurs. When the access manager 226 determines that the external apparatus is permitted to communicate with the MFP 110, the access manager 226 transfers a packet to the basic processing unit 212. By contrast, when the access manager 226 determines that the external apparatus is not permitted to communicate with the MFP 110, the access manager 226 ignores the packet or sends a denial packet back to the external apparatus.
When the packet is ignored, the communication is terminated at the external apparatus due to timeout. By contrast, when the denial packet is sent back, the external apparatus can recognize that the access is denied because the communication is terminated explicitly.
The access permission or disapproval is defined in advance in the administrator input information 230. When the MFP 110 is start up, for example, the access manager 226 reads out the whitelist including at least one registered IP address from the administrator input information 230 to configure a table on a memory such as a system memory 56 and a local memory 62 illustrated in
In the present embodiment, in response to an occurrence of data communication, the access manager 226 records, in the access information 234, an IP address of the communication counterpart and a period of time during which the MFP 10 and the communication counterpart communicate data with each other.
The schedule manager 222 calls the registration deletion determiner 224 periodically or any desired time according to a predefined schedule to cause the registration deletion determiner 224 to start determination of deletion of one or more registered IP addresses by the IP filtering function. The schedule manager 222 is set up with a schedule in advance in accordance with an instruction given by the administrator via the operation unit 218. The schedule may define the call to be performed periodically such as every hour, every day, every 17 o′clock, and at 17 o′clock on every Friday. Alternatively, the schedule may define the call to be performed at irregular intervals by an event activation such as a start-up of the MFP 110 or a transition from an energy saving mode.
In response to the call from the schedule manager 222, the registration deletion determiner 224 performs the determination of deletion of one or more registered IP addresses from the whitelist by the IP filtering function.
The elapsed time measuring unit 240 measures, for each of the IP addresses of the communication counterparts, a time elapsed since the latest communication between the MFP 110 and the communication counterpart. The address extractor 242 determines, based on the measured elapsed time, whether each of the IP addresses of the communication counterparts satisfies the predetermined condition to extract an IP addresses that satisfy the predetermined condition.
In the present embodiment, the address extractor 242 includes a first address extractor 244 and a second address extractor 246 to perform the determination in two steps. The first address extractor 244 extracts an IP address for which the measured elapsed time exceeds a period of time defining a time at which a check of a connection status is to be started. This period of time defining a time at which the check of the connection status is to be started is referred to as a “status-check start time” hereinafter. The second address extractor 246 extracts an IP address for which the measured elapsed time exceeds a period of time defining a time at which determination is to be performed as to whether the extracted IP address should actually be deleted. This period of time defining a time at which the determination is to be performed as to whether the extracted IP address should actually be deleted is referred to as a “deletion determination check time” hereinafter. The condition such as the status-check start time and the deletion determination check time is defined in advance by the administrator and stored in the administrator input information 230.
In a case in which an IP address for which the measured elapsed time exceeds the status-check start time is extracted, the connection-check requesting unit 248 requests the access manager 226 to check the connection status. The access manager 226 transmits a request for connection check to the user terminal 150 or the user terminal 160 as a communication counterpart corresponding to the extracted IP address. Further, the access manager 226 records a result of the connection check in the access information 234. In a case in which an IP address for which the measured elapsed time exceeds the deletion determination check time is extracted, the determiner 250 determines whether to actually restrict the communication between the MFP 110 and the user terminal 150 or the user terminal 160 corresponding to the extracted IP address based on the results of the connection checks performed so far.
In a specific embodiment, when the determiner 250 determines that the communication should be restricted, the deletion unit 252 may delete the extracted IP address from the whitelist to restrict the communication. The information regarding the IP address that is deleted from the whitelist is deleted from the administrator input information 230 or the device management information 232. Alternatively, a deletion flag is set. The deletion check unit 254 may request the administrator to confirm whether to restrict the communication between the MFP 110 and the user terminal 150 or 160 corresponding to the IP address for which the determiner 250 determines not to restrict the communication as a connection status is confirmed.
