Patents by Inventor Patrick Winkler
Patrick Winkler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12102724Abstract: The present device provides a safe, effective means of mobile ultraviolet (UV) disinfection. A control board within the main body of the device receives data from sensors that may variously measure orientation and speed of the main body as it moves along various surfaces for disinfection. In response to such data, the control board may brighten, dim, or completely shut off UV light-emitting diodes (UVLEs), both to prevent over- and under-exposure of the materials being disinfected, and to prevent a user from unsafely using the device.Type: GrantFiled: January 23, 2023Date of Patent: October 1, 2024Assignee: Germbot, LLCInventors: Patrick Flaherty, Karen Flaherty, Conor Flaherty, Bruce Winkler, Tim Bank
-
Patent number: 10891378Abstract: Automated malware signature generation is disclosed. Automated malware signature generation includes monitoring incoming unknown files for the presence of malware and analyzing the incoming unknown files based on both a plurality of classifiers of file behavior and a plurality of classifiers of file content. An incoming file is classified as having a particular malware classification based on the analyzing of incoming unknown files and a malware signature is generated for the incoming unknown file based on the particular malware classification. Access is provided to the malware signature.Type: GrantFiled: May 29, 2018Date of Patent: January 12, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Ning Sun, Patrick Winkler, Chengyun Chu, Hong Jia, Jason Geffner, Tony Lee, Jigar Mody, Frank Swiderski
-
Patent number: 10289725Abstract: The present disclosure describes methods, systems, and computer program products for providing data warehouse model federation. One computer-implemented method includes receiving a request to transform a first semantically enriched model to a second semantically enriched model, wherein the first semantically enriched model operates in a first data warehouse and the second semantically enriched model operates in a second data warehouse; identifying a set of data associated with the first semantically enriched model, wherein the set of data is stored in the first data warehouse; providing access to the set of data associated with the first semantically enriched model from the second data warehouse; creating the second semantically enriched model based on the first semantically enriched model using an interface of the second data warehouse; and deploying the second semantically enriched model in the second data warehouse.Type: GrantFiled: November 25, 2014Date of Patent: May 14, 2019Assignee: SAP SEInventors: Patrick Winkler, Klaus Nagel, Jascha Kanngiesser
-
Publication number: 20190073476Abstract: Automated malware signature generation is disclosed. Automated malware signature generation includes monitoring incoming unknown files for the presence of malware and analyzing the incoming unknown files based on both a plurality of classifiers of file behavior and a plurality of classifiers of file content. An incoming file is classified as having a particular malware classification based on the analyzing of incoming unknown files and a malware signature is generated for the incoming unknown file based on the particular malware classification. Access is provided to the malware signature.Type: ApplicationFiled: May 29, 2018Publication date: March 7, 2019Inventors: Ning Sun, Patrick Winkler, Chengyun Chu, Hong Jia, Jason Geffner, Tony Lee, Jigar Mody, Frank Swiderski
-
Patent number: 9996693Abstract: Automated malware signature generation is disclosed. Automated malware signature generation includes monitoring incoming unknown files for the presence of malware and analyzing the incoming unknown files based on both a plurality of classifiers of file behavior and a plurality of classifiers of file content. An incoming file is classified as having a particular malware classification based on the analyzing of incoming unknown files and a malware signature is generated for the incoming unknown file based on the particular malware classification. Access is provided to the malware signature.Type: GrantFiled: June 1, 2012Date of Patent: June 12, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Ning Sun, Patrick Winkler, Chengyun Chu, Hong Jia, Jason Geffner, Tony Lee, Jigar Mody, Frank Swiderski
-
Publication number: 20160147850Abstract: The present disclosure describes methods, systems, and computer program products for providing data warehouse model federation. One computer-implemented method includes receiving a request to transform a first semantically enriched model to a second semantically enriched model, wherein the first semantically enriched model operates in a first data warehouse and the second semantically enriched model operates in a second data warehouse; identifying a set of data associated with the first semantically enriched model, wherein the set of data is stored in the first data warehouse; providing access to the set of data associated with the first semantically enriched model from the second data warehouse; creating the second semantically enriched model based on the first semantically enriched model using an interface of the second data warehouse; and deploying the second semantically enriched model in the second data warehouse.Type: ApplicationFiled: November 25, 2014Publication date: May 26, 2016Inventors: Patrick Winkler, Klaus Nagel, Jascha Kanngiesser
-
