Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Fujitsu Technology Solutions Intellectual Property Gmbh patents


Recent patent applications related to Fujitsu Technology Solutions Intellectual Property Gmbh. Fujitsu Technology Solutions Intellectual Property Gmbh is listed as an Agent/Assignee. Note: Fujitsu Technology Solutions Intellectual Property Gmbh may have other listings under different names/spellings. We're not affiliated with Fujitsu Technology Solutions Intellectual Property Gmbh, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "F" | Fujitsu Technology Solutions Intellectual Property Gmbh-related inventors


Housing assembly for a computer system and computer system

A housing assembly for a computer system includes at least one first shielding casing with a first plurality of ventilation openings in an area of a first housing wall of the first shielding casing; and at least one second shielding casing with a second plurality of ventilation openings in an area of a second housing wall of the second shielding casing, wherein a first contact area of the first housing wall of the first shielding casing borders directly on a corresponding second contact area of the second housing wall of the second shielding casing, and at least one of the first housing wall of the first shielding casing and the second housing wall of the second shielding casing includes a recess so that the first plurality of ventilation openings of the first shielding casing is spaced apart from the second plurality of ventilation openings of the second shielding casing.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

Computer system including a computer housing with a fastening device

A computer system includes a computer housing with a fastening device that fastens the computer housing to a mount; a system component arranged in the computer housing and having at least one component to be cooled; a fan that cools the at least one component arranged in the computer housing in a region of the at least one component; a first ventilation area arranged laterally next to the fastening device in a first housing wall of the computer housing; and a ventilation channel extending in the computer housing between the first ventilation area and the fan, which is fluidically separated from the rest of the computer housing.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

Switch assembly

A switch assembly includes a manually operable push button, an elastic element, a rotatably mounted transmitter, and a microswitch, wherein the push button includes a pusher, which, upon actuation of the push button, exerts a first force on the elastic element, the elastic element connects to a force arm of the transmitter and is configured to transmit at least a part of the first force onto the force arm, and set the transmitter in a rotation, and the transmitter further includes a load arm configured to exert a second force on the microswitch during rotation of the transmitter.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

Cooling arrangement and air deflector

A cooling arrangement for a computer system includes a chassis, a circuit board arranged in the chassis, a fan, and at least one element to be cooled and arranged on the circuit board in an area to be cooled between the fan and a panel of the chassis, wherein an air deflector is arranged between the at least one element to be cooled and the panel of the chassis such that air flowing out of the fan in a direction of the at least one element to be cooled encounters the air deflector and is swirled in the area to be cooled.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

Method of executing a security-relevant application, computer system, and arrangement

A method of executing a security-relevant application on a computer system in a secured environment includes establishing a data network connection via an internal network of the secured environment between the computer system and a server arranged in the secured environment; searching, by the computer system, for at least one predetermined file on the server after the data network connection has been established; verifying, by the computer system, a signature of the at least one predetermined file, if the at least one predetermined file has been found; executing, by the computer system, the at least one predetermined file if the verification of the signature was successful, wherein a system file is modified through the execution of the at least one predetermined file; and starting the security-relevant application after the at least one predetermined file has been successfully executed.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

Computer casing and computer system

A computer casing for a computer system includes a chassis that receives components of the computer system, wherein the chassis includes a front side and a rear side opposite the front side; and a removable side panel that can be secured to the chassis to cover an interior of the computer casing; wherein the side panel includes an opening and a displaceable locking element; and in a secured state of the side panel, a kensington lock formed to secure the side panel to the chassis can be inserted through the opening of the side panel and a fixing opening such that the locking element is actuated in a direction of the front side and mechanically cooperates with the chassis in the region of the front side.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

Computer system, expansion component, auxiliary supply component and use thereof

A computer system includes a power supply unit that provides operating energy for the computer system, a system board connected to the power supply unit and having a multitude of expansion connections for connection of a corresponding multitude of expansion components, wherein each expansion component is assigned a fixed power budget to supply an associated expansion component, a first expansion component connected to a first expansion connection of the system board, and at least one auxiliary supply component arranged in a region of a second expansion connection of the system board, wherein the auxiliary supply component electrically connects to the first expansion component and delivers at least part of the power budget assigned to the second expansion connection to the first expansion component.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

