Patents by Inventor Michael Driscoll

Michael Driscoll has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180240169
    Abstract: There are provided systems and methods for utilizing a vehicle to determine an identity of a user. A user may establish a vehicle as associated with the user, such as a vehicle owned by the user or used by the user. The vehicle may include a vehicle device that may be configured to establish connections with other devices using short range and network communications. In various embodiments, the other devices may be devices at merchant locations. Thus, a merchant at the merchant location may be informed about settings, preferences, and/or parameters for use of the vehicle established by the user. The merchant may receive these parameters even if another user is utilizing the vehicle, thus, establishing rules for use of the vehicle by the other user. In other embodiments, the other devices may be devices in other vehicles, allowing the users to communicate and set waypoints during trips.
    Type: Application
    Filed: February 12, 2018
    Publication date: August 23, 2018
    Inventors: Dennis Michael Driscoll, Michael Charles Todasco
  • Publication number: 20180007061
    Abstract: A method for applying policies to an email message includes receiving, by an inbound policy module in a protected network, message metadata of an email message. The method also includes determining, based on the message metadata, whether receiving the email message in the protected network is prohibited by at least one metadata policy. The method further includes blocking the email message from being forwarded to the protected network if receiving the email message in the protected network is prohibited by the metadata policy. In specific embodiments, the method includes requesting scan results data for the email message if receiving the email message in the protected network is not prohibited by one or more metadata policies. In further embodiments, the method includes receiving the scan results data and requesting the email message if receiving the email message in the protected network is not prohibited by one or more scan policies.
    Type: Application
    Filed: June 12, 2017
    Publication date: January 4, 2018
    Applicant: McAfee, Inc.
    Inventors: Nicholas Liebmann, Peter Neal, Michael G. Bishop, Justin Cragin, Michael Driscoll
  • Publication number: 20170291614
    Abstract: There are provided systems and methods for vehicle use and performance restrictions based on detected users. A user may check-in to a vehicle so that the vehicle identifies the user, such as through providing identification to the vehicle using biometrics, logins, or other information. Using the identification, the vehicle may determine parameters and restrictions on use of the vehicle by the user. Parameters may include information about the user, such as age, health, or other statistic stored with the identification for the user, and may be utilized to determine restrictions on use of the vehicle by the user, such as a speed of the vehicle and passengers allowed in the vehicle. Restrictions may also be set for the user, including speeds of travel, routes of travel, and usage of media players in the vehicle. The usage of the vehicle may be monitored and enforced using the restrictions.
    Type: Application
    Filed: March 6, 2017
    Publication date: October 12, 2017
    Inventors: Michael Charles Todasco, Dennis Michael Driscoll, Jeremy Leigh Cattone, Amit Reuven Menipaz
  • Patent number: 9705889
    Abstract: A method for applying policies to an email message includes receiving, by an inbound policy module in a protected network, message metadata of an email message. The method also includes determining, based on the message metadata, whether receiving the email message in the protected network is prohibited by at least one metadata policy. The method further includes blocking the email message from being forwarded to the protected network if receiving the email message in the protected network is prohibited by the metadata policy. In specific embodiments, the method includes requesting scan results data for the email message if receiving the email message in the protected network is not prohibited by one or more metadata policies. In further embodiments, the method includes receiving the scan results data and requesting the email message if receiving the email message in the protected network is not prohibited by one or more scan policies.
    Type: Grant
    Filed: May 20, 2015
    Date of Patent: July 11, 2017
    Assignee: McAfee, Inc.
    Inventors: Nicholas Liebmann, Peter Neal, Michael G. Bishop, Justin Cragin, Michael Driscoll
  • Patent number: 9586596
    Abstract: There are provided systems and methods for vehicle use and performance restrictions based on detected users. A user may check-in to a vehicle so that the vehicle identifies the user, such as through providing identification to the vehicle using biometrics, logins, or other information. Using the identification, the vehicle may determine parameters and restrictions on use of the vehicle by the user. Parameters may include information about the user, such as age, health, or other statistic stored with the identification for the user, and may be utilized to determine restrictions on use of the vehicle by the user, such as a speed of the vehicle and passengers allowed in the vehicle. Restrictions may also be set for the user, including speeds of travel, routes of travel, and usage of media players in the vehicle. The usage of the vehicle may be monitored and enforced using the restrictions.
