Patents by Inventor B. Schroeder
B. Schroeder has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240135004Abstract: A system determines a baseline cyberthreat-risk score for a user, and displays the baseline cyberthreat-risk score via a user interface. The system presents at least one cyberthreat-education activity via the user interface, and receives, via the user interface, at least one user input associated with the presented at least one cyberthreat-education activity. The system generates an updated cyberthreat-risk score at least in part by updating the baseline cyberthreat-risk score based at least in part on the user input, and displays the updated cyberthreat-risk score via the user interface.Type: ApplicationFiled: January 4, 2024Publication date: April 25, 2024Inventors: Chad E. Adams, Daniel Robert Caricato, Kahlidah B. Covington, Ashley Brook Godfrey, Christopher Wayne Howser, Nicola A. Maiorana, Nirali J. Patel, Richard Joseph Schroeder, Roger Daryll White
-
Publication number: 20240123378Abstract: An in-tank filter assembly for an industrial fluid reservoir tank includes a two piece filter assembly mount comprising an upper filter mount and a lower tank extension member; an element and bypass plate; a bypass structure within the element and bypass plate; a filter element mount coupled to the element and bypass plate; the disposable filter element removably coupled to the filter element mount, wherein the filter assembly forms a bowl-less in tank return line filter having inside-out flow; and an inlet closing valve configured to selectively close off the inlet and biased toward a closed position, wherein the inlet closing valve is configured to automatically close off the inlet when the disposable filter element is removed from the filter element mount.Type: ApplicationFiled: October 9, 2023Publication date: April 18, 2024Inventors: Christopher B. Bortnik, Matt Adams, Scott F. Surdick, Michael J. Schmitt, Augustus O. Schroeder
-
Patent number: 11914719Abstract: A system determines a baseline cyberthreat-risk score for a user, and displays the baseline cyberthreat-risk score via a user interface. The system presents at least one cyberthreat-education activity via the user interface, and receives, via the user interface, at least one user input associated with the presented at least one cyberthreat-education activity. The system generates an updated cyberthreat-risk score at least in part by updating the baseline cyberthreat-risk score based at least in part on the user input, and displays the updated cyberthreat-risk score via the user interface.Type: GrantFiled: April 15, 2020Date of Patent: February 27, 2024Assignee: Wells Fargo Bank, N.A.Inventors: Chad E. Adams, Daniel Robert Caricato, Kahlidah B. Covington, Ashley Brook Godfrey, Christopher Wayne Howser, Nicola A. Maiorana, Nirali J. Patel, Richard Joseph Schroeder, Roger Daryll White
-
Patent number: 11760576Abstract: A conveyor belt with flow control cleats that includes belting, first cleats and second cleats. The belting has a first side edge and a second side edge. The first cleats extend from the belting. The first cleats are oriented at an angle with respect to the first side edge of between about 30 degrees and about 60 degrees. The second cleats extend from the belting. The second cleats are oriented at an angle with respect to the second side edge of between about 30 degrees and about 60 degrees. The first cleats and the second cleats both include a first long cleat section, a second long cleat section, a short cleat section and a third long cleat section. The short cleat section has a length that is shorter than a length of the first long cleat section. The second long cleat section is between the first long cleat section and the short cleat section. The short cleat section is between the second long cleat section and the third long cleat section.Type: GrantFiled: June 2, 2022Date of Patent: September 19, 2023Assignee: ContiTech Transportbandsysteme GmbHInventors: Michael B. Schroeder, Travis Mackey, Zach Kosienski
-
Publication number: 20220289487Abstract: A conveyor belt with flow control cleats that includes belting, first cleats and second cleats. The belting has a first side edge and a second side edge. The first cleats extend from the belting. The first cleats are oriented at an angle with respect to the first side edge of between about 30 degrees and about 60 degrees. The second cleats extend from the belting. The second cleats are oriented at an angle with respect to the second side edge of between about 30 degrees and about 60 degrees. The first cleats and the second cleats both include a first long cleat section, a second long cleat section, a short cleat section and a third long cleat section. The short cleat section has a length that is shorter than a length of the first long cleat section. The second long cleat section is between the first long cleat section and the short cleat section. The short cleat section is between the second long cleat section and the third long cleat section.Type: ApplicationFiled: June 2, 2022Publication date: September 15, 2022Inventors: Michael B. Schroeder, Travis Mackey, Zach Kosienski