Interface assembly that connects a peripheral device to an interface of a host system, an electronic device and a method of signaling

An interface assembly of a host system that connects a peripheral device to a usb type-c interface has at least one supply line and at least one signaling line, wherein one from among a plurality of different power profiles can be selected by the peripheral device by applying different analog control signals to the signaling line, a signaling circuit connects to the signaling line on a side of the host system, the signaling circuit, on the basis of at least one digital control signal, produces a predetermined analog control signal assigned to the at least one digital control signal and outputs it to the peripheral device via the signaling line and the at least one digital control signal is provided via a gpio port of a control module of a system component of the host system, and the gpio port is controlled by a bios.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

Method of destroying file contents

A method of destroying file contents of a file includes storing the file in a predefined file format, wherein a first part of the algorithm is integrated into a pre-execution header of the file called by an executing program or an executing operating system when the file is opened and a second part of the algorithm is integrated into a second part of the file, called by the first part of the algorithm when the first part of the algorithm is called by the executing program or the executing operating system, and modifying of the integrated algorithm includes modifying a storage structure of the algorithm so that it occurs in changed form after the opening of the file and cannot be recognized as before and storing the modified algorithm in the file.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

Method of authenticating a user at a security device

A method of authenticating a user at a security device includes providing a first pattern on an authentication device capable of wireless data transmission; searching for authentication devices by the security device via a wireless data connection; loading the first patterns of all found authentication devices in a memory of the security device via the wireless data connection; detecting a second pattern by a detection device of the security device; comparing the detected second pattern to the loaded first patterns; and positively authenticating the user when the detected second pattern matches one of the loaded first patterns.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

Method for secure data management in a computer network

A method for secure data management in a computer network includes automatically calculating a key from a predetermined number of key fragments of a predetermined length for an encryption of data, encrypting data of a data set to be protected by the calculated key, dividing the data set into a predetermined number of data subsets, wherein the above steps are carried out by at least one processing computer system from a group of processing computer systems, and transmitting the key fragments and the data subsets to a distributed protection system in the computer network, wherein in each case one or more key fragments and in each case one or more data subsets are transmitted respectively from the at least one processing computer system to in each case one entity from a plurality of entities of the distributed protection system in the computer network, and storing all transmitted key fragments and data subsets in the respective entities of the distributed protection system.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

Computer system and computer casing

A computer system includes a computer casing having a casing wall having an opening to pass through a connection means; a circuit board having the connection means; and a centering means arranged in the casing, wherein the centering means is formed to cooperate with the circuit board such that the circuit board is centered with respect to the casing wall in a direction of the casing wall in a placing movement so that the connection means takes a predetermined position flush with respect to the opening in the casing wall and can plunge into the opening.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

Front module and desktop computer system

A front module for a desktop computer system includes an interface unit, and a circuit board having a plug, wherein the plug is configured to connect the front module to a mainboard such that there is an electric contact between the mainboard and the interface unit, and the circuit board is dimensioned such that the interface unit terminates with a front chassis side of a casing surrounding the circuit board if the plug is plugged into a socket of a mainboard.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

Computer mainboard, voltage supply module and method for voltage supply of a computer mainboard

A computer mainboard includes components intended for operating a computer, a control logic that controls voltage supply of the computer mainboard, and a connector plug that receives at least one supply voltage (+12v dc) specified for the computer mainboard, an auxiliary voltage (vin_ext_dc) and a monitoring signal (vin_ext_ok) that indicates the presence of an external supply voltage (vext_dc, vext_ac) that has a predetermined specification, wherein the control logic is configured to detect the monitoring signal (vin_ext_ok) via the connector plug and, after detection of the monitoring signal (vin_ext_ok), to generate a first control signal (en_reg_eb#) and output it to the outside via the connector plug so that, depending thereon, an external voltage supply device can be activated to provide the at least one supply voltage (+12v dc) specified for the computer mainboard from the external supply voltage (vext_dc, vext_ac).. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

