Patents by Inventor Johannes Mayr

Johannes Mayr has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240269898
    Abstract: A tie-bar-less clamping unit for a moulding machine includes a machine frame formed for absorbing clamping forces, and a fixed platen arranged stationary in relation to the machine frame. A movable platen can move relative to the machine frame, and at least one push rod is preferably arranged substantially centrally with respect to the movable platen. At least one pressure pad is arranged between the push rod and the movable platen.
    Type: Application
    Filed: February 7, 2024
    Publication date: August 15, 2024
    Inventors: Lukas Muttenthaler, Gerhard HACKL-LEHNER, Christoph BALKA-HINTERSTEINER, Friedrich PERNKOPF, Stephan EPPICH, Johannes MAYR, Anton LOHNECKER, Markus OTTO, Florian MESSNER, Lukas GUGLER, Klaus Hubert GATTRINGER, Stephan BAUERNFEIND, Reinhard GRATZL, Herwig KOPPAUER
  • Publication number: 20240262301
    Abstract: A trim assembly has a trim portion that includes a first trim panel and a second trim panel that are separated by a gap. A shell is configured to couple with the trim portion, and an outer surface of the shell is continuous from an outer edge of the first trim panel to an outer edge of the second trim panel and extends across the gap.
    Type: Application
    Filed: February 6, 2024
    Publication date: August 8, 2024
    Inventors: Johannes Mayr, Brandon Herzberg, Derrick T. Jue, James G. Griffin, II, Trent Storm
  • Publication number: 20240176625
    Abstract: Embodiments provide systems and methods for logging events. A computer-implemented method, for example, includes a syslog connector providing a subscription to a cloud source that collects events from a plurality of data sources, the subscription comprising an event selection criterion, receiving event records from the cloud source according to the subscription, the received event records formatted according to a first format, transforming the event records received from the cloud source from the first format to syslog messages and storing, by the syslog connector, the syslog messages to a syslog data sink.
    Type: Application
    Filed: November 29, 2022
    Publication date: May 30, 2024
    Inventors: Niyazi Eray Goknel, Paul Fellner, Johannes Mayr, Aqil Ahmed
  • Publication number: 20240179154
    Abstract: Embodiments provide systems and methods for logging events. A computer-implemented method comprises receiving input for selecting one or more event types to receive from an event collector, receiving, based on the one or more event types, a plurality of security events from the event collector, transforming each of the plurality of security events to a standard format to generate a plurality of formatted security events and transmitting the plurality of formatted security events to a security information and event management (SIEM) server.
    Type: Application
    Filed: November 29, 2022
    Publication date: May 30, 2024
    Inventors: Niyazi Eray Goknel, Paul Fellner, Johannes Mayr, Aqil Ahmed
  • Patent number: 10787060
    Abstract: A vehicle body structure located adjacent to a passenger compartment of a vehicle includes a first wall defining an interior space adjacent to the first wall; a second wall extending outward from the first wall and defining a passageway in communication with the interior space; and a duct having a body that is disposed in the interior space of the first wall and an outlet that extends outward from the body and is disposed in the passageway of the second wall. The duct routes conditioned air from the body through the outlet to the passenger compartment of the vehicle.
    Type: Grant
    Filed: September 20, 2017
    Date of Patent: September 29, 2020
    Assignee: APPLE INC.
    Inventors: Johannes Mayr, John M. Kearney, Reinhard Hoermann
  • Patent number: 10284591
    Abstract: In non-limiting examples, anti-exploit systems and methods described herein monitor a memory space of a process for execution of functions. Stack walk processing is executed upon invocation of one of the functions in the monitored memory space. During execution of the stack walk processing, at least one memory check is performed to detect suspicious behavior. An alert of suspicious behavior is triggered when the performing of the memory check detects at least one of: code execution attempted from non-executable memory, identification of an invalid base pointer, identification of an invalid stack return address, attempted execution of a return-oriented programming technique, the base pointer is outside a current thread stack, and a return address is detected as being inside a virtual memory area. If an alert of suspicious behavior is triggered, execution of a payload is prevented for the invoked function.