-
Patent number: 11352211Abstract: A conveyor belt with flow control cleats including belting, a first set of cleats and a second set of cleats. The belting has a first side edge and a second side edge. The first set of cleats has a plurality of first cleat sections. The first set of cleats are oriented at a first acute angle with respect to the first side edge. The second set of cleats has a plurality of second cleat sections. The second set of cleats are oriented at a second acute angle with respect to the second side edge.Type: GrantFiled: February 22, 2021Date of Patent: June 7, 2022Assignee: WCCO Belting, Inc.Inventors: Michael B. Schroeder, Travis Mackey, Zach Kosienski
-
Publication number: 20220135334Abstract: An impact absorbing conveyor belt that includes an impact absorption layer, a first fabric layer and a top cover layer. The impact absorption layer has a first side. The impact absorption layer has a durometer. When the conveyor belt is in use, the first side of the impact absorption layer is oriented toward a surface of the conveyor belt on which an object being conveyed is placed. The top cover layer has a durometer that is greater than the durometer of the impact absorption layer. The first fabric layer and the top cover layer are both positioned on the first side of the impact absorption layer.Type: ApplicationFiled: October 18, 2021Publication date: May 5, 2022Inventor: Michael B. Schroeder
-
Patent number: 11288366Abstract: A system for capturing communication variables associated with a communication between two or more parties and implementing a quantum optimizer to analyze the communication variables to determine the actual context of a communication held by one or more parties to the communication. Once the actual context is determined, a further determination is made as to whether the actual context poses or potentially poses a security threat to one or more parties to the communication or a third-party and, if so, notifies the party of the security threat. In this regard, parties to a communication that are unaware of the actual context of the communication held by another party are made aware of that actual context poses a security threat and, in some embodiments, notifies the parties while the communication is still occurring.Type: GrantFiled: October 7, 2019Date of Patent: March 29, 2022Assignee: BANK OF AMERICA CORPORATIONInventors: Joseph Benjamin Castinado, Jeffrey B. Schroeder, William August Stahlhut
-
Patent number: 11167315Abstract: Universal belted chain including a first belt, a second belt, a first rod, a first fastener and a second fastener. The first belt has a first upper surface and a first lower surface. The first lower surface has a first channel formed therein. The second belt has a second upper surface and a second lower surface. The second lower surface has a second channel formed therein. The first fastener attaches the first rod to the first upper surface by extending the first fastener through the first belt. An end of the first fastener opposite the first rod is recessed in the first channel with respect to the first lower surface. The second fastener attaches the first rod to the second upper surface by extending the second fastener through the second belt. An end of the second fastener opposite the first rod is recessed in the second channel with respect to the second lower surface.Type: GrantFiled: October 3, 2019Date of Patent: November 9, 2021Assignee: WCCO Belting, Inc.Inventor: Michael B. Schroeder
-
Publication number: 20210284453Abstract: A conveyor belt with flow control cleats including belting, a first set of cleats and a second set of cleats. The belting has a first side edge and a second side edge. The first set of cleats has a plurality of first cleat sections. The first set of cleats are oriented at a first acute angle with respect to the first side edge. The second set of cleats has a plurality of second cleat sections.Type: ApplicationFiled: February 22, 2021Publication date: September 16, 2021Inventors: Michael B. Schroeder, Travis Mackey, Zach Kosienski
-
