Patents by Inventor Andrew Ginter
Andrew Ginter has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240136547Abstract: A fuel cell electrical power generation system is described herein. The system uses a combustor to increase the pressure and temperature of exhaust gases from a fuel cell stack of the system. The combustor uses hydrogen from a hydrogen supply to provide fuel to the combustor. The increased temperature/pressure of the exhaust gases post combustion are used to rotate a turbine, which in turn rotates a compressor of a turbocharger. The compressor compresses incoming air to increase the power output and/or the efficiency of the system. An ebooster can be used in low load conditions, such as during a startup or during at time in which the electrical loading on the fuel cells is relatively low.Type: ApplicationFiled: October 19, 2022Publication date: April 25, 2024Applicant: Caterpillar Inc.Inventors: David Andrew Pierpont, David M. Ginter
-
Patent number: 10432404Abstract: Communication apparatus includes a one-way, hardware-actuated data relay, which includes a first hardware interface configured to receive a command from a communications network and a second hardware interface configured to convey the received command to a protected destination when the relay is actuated. A decoder includes a third hardware interface configured to receive a digital signature for the command from the communications network and hardware decoding logic coupled to verify the digital signature and to actuate the relay upon verifying the digital signature, whereby the command is conveyed via the second hardware interface to the protected destination.Type: GrantFiled: March 14, 2017Date of Patent: October 1, 2019Assignee: WATERFALL SECURITY SOLUTIONS LTD.Inventors: Lior Frenkel, Andrew Ginter, Tomer Maor
-
Publication number: 20170201379Abstract: Communication apparatus includes a one-way, hardware-actuated data relay, which includes a first hardware interface configured to receive a command from a communications network and a second hardware interface configured to convey the received command to a protected destination when the relay is actuated. A decoder includes a third hardware interface configured to receive a digital signature for the command from the communications network and hardware decoding logic coupled to verify the digital signature and to actuate the relay upon verifying the digital signature, whereby the command is conveyed via the second hardware interface to the protected destination.Type: ApplicationFiled: March 14, 2017Publication date: July 13, 2017Inventors: Lior Frenkel, Andrew Ginter, Tomer Maor
-
Patent number: 9635037Abstract: Communication apparatus includes a one-way, hardware-actuated data relay, which includes a first hardware interface configured to receive a command from a communications network and a second hardware interface configured to convey the received command to a protected destination when the relay is actuated. A decoder includes a third hardware interface configured to receive a digital signature for the command from the communications network and hardware decoding logic coupled to verify the digital signature and to actuate the relay upon verifying the digital signature, whereby the command is conveyed via the second hardware interface to the protected destination.Type: GrantFiled: September 6, 2012Date of Patent: April 25, 2017Assignee: WATERFALL SECURITY SOLUTIONS LTD.Inventors: Lior Frenkel, Andrew Ginter, Tomer Maor
-
Patent number: 9369446Abstract: A method for communication includes receiving in a secure installation via a network from a remote user terminal an input comprising a stream of symbols that has been encrypted using a preselected encryption key. The encrypted stream of symbols is decoded in the secure installation using a decryption key corresponding to the preselected encryption key, to produce a clear stream of symbols. A computer program running on a processor in the secure installation is used in processing the symbols in the clear stream and generating a graphical output in a predefined display format in response to processing the symbols. The graphical output is outputted from the secure installation to the network in an unencrypted format for display on the remote user terminal.Type: GrantFiled: July 30, 2015Date of Patent: June 14, 2016Assignee: WATERFALL SECURITY SOLUTIONS LTD.Inventors: Lior Frenkel, Andrew Ginter
-
