Patents by Inventor A. Vogeley

A. Vogeley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11570998
    Abstract: A processing system (10) and a corresponding method are provided for processing work products (WP), including food items, to locate and quantify voids, undercuts and similar anomalies in the work products. The work products are conveyed past an X-ray scanner (14) by a conveyance device (12). Data from the X-ray scanning is transmitted to control system (18). Simultaneously with the X-ray scanning of the work product, the work product is optically scanned at the same location on the work product where X-ray scanning is occurring. The data from the optical scanner is also transmitted to the control system. Such data is analyzed to develop or generate the thickness profile of the work product. From the differences in the thickness profiles generated from the X-ray scanning data versus the optical scanning data, the location of voids, undercuts and similar anomalies can be determined by the control system.
    Type: Grant
    Filed: May 29, 2020
    Date of Patent: February 7, 2023
    Assignee: John Bean Technologies Corporation
    Inventors: David Pfanstiel, Daniel Holmes, Richard D. Stockard, Arthur W. Vogeley, Jr.
  • Publication number: 20230022013
    Abstract: A system for reading and reporting data from a production of an alcoholic beverage includes a data capture device having a sensor end for placement within a liquid. The sensor end has at least two sensors for measuring data related to the liquid. A transmitter located within the data capture device is coupled to the at least two sensors and the transmitter periodically transmits the data related to the liquid. Color transmission or reflection of the liquid is used to measure clarity, color of the liquid, and relative sugar content.
    Type: Application
    Filed: July 22, 2021
    Publication date: January 26, 2023
    Applicant: Gulf Photonics, Inc.
    Inventors: Patrick Bennetts, Craig Scott Vogeley, Bradley Paul Fernandez, Christopher Thomas Bailey
  • Publication number: 20220200256
    Abstract: An electrical feedthrough for a pressure housing includes two feedthrough elements having substantially matching external shape and dimension. Each feedthrough element extends straight along an element axis between a first element end portion and a second element end portion. A connecting element is releasably connected to the feedthrough elements and has opposite sides, with one of the opposite sides having a contact area upon which the first element end portion of one of the feedthrough elements abuts, and with the other one of the opposite sides having a contact area upon which the first element end portion of the other one of the feedthrough elements abuts. At least one of the feedthrough elements includes an electrical feedthrough conductor which extends along the element axis of the feedthrough element and abuts a connecting conductor of the connecting element.
    Type: Application
    Filed: December 19, 2019
    Publication date: June 23, 2022
    Applicant: Siemens Aktiengesellschaft
    Inventors: MATTHIAS JOHANNES BURGHARD, MARCO FESTA, PETER VOGELEY, JOHANNES HARDEWEG
  • Patent number: 11310660
    Abstract: Embodiments are disclosed for a method for identifying network risk. The method includes determining that a computing device has created a new connection to a network. Additionally, the method includes determining the public internet protocol (public IP) address of the exit point used by the network. Further, the method includes determining a reputation rating of the network based on the public IP address of the exit point. The method also includes providing a notification indicating the reputation rating of the network.
    Type: Grant
    Filed: November 26, 2019
    Date of Patent: April 19, 2022
    Assignee: International Business Machines Corporation
    Inventors: Ashkan Vila, Volker Vogeley, Artemiy Aleksandrovich Solyakov
  • Patent number: 11290472
    Abstract: A network-accessible cyber-threat security analytics service is configured to receive and respond to requests that originate as name queries to a Domain Name System (DNS) service. Threat intelligence information provided by the service is organized into threat intelligence zones that correspond to zones exposed via the DNS service. Upon receipt of a DNS query, the query having been generated by an application seeking access to threat intelligence data exposed by the service, the query is translated into a DNS zone-specific API request based on the type of threat intelligence information sought. The zone-specific API request is then used to retrieve the requested threat intelligence information from a threat intelligence database. The requested threat intelligence information is then returned to the application by being encoded as part of a response to the DNS query. In this manner, the DNS protocol is leverage to facilitate highly-efficient access and retrieval of threat intelligence information.