    Type: Grant
    Filed: January 27, 2015
    Date of Patent: May 7, 2019
    Assignee: WEBROOT INC.
    Inventors: Marco Giuliani, Marco Bizzarri, Benedetto Voltattorni, Johannes Mayr
  • Patent number: 10257224
    Abstract: Methods and systems for providing forensic visibility into systems and networks are provided. More particularly, a sensor agent may receive events defining an action of a first object acting on a target. The object, the event, and the target are then correlated to at least one originating object such that an audit trail for each individual event is created. A global perspective indicating an age, popularity, a determination as to whether the object may be malware, and IP/URL information associated with the event may then be applied to at least one of the object, the event, the target, and the originating object. A priority may then be determined and assigned to the event based on at least the global perspective. An event line containing event information is then transmitted to an end recipient where the information may be heuristically displayed.
    Type: Grant
    Filed: February 20, 2017
    Date of Patent: April 9, 2019
    Assignee: Webroot Inc.
    Inventors: Joseph Jaroch, Jacques Etienne Erasmus, Paul Barnes, Johannes Mayr, Michael Leidesdorff, Marco Giuliani, Christopher Jon Williams, Chad Edward Bacher
  • Publication number: 20170163660
    Abstract: Methods and systems for providing forensic visibility into systems and networks are provided. More particularly, a sensor agent may receive events defining an action of a first object acting on a target. The object, the event, and the target are then correlated to at least one originating object such that an audit trail for each individual event is created. A global perspective indicating an age, popularity, a determination as to whether the object may be malware, and IP/URL information associated with the event may then be applied to at least one of the object, the event, the target, and the originating object. A priority may then be determined and assigned to the event based on at least the global perspective. An event line containing event information is then transmitted to an end recipient where the information may be heuristically displayed.
    Type: Application
    Filed: February 20, 2017
    Publication date: June 8, 2017
    Applicant: WEBROOT INC.
    Inventors: Joseph Jaroch, Jacques Etienne Erasmus, Paul Barnes, Johannes Mayr, Michael Leidesdorff, Marco Giuliani, Christopher Jon Williams, Chad Edward Bacher
  • Patent number: 9578045
    Abstract: Methods and systems for providing forensic visibility into systems and networks are provided. More particularly, a sensor agent may receive events defining an action of a first object acting on a target. The object, the event, and the target are then correlated to at least one originating object such that an audit trail for each individual event is created. A global perspective indicating an age, popularity, a determination as to whether the object may be malware, and IP/URL information associated with the event may then be applied to at least one of the object, the event, the target, and the originating object. A priority may then be determined and assigned to the event based on at least the global perspective. An event line containing event information is then transmitted to an end recipient where the information may be heuristically displayed.
    Type: Grant
    Filed: May 5, 2014
    Date of Patent: February 21, 2017
    Assignee: WEBROOT INC.
    Inventors: Joseph Jaroch, Jacques Etienne Erasmus, Paul Barnes, Johannes Mayr, Michael Leidesdorff, Marco Giuliani, Christopher Jon Williams, Chad Edward Bacher
  • Patent number: 9233498
    Abstract: A closing unit of an injection molding machine includes a moveable mold mounting plate and a fixed mold mounting plate, a hydraulic pressure mechanism for building up a closing pressure, at least one column provided with an external profile, and at least one two-part nut which is provided with an internal profile and the half members of which are coupled in motionally opposite relationship. The at least one column in the closed condition of the two-part nut is lockable by a positively locking relationship between the internal profile and the external profile relative to the moveable mold mounting plate or relative to the pressure mechanism. There is also provided an electric drive for opening and closing the two-part nut.
