会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Grinding roller, fixing device, and image forming apparatus
    • 研磨辊,定影装置和图像形成装置
    • US09213274B2
    • 2015-12-15
    • US14207831
    • 2014-03-13
    • Kazuhiro KotakaEiri SagaeSatoshi KaiYoshihisa HaraYuusuke Arai
    • Kazuhiro KotakaEiri SagaeSatoshi KaiYoshihisa HaraYuusuke Arai
    • G03G15/00G03G15/20
    • G03G15/2017G03G15/2025G03G2215/2032
    • There is provided a grinding roller for use in a fixing device including a pair of rotary fixing members that rotate while being pressed against each other to form an area of contact, and heat and press a recording medium carrying an unfixed toner image and fed to the area of contact, to thereby fix the unfixed toner image on the recording medium. The grinding roller is configured to grind a surface of a toner image-side rotary member of the pair of rotary fixing members that comes into contact with the unfixed toner image. The grinding roller includes an abrasive grain layer including abrasive grains, forming a surface layer of the grinding roller, and having a surface with irregularities including projections each formed by an aggregate of some of the abrasive grains and larger in size than each of the abrasive grains and recesses formed between the projections.
    • 提供了一种用于定影装置的研磨辊,该定影装置包括一对旋转固定构件,该一对旋转固定构件相对于彼此压靠以形成接触区域而旋转,并且加热并压制携带未定影调色剂图像的记录介质, 从而将未定影的调色剂图像固定在记录介质上。 研磨辊构造成研磨与未定影的调色剂图像接触的一对旋转固定构件的调色剂图像侧旋转构件的表面。 研磨辊包括磨粒,包括磨粒,形成研磨辊的表面层,并且具有包括突起的表面,所述突起各自由一些磨粒的骨料形成,并且尺寸大于每个磨粒 以及形成在突起之间的凹部。
    • 5. 发明授权
    • Vulnerability countermeasure device and vulnerability countermeasure method
    • 脆弱性对策设备和漏洞对策方法
    • US09372995B2
    • 2016-06-21
    • US14237152
    • 2011-09-08
    • Tomohiro ShigemotoHirofumi NakakojiTetsuro KitoHisashi UmekiSatoshi TakemotoTadashi KajiSatoshi Kai
    • Tomohiro ShigemotoHirofumi NakakojiTetsuro KitoHisashi UmekiSatoshi TakemotoTadashi KajiSatoshi Kai
    • G06F21/00G06F21/57
    • G06F21/577G06F2221/033
    • A vulnerability countermeasure device stores configuration information associating multiple computers connected via a network and software possessed by each computer, vulnerability information associating the software with information related to the vulnerability of the software, and countermeasure policy information associating the software with a countermeasure policy to be executed if there is a vulnerability in the software; calculates the computer that data will reach based on information related to a route of the data included in the data received from a used terminal; acquires software existing in the computer based on the calculated computer and configuration information; assesses whether or not there is a vulnerability in the acquired software based on the acquired software and the vulnerability information; and is provided with countermeasure unit for executing a countermeasure to a vulnerability in accordance with a countermeasure policy with respect to the software assessed to have the vulnerability.
    • 漏洞对策装置存储将通过网络连接的多台计算机与各计算机拥有的软件相关联的配置信息,将软件与软件的脆弱性相关的信息关联的脆弱性信息以及将软件与要执行的对策策略相关联的对策策略信息 如果软件有一个漏洞; 基于与从使用终端接收到的数据中包含的数据的路径有关的信息计算数据将到达的计算机; 基于计算机和配置信息获取计算机中存在的软件; 根据获取的软件和漏洞信息,评估所获取的软件是否存在漏洞; 并且设置有对应单元,用于根据针对被评估为具有该脆弱性的软件的对策策略来执行对脆弱性的对策。
    • 7. 发明授权
    • Policy setting support tool
    • 策略设置支持工具
    • US07380267B2
    • 2008-05-27
    • US10688026
    • 2003-10-17
    • Masato AraiSatoshi Kai
    • Masato AraiSatoshi Kai
    • G06F17/00
    • G06F21/604G06F21/6218
    • The policy setting support tool according to the present invention simplifies the operation required for setting up policies by providing a policy creation unit 102 and a user interface unit 101. The policy creation unit 102 creates a draft policy from a combination of sample policies prepared for each kind of software, association information providing information on the programs that are likely to access a given object, and an access log showing a history of behavior of a given program. A user interface unit 101 displays the draft policy and allows the user to check and revise it. The support tool also facilitates the maintenance of policies, by providing a differential detection unit 104 for detecting items for suggested change referring to the current object 112 and the subject information database 113, for presenting them to the user as through a user interface unit 101, and for allowing the user to revise the policy in simplified operation.
    • 根据本发明的策略设置支持工具通过提供策略创建单元102和用户接口单元101简化了建立策略所需的操作。 策略创建单元102从为各种软件准备的样本策略的组合,关于可能访问给定对象的程序的关联信息提供关联信息和显示给定对象的行为历史的访问日志来创建草案策略 程序。 用户界面单元101显示草图策略并允许用户检查和修改它。 支持工具还通过提供差分检测单元104来提供策略的维护,该差分检测单元104用于通过用户界面单元101将用于向用户呈现的当前对象112和主题信息数据库113来检测用于建议的改变的项目, 并允许用户在简化操作中修改策略。
    • 10. 发明授权
    • Information asset management system, log analysis server, log analysis program, and portable medium
    • 信息资产管理系统,日志分析服务器,日志分析程序和便携式媒体
    • US08051204B2
    • 2011-11-01
    • US12061237
    • 2008-04-02
    • Satoshi KaiMasato AraiYoshinobu TanigawaHiromi IgawaAkira Morita
    • Satoshi KaiMasato AraiYoshinobu TanigawaHiromi IgawaAkira Morita
    • G06F15/173
    • G06Q10/06
    • An information asset management system in a network environment includes a monitoring program 11 that monitors operation events performed by users and creates terminal logs 12, a terminal log collection program 21 that stores an integrated log 22 created by collecting the terminal logs 12, and a correlation analysis program 31 that analyzes the whereabouts of information assets using the integrated log 22. When the user exports an information asset from the network environment and when the user imports the information asset into the network environment, the monitoring program 11 monitors these export and import events including feature values of the information assets. The correlation analysis program 31 compares a pre-export feature value of each information asset with a post-import feature value of each information asset to determine whether the information assets are identical and reports a list of information assets in the organization.
    • 网络环境中的信息资产管理系统包括监视用户进行的操作事件的监视程序11,并创建终端日志12,存储通过收集终端日志12而创建的集成日志22的终端日志收集程序21以及相关 分析程序31,其使用集成日志22分析信息资产的下落。当用户从网络环境导出信息资产时,以及当用户将信息资产导入到网络环境中时,监视程序11监视这些导出和导入事件 包括信息资产的特征值。 相关分析程序31将每个信息资产的出口前特征值与每个信息资产的导入后特征值进行比较,以确定信息资产是否相同,并在组织中报告信息资产的列表。