Patents by Inventor Peter Otto

Peter Otto has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240066156
    Abstract: The disclosed method of treating a malignant solid tumor in a subject includes the steps of administering to the subject an immunomodulatory dose of a radioactive phospholipid metal chelate compound that is differentially retained within malignant solid tumor tissue, and performing in situ tumor vaccination in the subject by introducing into at least one of the malignant solid tumors one or more agents capable of stimulating specific immune cells within the tumor microenvironment, or by performing another method of in situ tumor vaccination. In a non-limiting example, the radioactive phospholipid metal chelate compound has the formula: wherein R1 comprises a chelating agent that is chelated to a metal atom, wherein the metal atom is an alpha, beta or Auger emitting metal isotope with a half life of greater than 6 hours and less than 30 days. In one such embodiment, a is 1, n is 18, m is 0, b is 1, and R2 is —N+(CH3)3.
    Type: Application
    Filed: June 30, 2023
    Publication date: February 29, 2024
    Inventors: Jamey Weichert, Paul Sondel, Anatoly Pinchuk, Zachary Morris, Mario Otto, Bryan Bednarz, Peter Carlson
  • Patent number: 11787702
    Abstract: The present invention relates to a material of the formula SnTiO3 having a crystal structure comprised of layers, wherein the layers comprise Sn(II) ions, Ti(IV) ions and edge-sharing O6-octahedra, the edge-sharing O6-octahedra form a sub-layer, the Ti(IV) ions are located within ? of the edge-sharing O6-octahedra, thus forming edge-sharing TiO6-octahedra, the edge-sharing TiO6-octahedra form a honeycomb structure within the sub-layer, the honeycomb structure comprising hexagons with Ti(IV)-vacancies within the hexagons, the Sn(II) ions are located above and below the Ti(IV)-vacancies with respect to the sub-layer, the Ti(IV) ions are optionally substituted with M, M is one or more elements selected from Group 4 and Group 14 elements, and the crystal structure satisfies at least one of the following features (i) and (ii): (i) the Sn(II) ions have a tetrahedral coordination sphere involving three O ions of the layer and the electron lone pair of the Sn(II) ions which is situated at an apical position relative
    Type: Grant
    Filed: May 2, 2019
    Date of Patent: October 17, 2023
    Assignee: MAX-PLANCK-GESELLSCHAFT ZUR FÖRDERUNG DER WISSENSCHAFTEN E.V.
    Inventors: Leo Peter Otto Diehl, Bettina Valeska Lotsch, Florian Pielnhofer
  • Patent number: 11496433
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to estimate demographics of users employing social media. An example method disclosed herein includes (1) identifying a social media message regarding an asset, the social media message associated with a user identifier associated with the user, (2) determining demographics associated with a group of people exposed to the asset, (3) associating the user identifier with the asset, and (4) repeating (1) to (3). The example method also includes (5) combining demographics associated with two or more different groups of people with which the user identifier is associated to estimate a demographic profile for the user.
    Type: Grant
    Filed: June 24, 2019
    Date of Patent: November 8, 2022
    Assignee: THE NIELSEN COMPANY (US), LLC
    Inventors: Michael Richard Sheppard, Matthew B. Reid, Alejandro Terrazas, Peter Otto Robert Lipa, Brian George Schiller
  • Publication number: 20210379967
    Abstract: A heat exchanger device provides refrigeration in refrigerated vehicles operated by liquefied natural gas (LNG) which must first be regasified. The great temperature difference between heat-discharging cooling chamber air and heat-absorbing LNG evaporating at up to ?161° C. conducts the heat flow via an introduced intermediate medium circulating in a closed circuit to avert the risk of combustible natural gas leaking. The intermediate medium is non-combustible, environmentally-benign liquid heat exchange media having low viscosity. The liquid heat exchange media operating temperature is kept above ?85° C. using an additional thermal resistance in the heat exchanger which evaporates the LNG, so that the heat flow flows with sufficient temperature drop. A thin protective dry gas layer formed using sheathing tubes enclosing a tubular heat exchanger's tubes coaxially serves as this thermal resistance. Possibly escaping natural gas is determined by monitoring pressure in the layer, and the LNG supply interrupted.