Hereinafter, a more detailed description is given of the access management function implemented by the MFP 110 according to the present embodiment with reference to
The registration deletion determiner 224 starts the operation illustrated in
The registered IP address is an IP address of the user terminal 150 or the user terminal 160 as a communication counterpart that is registered in the whitelist to permit an access. The IP address is a target of the determination of the deletion. The status-check start time defines a time at which the check of the connection status is to be started, as described above. In a case in which an elapsed time since the last access exceeds the status-check start time at a time when the operation illustrated in
Referring to an example illustrated in
Although in
Referring again to
At S103, the registration deletion determiner 224 measures, for one of the registered IP addresses as a current processing target, an elapsed time since the last access based on the access information 234 to update the device management information 232.
More specifically, at S103, the registration deletion determiner 224 measures a current date and time and reads out the last access time corresponding to the IP address as the current processing target from the access information 234 to calculate a difference between the current time and the last access time. Thus, the elapsed time since the last access is measured. It should be noted that the access manager 226 updates the last access time in the access information 234 each time the user terminal 150 or the user terminal 160 accesses the MFP 110.
At S104, the registration deletion determiner 224 determines whether the measured elapsed time exceeds the status-check start time. When the registration deletion determiner 224 determines that the elapsed time does not exceed the status-check start time (S104: NO), the processing loop L1 ends for the IP address as the current processing target. Then, the processing loop L1 is performed for a next one of the registered IP addresses. By contrast, when the registration deletion determiner 224 determines that the elapsed time exceeds the status-check start time (S104: YES), the operation proceeds to S105.
At S105, the registration deletion determiner 224 determines whether the measured elapsed time exceeds the deletion determination check time. When the registration deletion determiner 224 determines that the elapsed time does not exceed the deletion determination check time (S105: NO), the operation proceeds to S106. At S106, the registration deletion determiner 224 causes the access manager 226 to perform the connection status check, and the processing loop L1 for the IP address as the current processing target ends. Then, the processing loop L1 is performed for a next one of the registered IP addresses.
More specifically, in the connection status check performed at S106, the registration deletion determiner 224 issues, to the access manager 226, a communication request directed to the IP address as the current processing target. For example, in response to receiving the connection request, the access manager 226 sends a message requesting a response to the user terminal 150 or the user terminal 160 as the communication counterpart to check the connection status. If the response is given back from the communication counterpart, it is confirmed that the communication counterpart is connected to the network 102 and the power is on. Examples of the message requesting a response from the communication counterpart include, but not limited to, a Ping command. In an alternative embodiment, a program configured to give a response back to a predetermined message may be resident in the user terminal 150 or the user terminal 160.
In addition, the connection check may be performed once or multiple times each time the operation illustrated in
By contrast, when the registration deletion determiner 224 determines that the elapsed time exceeds the deletion determination check time (S105: YES), the operation proceeds to S107. At S107, a deletion determination processing based on the response ratio corresponding to the IP address as the current processing target is called. When the operation returns from the deletion determination processing, the processing loop L1 for the IP address as the current processing target ends. Then, the processing loop L1 is performed for a next one of the registered IP addresses. A description is given later of the deletion determination processing called at S107 with reference to
When the processing loop L1 is performed for all of the registered IP addresses, the operation ends. By performing the processing loop L1 from S103 to S107 for all of the registered IP addresses, one or more IP address satisfying the conditions, specifically, one or more IP addresses for which the elapsed time reaches the status-check start time and one or more IP addresses for which the elapsed time reaches the deletion determination check time are extracted. Further, each of the connection status check and the deletion determination processing based on the response ratio is performed on the extracted IP address.
First, at S201, the registration deletion determiner 224 reads out the response rate associated with the IP address as the current processing target in the access information 234 to determine whether the read-out response rate satisfies the condition stored in the administrator input information 230.