    Type: Grant
    Filed: September 25, 2019
    Date of Patent: March 29, 2022
    Assignee: International Business Machines Corporation
    Inventors: Markus Ludwig, Volker Vogeley, Marc Noske, Matthias Bartelt, Johannes Noll, Marc-André Isenberg, Uwe Küllmar
  • Patent number: 11188049
    Abstract: A method and system are provided for automatically portioning workpieces, such as food products, by simulating portioning the workpieces in accordance with the one or more desired shapes of the final piece(s) as a directly controlled physical characteristic (parameter/specification) as well as one or more resulting indirectly controlled physical characteristics (parameters/specifications). The desired shape(s) of the final piece(s) are defined by a plurality of manipulatable reference coordinates. A workpiece is scanned to obtain scanning information, then portioning of the workpiece is simulated in accordance with the desired shape(s) of the final piece(s) defined by the directly controlled reference coordinates, thereby to determine the one or more indirectly controlled physical characteristics of the one or more final pieces to be portioned from the workpiece.
    Type: Grant
    Filed: May 24, 2019
    Date of Patent: November 30, 2021
    Assignee: John Bean Technologies Corporation
    Inventors: George R. Blaine, David A. Below, Arthur W. Vogeley, Jr.
  • Patent number: 11070588
    Abstract: Mechanisms are provided to implement a malicious activity response system (MARS) that automatically identifies and handles malicious activities within the data processing system. The MARS identifies threat intelligence associated with characteristics of malicious activity. The MARS forms a hypothesis for the malicious attack to identify a malicious attack that is occurring. The MARS identifies a trap for use in isolating the malicious activity; deploys the trap and automatically reconfiguring a network associated with the data processing system such that the malicious activity is routed to the trap thereby isolating the malicious activity, observes a behavior of the malicious activity within the trap; and extracts features associated with the malicious activity in the trap. The MARS then utilizes the extracted features to improve an operation of the malicious activity response system in handling future malicious activity.
    Type: Grant
    Filed: June 11, 2018
    Date of Patent: July 20, 2021
    Assignee: International Business Machines Corporation
    Inventors: Markus Ludwig, Johannes Noll, Marc Noske, Matthias Seul, Volker Vogeley
  • Publication number: 20210160688
    Abstract: Embodiments are disclosed for a method for identifying network risk. The method includes determining that a computing device has created a new connection to a network. Additionally, the method includes determining the public internet protocol (public IP) address of the exit point used by the network. Further, the method includes determining a reputation rating of the network based on the public IP address of the exit point. The method also includes providing a notification indicating the reputation rating of the network.
    Type: Application
    Filed: November 26, 2019
    Publication date: May 27, 2021
    Inventors: Ashkan Vila, Volker Vogeley, Artemiy Aleksandrovich Solyakov
  • Publication number: 20210092134
    Abstract: A network-accessible cyber-threat security analytics service is configured to receive and respond to requests that originate as name queries to a Domain Name System (DNS) service. Threat intelligence information provided by the service is organized into threat intelligence zones that correspond to zones exposed via the DNS service. Upon receipt of a DNS query, the query having been generated by an application seeking access to threat intelligence data exposed by the service, the query is translated into a DNS zone-specific API request based on the type of threat intelligence information sought. The zone-specific API request is then used to retrieve the requested threat intelligence information from a threat intelligence database. The requested threat intelligence information is then returned to the application by being encoded as part of a response to the DNS query. In this manner, the DNS protocol is leverage to facilitate highly-efficient access and retrieval of threat intelligence information.
    Type: Application
    Filed: September 25, 2019
    Publication date: March 25, 2021
    Applicant: International Business Machines Corporation
    Inventors: Markus Ludwig, Volker Vogeley, Marc Noske, Matthias Bartelt, Johannes Noll, Marc-André Isenberg, Uwe Küllmar
  • Publication number: 20200375203
    Abstract: A processing system (10) and a corresponding method are provided for processing work products (WP), including food items, to locate and quantify voids, undercuts and similar anomalies in the work products. The work products are conveyed past an X-ray scanner (14) by a conveyance device (12). Data from the X-ray scanning is transmitted to control system (18). Simultaneously with the X-ray scanning of the work product, the work product is optically scanned at the same location on the work product where X-ray scanning is occurring. The data from the optical scanner is also transmitted to the control system. Such data is analyzed to develop or generate the thickness profile of the work product. From the differences in the thickness profiles generated from the X-ray scanning data versus the optical scanning data, the location of voids, undercuts and similar anomalies can be determined by the control system.
