Patents by Inventor Johannes Mayr
Johannes Mayr has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240269898Abstract: A tie-bar-less clamping unit for a moulding machine includes a machine frame formed for absorbing clamping forces, and a fixed platen arranged stationary in relation to the machine frame. A movable platen can move relative to the machine frame, and at least one push rod is preferably arranged substantially centrally with respect to the movable platen. At least one pressure pad is arranged between the push rod and the movable platen.Type: ApplicationFiled: February 7, 2024Publication date: August 15, 2024Inventors: Lukas Muttenthaler, Gerhard HACKL-LEHNER, Christoph BALKA-HINTERSTEINER, Friedrich PERNKOPF, Stephan EPPICH, Johannes MAYR, Anton LOHNECKER, Markus OTTO, Florian MESSNER, Lukas GUGLER, Klaus Hubert GATTRINGER, Stephan BAUERNFEIND, Reinhard GRATZL, Herwig KOPPAUER
-
Publication number: 20240262301Abstract: A trim assembly has a trim portion that includes a first trim panel and a second trim panel that are separated by a gap. A shell is configured to couple with the trim portion, and an outer surface of the shell is continuous from an outer edge of the first trim panel to an outer edge of the second trim panel and extends across the gap.Type: ApplicationFiled: February 6, 2024Publication date: August 8, 2024Inventors: Johannes Mayr, Brandon Herzberg, Derrick T. Jue, James G. Griffin, II, Trent Storm
-
Publication number: 20240176625Abstract: Embodiments provide systems and methods for logging events. A computer-implemented method, for example, includes a syslog connector providing a subscription to a cloud source that collects events from a plurality of data sources, the subscription comprising an event selection criterion, receiving event records from the cloud source according to the subscription, the received event records formatted according to a first format, transforming the event records received from the cloud source from the first format to syslog messages and storing, by the syslog connector, the syslog messages to a syslog data sink.Type: ApplicationFiled: November 29, 2022Publication date: May 30, 2024Inventors: Niyazi Eray Goknel, Paul Fellner, Johannes Mayr, Aqil Ahmed
-
Publication number: 20240179154Abstract: Embodiments provide systems and methods for logging events. A computer-implemented method comprises receiving input for selecting one or more event types to receive from an event collector, receiving, based on the one or more event types, a plurality of security events from the event collector, transforming each of the plurality of security events to a standard format to generate a plurality of formatted security events and transmitting the plurality of formatted security events to a security information and event management (SIEM) server.Type: ApplicationFiled: November 29, 2022Publication date: May 30, 2024Inventors: Niyazi Eray Goknel, Paul Fellner, Johannes Mayr, Aqil Ahmed
-
Patent number: 10787060Abstract: A vehicle body structure located adjacent to a passenger compartment of a vehicle includes a first wall defining an interior space adjacent to the first wall; a second wall extending outward from the first wall and defining a passageway in communication with the interior space; and a duct having a body that is disposed in the interior space of the first wall and an outlet that extends outward from the body and is disposed in the passageway of the second wall. The duct routes conditioned air from the body through the outlet to the passenger compartment of the vehicle.Type: GrantFiled: September 20, 2017Date of Patent: September 29, 2020Assignee: APPLE INC.Inventors: Johannes Mayr, John M. Kearney, Reinhard Hoermann
-
Patent number: 10284591Abstract: In non-limiting examples, anti-exploit systems and methods described herein monitor a memory space of a process for execution of functions. Stack walk processing is executed upon invocation of one of the functions in the monitored memory space. During execution of the stack walk processing, at least one memory check is performed to detect suspicious behavior. An alert of suspicious behavior is triggered when the performing of the memory check detects at least one of: code execution attempted from non-executable memory, identification of an invalid base pointer, identification of an invalid stack return address, attempted execution of a return-oriented programming technique, the base pointer is outside a current thread stack, and a return address is detected as being inside a virtual memory area. If an alert of suspicious behavior is triggered, execution of a payload is prevented for the invoked function.Type: GrantFiled: January 27, 2015Date of Patent: May 7, 2019Assignee: WEBROOT INC.Inventors: Marco Giuliani, Marco Bizzarri, Benedetto Voltattorni, Johannes Mayr
