Patents by Inventor Kevin Driscoll
Kevin Driscoll has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11886189Abstract: A navigation program for an autonomous vehicle, the navigation program configured to: receive an initial model of an object to be inspected by the autonomous vehicle; identify an inspection target associated with the initial model of the object; and determine an inspection location for the autonomous vehicle from which inspection target is inspectable by an inspection system of the autonomous vehicle, wherein the initial model includes one or more convex shapes representing the object.Type: GrantFiled: September 10, 2019Date of Patent: January 30, 2024Assignee: PERCEPTUAL ROBOTICS LIMITEDInventors: Konstantinos Karachalios, Dimitrios Nikolaidis, Kevin Driscoll-Lind, Colin Greatwood, Andrew Calway, Oliver Moolan-Feroze
-
Patent number: 11827351Abstract: A navigation program for an autonomous vehicle, the navigation program configured to: receive an initial model of an object to be inspected by the autonomous vehicle; identify an inspection target associated with the initial model of the object; and determine an inspection location for the autonomous vehicle from which inspection target is inspectable by an inspection system of the autonomous vehicle, wherein the initial model includes one or more convex shapes representing the object.Type: GrantFiled: September 6, 2019Date of Patent: November 28, 2023Assignee: PERCEPTUAL ROBOTICS LIMITEDInventors: Konstantinos Karachalios, Dimitrios Nikolaidis, Kevin Driscoll-Lind, Colin Greatwood
-
Publication number: 20220050461Abstract: A navigation program for an autonomous vehicle, the navigation program configured to: receive an initial model of an object to be inspected by the autonomous vehicle; identify an inspection target associated with the initial model of the object; and determine an inspection location for the autonomous vehicle from which inspection target is inspectable by an inspection system of the autonomous vehicle, wherein the initial model includes one or more convex shapes representing the object.Type: ApplicationFiled: September 10, 2019Publication date: February 17, 2022Inventors: Konstantinos KARACHALIOS, Dimitrios NIKOLAIDIS, Kevin DRISCOLL-LIND, Colin GREATWOOD, Andrew CALWAY, Oliver MOOLAN-FEROZE
-
Publication number: 20220050460Abstract: A navigation program for an autonomous vehicle, the navigation program configured to: receive an initial model of an object to be inspected by the autonomous vehicle; identify an inspection target associated with the initial model of the object; and determine an inspection location for the autonomous vehicle from which inspection target is inspectable by an inspection system of the autonomous vehicle, wherein the initial model includes one or more convex shapes representing the object.Type: ApplicationFiled: September 6, 2019Publication date: February 17, 2022Inventors: Konstantinos KARACHALIOS, Dimitrios NIKOLAIDIS, Kevin DRISCOLL-LIND, Colin GREATWOOD
-
Patent number: 7907628Abstract: A multi-channel TDMA network having priority based is provided. A network includes a plurality of channels, and a plurality of nodes adapted to transmit and received data. Through each channel, every node is coupled to communicate data with every other node. Within each channel, each node is assigned a unique priority rank. Only the node with the highest priority rank is permitted to transmit data during a time slot. For each channel of the multi-channel network, the plurality of nodes are ranked in a different priority direction.Type: GrantFiled: November 19, 2004Date of Patent: March 15, 2011Assignee: Honeywell International Inc.Inventors: Brendan Hall, Kevin Driscoll, Philip J. Zumsteg
-
Patent number: 7668204Abstract: A method for authenticating a message in a time division multiple access network is provided. The method includes receiving a message from an active relaying component, inspecting a value in the message inserted by the active relaying component, and comparing the value with an expected value based on a transmission schedule.Type: GrantFiled: November 19, 2004Date of Patent: February 23, 2010Assignee: Honeywell International Inc.Inventors: Brendan Hall, Michael Paulitsch, Kevin Driscoll
-
Patent number: 7606179Abstract: In one embodiment, a node comprises an interface to communicatively couple the node to a channel. The channel communicatively couples the node to a first neighbor node and a first neighbor's neighbor node in a first direction. When the node relays relayed data along the channel, the node compares data received from the first neighbor node with data received from the first neighbor's neighbor node. The relayed data comprises: at least one of: the data received from the first neighbor node and the data received from the first neighbor's neighbor node; and information indicative of the results of the comparison.Type: GrantFiled: November 19, 2004Date of Patent: October 20, 2009Assignee: Honeywell International, Inc.Inventors: Brendan Hall, Kevin Driscoll, Michael Paulitsch
-