08/17/17 / #20170235346

Assembly for a computer system and cable covering unit for an assembly

An assembly for a computer system includes a computer chassis having a back panel with a connector panel; a cable covering unit fixable in a mounting position to the back panel that prevents connected plug connectors from being unplugged from the connector panel in the mounting position; wherein the cable covering unit and the computer chassis are arranged such that the cable covering unit can be placed on the computer chassis in an articulated manner to be fixed thereto and subsequently pivoted toward the back panel into the mounting position.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

08/03/17 / #20170223045

Method of forwarding data between computer systems, computer network infrastructure and computer program product

A method forwards data between secured computer systems in a computer network structure. Data packets are transmitted along a predetermined communication path structure from a source computer system to at least one target computer system by means of a group of task servers, wherein the communication path structure comprises a plurality of parallel sub-paths. ... Fujitsu Technology Solutions Intellectual Property Gmbh

08/03/17 / #20170222811

Routing method of forwarding task instructions between computer systems, computer network infrastructure and a computer program product

A routing method of forwarding task instructions between secured computer systems in a computer network infrastructure includes calling up routing information stored in a key computer system, generating a task file in the key computer system, wherein the task file comprises at least the routing information and a task description of at least one task for the target computer system; transmitting the task file based upon the routing information along the communication path from the key computer system by the group of the broker computer systems to the target computer system; verifying validity of the task file by the target computer system; executing at least one task in the target computer system by the task file in the case that verification of validity of the task file was successful.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

08/03/17 / #20170220391

Method of distributing tasks between computer systems, computer network infrastructure and computer program product

A method of distributing tasks between computer systems in a computer network infrastructure includes parallel receiving a task file by a plurality of broker computer systems, negotiating a primary broker computer system from the broker computer systems, transmitting task information of the task file from the primary broker computer system to a primary processing computer system from a plurality of processing computer systems, and performing at least one action in the primary processing computer system by the transmitted task information, wherein all from the group of the processing computer systems keep predetermined network ports used for this method closed such that no connection establishment from the exterior is permitted and access via a network by the network ports is prevented, and a respective processing computer system is capable of establishing a connection to a respective broker computer system to fetch respective task information from the broker computer system.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

06/22/17 / #20170181273

Assembly and electronic device

An assembly includes a carrier and an electrically conductive mesh, wherein the carrier includes a side surface with an edge, the electrically conductive mesh is attached to the side surface and extends over the edge of the side surface, and the edge has a radius at least as big as a minimal bending radius of electric lines of the electrically conductive mesh.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

06/08/17 / #20170163646

Method of unblocking external computer systems in a computer network infrastructure, distributed computer network having such a computer network infrastructure as well as computer program product

A method of unblocking external computer systems includes transmitting an authentication packet from an external computer system, configured outside the computer network infrastructure, to a broker computer system within the computer network infrastructure, wherein the authentication packet contains signed information for authentication of the external computer system, automatically transmitting the authentication packet from the broker computer system to at least one processing computer system within the computer network infrastructure, wherein the processing computer system keeps predetermined network ports at least temporarily closed wherein, however, the processing computer system is capable of accessing the broker computer system to fetch the authentication packet from the broker computer system, unblocking at least one selective network port by the processing computer system for communication with the external computer system, and establishing a connection to the selectively unblocked network port of the processing computer system by the external computer system.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

05/18/17 / #20170138530

Carrier mount for a monitor of a computer system as well as assembly with a carrier mount

A carrier mount for a monitor of a computer system includes a base plate, two side walls arranged oppositely on the base plate, and a cover plate arrangable at the side walls so that, together with the side walls and the base plate, a receiving space is defined, wherein the receiving space is formed such that a computer system can selectively at least partially be received therein or a drawer can be inserted.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

05/11/17 / #20170131749

Assembly for fixing a plugin unit in an installation cage of a computer system and method of producing an assembly