    Type: Application
    Filed: December 5, 2018
    Publication date: December 9, 2021
    Applicant: REGASCOLD GmbH
    Inventors: Rainer BRAUN, Peter OTTO, Lothar BIHL
  • Publication number: 20210230012
    Abstract: The present invention relates to a material of the formula SnTiO3 having a crystal structure comprised of layers, wherein the layers comprise Sn(II) ions, Ti(IV) ions and edge-sharing O6-octahedra, the edge-sharing O6-octahedra form a sub-layer, the Ti(IV) ions are located within ? of the edge-sharing O6-octahedra, thus forming edge-sharing TiO6-octahedra, the edge-sharing TiO6-octahedra form a honeycomb structure within the sub-layer, the honeycomb structure comprising hexagons with Ti(IV)-vacancies within the hexagons, the Sn(II) ions are located above and below the Ti(IV)-vacancies with respect to the sub-layer, the Ti(IV) ions are optionally substituted with M, M is one or more elements selected from Group 4 and Group 14 elements, and the crystal structure satisfies at least one of the following features (i) and (ii): (i) the Sn(II) ions have a tetrahedral coordination sphere involving three O ions of the layer and the electron lone pair of the Sn(II) ions which is situated at an apical position relative
    Type: Application
    Filed: May 2, 2019
    Publication date: July 29, 2021
    Inventors: Leo Peter Otto DIEHL, Bettina Valeska LOTSCH, Florian PIELNHOFER
  • Publication number: 20190379629
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to estimate demographics of users employing social media. An example method disclosed herein includes (1) identifying a social media message regarding an asset, the social media message associated with a user identifier associated with the user, (2) determining demographics associated with a group of people exposed to the asset, (3) associating the user identifier with the asset, and (4) repeating (1) to (3). The example method also includes (5) combining demographics associated with two or more different groups of people with which the user identifier is associated to estimate a demographic profile for the user.
    Type: Application
    Filed: June 24, 2019
    Publication date: December 12, 2019
    Inventors: Michael Richard Sheppard, Matthew B. Reid, Alejandro Terrazas, Peter Otto Robert Lipa, Brian George Schiller
  • Patent number: 10333882
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to estimate demographics of users employing social media. An example method disclosed herein includes (1) identifying a social media message regarding an asset, the social media message associated with a user identifier associated with the user, (2) determining demographics associated with a group of people exposed to the asset, (3) associating the user identifier with the asset, and (4) repeating (1) to (3). The example method also includes (5) combining demographics associated with two or more different groups of people with which the user identifier is associated to estimate a demographic profile for the user.
    Type: Grant
    Filed: December 27, 2013
    Date of Patent: June 25, 2019
    Assignee: The Nielsen Company (US), LLC
    Inventors: Michael Richard Sheppard, Matthew B. Reid, Alejandro Terrazas, Peter Otto Robert Lipa, Brian George Schiller
  • Patent number: 9998446
    Abstract: Systems for managing user-level security in a cloud-based service platform. A server in a cloud-based environment is configured to interface with storage devices that store objects that are accessible over a network by two or more users. An enterprise entity is identified using an enterprise identifier associated with the enterprise, and an application service is associated with an application identifier. An application service request comprising a user identifier and the application identifier is received, and authentication is determined based on the combination of the user identifier and a pre-authenticated application identifier. Once the application service request is authenticated, then specific aspects of the service request are authorized. The integrity of the application identifier is confirmed by locating a secure association of the given application identifier to a pre-shared enterprise identifier.
    Type: Grant
    Filed: August 27, 2015
    Date of Patent: June 12, 2018
    Assignee: Box, Inc.
    Inventors: Drew Barrett Branden, Daniel Theurer, Aniket Shivajirao Patil, Lev Kantorovskiy, Sean Andrew Rose, Rachel Kay Lambert, Timothy Martin Heilig, Peter Otto Rexer, Rory Arend Paap, Charles Boyd Burnette, Vikram Sudhir Sardesai, Dominic Anton Grillo, Wayne Cheng, Lyall Yatsun Chun, Steve Hackney
  • Patent number: 9989277
    Abstract: The invention relates to a heating device, in particular for mobile use, comprising a combustion chamber for reacting fuel with combustion air in order to release heat, a heat exchanger for transferring at least part of the released heat to a heating medium to be heated, a fuel conveying device for supplying fuel to the combustion chamber, a combustion air fan for supplying combustion air to the combustion chamber, a heating medium fan for supplying the heating medium to the heat exchanger, a common drive for the combustion air fan and the heating medium fan, at least one sensor for monitoring the mass flow of the heating medium, and a controller, which controls the fuel conveying device and the common drive. The controller is designed to change the ratio of the amount of the heating medium and the amount of the fuel supplied to the combustion chamber according to the mass flow of the heating medium.
    Type: Grant
    Filed: November 10, 2010
    Date of Patent: June 5, 2018
    Assignee: WEBASTO SE
    Inventors: Peter Otto, Christian Bäcker, Michael Pöhner
  • Patent number: 9942265
    Abstract: Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by providing a mechanism by which characterization of “legitimate” behavior is defined for accessor classes, preferably along with actions to be taken in the event an accessor exceeds those limits. A set of accessor “usage profiles” are generated. Typically, a profile comprises information, such as a “request time window,” one or more “constraints,” and one or more “actions.” A request time window defines a time period over which request usage is accumulated and over which constraints are applied. A constraint may be of various types (e.g., number of transactions, defined resource usage limits, etc.) to be applied for the usage monitoring An action defines how the system will respond if a particular constraint is triggered. By applying the constraints to accessor requests, over-utilization of compute resources is enabled.