When the registration deletion determiner 224 determines that the response rate satisfies the condition (S201: YES), the operation proceeds to S202. At S202, the registration deletion determiner 224 deletes the IP address as the current processing target from the list of the registered IP addresses of the IP filter, and the deletion determination processing ends. Then, the operation returns to the processing illustrated in
By contrast, when the registration deletion determiner 224 determines that the response rate does not satisfy the condition (S201: NO), the operation proceeds to S203. At S203, the registration deletion determiner 224 requests the administrator to confirm whether to restrict the communication between the MFP 110 and the user terminal 150 or the user terminal 160 corresponding to the IP address. For example, the registration deletion determiner 224 sends an email or an instant message requesting the confirmation to the administrator terminal 190. At S204, the registration deletion determiner 224 clears the elapsed time associated with the IP address in the device management information 232 to zero, and the deletion determination processing ends. Then, the operation returns to the processing illustrated in
For example, in a case in which the condition for the response rate is “DELETE IF NO RESPONSE”, it means that the IP address is deleted when no response is received from the user terminal 150 or the user terminal 160 corresponding to the IP address. Accordingly, in this example, when one or more responses are received from the user terminal 150 or the user terminal 160, the registration deletion determiner 224 sends, to the administrator terminal 190, an email, for example, requesting to determine whether to delete the IP address. Further, the elapsed time is cleared to zero and the measurement of the elapsed time is again started from zero.
Hereinafter, a description is given of an example of the change of the administrator input information 230 and the device management information 232 and how the registered IP is deleted by the access management function according to the present embodiment with reference to
Referring to the examples illustrated in
For another registered IP address of xxx.xxx.xxx.101, a rule is set such that the connection check is started if 30 days have passed since the last access. Further, the rule defines that, for the same registered IP address of xxx.xxx.xxx.101, the determination is performed as to whether the IP address should be deleted from the whitelist if 60 days have passed since the last access. At the timing of
Further, as illustrated in
In an example of
Hereinafter, a description is given of processes among each of the modules in the registration deletion determination processing with reference to
An operation illustrated in
At S303, the external apparatus such as the user terminal 150 and the user terminal 160 transmits data. At S304, the access manager 226 determines whether the IP address of the external apparatus as a communication counterpart from which the data is transmitted is permitted to access the MFP 110. Hereinafter, a description is given of an example in which the IP address of the communication counterpart is present in the whitelist and therefore the communication counterpart is permitted to access the MFP 110. At S305, the access manager 226 records a last access time in association with the registered IP address in the access information 234. In this case, the data is transferred to a predetermined destination via the basic processing unit 212 and a response is appropriately sent back to the external apparatus.
At S401, the schedule manager 222 detects a preset time. At S402, the schedule manager 222 calls the registration deletion determiner 224 to cause the registration deletion determiner 224 to start the determination as to whether to delete the IP address. At S403, the registration deletion determiner 224 reads out the registration deletion rule of each of the IP addresses from the administrator input information 230. At S404, the registration deletion determiner 224 develops the read-out registration deletion rules on the memory.
At S405, the registration deletion determiner 224 reads out the last access time of each of the IP addresses from the access information 234. At S406, the registration deletion determiner 224 updates the device management information 232 with the elapsed time measured for each of the IP addresses. At S407, the registration deletion determiner 224 performs the deletion determination for each of the IP addresses. Hereinafter, a description is given of an example in which the registration deletion determiner 224 determines that a certain IP address is to be deleted from the whitelist.
At S408, the registration deletion determiner 224 deletes an entry of the certain IP address from the administrator input information 230. At S409, the registration deletion determiner 224 notifies the access manager 226 that the entry of the certain IP address is to be deleted. At S410, the access manager 226 updates the whitelist.
Subsequently, at S501, the external apparatus transmits data to the MFP 110. Hereinafter, a description is given of an example in which the external apparatus whose entry of the IP address is deleted at S408 is to access the MFP 110. At S502, the access manager 226 determines whether the IP address of the external apparatus as a communication counterpart from which the data is transmitted is permitted to access the MFP 110. In this case, the access manager 226 determines that the access from the IP address is not permitted.
As described heretofore, according to the present embodiment, an IP address of a communication counterpart that is no longer in use is specified, and determination is made at appropriate time as to whether an access from the communication counterpart corresponding to the specified IP address is to be restricted. In particular, after some time since the registration of IP addresses from which an access is permitted, it becomes difficult for the administrator to distinguish terminals that are still in use from terminals that are no longer in use in a simple manner. According to the present embodiment, an IP address of a communication counterpart that is no longer in use is specified in an efficient manner, and the registration of the IP address of the communication counterpart that is no longer in use is invalidated at appropriate time. This enhances a level of security.