    Type: Grant
    Filed: December 30, 2014
    Date of Patent: March 7, 2017
    Assignee: PAYPAL, INC.
    Inventors: Michael Charles Todasco, Dennis Michael Driscoll, Jeremy Leigh Cattone, Amit Reuven Menipaz
  • Publication number: 20160189304
    Abstract: There are provided systems and methods for detection of users and vehicle usage for variable insurance terms. A user may utilize a vehicle and require an insurance policy for usage of the vehicle. The user may have an existing insurance policy or may require a new insurance policy. Once the user is detected as utilizing the vehicle, usage factors of the vehicle by the user may be communicated to a variable insurance server. Usage factors may include a location of use of the vehicle, speed of travel, a driver history for the user, or other information. The server may determine a new insurance policy for the user or may determine an adjustment to the user's existing insurance policy. Such insurance policy changes may be based on the user, the vehicle, and the user's usage of the vehicle. The user may accept the server's proposal to initiate the change.
    Type: Application
    Filed: December 30, 2014
    Publication date: June 30, 2016
    Inventors: Michael Charles Todasco, Dennis Michael Driscoll, Jeremy Leigh Cattone, Amit Reuven Menipaz
  • Publication number: 20160185358
    Abstract: There are provided systems and methods for vehicle use and performance restrictions based on detected users. A user may check-in to a vehicle so that the vehicle identifies the user, such as through providing identification to the vehicle using biometrics, logins, or other information. Using the identification, the vehicle may determine parameters and restrictions on use of the vehicle by the user. Parameters may include information about the user, such as age, health, or other statistic stored with the identification for the user, and may be utilized to determine restrictions on use of the vehicle by the user, such as a speed of the vehicle and passengers allowed in the vehicle. Restrictions may also be set for the user, including speeds of travel, routes of travel, and usage of media players in the vehicle. The usage of the vehicle may be monitored and enforced using the restrictions.
    Type: Application
    Filed: December 30, 2014
    Publication date: June 30, 2016
    Inventors: Michael Charles Todasco, Dennis Michael Driscoll, Jeremy Leigh Cattone, Amit Reuven Menipaz
  • Publication number: 20160042351
    Abstract: There are provided systems and methods for merchant item and service return processing using wireless beacons. A merchant may include a returns and customer service area at a merchant location for use in providing refunds, exchanges, or other services related to items sold by the merchant. The merchant location may include a wireless beacon at or nearby the area. The beacon may provide communication services with a device for the user. Using the beacon, the merchant may be informed that a user has arrived at the area and pull up a receipt and/or transaction history for the user with the merchant. The merchant may also be informed about past returns by the user that may assist the merchant in preventing fraud. Moreover, the merchant may also view similar items to the item purchased by the user for use in exchanges, which may include item delivery and/or availability information.
    Type: Application
    Filed: August 6, 2014
    Publication date: February 11, 2016
    Inventors: Mobeen Syed, Dennis Michael Driscoll
  • Publication number: 20160035001
    Abstract: Systems and methods for providing information to aid users make fuel purchasing decisions and facilitating fuel purchases at fuel providers. A user checks-in to a vehicle with a user account. The user is provided with recommended fuel provider locations based on information such as vehicle information, user account information, traffic information, user information, traffic information, fuel provider information, etc. User checks-in to a fuel provider location based on a connection to a device at the fuel provider location. A payment provider may receive a fuel purchase request authorizing a payment from the user account and processes the payment.