    Type: Application
    Filed: May 29, 2020
    Publication date: December 3, 2020
    Applicant: John Bean Technologies Corporation
    Inventors: David Pfanstiel, Daniel Holmes, Richard D. Stockard, Arthur W. Vogeley, JR.
  • Patent number: 10686807
    Abstract: A method for classification of suspicious activities is provided. In the method, a first intrusion detection system comprising a normal operation mode and which is connected to a second intrusion detection system by a first communications connection is implemented. In response to detecting a malfunction of the first communications connection, the first intrusion detection system is switched from the normal operation mode to a limited operation mode for receiving first data from one or more honeypot systems and second data from the second intrusion detection system. A prediction model for representing malicious attacks is generated by execution of a predefined classification algorithm with respect to the received data, wherein the predefined classification algorithm further determine a model evaluation metric with respect to the prediction model. The prediction model is deployed to detect the malicious attacks if the model evaluation metric meets a predefined validation condition.
    Type: Grant
    Filed: June 12, 2018
    Date of Patent: June 16, 2020
    Assignee: International Business Machines Corporation
    Inventors: Gideon Zenz, Volker Vogeley, Dirk Harz, Mark Usher, Astrid Granacher
  • Publication number: 20190379696
    Abstract: Mechanisms are provided to implement a malicious activity response system (MARS) that automatically identifies and handles malicious activities within the data processing system. The MARS identifies threat intelligence associated with characteristics of malicious activity. The MARS forms a hypothesis for the malicious attack to identify a malicious attack that is occurring. The MARS identifies a trap for use in isolating the malicious activity; deploys the trap and automatically reconfiguring a network associated with the data processing system such that the malicious activity is routed to the trap thereby isolating the malicious activity, observes a behavior of the malicious activity within the trap; and extracts features associated with the malicious activity in the trap. The MARS then utilizes the extracted features to improve an operation of the malicious activity response system in handling future malicious activity.
    Type: Application
    Filed: June 11, 2018
    Publication date: December 12, 2019
    Inventors: Markus Ludwig, Johannes Noll, Marc Noske, Matthias Seul, Volker Vogeley
  • Publication number: 20190379677
    Abstract: A method for classification of suspicious activities is provided. In the method, a first intrusion detection system comprising a normal operation mode and which is connected to a second intrusion detection system by a first communications connection is implemented. In response to detecting a malfunction of the first communications connection, the first intrusion detection system is switched from the normal operation mode to a limited operation mode for receiving first data from one or more honeypot systems and second data from the second intrusion detection system. A prediction model for representing malicious attacks is generated by execution of a predefined classification algorithm with respect to the received data, wherein the predefined classification algorithm further determine a model evaluation metric with respect to the prediction model. The prediction model is deployed to detect the malicious attacks if the model evaluation metric meets a predefined validation condition.
    Type: Application
    Filed: June 12, 2018
    Publication date: December 12, 2019
    Inventors: Gideon Zenz, Volker Vogeley, Dirk Harz, Mark Usher, Astrid Granacher
  • Publication number: 20190317467
    Abstract: A method and system are provided for automatically portioning workpieces, such as food products, by simulating portioning the workpieces in accordance with the one or more desired shapes of the final piece(s) as a directly controlled physical characteristic (parameter/specification) as well as one or more resulting indirectly controlled physical characteristics (parameters/specifications). The desired shape(s) of the final piece(s) are defined by a plurality of manipulatable reference coordinates. A workpiece is scanned to obtain scanning information, then portioning of the workpiece is simulated in accordance with the desired shape(s) of the final piece(s) defined by the directly controlled reference coordinates, thereby to determine the one or more indirectly controlled physical characteristics of the one or more final pieces to be portioned from the workpiece.
    Type: Application
    Filed: May 24, 2019
    Publication date: October 17, 2019
    Applicant: John Bean Technologies Corporation
    Inventors: George R. Blaine, David A. Below, Arthur W. Vogeley, JR.