Publication number: 20160112384Abstract: A method for communication includes receiving in a secure installation via a network from a remote user terminal an input comprising a stream of symbols that has been encrypted using a preselected encryption key. The encrypted stream of symbols is decoded in the secure installation using a decryption key corresponding to the preselected encryption key, to produce a clear stream of symbols. A computer program running on a processor in the secure installation is used in processing the symbols in the clear stream and generating a graphical output in a predefined display format in response to processing the symbols. The graphical output is outputted from the secure installation to the network in an unencrypted format for display on the remote user terminal.Type: ApplicationFiled: July 30, 2015Publication date: April 21, 2016Inventors: Lior Frenkel, Andrew Ginter
-
Patent number: 8891546Abstract: Communication apparatus includes at least first and second communication interfaces, configured for digital communication with first and second nodes. At least one processor is coupled between the communication interfaces, and is configured, upon receiving a message from one of the first and second nodes that is directed to the other of the first and second nodes, to carry out the following actions: when the message contains a command, to convey the command to the other of the first and second nodes; when the message contains status information, to convey the status information to the other of the first and second nodes; when the message contains a response to a command, to discard the response; and when the message contains a query, to block the query from reaching the other of the first and second nodes.Type: GrantFiled: April 27, 2014Date of Patent: November 18, 2014Assignee: Waterfall Security Solutions Ltd.Inventors: Lior Frenkel, Andrew Ginter, Tomer Maor
-
Publication number: 20140068712Abstract: Communication apparatus includes a one-way, hardware-actuated data relay, which includes a first hardware interface configured to receive a command from a communications network and a second hardware interface configured to convey the received command to a protected destination when the relay is actuated. A decoder includes a third hardware interface configured to receive a digital signature for the command from the communications network and hardware decoding logic coupled to verify the digital signature and to actuate the relay upon verifying the digital signature, whereby the command is conveyed via the second hardware interface to the protected destination.Type: ApplicationFiled: September 6, 2012Publication date: March 6, 2014Applicant: WATERFALL SECURITY SOLUTIONS LTD.Inventors: Lior Frenkel, Andrew Ginter, Tomer Maor
-
Patent number: 7779119Abstract: Described are techniques used in monitoring the performance, security and health of a system used in an industrial application. Agents included in the industrial network report data to an appliance or server. The appliance stores the data and determines when an alarm condition has occurred. Notifications are sent upon detecting an alarm condition. The alarm thresholds may be user defined. A threat thermostat controller determines a threat level used to control the connectivity of a network used in the industrial application.Type: GrantFiled: May 30, 2007Date of Patent: August 17, 2010Assignee: Industrial Defender, Inc.Inventors: Andrew Ginter, Tom Hutchinson, Rui Manuel Martins Lopes, Brad McMillan, Brett Jensen
-
Publication number: 20100064039Abstract: Described are techniques used in monitoring the performance, security and health of a system used in an industrial application. Agents included in the industrial network report data to an appliance or server. The appliance stores the data and determines when an alarm condition has occurred. Notifications are sent upon detecting an alarm condition. The alarm thresholds may be user defined. A threat thermostat controller determines a threat level used to control the connectivity of a network used in the industrial application.Type: ApplicationFiled: May 30, 2007Publication date: March 11, 2010Inventors: Andrew Ginter, Kegan Kawano, Tom Hutchinson, Rui Manuel Martins Lopes, Erik P. Hope, Brad McMillan, Adam Muegge, Andy G. Mah, Brett Jensen
-
Publication number: 20100023598Abstract: Described are techniques used in monitoring the performance, security and health of a system used in an industrial application. Agents included in the industrial network report data to an appliance or server. The appliance stores the data and determines when an alarm condition has occurred. Notifications are sent upon detecting an alarm condition. The alarm thresholds may be user defined. A threat thermostat controller determines a threat level used to control the connectivity of a network used in the industrial application.Type: ApplicationFiled: May 30, 2007Publication date: January 28, 2010Inventors: Andrew Ginter, Kegan Kawano, Tom Hutchinson, Rui Martins Lopes, Erik Hope, Brad McMillan, Adam Muegge, Andy Mah, Brett Jensen
