Patents by Inventor A. Vogeley
A. Vogeley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11570998Abstract: A processing system (10) and a corresponding method are provided for processing work products (WP), including food items, to locate and quantify voids, undercuts and similar anomalies in the work products. The work products are conveyed past an X-ray scanner (14) by a conveyance device (12). Data from the X-ray scanning is transmitted to control system (18). Simultaneously with the X-ray scanning of the work product, the work product is optically scanned at the same location on the work product where X-ray scanning is occurring. The data from the optical scanner is also transmitted to the control system. Such data is analyzed to develop or generate the thickness profile of the work product. From the differences in the thickness profiles generated from the X-ray scanning data versus the optical scanning data, the location of voids, undercuts and similar anomalies can be determined by the control system.Type: GrantFiled: May 29, 2020Date of Patent: February 7, 2023Assignee: John Bean Technologies CorporationInventors: David Pfanstiel, Daniel Holmes, Richard D. Stockard, Arthur W. Vogeley, Jr.
-
Publication number: 20230022013Abstract: A system for reading and reporting data from a production of an alcoholic beverage includes a data capture device having a sensor end for placement within a liquid. The sensor end has at least two sensors for measuring data related to the liquid. A transmitter located within the data capture device is coupled to the at least two sensors and the transmitter periodically transmits the data related to the liquid. Color transmission or reflection of the liquid is used to measure clarity, color of the liquid, and relative sugar content.Type: ApplicationFiled: July 22, 2021Publication date: January 26, 2023Applicant: Gulf Photonics, Inc.Inventors: Patrick Bennetts, Craig Scott Vogeley, Bradley Paul Fernandez, Christopher Thomas Bailey
-
Publication number: 20220200256Abstract: An electrical feedthrough for a pressure housing includes two feedthrough elements having substantially matching external shape and dimension. Each feedthrough element extends straight along an element axis between a first element end portion and a second element end portion. A connecting element is releasably connected to the feedthrough elements and has opposite sides, with one of the opposite sides having a contact area upon which the first element end portion of one of the feedthrough elements abuts, and with the other one of the opposite sides having a contact area upon which the first element end portion of the other one of the feedthrough elements abuts. At least one of the feedthrough elements includes an electrical feedthrough conductor which extends along the element axis of the feedthrough element and abuts a connecting conductor of the connecting element.Type: ApplicationFiled: December 19, 2019Publication date: June 23, 2022Applicant: Siemens AktiengesellschaftInventors: MATTHIAS JOHANNES BURGHARD, MARCO FESTA, PETER VOGELEY, JOHANNES HARDEWEG
-
Patent number: 11310660Abstract: Embodiments are disclosed for a method for identifying network risk. The method includes determining that a computing device has created a new connection to a network. Additionally, the method includes determining the public internet protocol (public IP) address of the exit point used by the network. Further, the method includes determining a reputation rating of the network based on the public IP address of the exit point. The method also includes providing a notification indicating the reputation rating of the network.Type: GrantFiled: November 26, 2019Date of Patent: April 19, 2022Assignee: International Business Machines CorporationInventors: Ashkan Vila, Volker Vogeley, Artemiy Aleksandrovich Solyakov
-
Patent number: 11290472Abstract: A network-accessible cyber-threat security analytics service is configured to receive and respond to requests that originate as name queries to a Domain Name System (DNS) service. Threat intelligence information provided by the service is organized into threat intelligence zones that correspond to zones exposed via the DNS service. Upon receipt of a DNS query, the query having been generated by an application seeking access to threat intelligence data exposed by the service, the query is translated into a DNS zone-specific API request based on the type of threat intelligence information sought. The zone-specific API request is then used to retrieve the requested threat intelligence information from a threat intelligence database. The requested threat intelligence information is then returned to the application by being encoded as part of a response to the DNS query. In this manner, the DNS protocol is leverage to facilitate highly-efficient access and retrieval of threat intelligence information.Type: GrantFiled: September 25, 2019Date of Patent: March 29, 2022Assignee: International Business Machines CorporationInventors: Markus Ludwig, Volker Vogeley, Marc Noske, Matthias Bartelt, Johannes Noll, Marc-André Isenberg, Uwe Küllmar
-
Patent number: 11188049Abstract: A method and system are provided for automatically portioning workpieces, such as food products, by simulating portioning the workpieces in accordance with the one or more desired shapes of the final piece(s) as a directly controlled physical characteristic (parameter/specification) as well as one or more resulting indirectly controlled physical characteristics (parameters/specifications). The desired shape(s) of the final piece(s) are defined by a plurality of manipulatable reference coordinates. A workpiece is scanned to obtain scanning information, then portioning of the workpiece is simulated in accordance with the desired shape(s) of the final piece(s) defined by the directly controlled reference coordinates, thereby to determine the one or more indirectly controlled physical characteristics of the one or more final pieces to be portioned from the workpiece.Type: GrantFiled: May 24, 2019Date of Patent: November 30, 2021Assignee: John Bean Technologies CorporationInventors: George R. Blaine, David A. Below, Arthur W. Vogeley, Jr.
