Patents by Inventor Thilo Schmitt
Thilo Schmitt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11296368Abstract: The invention relates to a rechargeable battery (1) comprising at least one storage module (3) for electrical energy and at least one cooling device (2) for cooling or controlling the temperature of the at least one storage module (3), wherein the cooling device (2) has at least one coolant channel (6), at least one coolant inlet (8) and at least one coolant outlet (9) and wherein the cooling device (2) has a single-layer or multi-layer film (4) and lying with this film (4) against the at least one storage module (3).Type: GrantFiled: June 8, 2018Date of Patent: April 5, 2022Assignee: Miba eMobility GmbHInventors: Stefan Astecker, Stefan Gaigg, Falk Nickel, Thilo Schmitt
-
Publication number: 20200153056Abstract: The invention relates to a rechargeable battery (1) comprising at least one storage module (3) for electrical energy and at least one cooling device (2) for cooling or controlling the temperature of the at least one storage module (3), wherein the cooling device (2) has at least one coolant channel (6), at least one coolant inlet (8) and at least one coolant outlet (9) and wherein the cooling device (2) has a single-layer or multi-layer film (4) and lying with this film (4) against the at least one storage module (3).Type: ApplicationFiled: June 8, 2018Publication date: May 14, 2020Applicant: Miba eMobility GmbHInventors: Stefan ASTECKER, Stefan GAIGG, Falk NICKEL, Thilo SCHMITT
-
Patent number: 10331452Abstract: In accordance with embodiments disclosed herein, there is provided systems and methods for tracking the mode of processing devices in an instruction tracing system. The method may include receiving an indication of a change in a current execution mode of the processing device. The method may also include determining that the current execution mode of the received indication is different than a value of an execution mode of a first execution mode (EM) packet previously-generated by the IT module. The method may also include generating, based on the determining that the current execution mode is different, a second EM packet that provides a value of the current execution mode of the processing device to indicate the change in the execution mode for an instruction in a trace generated by the IT module. The method may further include generating transactional memory (TMX) packets having n bit mode pattern in the packet log. The n is at least two and the n bit mode indicates transaction status of the TMX operation.Type: GrantFiled: June 27, 2013Date of Patent: June 25, 2019Assignee: Intel CorporationInventors: Thilo Schmitt, Peter Lachner, Beeman Strong, Ofer Levy, Thomas Toll, Matthew Merten, Tong Li, Ravi Rajwar, Konrad Lai
-
Publication number: 20190050566Abstract: Technologies for control flow exploit mitigation include a computing device having a processor with real-time instruction tracing support. During execution of a process, the processor generates trace data indicative of control flow of the process. The computing device analyzes the trace data to identify suspected control flow exploits. The computing device may use heuristic algorithms to identify return-oriented programming exploits. The computing device may maintain a shadow stack based on the trace data. The computing device may identify indirect branches to unauthorized addresses based on the trace data to identify jump-oriented programming exploits. The computing device may check the trace data whenever the process is preempted. The processor may detect mispredicted return instructions in real time and invoke a software handler in the process space of the process to verify and maintain the shadow stack. Other embodiments are described and claimed.Type: ApplicationFiled: April 30, 2018Publication date: February 14, 2019Inventors: Michael LeMay, Ravi L. Sahita, Beeman C. Strong, Thilo Schmitt, Yuriy Bulygin, Markus T. Metzger
-
Patent number: 10007784Abstract: Technologies for control flow exploit mitigation include a computing device having a processor with real-time instruction tracing support. During execution of a process, the processor generates trace data indicative of control flow of the process. The computing device analyzes the trace data to identify suspected control flow exploits. The computing device may use heuristic algorithms to identify return-oriented programming exploits. The computing device may maintain a shadow stack based on the trace data. The computing device may identify indirect branches to unauthorized addresses based on the trace data to identify jump-oriented programming exploits. The computing device may check the trace data whenever the process is preempted. The processor may detect mispredicted return instructions in real time and invoke a software handler in the process space of the process to verify and maintain the shadow stack. Other embodiments are described and claimed.Type: GrantFiled: March 27, 2015Date of Patent: June 26, 2018Assignee: Intel CorporationInventors: Michael LeMay, Ravi L. Sahita, Beeman C. Strong, Thilo Schmitt, Yuriy Bulygin, Markus T. Metzger
-
