Patents by Inventor Patrick Hoff
Patrick Hoff has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11939903Abstract: A method for operating an exhaust burner with a secondary air system downstream of a combustion engine of a motor vehicle. The method includes: activating an ignition device as a function of a release condition, the ignition device being heated up to a specifiable target temperature; metering fuel at a first time point into a combustion chamber of the exhaust burner at a first injection frequency using an injection valve, and the combustion chamber not being actively supplied with air; setting a first target air-mass flow using a secondary air system at a further, second time point, wherein the air-mass flow is increased strictly monotonically; controlling the air-fuel ratio to a first target air-fuel ratio as a function of a lambda sensor starting from the second time point, and metering fuel at a second injection frequency; setting a second target air-mass flow at a further, third time point.Type: GrantFiled: April 19, 2023Date of Patent: March 26, 2024Assignee: ROBERT BOSCH GMBHInventors: Christian Disch, Patrick Hoff, Torsten Kunz, William Krein
-
Publication number: 20240003278Abstract: A method for operating an exhaust burner with a secondary air system downstream of a combustion engine of a motor vehicle. The method includes: activating an ignition device as a function of a release condition, the ignition device being heated up to a specifiable target temperature; metering fuel at a first time point into a combustion chamber of the exhaust burner at a first injection frequency using an injection valve, and the combustion chamber not being actively supplied with air; setting a first target air-mass flow using a secondary air system at a further, second time point, wherein the air-mass flow is increased strictly monotonically; controlling the air-fuel ratio to a first target air-fuel ratio as a function of a lambda sensor starting from the second time point, and metering fuel at a second injection frequency; setting a second target air-mass flow at a further, third time point.Type: ApplicationFiled: April 19, 2023Publication date: January 4, 2024Inventors: Christian Disch, Patrick Hoff, Torsten Kunz, William Krein
-
Patent number: 11321164Abstract: A method comprises obtaining a set of log files for a software system. The set of log files applies to an extended window. A periodic pattern in a first set of error-event surges in the set of log files is identified. The error-event surges in the first set is identified as event noise. A second set of log files for the software system is obtained. The second set of log files applies to a shortened window. Timeseries analysis on the second set of log files is performed. A particular error-event surge in a detection period in the second set of log files that is abnormal as compared to the shortened window is detected based on the timeseries analysis. That the particular error-event surge does not fit into the periodic pattern is determined, the particular error-event surge is characterized as an anomaly, based on the determining.Type: GrantFiled: June 29, 2020Date of Patent: May 3, 2022Assignee: International Business Machines CorporationInventors: Chris Moss, Simon J. Kofkin-Hansen, Jordan Shamir, Devin Conley, James Patrick Hoff, Iain Mccown, Scott Moonen, Bryan M. Buckland
-
Publication number: 20210406106Abstract: A method comprises obtaining a set of log files for a software system. The set of log files applies to an extended window. A periodic pattern in a first set of error-event surges in the set of log files is identified. The error-event surges in the first set is identified as event noise. A second set of log files for the software system is obtained. The second set of log files applies to a shortened window. Timeseries analysis on the second set of log files is performed. A particular error-event surge in a detection period in the second set of log files that is abnormal as compared to the shortened window is detected based on the timeseries analysis. That the particular error-event surge does not fit into the periodic pattern is determined, the particular error-event surge is characterized as an anomaly, based on the determining.Type: ApplicationFiled: June 29, 2020Publication date: December 30, 2021Inventors: Chris Moss, Simon J. Kofkin-Hansen, Jordan Shamir, Devin Conley, James Patrick Hoff, Iain Mccown, Scott Moonen, Bryan M. Buckland
-
Publication number: 20210406112Abstract: A method comprises receiving a set of log files that correspond to a detected anomaly in a software system. The set of log files are input into a first classification algorithm. A set of classified log events is received from the first classification algorithm. The set of classified log events is input into a second classification algorithm. A classification of the detected anomaly is obtained from the second classification algorithm.Type: ApplicationFiled: June 29, 2020Publication date: December 30, 2021Inventors: Chris Moss, Simon J. Kofkin-Hansen, Jordan Shamir, Devin Conley, James Patrick Hoff, Iain Mccown, Scott Moonen, Bryan M. Buckland
-