An assembly for fixing a plugin unit in an installation cage of a computer system includes a holding rail with a support surface that fixes the holding rail in a guide rail of the installation cage; and two holding pins that engage in lateral fastening openings of the plugin unit and fix the guide rail to the plugin unit, wherein each holding pin is mechanically coupled with the holding rail via a damping element, and the assembly is formed integrally, wherein each damping element is molded to the corresponding holding pin and the holding rail in a non-detachable manner by an injection molding method.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

04/13/17 / #20170104719

Method of communicating between secured computer systems, a computer network infrastructure and a computer program product

A method communicates between secured computer systems in a computer network infrastructure. Data packets are transmitted between a plurality from a group of processing computer systems, wherein such a transmission is performed by at least one broker computer system. ... Fujitsu Technology Solutions Intellectual Property Gmbh

04/13/17 / #20170104413

Power supply unit arrangement for an electronic device

A power supply unit arrangement for an electronic device includes a first switching converter with a first control loop that provides a controlled output voltage (dc-out) at a node; a second switching converter with a second control loop that alternatively provides the controlled output voltage (dc-out) at the node; and an open-loop control circuit connected to the first control loop and the second control loop, wherein the open-loop control circuit, upon a changeover of the current supply from the first switching converter to the second switching converter, sets a predetermined control state of the first control loop and deactivates the first switching converter and, upon a changeover of the current supply from the second switching converter to the first switching converter, reactivates the first switching converter using the predetermined control state.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

03/09/17 / #20170068818

Computer system and method of securely booting a computer system

A computer system includes a data network connection, a reading device, an input component and a security device that receives access data from the data network connection, the reading device and the input component, wherein the security device establishes a data network link via the data network connection as the computer system is starting up and the security device further receives access data either via the data network link or via the reading device and the input component, and the security device compares the received access data with a data record stored in a firmware on a memory element including security-related data to authenticate a user and boots the computer system if the comparison was successful.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

03/02/17 / #20170060597

Method of booting a production computer system

A method of booting a production computer system includes establishing a connection between a key computer system and the production computer system, gathering information about system data of the production computer system, transmitting the information about the system data of the production computer system to the key computer system, comparing the gathered information with comparison information stored in the key computer system, automated transmitting of a passphrase from the key computer system to the production computer system to decrypt encrypted file system date on a medium within the production computer system if the comparison is successful, decrypting the encrypted file system data on the medium by the passphrase, and loading the decrypted file system data and booting the production computer system.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

02/02/17 / #20170031608

Method of improving access to a main memory of a computer system, a corresponding computer system and a computer program product

A method of improving access to a main memory of a computer system includes providing a main memory including at least a first memory of a first memory configuration and a second memory of a second memory configuration, and providing a choice between the first memory and the second memory for access to the main memory, wherein access to the first memory and access to the second memory can be distinguished by the choice depending on the respective access behavior of the first memory and of the second memory, and the choice is provided by a running application program.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

01/26/17 / #20170024580

Method of destroying file contents

A method of destroying file contents of a file includes storing the file in a predefined file format; integrating an algorithm that destroys file contents and has predefined trigger criteria into the file; checking the predefined trigger criteria when the file is opened; destroying file contents if at least one predefined trigger criterion is satisfied; and modifying the integrated algorithm if the predefined trigger criteria are not satisfied, wherein a first part of the algorithm is integrated into a first part of the file called by an executing program or an executing operating system when the file is opened, and modifying of the integrated algorithm includes modifying the storage structure of the algorithm so that it occurs in changed form after the opening of the file and cannot be recognized as before.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh

01/12/17 / #20170010654

Display device, computer system and method of managing the operating states of a computer system

A display device includes interface circuitry configured to receive a display signal from an external computing device; a display screen configured to display the received display signal; an energy management function configured to control an operating state of the display device; a sensor configured to provide at least one control signal indicative of the presence of a user in a predefined area in front of the display screen; and a control unit configured to select an energy saving mode from a plurality of energy saving modes based at least on the control signal provided by the sensor.. . ... Fujitsu Technology Solutions Intellectual Property Gmbh








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Fujitsu Technology Solutions Intellectual Property Gmbh in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Fujitsu Technology Solutions Intellectual Property Gmbh with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###