Posts Tagged: "Fujitsu patents"

Fujitsu U.S. patent activities focus on information processing, signals and data storage

During 2014, Fujitsu was granted 1,820 patent grants from the U.S. Patent and Trademark Office, the 13th-highest total for any single entity receiving U.S. patents that year. A large percentage of the patents issued to Fujitsu in 2014 were focused on information processing, data storage units and base stations, especially stations developed for mobile networks.

Fujitsu’s Patents: Processing, Virtual Machines & Biometrics

In viewing Fujitsu’s recently filed patent applications, we saw a multitude of inventions in the field of information processing, whether for the analysis of computing processes or virtualization of computing resources on physical servers. A couple of biometrics innovations are discussed, including a system of electrodes meant to detect and prevent a vehicle driver from becoming drowsy. Methods for enhanced online classroom discussions are also explored. Fujitsu enjoys a very robust patent portfolio, and much of the company’s recent additions to that portfolio involve semiconductor devices. Many of the inventions which have been recently protected for Fujitsu are design to accommodate the further miniaturization of semiconductors for electronic applications. Technologies for converting voice data into useful textual objects on a computing device, as well as another biometrics innovation for better methods of authenticating a person, are also featured below.

Fujitsu Seeks Patent on Method of Detecting Illegal Network Connections

This patent application was filed by Fujitsu with the USPTO in July 2013, and claims the benefit of priority of a prior Japanese Patent Application filed on Oct. 26, 2012. The application seeks to protect new methods of detecting illegal connections with a network monitoring apparatus, which is capable of determining that a reverse connection is unauthorized. Although this system seems as though it can only protect a computer network once the malware has been noticed, after it has been executed, the system would be able to effectively limit the transmission of private material and identify untrustworthy data communications. To detect a reverse connection, this system analyzes the behavior of information packets sent between information collection apparati which are communicating with each other.