  • Patent number: 10303151
    Abstract: A method and system are provided for automatically portioning workpieces, such as food products, by simulating portioning the workpieces in accordance with the one or more desired shapes of the final piece(s) as a directly controlled physical characteristic (parameter/specification) as well as one or more resulting indirectly controlled physical characteristics (parameters/specifications). The desired shape(s) of the final piece(s) are defined by a plurality of manipulatable reference coordinates. A workpiece is scanned to obtain scanning information, then portioning of the workpiece is simulated in accordance with the desired shape(s) of the final piece(s) defined by the directly controlled reference coordinates, thereby to determine the one or more indirectly controlled physical characteristics of the one or more final pieces to be portioned from the workpiece.
    Type: Grant
    Filed: January 19, 2018
    Date of Patent: May 28, 2019
    Assignee: John Bean Technologies Corporation
    Inventors: George R. Blaine, David A. Below, Arthur W. Vogeley, Jr.
  • Patent number: 10284578
    Abstract: A mechanism is provided for blocking IP connection addresses and prefixes. Header information is extracted from an incoming connection request. A determination is made as to whether a portion of an Internet Protocol address comprised in the header information is blacklisted. Responsive to a portion of the Internet Protocol address being blacklisted, a fingerprint is generated, and a determination is made as to whether the fingerprint is blacklisted. Responsive to the fingerprint being blacklisted, the underlying physical connection is dropped; data associated with the incoming connection request is stored in a buffer, the fingerprint is associated to the incoming connection request; the incoming connection request is merged with stored blacklisted requests of a related originating system; and shared prefixes of the Internet Protocol address of the stored blacklisted requests are filtered out.
    Type: Grant
    Filed: March 6, 2017
    Date of Patent: May 7, 2019
    Assignee: International Business Machines Corporation
    Inventors: Dominik W. Brugger, Matthias Seul, Volker Vogeley, Gideon Zenz
  • Patent number: 10212175
    Abstract: One or more processors generate a website mimicking a virtual message board. One or more processors receive a request message directed to the website. One or more processors analyze the request message for evidence that the request message originates from a source of spam. In response to a determination that the request message likely does originate from a spam source, one or more processors provide data about the spam source to an anti-spam system.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: February 19, 2019
    Assignee: International Business Machines Corporation
    Inventors: Matthias Seul, Volker Vogeley
  • Publication number: 20180255075
    Abstract: A mechanism is provided for blocking IP connection addresses and prefixes. Header information is extracted from an incoming connection request. A determination is made as to whether a portion of an Internet Protocol address comprised in the header information is blacklisted. Responsive to a portion of the Internet Protocol address being blacklisted, a fingerprint is generated, and a determination is made as to whether the fingerprint is blacklisted. Responsive to the fingerprint being blacklisted, the underlying physical connection is dropped; data associated with the incoming connection request is stored in a buffer, the fingerprint is associated to the incoming connection request; the incoming connection request is merged with stored blacklisted requests of a related originating system; and shared prefixes of the Internet Protocol address of the stored blacklisted requests are filtered out.
    Type: Application
    Filed: March 6, 2017
    Publication date: September 6, 2018
    Inventors: Dominik W. Brugger, Matthias Seul, Volker Vogeley, Gideon Zenz
  • Patent number: 10048185
    Abstract: A density meter for measuring the density of a fluid, having a base plate, wherein a spring element is clamped to the base plate; a torpedo, wherein the torpedo comprises a known weight, and wherein the torpedo is attached or coupled to the spring element; and a sensor, wherein the sensor measures a deflection of the spring element, as the torpedo displaces a volume of fluid.
    Type: Grant
    Filed: October 9, 2014
    Date of Patent: August 14, 2018
    Assignee: Parasitx, LLC
    Inventors: David D. Wright, James H. Vogeley, Taylor D. McClenny, Peter R. Merrick, Paul A. Robinson
  • Patent number: D981878
    Type: Grant
    Filed: May 18, 2021
    Date of Patent: March 28, 2023
    Assignee: Gulf Photonics, Inc.
    Inventors: Patrick Bennetts, Craig Scott Vogeley, Bradley Paul Fernandez, Christopher Thomas Bailey