Issued Patents All Time
Showing 26–50 of 66 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9514398 | Securely printing a document | Kazuhito Akiyama, Sanehiro Furuichi | 2016-12-06 |
| 9501628 | Generating a distrubition package having an access control execution program for implementing an access control mechanism and loading unit for a client | Taku Aratsu, Sanehiro Furuichi | 2016-11-22 |
| 9497170 | Computer assisted name-based aggregation system for identifying names of anonymized data | Kazuhito Akiyama, Nobuhiro Asai | 2016-11-15 |
| 9416821 | Cage for rolling bearing and rolling bearing | Yoji Sato, Hidenobu Mikami | 2016-08-16 |
| 9396208 | Selecting storage cloud for storage of entity files from plurality of storage clouds | Yuto Fukui, Sanehiro Furuichi | 2016-07-19 |
| 9396209 | Selecting storage cloud for storage of entity files from plurality of storage clouds | Yuto Fukui, Sanehiro Furuichi | 2016-07-19 |
| 9354625 | Abnormality detection for isolating a control system | Akira Ohkado, Yukihiko Sohda, Tadashi Tsumura | 2016-05-31 |
| 9251805 | Method for processing speech of particular speaker, electronic system for the same, and program for electronic system | Taku Aratsu, Akihiko Takajo, Takahito Tashiro | 2016-02-02 |
| 9218499 | Data duplication using a shared storage area with improved access control | Sanehiro Furuichi | 2015-12-22 |
| 9075410 | Abnormality detection for isolating a control system | Akira Ohkado, Yukihiko Sohda, Tadashi Tsumura | 2015-07-07 |
| 9064110 | Anomaly detection to implement security protection of a control system | Kazuhito Akiyama, Akira Ohkado, Yukihiko Sohda, Tadashi Tsumura | 2015-06-23 |
| 9009295 | System for indicating to network user the cost of service provided to each device on network | Kazuhito Akiyama, Sanehiro Furuichi | 2015-04-14 |
| 9003415 | Method and apparatus having resistance to forced termination attack on monitoring program for monitoring a predetermined resource | Sanehiro Furuichi | 2015-04-07 |
| 8966158 | Data protection technique that protects illicit copying of data maintained in data storage | Sanehiro Furuichi | 2015-02-24 |
| 8930368 | Categorizing data to perform access control | Sanehiro Furuichi, Hideo Ichinomiya, Hayato Kiriyama, Taku Aratsu | 2015-01-06 |
| 8922828 | Determining scan priority of documents | Sanehiro Furuichi, Kiriyama Hayato, Hideo Ichinomiya, Aratsu Taku | 2014-12-30 |
| 8918899 | Information processing device, control method and program | Sanehiro Furuichi | 2014-12-23 |
| 8799376 | Method, computer program, and device for processing e-mail addressed to multiple destination addresses | Katsuyuki Shiga, Takeyuki Shimura, Yuhichi Takahashi | 2014-08-05 |
| 8776070 | Method and apparatus having resistance to forced termination attack on monitoring program for monitoring a predetermined resource | Sanehiro Furuichi | 2014-07-08 |
| 8726085 | Anomaly detection to implement security protection of a control system | Kazuhito Akiyama, Akira Ohkado, Yukihiko Sohda, Tadashi Tsumura | 2014-05-13 |
| 8683589 | Providing protection against unauthorized network access | Seiji Munetoh, Akira Ohkado, Yukihiko Sohda | 2014-03-25 |
| 8677484 | Providing protection against unauthorized network access | Seiji Munetoh, Akira Ohkado, Yukihiko Sohda | 2014-03-18 |
| 8661502 | Determining a sensitivity label of document information in real time | Taku Aratsu, Sanehiro Furuichi, Hideo Ichinomiya, Hayato Kiriyama | 2014-02-25 |
| 8528050 | Instant messagings | Hiroaki Kashima, Shigeki Takeuchi, Daisuke Tomoda, Hayato Uenohara, Yuhko Yamauchi | 2013-09-03 |
| 8499064 | Changing operating state of a network device on a network based on a number of users of the network | Kazuhito Akiyama, Sanehiro Furuichi | 2013-07-30 |