会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明专利
    • Application procedure illegal risk evaluation device
    • 应用程序非法风险评估装置
    • JP2009048402A
    • 2009-03-05
    • JP2007213620
    • 2007-08-20
    • Fujitsu Ltd富士通株式会社
    • KITAJIMA HIRONOBUOCHITANI AKIRAIKESAKA MORIO
    • G06Q50/00G06Q50/26
    • G06Q10/00G06Q10/04G06Q20/4016G06Q40/08
    • PROBLEM TO BE SOLVED: To quantitatively evaluate illegal risk of a chain of personal identification formed by a plurality of application procedures. SOLUTION: The relation of document groups and procedures required till acquisition of a document for personal identification required for a predetermined application, such as for example, a case that a driver's license or a combination of a health insurance card and an employee ID card is accepted as a personal identification document to the issuance application of a passport, that a health insurance card or a copy of certificate of residence is accepted as a personal identification document to the issuance application of the driver's license is stored in a personal identification diagram storage part 21. Cases of illegalness occurred in the application procedures and/or acquisition of an optional document for personal identification is accepted by an illegal case data accept part 31. An illegal risk evaluation part 41 evaluates the possibility of illegal use of any of the documents for personal identification based on the personal identification diagram and the illegal case data. COPYRIGHT: (C)2009,JPO&INPIT
    • 要解决的问题:定量评估由多个申请程序形成的个人识别链的非法风险。

      解决方案:在获得用于预定应用所需的个人身份证件的文档之前所需的文档组和过程的关系,例如驾驶执照或健康保险卡和雇员身份的组合的情况 卡作为护照的发行申请的个人身份证明文件被接受为身份证明图,存储健康保险卡或者住所证明文件作为个人身份证明文件作为个人身份证件发给驾驶执照的发行申请。 存储部分21.非法案件数据接受部分31接受申请程序中发生非法事件和/或获取用于个人身份证明的可选文件。非法风险评估部分41评估非法使用任何 基于个人识别图和非法情况资料的个人身份证明文件。 版权所有(C)2009,JPO&INPIT

    • 2. 发明专利
    • Paper sheet storage device, stacker, deposit removing method and program
    • 纸张存储设备,堆叠机,存款移除方法和程序
    • JP2012197180A
    • 2012-10-18
    • JP2011287037
    • 2011-12-27
    • Fujitsu Ltd富士通株式会社
    • IKEDA NORIKOWAKAMURA MASATOIKESAKA MORIOISHIDA SUSUMU
    • B65H5/00B01J27/18B01J35/02B65H5/06G07D9/00
    • PROBLEM TO BE SOLVED: To remove a material deposited on a paper sheet, and to efficiently use a space in a device.SOLUTION: The paper sheet storage device includes: stackers for storing paper sheets; conveying paths for conveying the paper sheets; rollers each provided on the conveying path coming into contact with the paper sheets when conveying the paper sheets to the stacker, and coated with elastic polymer material containing photocatalyst material having an adsorptive property and a decomposition property, and detecting the paper sheets adsorbed to the roller section itself; and a light irradiation section for irradiating the polymer material with which the roller sections are coated with light for generating catalysis.
    • 要解决的问题:去除沉积在纸张上的材料,并且有效地使用设备中的空间。 纸张存储装置包括:用于存储纸张的堆垛机; 用于输送纸张的输送路径; 当将纸张输送到堆垛机时,设置在与纸张接触的输送路径上的辊子,并且涂覆有含有吸附性和分解性的光催化剂材料的弹性聚合物材料,并且检测吸附到辊子上的纸张 部分本身; 以及光照射部分,用于照射用于产生催化剂的用于涂覆辊部分的聚合物材料。 版权所有(C)2013,JPO&INPIT
    • 3. 发明专利
    • Risk evaluation program, risk evaluation apparatus, and risk evaluation method
    • 风险评估程序,风险评估装置和风险评估方法
    • JP2009238188A
    • 2009-10-15
    • JP2008087007
    • 2008-03-28
    • Fujitsu Ltd富士通株式会社
    • KITAJIMA HIRONOBUOCHITANI AKIRAIKESAKA MORIO
    • G06Q10/00G06Q50/00G06Q50/10G06Q50/26
    • PROBLEM TO BE SOLVED: To propose a technique for quantitatively evaluating risk of a fraud caused by altering examination procedures in an administrative agency, etc. and false application. SOLUTION: A risk index that a fraud to an application 1 is overlooked in a diagram 100 in which a series of examination procedures groups are modeled is estimated using fraud incidence that the fraud is generated to applications 2-5 to be performed in advance subordinate to the application 1, and fraud overlook ratio that the fraud to the applications 2-5 is overlooked. Thus, the risk of fraud by altering the examination procedures and the false application is quantitatively evaluated. COPYRIGHT: (C)2010,JPO&INPIT
    • 要解决的问题:提出一种定量评估由行政机关等更改审查程序引起的欺诈风险的方法和虚假申请的技术。 解决方案:在图100中忽略对应用程序1的欺诈的风险指数,其中一系列检查程序组被建模,使用欺诈发生率来估计欺诈是为了执行应用2-5而产生的 提前从属于应用程序1,欺诈忽视比率,使应用程序2-5的欺诈被忽略。 因此,通过更改检查程序和虚假应用程序的欺诈风险进行定量评估。 版权所有(C)2010,JPO&INPIT
    • 5. 发明专利
    • Reliability evaluation program and reliability evaluation device
    • 可靠性评估方案和可靠性评估装置
    • JP2008171037A
    • 2008-07-24
    • JP2007000784
    • 2007-01-05
    • Fujitsu Ltd富士通株式会社
    • KITAJIMA HIRONOBUOCHITANI AKIRAIKESAKA MORIO
    • G06Q50/00G06Q50/04G06Q50/26
    • G06Q10/10G06Q10/06
