Patents by Inventor Markus Hartwig

Markus Hartwig has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240375691
    Abstract: Fire-protected floor structure of a wagon body containing a sandwich plate (5) made of a metallic top layer (10) and a metallic base layer (20) and a core layer (30) lying therebetween as well as metallic edge profiles (40). The core layer (30) is completely enclosed by the metallic top and base layers (10, 20) and the edge profiles (40). The floor structure has a mineral coolant layer (60) on the side of the base layer (20) facing away from the core layer (30) and the side of the mineral coolant layer (60) facing away from the core layer (30) is covered with an intumescent layer (70). The core layer (30) is made of a structural foam, in particular of PET foam, or of balsa wood, or contains at least 95% by weight of PET or balsa wood.
    Type: Application
    Filed: August 29, 2022
    Publication date: November 14, 2024
    Applicant: 3A COMPOSITES MOBILITY AG
    Inventors: Markus Hartwig, Panagiotis Michos
  • Publication number: 20220284094
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Application
    Filed: May 23, 2022
    Publication date: September 8, 2022
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Patent number: 11379582
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Grant
    Filed: September 3, 2020
    Date of Patent: July 5, 2022
    Assignee: Webroot Inc.
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Publication number: 20200401694
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Application
    Filed: September 3, 2020
    Publication date: December 24, 2020
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Patent number: 10803170
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Grant
    Filed: June 24, 2014
    Date of Patent: October 13, 2020
    Assignee: WEBROOT INC.
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Publication number: 20150007327
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Application
    Filed: June 24, 2014
    Publication date: January 1, 2015
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Patent number: 8763123
    Abstract: In one aspect, a method of determining the protection that a remote computer has from malware includes receiving at a base computer, details of all or selected security products operating on a remote computer, receiving similar information from other remote computers, and identifying malware process that were not identified by the security products installed on the other remote computers and having a same or similar combination of security products installed on the remote computer.
    Type: Grant
    Filed: July 8, 2012
    Date of Patent: June 24, 2014
    Assignee: Prevx Limited
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Patent number: 8726389
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Grant
    Filed: July 8, 2012
    Date of Patent: May 13, 2014
    Assignee: Prevx Limited
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Patent number: 8418250
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Grant
    Filed: June 30, 2006
    Date of Patent: April 9, 2013
    Assignee: Prevx Limited
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Publication number: 20120278895
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Application
    Filed: July 8, 2012
    Publication date: November 1, 2012
    Applicant: PREVX LTD.
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Publication number: 20120278891
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Application
    Filed: July 8, 2012
    Publication date: November 1, 2012
    Applicant: PREVX LTD.
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Publication number: 20070016953
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Application
    Filed: June 30, 2006
    Publication date: January 18, 2007
    Applicant: PREVX LIMITED
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Publication number: 20060026684
    Abstract: A system and method of host intrusion prevention for preventing intrusion into a computer system is disclosed. Requests to access a resource of the computer system are monitored. It is determined whether the requested access is to be permitted or not in accordance with a policy. The requested access is allowed or denied accordingly.
    Type: Application
    Filed: July 18, 2005
    Publication date: February 2, 2006
    Applicant: Prevx Ltd.
    Inventors: Ralph Harvey, Darren Harter, Markus Hartwig, Paul Stubbs
  • Patent number: 5161675
    Abstract: A tubular belt conveyor system includes a conveyor belt having a cross-sectionally closed, curvilinear, tubular configuration including a zone of overlapping edge portions. A plurality of support and guide assemblies for the conveyor are situated along the conveyor path. Each assembly includes a plurality of support and guide rollers held about the cross-sectionally closed conveyor belt in a contacting relationship therewith. In each assembly one roller is in engagement with the cross-sectionally closed conveyor belt at the edge overlap. The closed tubular configuration in each length portion of the conveying path has an oval cross section. The support and guide rollers force the conveyor belt into the closed tubular configuration of oval cross section. The first support and guide roller of each assembly is settable onto the zone of overlapping edge portions.
    Type: Grant
    Filed: June 9, 1989
    Date of Patent: November 10, 1992
    Assignee: PWH Anlagen & Systeme GmbH
    Inventors: Wilhelm Engst, Markus Hartwig, Rainer Alles