In the embodiment described heretofore, the IP address filtering function is applied to both of the transmission and reception of data. In another embodiment, the IP address filtering function may be applied to the transmission and the reception independently.
Hereinafter, a description is given of the MFP 110 implementing an access management function according to another embodiment with reference to
A description is given of an example embodiment in which the device management information 232 includes the permission or disapproval of transmission and the permission or disapproval of reception. However, in a case in which the data structure as illustrated in
In another embodiment, the access manager 226 manages communications between the MFP 110 and the external apparatus separately for each one transmission and reception. In this embodiment, the access manager 226 implements both of an IP filtering function for transmission and an IP filtering function for reception. Accordingly, the access manager 226 determines whether the external apparatus is a permitted communication counterpart for reception when data communication between the MFP 110 and the external apparatus occurs. Further, the access manager 226 determines whether the external apparatus is a permitted communication counterpart for transmission when data communication between the MFP 110 and the external apparatus occurs.
In response to a call from the schedule manager 222, the registration deletion determiner 224 measures, for each of the IP addresses of communication counterparts, an elapsed time since the last transmission time. Further, the registration deletion determiner 224 measures, for each of the IP addresses of communication counterparts, an elapsed time since the latest reception time. The registration deletion determiner 224 further determines, for each of the registered IP addresses, whether each of the measured elapsed times satisfies the conditions defined in the administrator input information 230 to extract one or more IP addresses that satisfies the conditions. In a case in which an IP address for which the measured elapsed time from the last transmission time exceeds the status-check start time is extracted, the registration deletion determiner 224 requests the access manager 226 to check the connection status. Further, in a case in which an IP address for which the measured elapsed time from the last reception time exceeds the status-check start time is extracted, the registration deletion determiner 224 requests the access manager 226 to check the connection status. The access manager 226 records a result of the connection check in the access information 234 separately for each one of transmission and reception. In a case in which an IP address for which the measured elapsed time from the last transmission time exceeds the deletion determination check time is extracted, the registration deletion determiner 224 determines whether to actually restrict the data transmission from the user terminal 150 or the user terminal 160 corresponding to the extracted IP address to the MFP 110 based on the results of the connection checks performed so far. Further, In a case in which an IP address for which the measured elapsed time from the last reception time exceeds the deletion determination check time is extracted, the registration deletion determiner 224 determines whether to actually restrict the data reception by the user terminal 150 or the user terminal 160 corresponding to the extracted IP address from the MFP 110 based on the results of the connection checks performed so far.
In a specific embodiment, when the registration deletion determiner 224 determines that data transmission from the MFP 110 to the user terminal 150 or the user terminal 160 corresponding to the extracted IP address should be restricted, the registration deletion determiner 224 deletes the IP address from the whitelist for transmission to restrict the data transmission. Further, when the registration deletion determiner 224 determines that data reception at the user terminal 150 or the user terminal 160 corresponding to the extracted IP address from the MFP 110 should be restricted, the registration deletion determiner 224 deletes the IP address from the whitelist for reception to restrict the data reception. The registration deletion determiner 224 may request the administrator to confirm whether to restrict the communication between the MFP 110 and the user terminal 150 or 160 corresponding to the IP address for which the determiner 250 determines not to restrict the communication as a connection status is confirmed.
As described heretofore, according another embodiment, both of the whitelist for data transmission and the whitelist for data reception are prepared, and the measurement of elapsed time, the extraction of IP address for which the measured elapsed time satisfies the conditions, and the determination as to whether to restrict the communication are performed separately for each one of data transmission and data reception. Thus, the more detailed IP address filtering function enables more detailed determination as to whether the registered IP address is to be deleted.