    • PROBLEM TO BE SOLVED: To quantitatively evaluate application procedures from the point of view of reliability. SOLUTION: A reliability evaluation device 200 is provided with a pattern generation part 221 for generating the normal/abnormal pattern of a path between the start point node of an application procedure and the investigation point node of reliability based on node information for storing an object relevant to fact confirmation in an application procedure as a node and path information storing processing to be executed between nodes as a path; a normality deciding part 222 for deciding whether or not each normal/abnormal pattern generated by the pattern generation part 221 can pass and reach from the start point node through only the normal path to the verification point node; an arithmetic expression generation part 223 for generating an arithmetic expression for searching the reliability of the application procedure as the total of the generation probability of the normal/abnormal pattern decided to be reachable by the normality deciding part 222; and a reliability arithmetic part 224 for calculating the reliability of the application procedure by applying normality probability to the arithmetic expression generated by the arithmetic expression generation part 223. COPYRIGHT: (C)2008,JPO&INPIT
    • 要解决的问题:从可靠性的角度定量评估应用程序。 解决方案:可靠性评估装置200具有图案生成部221,用于基于用于存储的节点信息,生成应用程序的起点节点和可靠性的调查点节点之间的路径的正常/异常模式 与应用程序中的事实确认相关的对象作为要作为路径的节点之间执行的节点和路径信息存储处理的对象; 用于判定由模式生成部221生成的每个正常/异常模式是否可以通过仅到起始点节点的正常路径从起始点节点到达的正常判定部222; 算术表达式生成部223,用于生成用于搜索应用程序的可靠性的算术表达式作为由正常判定部分222决定为可达到的正常/异常模式的生成概率的总和; 以及可靠性算术部分224,用于通过对由算术表达式生成部分223产生的算术表达式应用正态概率来计算应用程序的可靠性。(C)2008,JPO&INPIT
    • 6. 发明专利
    • Reliability evaluation program, reliability evaluation method and reliability evaluation device
    • 可靠性评估程序,可靠性评估方法和可靠性评估设备
    • JP2008269240A
    • 2008-11-06
    • JP2007110628
    • 2007-04-19
    • Fujitsu Ltd富士通株式会社
    • KITAJIMA HIRONOBUOCHITANI AKIRAIKESAKA MORIO
    • G06Q50/00G06Q50/08G06Q50/26
    • G06F21/577G06F2221/2101
    • PROBLEM TO BE SOLVED: To provide a reliability evaluation program, a reliability evaluation method, and a reliability evaluation device, for supporting design or improvement for ensuring reliability in an application procedure by quantitatively evaluating the application procedure in terms of reliability. SOLUTION: Information on action is read from a predetermined storage part preliminarily storing information showing whether an action performed between nodes as a verification object in the application procedure operates information or a verifies information. When the action for information operation is determined to be illicit from the read information on action, reliability of the application procedure is computed based on a probability for detecting illicitness of the action for information confirmation executed in a node connected with the action for information operation. COPYRIGHT: (C)2009,JPO&INPIT
    • 要解决的问题:提供可靠性评估程序,可靠性评估方法和可靠性评估装置,用于通过在可靠性方面定量评估应用程序来支持设计或改进以确保应用程序的可靠性。 解决方案:从预先存储表示在应用程序中作为验证对象的节点之间执行的动作是否进行信息的信息的预定存储部分读取动作信息,或者验证信息。 当从读取的动作信息中确定信息操作动作是非法的时,基于用于检测与用于信息操作的动作连接的节点中执行的用于信息确认的动作的非法的概率来计算应用程序的可靠性。 版权所有(C)2009,JPO&INPIT
    • 7. 发明专利
    • LOAD DISTRIBUTION SYSTEM
    • JPH03103964A
    • 1991-04-30
    • JP24260989
    • 1989-09-19
    • FUJITSU LTD
    • IKESAKA MORIO
    • G06F15/16
    • PURPOSE:To improve processing efficiency and the performance of parallel system by distributing processing pools to respective processors and executing the distributed processing of a processing request. CONSTITUTION:Each processor 11 is provided with a processing pool 19 for registering a processing group to be processed, the processor 11 transmits a processing request to another processor 11 having a different address after processing its own processing pool 19, and when the other processor has processing, executing the processing up to the end. When the other processor has no processing, the processor concerned shifts a check bit, transmitted a processing request one of other processors 11, and when the processing reaches the prescribed number of processors, completes the whole processing. Thus, the processing pools 19 are distributed to respective processors 11 to distributively processing each processing request. Thus, the processing efficiency can be improved and the performance of the parallel system can be improved.
    • 8. 发明专利
    • DETECTION PROCESSING SYSTEM FOR FILE DIFFERENT POINT
    • JPH02285437A
    • 1990-11-22
    • JP10836789
    • 1989-04-26
    • FUJITSU LTD
    • IKESAKA MORIO
    • G06F12/00
    • PURPOSE:To obtain the proper detecting result of the file different points in accordance with the object of comparison by designating the skipping characters so as to delete the characters of an optional type out of the object of comparison. CONSTITUTION:A different point detection processing part 12 is constituted of a character string converting part 14 and a deciding part 15 for instance. The part 14 deletes the skipping characters out of the character strings showing the contents of both files 3a and 3b and converts the character strings. Then the part 15 performs the comparison of converted character strings and outputs the different point output 13 showing a discordant part when no coincidence is obtained from the comparison. Thus it is possible to perform the designation so as to delete an optional character out of the object for the detection of different points. Consequently, the output result of different points can be obtained by performing the proper comparison is accordance with the processing object.