    Type: Grant
    Filed: January 6, 2014
    Date of Patent: April 10, 2018
    Assignee: International Business Machines Corporation
    Inventors: Russell L. Holden, John Douglas Curtis, Peter Otto Mierswa
  • Patent number: 9942266
    Abstract: Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by providing a mechanism by which characterization of “legitimate” behavior is defined for accessor classes, preferably along with actions to be taken in the event an accessor exceeds those limits. A set of accessor “usage profiles” are generated. Typically, a profile comprises information, such as a “request time window,” one or more “constraints,” and one or more “actions.” A request time window defines a time period over which request usage is accumulated and over which constraints are applied. A constraint may be of various types (e.g., number of transactions, defined resource usage limits, etc.) to be applied for the usage monitoring An action defines how the system will respond if a particular constraint is triggered. By applying the constraints to accessor requests, over-utilization of compute resources is enabled.
    Type: Grant
    Filed: August 18, 2015
    Date of Patent: April 10, 2018
    Assignee: International Business Machines Corporation
    Inventors: Russell L. Holden, John Douglas Curtis, Peter Otto Mierswa
  • Publication number: 20170078325
    Abstract: Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by providing a mechanism by which characterization of “legitimate” behavior is defined for tenant applications or application classes, preferably along with actions to be taken in the event a request to execute an application is anticipated to exceed defined workflow limits. A set of application profiles are generated. Typically, a profile comprises information, such as a request defined by one or more request variables, one or more “constraints,” one or more “request mappings,” and one or more “actions.” A constraint is a maximum permitted workload for the application. A request mapping maps a request variable to the constraint, either directly or indirectly. The profile information defines how a request is mapped to a workload to determine whether the request is in policy or, if not, what action to take.
    Type: Application
    Filed: November 22, 2016
    Publication date: March 16, 2017
    Inventors: Mark McGloin, John Douglas Curtis, Peter Otto Mierswa, Russell L. Holden, Olgierd Stanislaw Pieczul
  • Patent number: 9578440
    Abstract: A signal processing method and system are provided for delivering spatialized sound using highly optimized inverse filters to deliver narrow localized beams of sound from the included speaker array. The inventive method can be used to provide private listening areas in a public space and provide spatialization of source material for individual users to create a virtual 3D audio effect. In a binaural mode, a speaker array provides two targeted beams aimed towards the primary user's ears—one discrete beam for the left ear and one discrete beam for the right ear.
    Type: Grant
    Filed: November 15, 2011
    Date of Patent: February 21, 2017
    Assignees: The Regents of the University of California, University of Southampton
    Inventors: Peter Otto, Suketu Kamdar, Toshiro Yamada, Filippo M. Fazi
  • Patent number: 9506787
    Abstract: The invention relates to a device for measuring the differential pressure in a flowing fluid. The invention has a housing having two coaxial openings and an inner space. The inner space can be accessed by at least one of the openings. A measuring nozzle is arranged in the housing and has a flow channel with a cross-sectional constriction, and a differential pressure sensor comprising two measuring inlets for sensing a difference between pressures at the measuring inlets. A first one of the measuring inlets is in connection with the flow channel. A second one of the measuring inlets is in connection outside of the measuring nozzle with the inner space, and with a shut-off body. The shut-off body includes the measuring nozzle and is rotatably mounted in the housing about a rotation axis. The shut-off body, in a first rotational angle position, connects the flow channel to the two openings, and in a second rotational angle position blocks a flow between the two openings.
    Type: Grant
    Filed: June 3, 2013
    Date of Patent: November 29, 2016
    Assignee: POSTBERG + CO. DRUCKLUFT-CONTROLLING GMBH
    Inventors: Hans-Jürgen Postberg, Peter Otto
  • Patent number: 9503471
    Abstract: Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by providing a mechanism by which characterization of “legitimate” behavior is defined for tenant applications or application classes, preferably along with actions to be taken in the event a request to execute an application is anticipated to exceed defined workflow limits. A set of application profiles are generated. Typically, a profile comprises information, such as a request defined by one or more request variables, one or more “constraints,” one or more “request mappings,” and one or more “actions.” A constraint is a maximum permitted workload for the application. A request mapping maps a request variable to the constraint, either directly or indirectly. The profile information defines how a request is mapped to a workload to determine whether the request is in policy or, if not, what action to take.