    Type: Grant
    Filed: August 27, 2013
    Date of Patent: January 12, 2016
    Assignee: ENGEL AUSTRIA GMBH
    Inventors: Ing. Franz Dirneder, Johannes Mayr
  • Publication number: 20150215335
    Abstract: In non-limiting examples, anti-exploit systems and methods described herein monitor a memory space of a process for execution of functions. Stack walk processing is executed upon invocation of one of the functions in the monitored memory space. During execution of the stack walk processing, at least one memory check is performed to detect suspicious behavior. An alert of suspicious behavior is triggered when the performing of the memory check detects at least one of: code execution attempted from non-executable memory, identification of an invalid base pointer, identification of an invalid stack return address, attempted execution of a return-oriented programming technique, the base pointer is outside a current thread stack, and a return address is detected as being inside a virtual memory area. If an alert of suspicious behavior is triggered, execution of a payload is prevented for the invoked function.
    Type: Application
    Filed: January 27, 2015
    Publication date: July 30, 2015
    Applicant: WEBROOT INC.
    Inventors: Marco Giuliani, Marco Bizzarri, Benedetto Voltattorni, Johannes Mayr
  • Publication number: 20140331322
    Abstract: Methods and systems for providing forensic visibility into systems and networks are provided. More particularly, a sensor agent may receive events defining an action of a first object acting on a target. The object, the event, and the target are then correlated to at least one originating object such that an audit trail for each individual event is created. A global perspective indicating an age, popularity, a determination as to whether the object may be malware, and IP/URL information associated with the event may then be applied to at least one of the object, the event, the target, and the originating object. A priority may then be determined and assigned to the event based on at least the global perspective. An event line containing event information is then transmitted to an end recipient where the information may be heuristically displayed.
    Type: Application
    Filed: May 5, 2014
    Publication date: November 6, 2014
    Applicant: Webroot Inc.
    Inventors: Joseph Jaroch, Jacques Etienne Erasmus, Paul Barnes, Johannes Mayr, Michael Leidesdorff, Marco Giuliani, Christopher Jon Williams, Chad Edward Bacher
  • Publication number: 20140065258
    Abstract: A closing unit of an injection molding machine includes a moveable mold mounting plate and a fixed mold mounting plate, a hydraulic pressure mechanism for building up a closing pressure, at least one column provided with an external profile, and at least one two-part nut which is provided with an internal profile and the halves of which are coupled in motionally opposite relationship. The at least one column in the closed condition of the two-part nut is lockable by a positively locking relationship between the internal profile and the external profile relative to the moveable mold mounting plate or relative to the pressure mechanism. There is also provided an electric drive for opening and closing the two-part nut.
    Type: Application
    Filed: August 27, 2013
    Publication date: March 6, 2014
    Applicant: ENGEL AUSTRIA GMBH
    Inventors: Ing. Franz DIRNEDER, Johannes MAYR
  • Patent number: 8289854
    Abstract: A system, method, and computer program product are provided for analyzing a protocol utilizing a state machine, based on a token determined utilizing another state machine. In use, a state of a protocol used within a data stream is identified. Additionally, at least one taken capable of initiating a change in the state of the protocol used within the data stream is determined utilizing a first state machine. Furthermore, the protocol is analyzed based on the at least one token, utilizing a second state machine.
    Type: Grant
    Filed: November 28, 2007
    Date of Patent: October 16, 2012
    Assignee: McAfee, Inc.
    Inventors: Manuel Nedbal, Johannes Mayr, Keith Eric Amidon
  • Patent number: 7900255
    Abstract: A pattern matching system, method and computer program product are provided. In use, a plurality of components of data is received, such that each component of the data is compared against a plurality of patterns. To this end, more than one match between the components of the data and the patterns can be identified.
    Type: Grant
    Filed: October 18, 2005
    Date of Patent: March 1, 2011
    Assignee: McAfee, Inc.
    Inventors: Johannes Mayr, Thomas C. H. Steiner, Manuel Nedbal
  • Patent number: 7313821
    Abstract: A security system, method and computer program product are provided. In use, information from a plurality of sensors associated with at least one computer is received, where such information relates to events that have occurred at the at least one computer. Thereafter, the information is correlated, and a reaction is conditionally performed based on the information.
    Type: Grant
    Filed: April 13, 2006
    Date of Patent: December 25, 2007
    Assignee: McAfee, Inc.
    Inventors: Thomas C. H. Steiner, Andreas Schlemmer, Johannes Mayr