MT

Masami Tada

IBM: 60 patents #1,306 of 70,183Top 2%
OM Omron: 4 patents #761 of 3,089Top 25%
NT Ntn: 2 patents #586 of 1,364Top 45%
Overall (All Time): #32,905 of 4,157,543Top 1%
66
Patents All Time

Issued Patents All Time

Showing 26–50 of 66 patents

Patent #TitleCo-InventorsDate
9514398 Securely printing a document Kazuhito Akiyama, Sanehiro Furuichi 2016-12-06
9501628 Generating a distrubition package having an access control execution program for implementing an access control mechanism and loading unit for a client Taku Aratsu, Sanehiro Furuichi 2016-11-22
9497170 Computer assisted name-based aggregation system for identifying names of anonymized data Kazuhito Akiyama, Nobuhiro Asai 2016-11-15
9416821 Cage for rolling bearing and rolling bearing Yoji Sato, Hidenobu Mikami 2016-08-16
9396208 Selecting storage cloud for storage of entity files from plurality of storage clouds Yuto Fukui, Sanehiro Furuichi 2016-07-19
9396209 Selecting storage cloud for storage of entity files from plurality of storage clouds Yuto Fukui, Sanehiro Furuichi 2016-07-19
9354625 Abnormality detection for isolating a control system Akira Ohkado, Yukihiko Sohda, Tadashi Tsumura 2016-05-31
9251805 Method for processing speech of particular speaker, electronic system for the same, and program for electronic system Taku Aratsu, Akihiko Takajo, Takahito Tashiro 2016-02-02
9218499 Data duplication using a shared storage area with improved access control Sanehiro Furuichi 2015-12-22
9075410 Abnormality detection for isolating a control system Akira Ohkado, Yukihiko Sohda, Tadashi Tsumura 2015-07-07
9064110 Anomaly detection to implement security protection of a control system Kazuhito Akiyama, Akira Ohkado, Yukihiko Sohda, Tadashi Tsumura 2015-06-23
9009295 System for indicating to network user the cost of service provided to each device on network Kazuhito Akiyama, Sanehiro Furuichi 2015-04-14
9003415 Method and apparatus having resistance to forced termination attack on monitoring program for monitoring a predetermined resource Sanehiro Furuichi 2015-04-07
8966158 Data protection technique that protects illicit copying of data maintained in data storage Sanehiro Furuichi 2015-02-24
8930368 Categorizing data to perform access control Sanehiro Furuichi, Hideo Ichinomiya, Hayato Kiriyama, Taku Aratsu 2015-01-06
8922828 Determining scan priority of documents Sanehiro Furuichi, Kiriyama Hayato, Hideo Ichinomiya, Aratsu Taku 2014-12-30
8918899 Information processing device, control method and program Sanehiro Furuichi 2014-12-23
8799376 Method, computer program, and device for processing e-mail addressed to multiple destination addresses Katsuyuki Shiga, Takeyuki Shimura, Yuhichi Takahashi 2014-08-05
8776070 Method and apparatus having resistance to forced termination attack on monitoring program for monitoring a predetermined resource Sanehiro Furuichi 2014-07-08
8726085 Anomaly detection to implement security protection of a control system Kazuhito Akiyama, Akira Ohkado, Yukihiko Sohda, Tadashi Tsumura 2014-05-13
8683589 Providing protection against unauthorized network access Seiji Munetoh, Akira Ohkado, Yukihiko Sohda 2014-03-25
8677484 Providing protection against unauthorized network access Seiji Munetoh, Akira Ohkado, Yukihiko Sohda 2014-03-18
8661502 Determining a sensitivity label of document information in real time Taku Aratsu, Sanehiro Furuichi, Hideo Ichinomiya, Hayato Kiriyama 2014-02-25
8528050 Instant messagings Hiroaki Kashima, Shigeki Takeuchi, Daisuke Tomoda, Hayato Uenohara, Yuhko Yamauchi 2013-09-03
8499064 Changing operating state of a network device on a network based on a number of users of the network Kazuhito Akiyama, Sanehiro Furuichi 2013-07-30