Patent number: 10289850Abstract: For supervisor password access based on a key press of a hotkey, systems, apparatus, methods, and program products are disclosed. The apparatus may include a processor that monitors for a key press of a hotkey during a up process, that detects a supervisor password access attempt, that allows access to the supervisor password in response to hotkey being pressed during the boot up process, and that denies access to the supervisor password in response to hotkey not being pressed during the boot up process.Type: GrantFiled: March 25, 2016Date of Patent: May 14, 2019Assignee: Lenovo (Singapore) PTE. LTD.Inventors: Joseph Robert Parker, Mikio Hagiwara, James Patrick Hoff, Eitaroh Kasamatsu
-
Publication number: 20170277896Abstract: For supervisor password access based on a key press of a hotkey, systems, apparatus, methods, and program products are disclosed. The apparatus may include a processor that monitors for a key press of a hotkey during a up process, that detects a supervisor password access attempt, that allows access to the supervisor password in response to hotkey being pressed during the boot up process, and that denies access to the supervisor password in response to hotkey not being pressed during the boot up process.Type: ApplicationFiled: March 25, 2016Publication date: September 28, 2017Inventors: Joseph Robert Parker, Mikio Hagiwara, James Patrick Hoff, Eitaroh Kasamatsu
-
Publication number: 20140154745Abstract: The invention relates to a process for the culturing of cells, preferably E1-immortalized HER cells, more preferably PER.C6 cells in a reactor in suspension in a cell culture medium, wherein the cells produce a biological substance, preferably an antibody, wherein at least one cell culture medium component is fed to the cell culture and wherein the cells culture comprising the cells, the biological substance and the cell culture medium is circulated over a separation system and wherein the separation system separates the biological substance from substances having a lower molecular weight than the biological substance and wherein the biological substance is retained in or fed back into the reactor. Preferably part of the substances of lower molecular weight is continuously removed from the cell culture.Type: ApplicationFiled: February 7, 2014Publication date: June 5, 2014Applicant: DSM IP ASSETS B.V.Inventors: Gerben Meile Zijlstra, Robert Patrick Hoff, Jacob Schilder
-
Patent number: 8685731Abstract: The invention relates to a process for the coloring of cells, preferably E1-immortalized HER cells, more preferably PER.C6 cells in a reactor in suspension in a cell culture medium, wherein the cells produce a biological substance, preferably an antibody, wherein at least one cell culture medium component is fed to the cell culture and wherein the cell culture comprising the cells, the biological substance and cell culture medium is circulated over a separation system and wherein the separation system separates the biological substance from substances having a lower molecular weight than the biological substance and wherein the biological substance is retained in or fed back into the reactor. Preferably part of the substances of lower molecular weight is continuously removed from the cell culture.Type: GrantFiled: December 6, 2012Date of Patent: April 1, 2014Assignee: DSM IP Assets B.V.Inventors: Gerben Meile Zijlstra, Robert Patrick Hoff, Jacob Schilder
-
Patent number: 8549592Abstract: A method and apparatus are disclosed in a data processing system for establishing virtual endorsement credentials. The data processing system includes a hardware trusted platform module (TPM). Logical partitions are generated in the system. A different virtual TPM is generated for each one of the logical partitions. For each one of the logical partitions, the virtual TPM that was generated for the logical partition then dynamically generates a virtual endorsement key, which is stored only within a corresponding virtual TPM. Using the virtual endorsement key, each virtual TPM also generates a virtual endorsement credential for use by the logical partition that includes the virtual TPM. The virtual endorsement credential is generated within the data processing system without the data processing system or its devices accessing a trusted third party that is external to the data processing system.Type: GrantFiled: July 12, 2005Date of Patent: October 1, 2013Assignee: International Business Machines CorporationInventors: Steven A. Bade, James Patrick Hoff, Siegfried Sutter, James Peter Ward, Helmut H. Weber
-