-
Patent number: 11070588Abstract: Mechanisms are provided to implement a malicious activity response system (MARS) that automatically identifies and handles malicious activities within the data processing system. The MARS identifies threat intelligence associated with characteristics of malicious activity. The MARS forms a hypothesis for the malicious attack to identify a malicious attack that is occurring. The MARS identifies a trap for use in isolating the malicious activity; deploys the trap and automatically reconfiguring a network associated with the data processing system such that the malicious activity is routed to the trap thereby isolating the malicious activity, observes a behavior of the malicious activity within the trap; and extracts features associated with the malicious activity in the trap. The MARS then utilizes the extracted features to improve an operation of the malicious activity response system in handling future malicious activity.Type: GrantFiled: June 11, 2018Date of Patent: July 20, 2021Assignee: International Business Machines CorporationInventors: Markus Ludwig, Johannes Noll, Marc Noske, Matthias Seul, Volker Vogeley
-
Publication number: 20210160688Abstract: Embodiments are disclosed for a method for identifying network risk. The method includes determining that a computing device has created a new connection to a network. Additionally, the method includes determining the public internet protocol (public IP) address of the exit point used by the network. Further, the method includes determining a reputation rating of the network based on the public IP address of the exit point. The method also includes providing a notification indicating the reputation rating of the network.Type: ApplicationFiled: November 26, 2019Publication date: May 27, 2021Inventors: Ashkan Vila, Volker Vogeley, Artemiy Aleksandrovich Solyakov
-
Publication number: 20210092134Abstract: A network-accessible cyber-threat security analytics service is configured to receive and respond to requests that originate as name queries to a Domain Name System (DNS) service. Threat intelligence information provided by the service is organized into threat intelligence zones that correspond to zones exposed via the DNS service. Upon receipt of a DNS query, the query having been generated by an application seeking access to threat intelligence data exposed by the service, the query is translated into a DNS zone-specific API request based on the type of threat intelligence information sought. The zone-specific API request is then used to retrieve the requested threat intelligence information from a threat intelligence database. The requested threat intelligence information is then returned to the application by being encoded as part of a response to the DNS query. In this manner, the DNS protocol is leverage to facilitate highly-efficient access and retrieval of threat intelligence information.Type: ApplicationFiled: September 25, 2019Publication date: March 25, 2021Applicant: International Business Machines CorporationInventors: Markus Ludwig, Volker Vogeley, Marc Noske, Matthias Bartelt, Johannes Noll, Marc-André Isenberg, Uwe Küllmar
-
Publication number: 20200375203Abstract: A processing system (10) and a corresponding method are provided for processing work products (WP), including food items, to locate and quantify voids, undercuts and similar anomalies in the work products. The work products are conveyed past an X-ray scanner (14) by a conveyance device (12). Data from the X-ray scanning is transmitted to control system (18). Simultaneously with the X-ray scanning of the work product, the work product is optically scanned at the same location on the work product where X-ray scanning is occurring. The data from the optical scanner is also transmitted to the control system. Such data is analyzed to develop or generate the thickness profile of the work product. From the differences in the thickness profiles generated from the X-ray scanning data versus the optical scanning data, the location of voids, undercuts and similar anomalies can be determined by the control system.Type: ApplicationFiled: May 29, 2020Publication date: December 3, 2020Applicant: John Bean Technologies CorporationInventors: David Pfanstiel, Daniel Holmes, Richard D. Stockard, Arthur W. Vogeley, JR.
