Patents by Inventor Matthias Wollnik
Matthias Wollnik has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10519975Abstract: Compressor stage with a stator-side intake connection piece via which medium which is to be compressed can be introduced into the compressor stage in the region of the compressor stage, with a stator-side inflow channel via which the medium to be compressed can be conveyed in direction of a rotor-side impeller proceeding from the intake connection piece, wherein the impeller has a radially inner hub, a radially outer cover disk and impeller blades extending between the hub and the cover disk, wherein a plus measuring point and a minus measuring point are provided at the compressor stage for measuring the effective pressure at the compressor stage, and wherein the minus measuring point is positioned upstream of the impeller outside of the stator-side inflow channel in an annular gap which branches off from the inflow channel.Type: GrantFiled: December 16, 2014Date of Patent: December 31, 2019Assignee: MAN Energy Solutions SEInventors: Alf-Peter Tiedtke, Matthias Wollnik
-
Patent number: 9501656Abstract: A global policy is applied to only select resources (e.g., certain file folders) based on property settings associated as metadata with those resources. The resource property settings correspond to a defined property set (e.g., a global taxonomy) that is consistent with the global policy. When global policy is received, the property metadata for each resource determines whether to apply the global policy to that resource. In this way, a central administrator may provide the defined property set, a policy author may provide the policy, and a local administrator may set the resource property settings.Type: GrantFiled: April 5, 2011Date of Patent: November 22, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Matthias Wollnik, Nir Ben-Zvi, Judd Hardy, Ivelin L. Zheglov, Ravindra Mysore Seetharam
-
Publication number: 20160319838Abstract: Compressor stage with a stator-side intake connection piece via which medium which is to be compressed can be introduced into the compressor stage in the region of the compressor stage, with a stator-side inflow channel via which the medium to be compressed can be conveyed in direction of a rotor-side impeller proceeding from the intake connection piece, wherein the impeller has a radially inner hub, a radially outer cover disk and impeller blades extending between the hub and the cover disk, wherein a plus measuring point and a minus measuring point are provided at the compressor stage for measuring the effective pressure at the compressor stage, and wherein the minus measuring point is positioned upstream of the impeller outside of the stator-side inflow channel in an annular gap which branches off from the inflow channel.Type: ApplicationFiled: December 16, 2014Publication date: November 3, 2016Inventors: Alf-Peter TIEDTKE, Matthias WOLLNIK
-
Patent number: 8800048Abstract: Methods and a tool or instrument for performing the methods of protecting a computer program with a parameter cloud are disclosed. A parameter cloud comprising a plurality of elements may be created. Called functions of a computer program may have defined expected parameter cloud states so that proper behavior of the called function is achieved when the parameter cloud state is the expected parameter cloud state. An expected parameter cloud state may include a selected set of elements of the parameter cloud having assigned values. Static portions of the called functions may depend on a current parameter cloud state, and calling functions may transform the parameter cloud state prior to calling their respective called functions. The methods and instrument may operate on original source code or post-binary targets of the computer program. A fingerprint may be used to identify a specific computer program from a sequence of state transitions.Type: GrantFiled: May 20, 2008Date of Patent: August 5, 2014Assignee: Microsoft CorporationInventors: Matthias Wollnik, Nathan Ide, Andrey Lelikov, John Richard McDowell, Aaron Payne Goldsmid, Karan Singh Dhillon
-
Publication number: 20120260303Abstract: The subject disclosure is directed towards applying global policy to only select resources (e.g., certain file folders) based on property settings associated as metadata with those resources. The resource property settings correspond to a defined property set (e.g., a global taxonomy) that is consistent with the global policy. When global policy is received, the property metadata for each resource determines whether to apply the global policy to that resource. In this way, a central administrator may provide the defined property set, a policy author may provide the policy, and a local administrator may set the resource property settings.Type: ApplicationFiled: April 5, 2011Publication date: October 11, 2012Applicant: Microsoft CorporationInventors: Matthias Wollnik, Nir Ben-Zvi, Judd Hardy, Ivelin L. Zheglov, Ravindra Mysore Seetharam
-
Patent number: 8001596Abstract: A method to apply a protection mechanism to a binary object includes using operating system resources to load a binary object from a storage medium along with a manifest and a digital signature. Authentication of the binary object is performed using the digital signature and the manifest is read to determine a category of protection for the binary object. The operating system selects a protection mechanism corresponding to the protection category and injects protection mechanism code, along with the binary object into a binary image on computer RAM. When the binary image is accessed, the protection mechanism executes and either allows full access and functionality to the binary object or prevents proper access and operation of the binary object. The protection mechanisms may be updated independently from the information on the storage medium.Type: GrantFiled: May 3, 2007Date of Patent: August 16, 2011Assignee: Microsoft CorporationInventors: Matthias Wollnik, Nir Ben Zvi, Hakki Tunc Bostanci, John Richard McDowell, Aaron Goldsmid
-
Publication number: 20090293041Abstract: Methods and a tool or instrument for performing the methods of protecting a computer program with a parameter cloud are disclosed. A parameter cloud comprising a plurality of elements may be created. Called functions of a computer program may have defined expected parameter cloud states so that proper behavior of the called function is achieved when the parameter cloud state is the expected parameter cloud state. An expected parameter cloud state may include a selected set of elements of the parameter cloud having assigned values. Static portions of the called functions may depend on a current parameter cloud state, and calling functions may transform the parameter cloud state prior to calling their respective called functions. The methods and instrument may operate on original source code or post-binary targets of the computer program. A fingerprint may be used to identify a specific computer program from a sequence of state transitions.Type: ApplicationFiled: May 20, 2008Publication date: November 26, 2009Applicant: MICROSOFT CORPORATIONInventors: Matthias Wollnik, Nathan Ide, Andrey Lelikov, John Richard McDowell, Aaron Payne Goldsmid, Karan Singh Dhillon
-
Publication number: 20080276314Abstract: A method to apply a protection mechanism to a binary object includes using operating system resources to load a binary object from a storage medium along with a manifest and a digital signature. Authentication of the binary object is performed using the digital signature and the manifest is read to determine a category of protection for the binary object. The operating system selects a protection mechanism corresponding to the protection category and injects protection mechanism code, along with the binary object into a binary image on computer RAM. When the binary image is accessed, the protection mechanism executes and either allows full access and functionality to the binary object or prevents proper access and operation of the binary object. The protection mechanisms may be updated independently from the information on the storage medium.Type: ApplicationFiled: May 3, 2007Publication date: November 6, 2008Applicant: Microsoft CorporationInventors: MATTHIAS WOLLNIK, Nir Ben-Zvi, Hakki Tunc Bostanci, John Richard McDowell, Aaron Goldsmid
-
Publication number: 20060259542Abstract: The invention is directed to techniques for monitoring and testing publish/subscribe network systems. For example, an enterprise network that has a number of geographically dispersed network devices and interconnected sub-networks may be configured to operate as a publish/subscribe network system in which each of the dispersed network devices sends and receives messages for specific groups of the network devices. The techniques described herein enable data object capture and analysis in the application layer of a publish/subscribe network system using shim adapters. The techniques also enable network packet capture and analysis in the network layer of a publish/subscribe network system. Furthermore, the techniques include integrated analysis of testing results from the application layer and the network layer to determine performance characteristics, such as latency, across both of the layers.Type: ApplicationFiled: July 14, 2006Publication date: November 16, 2006Applicant: Architecture Technology CorporationInventors: John Wu, Benjamin Burnett, Matthias Wollnik