-
Publication number: 20080209033Abstract: Described are techniques used in monitoring the performance, security and health of a system used in an industrial application. Agents included in the industrial network report data to an appliance or server. The appliance stores the data and determines when an alarm condition has occurred. Notifications are sent upon detecting an alarm condition. The alarm thresholds may be user defined. A threat thermostat controller determines a threat level used to control the connectivity of a network used in the industrial application.Type: ApplicationFiled: May 30, 2007Publication date: August 28, 2008Inventors: Andrew Ginter, Kegan Kawano, Tom Hutchinson, Rui Manuel Martins Lopes, Erik P. Hope, Brad McMillan, Adam Muegge, Andy G. Mah, Brett Jensen
-
Publication number: 20070294369Abstract: Described are techniques used in monitoring the performance, security and health of a system used in an industrial application. Agents included in the industrial network report data to an appliance or server. The appliance stores the data and determines when an alarm condition has occurred. Notifications are sent upon detecting an alarm condition. The alarm thresholds may be user defined. A threat thermostat controller determines a threat level used to control the connectivity of a network used in the industrial application.Type: ApplicationFiled: May 30, 2007Publication date: December 20, 2007Inventors: Andrew Ginter, Kegan Kawano, Tom Hutchinson, Rui Martins Lopes, Erik Hope, Brad McMillan, Adam Muegge, Andy Mah, Brett Jensen
-
Patent number: 7246156Abstract: Described are techniques used in monitoring the performance, security and health of a system used in an industrial application. Agents included in the industrial network report data to an appliance or server. The appliance stores the data and determines when an alarm condition has occurred. Notifications are sent upon detecting an alarm condition. The alarm thresholds may be user defined. A threat thermostat controller determines a threat level used to control the connectivity of a network used in the industrial application.Type: GrantFiled: March 31, 2004Date of Patent: July 17, 2007Assignee: Industrial Defender, Inc.Inventors: Andrew Ginter, Kegan Kawano, Tom Hutchinson, Rui Manuel Martins Lopes, Erik P. Hope, Brad McMillan, Adam Muegge, Andy G. Mah, Brett Jensen
-
Publication number: 20070050777Abstract: Described are techniques used in monitoring the performance, security and health of a system used in an industrial application. Agents included in the industrial network report data to an appliance or server. The appliance stores the data and determines when an alarm condition has occurred. Notifications are sent upon detecting an alarm condition. The alarm thresholds may be user defined. A threat thermostat controller determines a threat level used to control the connectivity of a network used in the industrial application.Type: ApplicationFiled: June 16, 2006Publication date: March 1, 2007Inventors: Thomas Hutchinson, Andrew Ginter, Daryl Harms, John Jensen
-
Publication number: 20050182969Abstract: Described are techniques used in monitoring the performance, security and health of a system used in an industrial application. Agents included in the industrial network report data to an appliance or server. The appliance stores the data and determines when an alarm condition has occurred. Notifications are sent upon detecting an alarm condition. The alarm thresholds may be user defined. A threat thermostat controller determines a threat level used to control the connectivity of a network used in the industrial application.Type: ApplicationFiled: April 8, 2005Publication date: August 18, 2005Inventors: Andrew Ginter, Kegan Kawano, Tom Hutchinson, Rui Manuel Lopes, Erik Hope, Brad McMillan, Adam Muegge, Andy Mah, Brett Jensen
-
Publication number: 20050015624Abstract: Described are techniques used in monitoring the performance, security and health of a system used in an industrial application. Agents included in the industrial network report data to an appliance or server. The appliance stores the data and determines when an alarm condition has occurred. Notifications are sent upon detecting an alarm condition. The alarm thresholds may be user defined. A threat thermostat controller determines a threat level used to control the connectivity of a network used in the industrial application.Type: ApplicationFiled: March 31, 2004Publication date: January 20, 2005Inventors: Andrew Ginter, Kegan Kawano, Tom Hutchinson, Rui Lopes, Erik Hope, Brad McMillan, Adam Muegge, Andy Mah, Brett Jensen