-
Patent number: 10686807Abstract: A method for classification of suspicious activities is provided. In the method, a first intrusion detection system comprising a normal operation mode and which is connected to a second intrusion detection system by a first communications connection is implemented. In response to detecting a malfunction of the first communications connection, the first intrusion detection system is switched from the normal operation mode to a limited operation mode for receiving first data from one or more honeypot systems and second data from the second intrusion detection system. A prediction model for representing malicious attacks is generated by execution of a predefined classification algorithm with respect to the received data, wherein the predefined classification algorithm further determine a model evaluation metric with respect to the prediction model. The prediction model is deployed to detect the malicious attacks if the model evaluation metric meets a predefined validation condition.Type: GrantFiled: June 12, 2018Date of Patent: June 16, 2020Assignee: International Business Machines CorporationInventors: Gideon Zenz, Volker Vogeley, Dirk Harz, Mark Usher, Astrid Granacher
-
Publication number: 20190379696Abstract: Mechanisms are provided to implement a malicious activity response system (MARS) that automatically identifies and handles malicious activities within the data processing system. The MARS identifies threat intelligence associated with characteristics of malicious activity. The MARS forms a hypothesis for the malicious attack to identify a malicious attack that is occurring. The MARS identifies a trap for use in isolating the malicious activity; deploys the trap and automatically reconfiguring a network associated with the data processing system such that the malicious activity is routed to the trap thereby isolating the malicious activity, observes a behavior of the malicious activity within the trap; and extracts features associated with the malicious activity in the trap. The MARS then utilizes the extracted features to improve an operation of the malicious activity response system in handling future malicious activity.Type: ApplicationFiled: June 11, 2018Publication date: December 12, 2019Inventors: Markus Ludwig, Johannes Noll, Marc Noske, Matthias Seul, Volker Vogeley
-
Publication number: 20190379677Abstract: A method for classification of suspicious activities is provided. In the method, a first intrusion detection system comprising a normal operation mode and which is connected to a second intrusion detection system by a first communications connection is implemented. In response to detecting a malfunction of the first communications connection, the first intrusion detection system is switched from the normal operation mode to a limited operation mode for receiving first data from one or more honeypot systems and second data from the second intrusion detection system. A prediction model for representing malicious attacks is generated by execution of a predefined classification algorithm with respect to the received data, wherein the predefined classification algorithm further determine a model evaluation metric with respect to the prediction model. The prediction model is deployed to detect the malicious attacks if the model evaluation metric meets a predefined validation condition.Type: ApplicationFiled: June 12, 2018Publication date: December 12, 2019Inventors: Gideon Zenz, Volker Vogeley, Dirk Harz, Mark Usher, Astrid Granacher
-
Publication number: 20190317467Abstract: A method and system are provided for automatically portioning workpieces, such as food products, by simulating portioning the workpieces in accordance with the one or more desired shapes of the final piece(s) as a directly controlled physical characteristic (parameter/specification) as well as one or more resulting indirectly controlled physical characteristics (parameters/specifications). The desired shape(s) of the final piece(s) are defined by a plurality of manipulatable reference coordinates. A workpiece is scanned to obtain scanning information, then portioning of the workpiece is simulated in accordance with the desired shape(s) of the final piece(s) defined by the directly controlled reference coordinates, thereby to determine the one or more indirectly controlled physical characteristics of the one or more final pieces to be portioned from the workpiece.Type: ApplicationFiled: May 24, 2019Publication date: October 17, 2019Applicant: John Bean Technologies CorporationInventors: George R. Blaine, David A. Below, Arthur W. Vogeley, JR.