Publication number: 20200122198Abstract: Universal belted chain including a first belt, a second belt, a first rod, a first fastener and a second fastener. The first belt has a first upper surface and a first lower surface. The first lower surface has a first channel formed therein. The second belt has a second upper surface and a second lower surface. The second lower surface has a second channel formed therein. The first fastener attaches the first rod to the first upper surface by extending the first fastener through the first belt. An end of the first fastener opposite the first rod is recessed in the first channel with respect to the first lower surface. The second fastener attaches the first rod to the second upper surface by extending the second fastener through the second belt. An end of the second fastener opposite the first rod is recessed in the second channel with respect to the second lower surface.Type: ApplicationFiled: October 3, 2019Publication date: April 23, 2020Inventor: Michael B. Schroeder
-
Publication number: 20200034533Abstract: A system for capturing communication variables associated with a communication between two or more parties and implementing a quantum optimizer to analyze the communication variables to determine the actual context of a communication held by one or more parties to the communication. Once the actual context is determined, a further determination is made as to whether the actual context poses or potentially poses a security threat to one or more parties to the communication or a third-party and, if so, notifies the party of the security threat. In this regard, parties to a communication that are unaware of the actual context of the communication held by another party are made aware of that actual context poses a security threat and, in some embodiments, notifies the parties while the communication is still occurring.Type: ApplicationFiled: October 7, 2019Publication date: January 30, 2020Applicant: BANK OF AMERICA CORPORATIONInventors: Joseph Benjamin Castinado, Jeffrey B. Schroeder, William August Stahlhut
-
Patent number: 10437991Abstract: A system for capturing communication variables associated with a communication between two or more parties and implementing a quantum optimizer to analyze the communication variables to determine the actual context of a communication held by one or more parties to the communication. Once the actual context is determined, a further determination is made as to whether the actual context poses or potentially poses a security threat to one or more parties to the communication or a third-party and, if so, notifies the party of the security threat. In this regard, parties to a communication that are unaware of the actual context of the communication held by another party are made aware of that actual context poses a security threat and, in some embodiments, notifies the parties while the communication is still occurring.Type: GrantFiled: March 6, 2017Date of Patent: October 8, 2019Assignee: BANK OF AMERICA CORPORATIONInventors: Joseph Benjamin Castinado, Jeffery B. Schroeder, William August Stahlhut
-
Patent number: 10412082Abstract: Embodiments of the present invention provide a system for providing real-time multi-faceted authentication of a user before or during the user's interaction with a channel. The system uses authentication devices to acquire large amounts of authentication level information data, then makes a determination that at least a portion of the acquired authentication level information data cannot be efficiently processed by a conventional computer apparatus due to the complexity of a required analysis process and/or the quantity of data that must be processed. The system then formats and transmits this authentication data to a special quantum optimizer that is configured to perform the complex analysis and/or process extremely large volumes of data substantially in real-time. The quantum optimizer performs the analysis and returns a confirmed identity of the user that is then used by the conventional computer apparatus to authenticate the user for the interaction with the channel.Type: GrantFiled: March 9, 2017Date of Patent: September 10, 2019Assignee: BANK OF AMERICA CORPORATIONInventors: Cameron Darnell Wadley, William August Stahlhut, Elizabeth S. Votaw, Jeffery B. Schroeder
-
Patent number: 10334462Abstract: Disclosed are systems for predictive analysis of data received from inter-related communication devices within a distributed communication network (e.g., Internet-of-Things (IoT)), which have been determined to be associated with an entity. The predictive analysis resulting in a determination of future resource needs. Based on the predicted future resource needs, the present invention determines a resource acquisition scheme which serves to accommodate the predicted future resource needs.Type: GrantFiled: June 23, 2016Date of Patent: June 25, 2019Assignee: Bank of America CorporationInventors: Michael Emil Ogrinz, Jeffery B. Schroeder
-