Patent number: 9098550Abstract: In one embodiment, a computer-implemented method comprises receiving a query. A data store stores data as a plurality of data sets. Each data set comprises a plurality of fields and a plurality of data elements. Each field is associated with a portion of data elements. The query identifies selected data sets and selected properties of the selected data sets. For each selected property, the data elements of the selected data sets associated with each selected property are determined. A first rating of the determined data elements of the selected data sets is determined based on a type of combination of a pair of selected data sets. For the selected data set pairs, a second rating of the pair is determined based on the first ratings for the selected properties. A model of a combination of the selected data sets is generated based on the second rating.Type: GrantFiled: May 17, 2012Date of Patent: August 4, 2015Assignee: SAP SEInventors: Patrick Winkler, Klaus Nagel, Marcus Hoepfner
-
Patent number: 8793213Abstract: A central data warehouse includes embedded data marts. These embedded data marts, referred to as workspaces, are assigned centrally manage data by reference only but rely directly on the centrally managed data and the underlying infrastructure. Workspaces still allow departments in an enterprise to perform certain actions on their own (like adding new data and building new models) without having to instantiate copies of the centrally managed data in a locally managed data mart.Type: GrantFiled: May 23, 2012Date of Patent: July 29, 2014Assignee: SAP AGInventors: Klaus Nagel, Rainer Schaefer, Silvia Bratz, Marcus Hoepfner, Patrick Winkler, Matthias Jensen, Dirk Janning
-
Patent number: 8707023Abstract: A system and method for uploading data from a customer system to a hosted system is disclosed. A stub is integrated with a firewall between the customer system and the hosted system. The stub includes an inbound layer on the customer system side of the firewall and an outbound layer on the hosted system side of the firewall, and the inbound layer includes a write-only directory. A demon is connected between the inbound layer and the outbound layer of the stub. The demon is configured to recognize newly received data in the write-only directory of the inbound layer, encrypt the newly received data to generate encrypted data, and move the encrypted data to the outbound layer for access by the hosted system.Type: GrantFiled: June 17, 2010Date of Patent: April 22, 2014Assignee: SAP AGInventors: Klaus Nagel, Achim Seubert, Oliver Rebholz, Patrick Winkler
-
Publication number: 20130318030Abstract: A central data warehouse includes embedded data marts. These embedded data marts, referred to as workspaces, are assigned centrally manage data by reference only but rely directly on the centrally managed data and the underlying infrastructure. Workspaces still allow departments in an enterprise to perform certain actions on their own (like adding new data and building new models) without having to instantiate copies of the centrally managed data in a locally managed data mart.Type: ApplicationFiled: May 23, 2012Publication date: November 28, 2013Applicant: SAP AGInventors: Klaus Nagel, Rainer Schaefer, Silvia Bratz, Marcus Hoepfner, Patrick Winkler, Matthias Jensen, Dirk Janning
-
Publication number: 20130311456Abstract: In one embodiment, a computer-implemented method comprises receiving a query. A data store stores data as a plurality of data sets. Each data set comprises a plurality of fields and a plurality of data elements. Each field is associated with a portion of data elements. The query identifies selected data sets and selected properties of the selected data sets. For each selected property, the data elements of the selected data sets associated with each selected property are determined. A first rating of the determined data elements of the selected data sets is determined based on a type of combination of a pair of selected data sets. For the selected data set pairs, a second rating of the pair is determined based on the first ratings for the selected properties. A model of a combination of the selected data sets is generated based on the second rating.Type: ApplicationFiled: May 17, 2012Publication date: November 21, 2013Applicant: SAP AGInventors: Patrick Winkler, Klaus Nagel, Marcus Hoepfner
-
Publication number: 20120260343Abstract: Automated malware signature generation is disclosed. Automated malware signature generation includes monitoring incoming unknown files for the presence of malware and analyzing the incoming unknown files based on both a plurality of classifiers of file behavior and a plurality of classifiers of file content. An incoming file is classified as having a particular malware classification based on the analyzing of incoming unknown files and a malware signature is generated for the incoming unknown file based on the particular malware classification. Access is provided to the malware signature.Type: ApplicationFiled: June 1, 2012Publication date: October 11, 2012Applicant: Microsoft CorporationInventors: Ning Sun, Patrick Winkler, Chengyun Chu, Hong Jia, Jason Geffner, Tony Lee, Jigar Mody, Frank Swiderski
-