    Type: Application
    Filed: August 1, 2014
    Publication date: February 4, 2016
    Inventors: Dennis Michael Driscoll, Michael Charles Todasco
  • Publication number: 20150304339
    Abstract: A method for applying policies to an email message includes receiving, by an inbound policy module in a protected network, message metadata of an email message. The method also includes determining, based on the message metadata, whether receiving the email message in the protected network is prohibited by at least one metadata policy. The method further includes blocking the email message from being forwarded to the protected network if receiving the email message in the protected network is prohibited by the metadata policy. In specific embodiments, the method includes requesting scan results data for the email message if receiving the email message in the protected network is not prohibited by one or more metadata policies. In further embodiments, the method includes receiving the scan results data and requesting the email message if receiving the email message in the protected network is not prohibited by one or more scan policies.
    Type: Application
    Filed: May 20, 2015
    Publication date: October 22, 2015
    Applicant: McAfee, Inc.
    Inventors: Nicholas Liebmann, Peter Neal, Michael G. Bishop, Justin Cragin, Michael Driscoll
  • Publication number: 20150178339
    Abstract: Displaying a visual representation of table, including generating a visual representation of a table including a plurality of dimensions, displaying the visual representation of the table, where a first dimension value corresponding to one of the plurality of dimensions is collapsed when the table is initially generated, and a second dimension value corresponding to one of the plurality of dimensions is expanded such that sub-dimension values for the first dimension value are not visible, and sub-dimension values for the second dimension value are visible, detecting that a user has placed a first dimension value manipulator corresponding to said first dimension value into an expand mode, and in response to detecting the first dimension value manipulator is in an expand mode, expanding the first dimension value in the displayed visual representation of the table such that the sub-dimension values for the first dimension value are visible.
    Type: Application
    Filed: December 19, 2014
    Publication date: June 25, 2015
    Inventors: Vadim Ogievetsky, Michael Driscoll, Young Min Kin, Elizabeth Allen, Katherine Chu, Ofir Oss, Adam Smith, Luca Candela
  • Patent number: 9049235
    Abstract: A method for applying policies to an email message includes receiving, by an inbound policy module in a protected network, message metadata of an email message. The method also includes determining, based on the message metadata, whether receiving the email message in the protected network is prohibited by at least one metadata policy. The method further includes blocking the email message from being forwarded to the protected network if receiving the email message in the protected network is prohibited by the metadata policy. In specific embodiments, the method includes requesting scan results data for the email message if receiving the email message in the protected network is not prohibited by one or more metadata policies. In further embodiments, the method includes receiving the scan results data and requesting the email message if receiving the email message in the protected network is not prohibited by one or more scan policies.
    Type: Grant
    Filed: November 21, 2012
    Date of Patent: June 2, 2015
    Assignee: McAfee, Inc.
    Inventors: Nicholas Liebmann, Peter Neal, Michael G. Bishop, Justin Cragin, Michael Driscoll
  • Publication number: 20140020047
    Abstract: A method for applying policies to an email message includes receiving, by an inbound policy module in a protected network, message metadata of an email message. The method also includes determining, based on the message metadata, whether receiving the email message in the protected network is prohibited by at least one metadata policy. The method further includes blocking the email message from being forwarded to the protected network if receiving the email message in the protected network is prohibited by the metadata policy. In specific embodiments, the method includes requesting scan results data for the email message if receiving the email message in the protected network is not prohibited by one or more metadata policies. In further embodiments, the method includes receiving the scan results data and requesting the email message if receiving the email message in the protected network is not prohibited by one or more scan policies.