Patent number: 8543803Abstract: An apparatus, system, and method are disclosed for suspend-resume scheduling in conjunction with an operation requiring a suspend-resume cycle of a computer 200, including updating, for purposes of system configuration management, a non-volatile memory 506, such as an electrically erasable programmable read-only memory (“EEPROM”) 702. A control module 402 sends 806 a request to update the EEPROM 702. A suspend module 404 suspends 818 an operating system 204. A standby module 406 prepares 904 the computer 200 to enter a standby state, estimates 914 a sufficient amount of time to enter the standby state, places 916 the estimate into an alarm register 608, and then enters 918 the standby state. An update module 308 exits 1004 the standby state in response to an alarm signal 612, receives the request if present 1008, writes 1012 the EEPROM 702 with the updated information, and resumes 1018 the operating system 204.Type: GrantFiled: February 20, 2009Date of Patent: September 24, 2013Assignee: Lenovo (Singapore) Pte LtdInventors: Jeffrey Mark Estroff, Mikio Hagiwara, James Patrick Hoff, Seiichi Kawano, Randall Scott Springfield
-
Patent number: 8495361Abstract: A method and system for ensuring security-compliant creation and signing of endorsement keys of manufactured TPMs. The endorsement keys are generated for the TPM. The TPM vendor selects an N-byte secret and stores the N-byte secret in the TPM along with the endorsement keys. The secret number cannot be read outside of the TPM. The secret number is also provided to the OEM's credential server. During the endorsement key (EK) credential process, the TPM generates an endorsement key, which comprises both the public key and a hash of the secret and the public key. The credential server matches the hash within the endorsement key with a second hash of the received public key (from the endorsement key) and the vendor provided secret. The EK certificate is generated and inserted into the TPM only when a match is confirmed.Type: GrantFiled: September 21, 2007Date of Patent: July 23, 2013Assignee: International Business Machines CorporationInventors: Ryan Charles Catherman, David Carroll Challener, James Patrick Hoff
-
Patent number: 8440458Abstract: The invention relates to a process for the culturing of cells, preferably E1-immortalized HER cells, more preferably PER.C6 cells in a reactor in suspension in a cell culture medium, wherein the cells produce a biological substance, preferably an antibody, wherein at least one cell culture medium component is fed to the cell culture and wherein the cell culture comprising the cells, the biological substance and cell culture medium is circulated over a separation system and wherein the separation system separates the biological substance from substances having a lower molecular weight than the biological substance and wherein the biological substance is retained in or fed back into the reactor. Preferably part of the substances of lower molecular weight is continuously removed from the cell culture.Type: GrantFiled: February 15, 2012Date of Patent: May 14, 2013Assignee: DSM IP Assets B.V.Inventors: Gerben Meile Zijlstra, Robert Patrick Hoff, Jacob Schilder
-
Patent number: 8222001Abstract: The invention relates to a process for the culturing of cells, preferably E1-immortalized HER cells, more preferably PER.C6 cells in a reactor in suspension in a cell culture medium, wherein the cells produce a biological substance, preferably an antibody, wherein at least one cell culture medium component is fed to the cell culture and wherein the cell culture comprising the cells, the biological substance and cell culture medium is circulated over a separation system and wherein the separation system separates the biological substance from substances having a lower molecular weight than the biological substance and wherein the biological substance is retained in or fed back into the reactor. Preferably part of the substances of lower molecular weight is continuously removed from the cell culture.Type: GrantFiled: February 13, 2012Date of Patent: July 17, 2012Assignee: DSM IP Assets B.V.Inventors: Gerben Meile Zijlstra, Robert Patrick Hoff, Jacob Schilder
-
Patent number: 8086852Abstract: A method is presented for implementing a trusted computing environment within a data processing system. A hypervisor is initialized within the data processing system, and the hypervisor supervises a plurality of logical, partitionable, runtime environments within the data processing system. The hypervisor reserves a logical partition for a hypervisor-based trusted platform module (TPM) and presents the hypervisor-based trusted platform module to other logical partitions as a virtual device via a device interface. Each time that the hypervisor creates a logical partition within the data processing system, the hypervisor also instantiates a logical TPM within the reserved partition such that the logical TPM is anchored to the hypervisor-based TPM. The hypervisor manages multiple logical TPM's within the reserved partition such that each logical TPM is uniquely associated with a logical partition.Type: GrantFiled: September 9, 2008Date of Patent: December 27, 2011Assignee: International Business Machines CorporationInventors: Steven A. Bade, Ryan Charles Catherman, James Patrick Hoff, Nia Letise Kelley, Emily Jane Ratliff
-