Patent number: 10270594Abstract: A system for generating an enhanced polymorphic quantum enabled firewall in real-time typically includes a classical computer apparatus and a quantum optimizer in communication with the classical computer apparatus. The classical computer apparatus is configured to identify an unauthorized attempt to access information by an unidentified source, collect a first set of data about the unauthorized attempt, determine a type of the unauthorized attempt by analyzing the first set of data, and transmit the first set of data and the type of the unauthorized attempt to the quantum optimizer. The quantum optimizer upon receiving the first set of data and the type of the unauthorized attempt, generates a second key and a second level of encryption using the second key, generates a new protocol for transferring the second level of encryption over a network, and transfers the second level of encryption and the new protocol to the classical computer apparatus.Type: GrantFiled: March 6, 2017Date of Patent: April 23, 2019Assignee: BANK OF AMERICA CORPORATIONInventors: Joseph Benjamin Castinado, Jeffery B. Schroeder, William August Stahlhut
-
Publication number: 20180262489Abstract: Embodiments of the present invention provide a system for providing real-time multi-faceted authentication of a user before or during the user's interaction with a channel. The system uses authentication devices to acquire large amounts of authentication level information data, then makes a determination that at least a portion of the acquired authentication level information data cannot be efficiently processed by a conventional computer apparatus due to the complexity of a required analysis process and/or the quantity of data that must be processed. The system then formats and transmits this authentication data to a special quantum optimizer that is configured to perform the complex analysis and/or process extremely large volumes of data substantially in real-time. The quantum optimizer performs the analysis and returns a confirmed identity of the user that is then used by the conventional computer apparatus to authenticate the user for the interaction with the channel.Type: ApplicationFiled: March 9, 2017Publication date: September 13, 2018Inventors: Cameron Darnell Wadley, William August Stahlhut, Elizabeth S. Votaw, Jeffery B. Schroeder
-
Publication number: 20180254895Abstract: A system for generating an enhanced polymorphic quantum enabled firewall in real-time typically includes a classical computer apparatus and a quantum optimizer in communication with the classical computer apparatus. The classical computer apparatus is configured to identify an unauthorized attempt to access information by an unidentified source, collect a first set of data about the unauthorized attempt, determine a type of the unauthorized attempt by analyzing the first set of data, and transmit the first set of data and the type of the unauthorized attempt to the quantum optimizer. The quantum optimizer upon receiving the first set of data and the type of the unauthorized attempt, generates a second key and a second level of encryption using the second key, generates a new protocol for transferring the second level of encryption over a network, and transfers the second level of encryption and the new protocol to the classical computer apparatus.Type: ApplicationFiled: March 6, 2017Publication date: September 6, 2018Inventors: Joseph Benjamin Castinado, Jeffery B. Schroeder, William August Stahlhut
-
Publication number: 20180253552Abstract: A system for capturing communication variables associated with a communication between two or more parties and implementing a quantum optimizer to analyze the communication variables to determine the actual context of a communication held by one or more parties to the communication. Once the actual context is determined, a further determination is made as to whether the actual context poses or potentially poses a security threat to one or more parties to the communication or a third-party and, if so, notifies the party of the security threat. In this regard, parties to a communication that are unaware of the actual context of the communication held by another party are made aware of that actual context poses a security threat and, in some embodiments, notifies the parties while the communication is still occurring.Type: ApplicationFiled: March 6, 2017Publication date: September 6, 2018Inventors: Joseph Benjamin Castinado, Jeffery B. Schroeder, William August Stahlhut
-
Publication number: 20170374583Abstract: Disclosed are systems for predictive analysis of data received from inter-related communication devices within a distributed communication network (e.g., Internet-of-Things (IoT)), which have been determined to be associated with an entity. The predictive analysis resulting in a determination of future resource needs. Based on the predicted future resource needs, the present invention determines a resource acquisition scheme which serves to accommodate the predicted future resource needs.Type: ApplicationFiled: June 23, 2016Publication date: December 28, 2017Inventors: Michael Emil Ogrinz, Jeffery B. Schroeder