Patent number: 9753832Abstract: In accordance with embodiments disclosed herein, there is provided systems and methods for minimizing bandwidth to compress an output stream of an instruction tracing system. For example, the method may include identifying a current instruction in a trace of the IT module as a conditional branch (CB) instruction. The method includes executing one of generating a CB packet including a byte pattern with an indication of outcome of the CB instruction, or adding an indication of the outcome of the CB instruction to the byte pattern of an existing CB packet. The method includes generating a packet when a subsequent instruction in the trace is not the CB instruction. The packet is different from the CB packet. The method also includes adding the packet into a deferred queue when the packet is deferrable. The method further includes outputting the CB packet followed by the deferred packet into a packet log.Type: GrantFiled: June 28, 2013Date of Patent: September 5, 2017Assignee: Intel CorporationInventors: Ilya Wagner, Matthew C. Merten, Frank Binns, Christine E. Wang, Mayank Bomb, Tong Li, Thilo Schmitt, M D A. Rahman
-
Publication number: 20160283714Abstract: Technologies for control flow exploit mitigation include a computing device having a processor with real-time instruction tracing support. During execution of a process, the processor generates trace data indicative of control flow of the process. The computing device analyzes the trace data to identify suspected control flow exploits. The computing device may use heuristic algorithms to identify return-oriented programming exploits. The computing device may maintain a shadow stack based on the trace data. The computing device may identify indirect branches to unauthorized addresses based on the trace data to identify jump-oriented programming exploits. The computing device may check the trace data whenever the process is preempted. The processor may detect mispredicted return instructions in real time and invoke a software handler in the process space of the process to verify and maintain the shadow stack. Other embodiments are described and claimed.Type: ApplicationFiled: March 27, 2015Publication date: September 29, 2016Inventors: Michael LeMay, Ravi L. Sahita, Beeman C. Strong, Thilo Schmitt, Yuriy Bulygin, Markus T. Metzger
-
Publication number: 20150006717Abstract: In accordance with embodiments disclosed herein, there is provided systems and methods for tracking the mode of processing devices in an instruction tracing system. The method may include receiving an indication of a change in a current execution mode of the processing device. The method may also include determining that the current execution mode of the received indication is different than a value of an execution mode of a first execution mode (EM) packet previously-generated by the IT module. The method may also include generating, based on the determining that the current execution mode is different, a second EM packet that provides a value of the current execution mode of the processing device to indicate the change in the execution mode for an instruction in a trace generated by the IT module. The method may further include generating transactional memory (TMX) packets having n bit mode pattern in the packet log. The n is at least two and the n bit mode indicates transaction status of the TMX operation.Type: ApplicationFiled: June 27, 2013Publication date: January 1, 2015Inventors: Thilo Schmitt, Peter Lachner, Beeman Strong, Ofer Levy, Thomas Toll, Matthew Merten, Tong Li, Ravi Rajwar, Konrad Lai
-
Publication number: 20150006868Abstract: In accordance with embodiments disclosed herein, there is provided systems and methods for minimizing bandwidth to compress an output stream of an instruction tracing system. For example, the method may include identifying a current instruction in a trace of the IT module as a conditional branch (CB) instruction. The method includes executing one of generating a CB packet including a byte pattern with an indication of outcome of the CB instruction, or adding an indication of the outcome of the CB instruction to the byte pattern of an existing CB packet. The method includes generating a packet when a subsequent instruction in the trace is not the CB instruction. The packet is different from the CB packet. The method also includes adding the packet into a deferred queue when the packet is deferrable. The method further includes outputting the CB packet followed by the deferred packet into a packet log.Type: ApplicationFiled: June 28, 2013Publication date: January 1, 2015Inventors: Ilya Wagner, Matthew C. Merten, Frank Binns, Christine E. Wang, Mayank Bomb, Tong Li, Thilo Schmitt, MD A. Rahman
-
Patent number: 5479704Abstract: A repair process for blades of turboengines damaged in the head or edge regions in which the damaged regions are first separated to leave an undamaged blade stump with an exposed, repair surface. The repair surface of the blade stump is prepared for butt welding and a repair plate of constant thickness which exceeds the maximum profile height of the blade by more than 50% is provided with a front surface adapted to the repair surface. This front surface of the repair plate is abutted against the repair surface and the blade stump and the repair blade are then butt welded. The weld joint and the repair plate are machined to the profile contour of the blade stump and to the desired blade profile. This process is used for the repair of blades of integral rotor disks of turboengines, particularly for blades of integral compressor impellers.Type: GrantFiled: August 5, 1994Date of Patent: January 2, 1996Assignee: MTU Motoren-und Turbinen Union Munchen GmbHInventors: Karl-Hermann Richter, Reinhold Meier, Thilo Schmitt, Bernd Stimper