Patent number: 8264415Abstract: An assembly (10) for installation in a subsurface ground enclosure has an electronic transmitter, an antenna and other circuitry that are encapsulated against moisture conditions. The assembly (10) comprises a circuit board (31) supporting radio frequency transmitter circuitry, the circuit board (31) having at least two orthogonal edges (31b, 31c), an antenna (14, 15) having two 90-degree bent portions extending from orthogonal edges (31b, 31c) of the circuit board (31), a housing bottom portion (11) with an internal barrier (18) separating an L-shaped antenna compartment (13) adjacent two sides of the circuit board (31) from a battery compartment (16) underneath the circuit board (31), sealing material for encapsulating the circuit board (31) and the batteries (17) in the battery compartment (16), and a cover (20) that protects the antenna compartment (13) from entry of the sealing material.Type: GrantFiled: January 16, 2009Date of Patent: September 11, 2012Assignee: Badger Meter, Inc.Inventors: Patrick Winkler, Jin Hao, Eric Metzger
-
Patent number: 8201244Abstract: Automated malware signature generation is disclosed. Automated malware signature generation includes monitoring incoming unknown files for the presence of malware and analyzing the incoming unknown files based on both a plurality of classifiers of file behavior and a plurality of classifiers of file content. An incoming file is classified as having a particular malware classification based on the analyzing of incoming unknown files and a malware signature is generated for the incoming unknown file based on the particular malware classification. Access is provided to the malware signature.Type: GrantFiled: September 19, 2006Date of Patent: June 12, 2012Assignee: Microsoft CorporationInventors: Ning Sun, Patrick Winkler, Chengyun Chu, Hong Jia, Jason Geffner, Tony Lee, Jigar Mody, Frank Swiderski
-
Publication number: 20110314272Abstract: A system and method for uploading data from a customer system to a hosted system is disclosed. A stub is integrated with a firewall between the customer system and the hosted system. The stub includes an inbound layer on the customer system side of the firewall and an outbound layer on the hosted system side of the firewall, and the inbound layer includes a write-only directory. A demon is connected between the inbound layer and the outbound layer of the stub. The demon is configured to recognize newly received data in the write-only directory of the inbound layer, encrypt the newly received data to generate encrypted data, and move the encrypted data to the outbound layer for access by the hosted system.Type: ApplicationFiled: June 17, 2010Publication date: December 22, 2011Inventors: Klaus Nagel, Achim Seubert, Oliver Rebholz, Patrick Winkler
-
Publication number: 20100182162Abstract: An assembly (10) for installation in a subsurface ground enclosure has an electronic transmitter, an antenna and other circuitry that are encapsulated against moisture conditions. The assembly (10) comprises a circuit board (31) supporting radio frequency transmitter circuitry, the circuit board (31) having at least two orthogonal edges (31b, 31c), an antenna (14, 15) having two 90-degree bent portions extending from orthogonal edges (31b, 31c) of the circuit board (31), a housing bottom portion (11) with an internal barrier (18) separating an L-shaped antenna compartment (13) adjacent two sides of the circuit board (31) from a battery compartment (16) underneath the circuit board (31), sealing material for encapsulating the circuit board (31) and the batteries (17) in the battery compartment (16), and a cover (20) that protects the antenna compartment (13) from entry of the sealing material.Type: ApplicationFiled: January 16, 2009Publication date: July 22, 2010Inventors: Patrick Winkler, Jin Hao, Eric Metzger
-
Publication number: 20080148399Abstract: Stack buffer overrun situations may be handled by a computer program that checks the memory location from where a particular function is called. As long as the return address for the function call is from a memory location of a known library that is loaded in memory, normal operation continues. If the memory location is not from a known library, the function call is suspect and execution may be terminated, since such a location may cause malicious software to be executed or abnormal program execution to happen. The memory location may also be verified by additional means, including testing whether the memory page permissions permit execution. The computer program may be a plug-in to an existing application and may also have a user-editable component. The computer program can enable a quick deployment of a temporary fix to a malicious software problem before a more permanent solution may be deployed.Type: ApplicationFiled: October 18, 2006Publication date: June 19, 2008Applicant: Microsoft CorporationInventor: Patrick Winkler
-
Publication number: 20080127336Abstract: Automated malware signature generation is disclosed. Automated malware signature generation includes monitoring incoming unknown files for the presence of malware and analyzing the incoming unknown files based on both a plurality of classifiers of file behavior and a plurality of classifiers of file content. An incoming file is classified as having a particular malware classification based on the analyzing of incoming unknown files and a malware signature is generated for the incoming unknown file based on the particular malware classification. Access is provided to the malware signature.Type: ApplicationFiled: September 19, 2006Publication date: May 29, 2008Applicant: Microsoft CorporationInventors: Ning Sun, Patrick Winkler, Chengyun Chu, Hong Jia, Jason Geffner, Tony Lee, Jigar Mody, Frank Swiderski