Publication number: 20070248232Abstract: A system for sharing secure keying information with a new device not of a secure wireless network. The keying information may be used for encryption and provided to the new device in a manner which is not susceptible to exposure outside of the secure network. The keying information shared with the new device may be regarded as a birth key. Upon appropriate provision of the birth key, the new device may request with a birth key encrypted message via a communication mode exposed to potential adversaries to be added to the secure network.Type: ApplicationFiled: April 10, 2006Publication date: October 25, 2007Applicant: HONEYWELL INTERNATIONAL INC.Inventors: Kevin Driscoll, Patrick Gonia, Joseph Kimball, Thomas Phinney
-
Patent number: 7246186Abstract: In one embodiment, a node comprises a first network interface and a second network interface. The node further comprises a first bus guardian that asserts a first bus guardian signal when the second network interface is allowed to transmit and a second bus guardian that asserts a second bus guardian signal when the first network interface is allowed to transmit. The first network interface is not allowed to transmit unless the second bus guardian asserts the second bus guardian signal. The second network interface is not allowed to transmit unless the first bus guardian asserts the first bus guardian signal.Type: GrantFiled: November 19, 2004Date of Patent: July 17, 2007Assignee: Honeywell International Inc.Inventors: Brendan Hall, Kevin Driscoll, Kelly Dean Morrell
-
Publication number: 20060170445Abstract: A Byzantine filter tester including a feedback loop, a pseudo random waveform generator and an output tester. The feedback loop is coupled between an output of a device under test and an input of the device under test. The feedback loop is further adapted to have an odd number of inversions that create oscillations. Moreover, the feedback loop includes an integrator with a very large time constant to filter the oscillations to determine an input threshold of the device under test. The pseudo random waveform generator is adapted to couple waveforms to the input of the device under test that are adapted to cover test points in a logic grid defined in part by the determined input threshold of the device under test. Finally, the output tester is adapted to observe a plurality of redundant outputs of the device under test to verify the proof coverage of the device under test.Type: ApplicationFiled: January 27, 2006Publication date: August 3, 2006Applicant: Honeywell International Inc.Inventor: Kevin Driscoll
-
Publication number: 20060156019Abstract: System and methods for initializing secure communications with lightweight devices are described herein. In one embodiment, the method includes enabling a device manager to securely communicate with a lightweight device, the method comprising receiving encrypted data from the device manager, wherein the device manager received the encrypted data from the lightweight device. In the embodiment, the method also includes decrypting the encrypted data to produce access information, wherein the access information enables the device manager to securely communicate with the lightweight device. In the embodiment, the method also includes securely transmitting the access information to the device manager.Type: ApplicationFiled: December 30, 2004Publication date: July 13, 2006Inventor: Kevin Driscoll
-
Publication number: 20050278457Abstract: Method and systems of transmission schedule enforcement in a hub-based network is provided. Method includes receiving guardian messages from one or more of a plurality of nodes, implementing a voting function, voting the received guardian messages using the voting function, and when a clear winner of the received guardian messages is detected, enabling a port indicated by the clear winner to propagate. The guardian messages are received outside of TDMA communications. The guardian messages contain information pertaining to the next slot or slots to transmit.Type: ApplicationFiled: November 19, 2004Publication date: December 15, 2005Applicants: HONEYWELL INTERNATIONAL INC., TTTECH COMPUTERTECHNIK AGInventors: Brendan Hall, Kevin Driscoll, Matthias Wachter, Harald Angelow
-
Publication number: 20050198280Abstract: In one embodiment, a node comprises an interface to communicatively couple the node to a channel. The channel communicatively couples the node to a first neighbor node in a first direction and to a second neighbor node in a second direction. When the first neighbor node is scheduled to transmit and the node receives data from the first neighbor node via the channel, the node determines if the transmission of the data complies with a policy. When the transmission of the data does not comply with the policy, the node does at least one of: blocks the data from being relayed along the channel and relays the data along the channel with information indicating that the transmission of the data does not comply with the policy.Type: ApplicationFiled: November 19, 2004Publication date: September 8, 2005Applicant: HONEYWELL INTERNATIONAL INC.Inventors: Brendan Hall, Kevin Driscoll