    Type: Grant
    Filed: August 25, 2015
    Date of Patent: November 22, 2016
    Assignee: International Business Machines Corporation
    Inventors: Mark McGloin, John Douglas Curtis, Peter Otto Mierswa, Russell L. Holden, Olgierd Stanislaw Pieczul
  • Patent number: 9444838
    Abstract: Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by providing a mechanism by which characterization of “legitimate” behavior is defined for tenant applications or application classes, preferably along with actions to be taken in the event a request to execute an application is anticipated to exceed defined workflow limits. A set of application profiles are generated. Typically, a profile comprises information, such as a request defined by one or more request variables, one or more “constraints,” one or more “request mappings,” and one or more “actions.” A constraint is a maximum permitted workload for the application. A request mapping maps a request variable to the constraint, either directly or indirectly. The profile information defines how a request is mapped to a workload to determine whether the request is in policy or, if not, what action to take.
    Type: Grant
    Filed: July 21, 2014
    Date of Patent: September 13, 2016
    Assignee: International Business Machines Corporation
    Inventors: Mark McGloin, John Douglas Curtis, Peter Otto Mierswa, Russell L. Holden, Olgierd S. Pieczul
  • Patent number: 9439910
    Abstract: The invention relates to iron(III) complex compounds and pharmaceutical compositions comprising them for the use as medicaments, in particular for the treatment and/or prophylaxis of iron deficiency symptoms and iron deficiency anemias.
    Type: Grant
    Filed: April 4, 2013
    Date of Patent: September 13, 2016
    Assignee: VIFOR (INTERNATIONAL) AG
    Inventors: Thomas Bark, Wilm Buhr, Susanna Burckhardt, Michael Burgert, Camillo Canclini, Franz Dürrenberger, Felix Funk, Peter Otto Geisser, Aris Kalogerakis, Simona Mayer, Erik Philipp, Stefan Reim, Diana Sieber, Jörg Schmitt, Katrin Schwarz
  • Patent number: 9422247
    Abstract: The invention relates to iron(III) complex compounds and pharmaceutical compositions comprising them for the use as medicaments, in particular for the treatment and/or prophylaxis of iron deficiency symptoms and iron deficiency anemias.
    Type: Grant
    Filed: March 28, 2012
    Date of Patent: August 23, 2016
    Assignee: Vifor (International) AG
    Inventors: Thomas Bark, Wilm Buhr, Susanna Burckhardt, Michael Burgert, Camillo Canclini, Franz Dürrenberger, Felix Funk, Peter Otto Geisser, Aris Kalogerakis, Simona Mayer, Erik Philipp, Stefan Reim, Diana Sieber, Jörg Schmitt, Katrin Schwarz
  • Publication number: 20160065555
    Abstract: Systems for managing user-level security in a cloud-based service platform. A server in a cloud-based environment is configured to interface with storage devices that store objects that are accessible over a network by two or more users. An enterprise entity is identified using an enterprise identifier associated with the enterprise, and an application service is associated with an application identifier. An application service request comprising a user identifier and the application identifier is received, and authentication is determined based on the combination of the user identifier and a pre-authenticated application identifier. Once the application service request is authenticated, then specific aspects of the service request are authorized. The integrity of the application identifier is confirmed by locating a secure association of the given application identifier to a pre-shared enterprise identifier.
    Type: Application
    Filed: August 27, 2015
    Publication date: March 3, 2016
    Applicant: BOX, INC.
    Inventors: Drew Barrett Branden, Daniel Theurer, Aniket Shivajirao Patil, Lev Kantorovskiy, Sean Andrew Rose, Rachel Kay Lambert, TimothyTimothy Martin Heilig, Peter Otto Rexer, Rory Arend Paap, Charles Boyd Burnette, Vikram Sudhir Sardesai, Dominic Anton Grillo, Wayne Cheng, Lyall Yatsun Chun, Steven Brett Hackney
  • Publication number: 20160021138
    Abstract: Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by providing a mechanism by which characterization of “legitimate” behavior is defined for tenant applications or application classes, preferably along with actions to be taken in the event a request to execute an application is anticipated to exceed defined workflow limits. A set of application profiles are generated. Typically, a profile comprises information, such as a request defined by one or more request variables, one or more “constraints,” one or more “request mappings,” and one or more “actions.” A constraint is a maximum permitted workload for the application. A request mapping maps a request variable to the constraint, either directly or indirectly. The profile information defines how a request is mapped to a workload to determine whether the request is in policy or, if not, what action to take.
    Type: Application
    Filed: August 25, 2015
    Publication date: January 21, 2016
    Inventors: Mark McGloin, John Douglas Curtis, Peter Otto Mierswa, Russell L. Holden, Olgierd Stanislaw Pieczul