-
Patent number: 10303151Abstract: A method and system are provided for automatically portioning workpieces, such as food products, by simulating portioning the workpieces in accordance with the one or more desired shapes of the final piece(s) as a directly controlled physical characteristic (parameter/specification) as well as one or more resulting indirectly controlled physical characteristics (parameters/specifications). The desired shape(s) of the final piece(s) are defined by a plurality of manipulatable reference coordinates. A workpiece is scanned to obtain scanning information, then portioning of the workpiece is simulated in accordance with the desired shape(s) of the final piece(s) defined by the directly controlled reference coordinates, thereby to determine the one or more indirectly controlled physical characteristics of the one or more final pieces to be portioned from the workpiece.Type: GrantFiled: January 19, 2018Date of Patent: May 28, 2019Assignee: John Bean Technologies CorporationInventors: George R. Blaine, David A. Below, Arthur W. Vogeley, Jr.
-
Patent number: 10284578Abstract: A mechanism is provided for blocking IP connection addresses and prefixes. Header information is extracted from an incoming connection request. A determination is made as to whether a portion of an Internet Protocol address comprised in the header information is blacklisted. Responsive to a portion of the Internet Protocol address being blacklisted, a fingerprint is generated, and a determination is made as to whether the fingerprint is blacklisted. Responsive to the fingerprint being blacklisted, the underlying physical connection is dropped; data associated with the incoming connection request is stored in a buffer, the fingerprint is associated to the incoming connection request; the incoming connection request is merged with stored blacklisted requests of a related originating system; and shared prefixes of the Internet Protocol address of the stored blacklisted requests are filtered out.Type: GrantFiled: March 6, 2017Date of Patent: May 7, 2019Assignee: International Business Machines CorporationInventors: Dominik W. Brugger, Matthias Seul, Volker Vogeley, Gideon Zenz
-
Patent number: 10212175Abstract: One or more processors generate a website mimicking a virtual message board. One or more processors receive a request message directed to the website. One or more processors analyze the request message for evidence that the request message originates from a source of spam. In response to a determination that the request message likely does originate from a spam source, one or more processors provide data about the spam source to an anti-spam system.Type: GrantFiled: November 30, 2015Date of Patent: February 19, 2019Assignee: International Business Machines CorporationInventors: Matthias Seul, Volker Vogeley
-
Publication number: 20180255075Abstract: A mechanism is provided for blocking IP connection addresses and prefixes. Header information is extracted from an incoming connection request. A determination is made as to whether a portion of an Internet Protocol address comprised in the header information is blacklisted. Responsive to a portion of the Internet Protocol address being blacklisted, a fingerprint is generated, and a determination is made as to whether the fingerprint is blacklisted. Responsive to the fingerprint being blacklisted, the underlying physical connection is dropped; data associated with the incoming connection request is stored in a buffer, the fingerprint is associated to the incoming connection request; the incoming connection request is merged with stored blacklisted requests of a related originating system; and shared prefixes of the Internet Protocol address of the stored blacklisted requests are filtered out.Type: ApplicationFiled: March 6, 2017Publication date: September 6, 2018Inventors: Dominik W. Brugger, Matthias Seul, Volker Vogeley, Gideon Zenz
-
Patent number: 10048185Abstract: A density meter for measuring the density of a fluid, having a base plate, wherein a spring element is clamped to the base plate; a torpedo, wherein the torpedo comprises a known weight, and wherein the torpedo is attached or coupled to the spring element; and a sensor, wherein the sensor measures a deflection of the spring element, as the torpedo displaces a volume of fluid.Type: GrantFiled: October 9, 2014Date of Patent: August 14, 2018Assignee: Parasitx, LLCInventors: David D. Wright, James H. Vogeley, Taylor D. McClenny, Peter R. Merrick, Paul A. Robinson
-
Patent number: D981878Type: GrantFiled: May 18, 2021Date of Patent: March 28, 2023Assignee: Gulf Photonics, Inc.Inventors: Patrick Bennetts, Craig Scott Vogeley, Bradley Paul Fernandez, Christopher Thomas Bailey