-
Publication number: 20050172167Abstract: A method for verifying operation of a first component in a single fault tolerant system is provided. The method includes monitoring for an expected action of the system that indirectly identifies the operating condition of the first component to a second component of the system, when the monitored expected action indicates a faulty operating condition, isolating the first component's errant behavior, and when the monitored expected action indicates a proper operating condition, proceeding with normal operation of the system.Type: ApplicationFiled: November 19, 2004Publication date: August 4, 2005Applicant: HONEYWELL INTERNATIONAL INC.Inventors: Kevin Driscoll, Brendan Hall, Philip Zumsteg
-
Publication number: 20050152379Abstract: In one embodiment, one or more self checking pairs are implemented at the application layer in a network that supports the qualified propagation of data at the transport layer (for example, in a network having a braided ring topology).Type: ApplicationFiled: December 10, 2004Publication date: July 14, 2005Applicant: HONEYWELL INTERNATIONAL INC.Inventors: Brendan Hall, Kevin Driscoll, Michael Paulitsch
-
Publication number: 20050152377Abstract: In one embodiment, a method resolves cliques formed in a network comprising a plurality of nodes that are communicatively coupled to one another over at least a first channel. The method comprises, at each node, wherein that node is a member of a current clique: listening asynchronously for data on the first channel from a first neighbor's neighbor node of that node. The method further comprises, at that node, when a first valid frame is received on the first channel from the first neighbor's neighbor node of that node, listening asynchronously for a second valid frame on the first channel from a first neighbor node of that node.Type: ApplicationFiled: November 19, 2004Publication date: July 14, 2005Applicant: HONEYWELL INTERNATIONAL INC.Inventors: Brendan Hall, Kevin Driscoll
-
Publication number: 20050149812Abstract: A method of verifying the accuracy of blocks of data. In one embodiment, a method of verifying the accuracy of data in a message that includes a checking mechanism with hidden data is provided. The method comprises observing two or more initial messages. Comparing the residual error of each of the observed initial messages. If the residual errors of at least two of the initial messages match each other, storing the matched residual error. For subsequent messages, comparing residual errors of the subsequent messages with the stored matched residual error.Type: ApplicationFiled: November 19, 2004Publication date: July 7, 2005Applicant: HONEYWELL INTERNATIONAL INC.Inventors: Brendan Hall, Kevin Driscoll
-
Publication number: 20050149789Abstract: A verification of fault coverage tool for testing digital logic electronic components. In one embodiment, a method of testing a device under test (DUT) having an input and a plurality of redundant outputs is provided. The method comprises defining a logic test grid of test sample points that generally define an indeterminate logic range over a period of time. Generating a plurality of pseudo random test waveforms that are designed to pass though each test sample point and every sequential combination of test sample points. Coupling the plurality of pseudo random test waveforms to the input of the DUT. Reading the plurality of redundant outputs of the DUT for each of the plurality of pseudo random test waveforms coupled to the input of the DUT and determining the proof of coverage of the DUT in the indeterminate logic range based on the observing of the plurality of redundant outputs of the DUT.Type: ApplicationFiled: November 19, 2004Publication date: July 7, 2005Applicant: Honeywell International, Inc.Inventor: Kevin Driscoll
-
Publication number: 20050149737Abstract: One embodiment includes a method that includes receiving an ephemeral value from a challenging device. The method also includes retrieving data whose content is presumed known to the challenging device. The method includes generating a digital signature of the data based on the ephemeral value. Additionally, the method includes transmitting the digital signature to the challenging device.Type: ApplicationFiled: December 31, 2003Publication date: July 7, 2005Inventor: Kevin Driscoll
-
Publication number: 20050141524Abstract: A method for controlling start-up of a network is provided. The method includes receiving a message from one node of a plurality of nodes at a hub while the network is in an unsynchronized state, relaying the message to the other nodes of the plurality of nodes of the network independent of the content of the message, and blocking all messages from the one node of the plurality of nodes until a relaying condition is met.Type: ApplicationFiled: November 19, 2004Publication date: June 30, 2005Applicant: HONEYWELL INTERNATIONAL INC.Inventors: Brendan Hall, Kevin Driscoll