-
Patent number: 10257224Abstract: Methods and systems for providing forensic visibility into systems and networks are provided. More particularly, a sensor agent may receive events defining an action of a first object acting on a target. The object, the event, and the target are then correlated to at least one originating object such that an audit trail for each individual event is created. A global perspective indicating an age, popularity, a determination as to whether the object may be malware, and IP/URL information associated with the event may then be applied to at least one of the object, the event, the target, and the originating object. A priority may then be determined and assigned to the event based on at least the global perspective. An event line containing event information is then transmitted to an end recipient where the information may be heuristically displayed.Type: GrantFiled: February 20, 2017Date of Patent: April 9, 2019Assignee: Webroot Inc.Inventors: Joseph Jaroch, Jacques Etienne Erasmus, Paul Barnes, Johannes Mayr, Michael Leidesdorff, Marco Giuliani, Christopher Jon Williams, Chad Edward Bacher
-
Publication number: 20170163660Abstract: Methods and systems for providing forensic visibility into systems and networks are provided. More particularly, a sensor agent may receive events defining an action of a first object acting on a target. The object, the event, and the target are then correlated to at least one originating object such that an audit trail for each individual event is created. A global perspective indicating an age, popularity, a determination as to whether the object may be malware, and IP/URL information associated with the event may then be applied to at least one of the object, the event, the target, and the originating object. A priority may then be determined and assigned to the event based on at least the global perspective. An event line containing event information is then transmitted to an end recipient where the information may be heuristically displayed.Type: ApplicationFiled: February 20, 2017Publication date: June 8, 2017Applicant: WEBROOT INC.Inventors: Joseph Jaroch, Jacques Etienne Erasmus, Paul Barnes, Johannes Mayr, Michael Leidesdorff, Marco Giuliani, Christopher Jon Williams, Chad Edward Bacher
-
Patent number: 9578045Abstract: Methods and systems for providing forensic visibility into systems and networks are provided. More particularly, a sensor agent may receive events defining an action of a first object acting on a target. The object, the event, and the target are then correlated to at least one originating object such that an audit trail for each individual event is created. A global perspective indicating an age, popularity, a determination as to whether the object may be malware, and IP/URL information associated with the event may then be applied to at least one of the object, the event, the target, and the originating object. A priority may then be determined and assigned to the event based on at least the global perspective. An event line containing event information is then transmitted to an end recipient where the information may be heuristically displayed.Type: GrantFiled: May 5, 2014Date of Patent: February 21, 2017Assignee: WEBROOT INC.Inventors: Joseph Jaroch, Jacques Etienne Erasmus, Paul Barnes, Johannes Mayr, Michael Leidesdorff, Marco Giuliani, Christopher Jon Williams, Chad Edward Bacher
-
Patent number: 9233498Abstract: A closing unit of an injection molding machine includes a moveable mold mounting plate and a fixed mold mounting plate, a hydraulic pressure mechanism for building up a closing pressure, at least one column provided with an external profile, and at least one two-part nut which is provided with an internal profile and the half members of which are coupled in motionally opposite relationship. The at least one column in the closed condition of the two-part nut is lockable by a positively locking relationship between the internal profile and the external profile relative to the moveable mold mounting plate or relative to the pressure mechanism. There is also provided an electric drive for opening and closing the two-part nut.Type: GrantFiled: August 27, 2013Date of Patent: January 12, 2016Assignee: ENGEL AUSTRIA GMBHInventors: Ing. Franz Dirneder, Johannes Mayr
-