Patent number: 7861079Abstract: A method and system for ensuring security-compliant creation and signing of endorsement keys of manufactured TPMs. The endorsement keys are generated for the TPM. The TPM vendor selects an N-byte secret and stores the N-byte secret in the TPM along with the endorsement keys. The secret number cannot be read outside of the TPM. The secret number is also provided to the OEM's credential server. During the endorsement key (EK) credential process, the TPM generates an endorsement key, which comprises both the public key and a hash of the secret and the public key. The credential server matches the hash within the endorsement key with a second hash of the received public key (from the endorsement key) and the vendor provided secret. The EK certificate is generated and inserted into the TPM only when a match is confirmed.Type: GrantFiled: September 21, 2007Date of Patent: December 28, 2010Assignee: International Business Machines CorporationInventors: Ryan Charles Catherman, David Carroll Challener, James Patrick Hoff
-
Publication number: 20100217968Abstract: An apparatus, system, and method are disclosed for suspend-resume scheduling in conjunction with an operation requiring a suspend-resume cycle of a computer 200, including updating, for purposes of system configuration management, a non-volatile memory 506, such as an electrically erasable programmable read-only memory (“EEPROM”) 702. A control module 402 sends 806 a request to update the EEPROM 702. A suspend module 404 suspends 818 an operating system 204. A standby module 406 prepares 904 the computer 200 to enter a standby state, estimates 914 a sufficient amount of time to enter the standby state, places 916 the estimate into an alarm register 608, and then enters 918 the standby state. An update module 308 exits 1004 the standby state in response to an alarm signal 612, receives the request if present 1008, writes 1012 the EEPROM 702 with the updated information, and resumes 1018 the operating system 204.Type: ApplicationFiled: February 20, 2009Publication date: August 26, 2010Applicant: LENOVO (SINGAPORE) PTE, LTD.Inventors: Jeffrey Mark Estroff, Mikio Hagiwara, James Patrick Hoff, Seiichi Kawano, Randall Scott Springfield
-
Patent number: 7752458Abstract: An architecture for a distributed data processing system comprises a system-level service processor along with one or more node-level service processors; each are uniquely associated with a node, and each is extended to comprise any components that are necessary for operating the nodes as trusted platforms, such as a TPM and a CRTM in accordance with the security model of the Trusted Computing Group. These node-level service processors then inter-operate with the system-level service processor, which also contains any components that are necessary for operating the system as a whole as a trusted platform. A TPM within the system-level service processor aggregates integrity metrics that are gathered by the node-level service processors, thereafter reporting integrity metrics as requested, e.g., to a hypervisor, thereby allowing a large distributed data processing system to be validated as a trusted computing environment while allowing its highly parallelized initialization process to proceed.Type: GrantFiled: October 24, 2008Date of Patent: July 6, 2010Assignee: International Business Machines CorporationInventors: Steven A. Bade, Ryan Charles Catherman, James Patrick Hoff, William Lee Terrell
-
Patent number: 7751568Abstract: A method and system for ensuring security-compliant creation and certificate generation for endorsement keys of manufactured TPMs. The endorsement keys are generated by the TPM manufacturer and stored within the TPM. The TPM manufacturer also creates a signing key pair and associated signing key certificate. The signing key pair is also stored within the TPM, while the certificate is provided to the OEM's credential server. During the endorsement key (EK) credential process, the TPM generates a signed endorsement key, which comprises the public endorsement key signed with the public signing key. The credential server matches the public signing key of the endorsement key with a public signing key within the received certificate. The EK certificate is generated and inserted into the TPM only when a match is confirmed.Type: GrantFiled: December 31, 2003Date of Patent: July 6, 2010Assignee: International Business Machines CorporationInventors: Ryan Charles Catherman, David Carroll Challener, James Patrick Hoff
-
Patent number: 7743406Abstract: A system and method for securing data on a wireless device. A secured zone is defined by a boundary sensor. A data processing system is coupled to the boundary sensor and a wireless device. If the data processing system detects that the signal strength of the wireless device has fallen below a first predetermined value for longer than a second predetermined value, the data processing system deletes a digital certificate corresponding to the wireless device from memory. Thus, when the wireless device is reintroduced into the secured zone, in response to determining that a digital certificate corresponding to the wireless device is not stored in memory, the disabling module disables the wireless device from operation within the secured zone.Type: GrantFiled: December 21, 2004Date of Patent: June 22, 2010Assignee: International Business Machines CorporationInventors: Scott Sina Abedi, Roger Kenneth Abrams, Ryan Charles Catherman, James Patrick Hoff, James Stephen Rutledge