Hereinafter, a description is given of a hardware configuration of the MFP 110 according to one or more embodiments with reference to
The ASIC 60 is connected to a local memory 62, a hard disc drive (HDD) 64, a nonvolatile memory (NV-RAM) 66 such as a flash memory. The local memory 62 is used as a buffer for image data to be copied or a buffer for data to be coded. The HDD 64 is a storage storing image data, document data, programs, font data, form data, etc. The NV-RAM 66 according to the present embodiment provides a storage area for storing programs for controlling the MFP 110, various types of system information, the administrator input information 230, the device management information 232, and the access information 234.
The controller 52 further includes a south bridge (SB) 68, a network interface card (NIC) 70, a secured digital (SD) card slot 72, an universal serial bus (USB) interface 74, an IEEE 1394 interface 76, and a Centronics interface 78, which are connected to the NB 58 via a peripheral component interconnect (PCI) bus 90. The SB 68 is a bridge to connect the NB 58 with a read only memory (ROM), PCI bus peripheral devices, etc. The NIC 70 is an interface device to connect the MFP 110 to the network 102 such as the Internet and a local area network (LAN). The SD card slot 72 mounts a SD card that is removable. The USB interface 74, the IEEE interface 76, and the Centronics interface 78 are interfaces that are in compliance with the USB standard, the IEEE standard, and the Centronics standard, respectively. These interfaces accept printing jobs, etc.
The control panel 82 implements the operation unit 218. The control panel 82 is connected to the ASIC 60 of the controller 52. The control panel 82 accepts various instruction inputs from an operator and provides a user interface to perform a screen display. The control panel 82 may include a display, a keyboard, and a mouse. Alternatively, the control panel may be constituted by a touch panel. The FCU 84 and the engine 86 is connected to the ASIC 60 via a PCI bus 92. The FCU 84 performs communications via the G3 and/or G4 facsimile protocol. The engine 86 receives print instructions or scan instructions issued by an application and performs image formation or image scanning. The engine 86 constitutes the scanner unit 214 and the print unit 216.
The MFP 110 according to the present embodiment reads out a control program from the HDD 64 or the NV-RAM 66 and expands the control program to a work area provided by the system memory 56 or the local memory 62 to implement each of functional blocks and operations described above, under control of the CPU 54.
As described heretofore, according to the above-described embodiments, identification information of a communication counterpart that is no longer in use is specified in an effective manner, and determination is made at appropriate time as to whether an access from the communication counterpart corresponding to the specified identification information is to be restricted.
This configuration enables a timely invalidation of the use permission given to a terminal that is no longer in use. Accordingly, a level of network security for the MFP 110 is improved.
A description is given heretofore of an example in which a filtering function is implemented by the IP address filtering function using an IP address as identification information. However, the identification information used for the filtering function may be any other suitable information of another layer such as a media access control (MAC) address.
The functional blocks as described above are implemented by a computer-executable program written by programming languages such as an assembler language, C, and object-oriented programming languages such as C++, C#, and Java (registered trademark). The program may be distributed via a telecommunication line or as being stored in a computer-readable storage medium such as a ROM, an electrically erasable and programmable read only memory (EEPROM), an electrically programmable read only memory (EPROM), a flash memory, a flexible disk, a compact disc read only memory (CD-ROM), a compact disc rewritable (CD-RW), a digital versatile disk (DVD)-ROM, a DVD-RAM, a DVD-RW, a Blu-ray disc, an SD card, and a magneto-optical disc (MO).
The above-described embodiments are illustrative and do not limit the present invention. Thus, numerous additional modifications and variations are possible in light of the above teachings. For example, elements and/or features of different illustrative embodiments may be combined with each other and/or substituted for each other within the scope of the present invention.
Any one of the above-described operations may be performed in various other ways, for example, in an order different from the one described above.
Each of the functions of the described embodiments may be implemented by one or more processing circuits or circuitry. Processing circuitry includes a programmed processor, as a processor includes circuitry. A processing circuit also includes devices such as an application specific integrated circuit (ASIC), DSP (digital signal processor), FPGA (field programmable gate array) and conventional circuit components arranged to perform the recited functions.
Number | Date | Country | Kind |
---|---|---|---|
2016-081302 | Apr 2016 | JP | national |