Publication number: 20150215335Abstract: In non-limiting examples, anti-exploit systems and methods described herein monitor a memory space of a process for execution of functions. Stack walk processing is executed upon invocation of one of the functions in the monitored memory space. During execution of the stack walk processing, at least one memory check is performed to detect suspicious behavior. An alert of suspicious behavior is triggered when the performing of the memory check detects at least one of: code execution attempted from non-executable memory, identification of an invalid base pointer, identification of an invalid stack return address, attempted execution of a return-oriented programming technique, the base pointer is outside a current thread stack, and a return address is detected as being inside a virtual memory area. If an alert of suspicious behavior is triggered, execution of a payload is prevented for the invoked function.Type: ApplicationFiled: January 27, 2015Publication date: July 30, 2015Applicant: WEBROOT INC.Inventors: Marco Giuliani, Marco Bizzarri, Benedetto Voltattorni, Johannes Mayr
-
Publication number: 20140331322Abstract: Methods and systems for providing forensic visibility into systems and networks are provided. More particularly, a sensor agent may receive events defining an action of a first object acting on a target. The object, the event, and the target are then correlated to at least one originating object such that an audit trail for each individual event is created. A global perspective indicating an age, popularity, a determination as to whether the object may be malware, and IP/URL information associated with the event may then be applied to at least one of the object, the event, the target, and the originating object. A priority may then be determined and assigned to the event based on at least the global perspective. An event line containing event information is then transmitted to an end recipient where the information may be heuristically displayed.Type: ApplicationFiled: May 5, 2014Publication date: November 6, 2014Applicant: Webroot Inc.Inventors: Joseph Jaroch, Jacques Etienne Erasmus, Paul Barnes, Johannes Mayr, Michael Leidesdorff, Marco Giuliani, Christopher Jon Williams, Chad Edward Bacher
-
Publication number: 20140065258Abstract: A closing unit of an injection molding machine includes a moveable mold mounting plate and a fixed mold mounting plate, a hydraulic pressure mechanism for building up a closing pressure, at least one column provided with an external profile, and at least one two-part nut which is provided with an internal profile and the halves of which are coupled in motionally opposite relationship. The at least one column in the closed condition of the two-part nut is lockable by a positively locking relationship between the internal profile and the external profile relative to the moveable mold mounting plate or relative to the pressure mechanism. There is also provided an electric drive for opening and closing the two-part nut.Type: ApplicationFiled: August 27, 2013Publication date: March 6, 2014Applicant: ENGEL AUSTRIA GMBHInventors: Ing. Franz DIRNEDER, Johannes MAYR
-
Patent number: 8289854Abstract: A system, method, and computer program product are provided for analyzing a protocol utilizing a state machine, based on a token determined utilizing another state machine. In use, a state of a protocol used within a data stream is identified. Additionally, at least one taken capable of initiating a change in the state of the protocol used within the data stream is determined utilizing a first state machine. Furthermore, the protocol is analyzed based on the at least one token, utilizing a second state machine.Type: GrantFiled: November 28, 2007Date of Patent: October 16, 2012Assignee: McAfee, Inc.Inventors: Manuel Nedbal, Johannes Mayr, Keith Eric Amidon
-
Patent number: 7900255Abstract: A pattern matching system, method and computer program product are provided. In use, a plurality of components of data is received, such that each component of the data is compared against a plurality of patterns. To this end, more than one match between the components of the data and the patterns can be identified.Type: GrantFiled: October 18, 2005Date of Patent: March 1, 2011Assignee: McAfee, Inc.Inventors: Johannes Mayr, Thomas C. H. Steiner, Manuel Nedbal
-
Patent number: 7313821Abstract: A security system, method and computer program product are provided. In use, information from a plurality of sensors associated with at least one computer is received, where such information relates to events that have occurred at the at least one computer. Thereafter, the information is correlated, and a reaction is conditionally performed based on the information.Type: GrantFiled: April 13, 2006Date of Patent: December 25, 2007Assignee: McAfee, Inc.Inventors: Thomas C. H. Steiner, Andreas Schlemmer, Johannes Mayr