    Type: Application
    Filed: November 21, 2012
    Publication date: January 16, 2014
    Inventors: Nicholas Liebmann, Peter Neal, Michael G. Bishop, Justin Cragin, Michael Driscoll
  • Publication number: 20080168778
    Abstract: A cryopump includes a refrigerator with at least first and second stages. A radiation shield surrounds the second stage and is in thermal contact with the first stage. The radiation shield includes a drain hole to permit cryogenic fluid to traverse through the drain hole during regeneration. The cryopump also includes a primary pumping surface supporting adsorbent in thermal contact with the second stage. The second stage array assembly includes a primary condensing surface, protected surfaces having adsorbent, and non-primary condensing surfaces. A baffle is disposed over the drain hole. The baffle redirects gas from an annular space disposed between the radiation shield and the vacuum vessel that attempts to traverse through the drain hole to prevent the gas from condensing on a non-primary condensing surface. The baffle directs gas to condense on the primary condensing surface.
    Type: Application
    Filed: January 15, 2008
    Publication date: July 17, 2008
    Applicant: Brooks Automation, Inc.
    Inventors: Allen J. Bartlett, Michael A. Driscoll, Michael J. Eacobacci, William L. Johnson, Robert P. Sullivan, Sergei Syssoev, Mark A. Stira, John J. Casello
  • Publication number: 20070069090
    Abstract: A hardware fixture for doors, cabinets, drawers or other fixtures, has an interchangeable decorative or informational attachment. The hardware fixture includes a knob or pull body receiving the attachment, which can be shaped as a disc. The surface of the body may be recessed or surrounded by a rim that protects an edge of the decorative member against inadvertent dislodgment. The body includes a magnet or ferrous portion and the interchangeable decorative attachment similarly includes a magnet or ferrous portion that is attracted to the body. The magnetic surfaces abut only part way across the central portion of the knob body. The decorative attachment can be dislodged when desired by tipping it. Downward pressure on the decorative member over a gap with the knob lifts the opposite edge of the decorative attachment such that it can be grasped.
    Type: Application
    Filed: September 26, 2005
    Publication date: March 29, 2007
    Inventor: Michael Driscoll
  • Publication number: 20050245105
    Abstract: The invention relates to an electrical connector that can be used to electrically connect a daughtercard to a backplane.
    Type: Application
    Filed: June 14, 2005
    Publication date: November 3, 2005
    Applicant: Litton Systems, Inc.
    Inventors: Michael Driscoll, Stephen Vetter, Robert Bradley, Lee Wolfel, Robert Beadle
  • Publication number: 20050085103
    Abstract: The present invention is directed to a high density electrical connector which can provide 80 or more twinax connections per linear inch in a 20 millimeter card slot. In a typical electronic system package, 20 millimeters is the spacing from center line to center line of the adjacent parallel daughtercards. Twinax cable is coaxial cable that contains two .inner conducting wires rather than one. The two inner conducting wires provide two physical channels. Coaxial cable is called “coaxial” because it includes one physical channel that carries the signal surrounded (after a layer of insulation) by another concentric physical channel, both running along the same axis. The outer channel serves as ground.
    Type: Application
    Filed: October 25, 2004
    Publication date: April 21, 2005
    Applicant: Litton Systems, Inc.
    Inventors: Michael Driscoll, Stephen Vetter, Robert Bradley
  • Patent number: 6226714
    Abstract: A method of invalidating cache lines on an SCI sharing list by forwarding an invalidate request from node to node of a multiprocessor computer, such as a distributed shared memory (DSM) or non-uniform memory access (NUMA) machine. From the node at the head of the list, an invalidate request is sent to a succeeding node on the list. In response to receiving the invalidate request, the succeeding node checks the state of its cache line to determine whether it is the tail of the list and also invalidates the cache line. If the succeeding node is not the tail of the list, it forwards the invalidate request to the next succeeding node on the list. This next succeeding and other succeeding nodes then repeat the steps of invalidating the cache line and forwarding the invalidate request until the node that is the tail of the list is reached. The tail node responds by sending an invalidate response to the node at the head of the sharing list.
    Type: Grant
    Filed: July 9, 1998
    Date of Patent: May 1, 2001
    Assignee: International Business Machines Corporation
    Inventors: Robert J. Safranek, Michael A. Driscoll
  • Patent number: 4517085
    Abstract: An interconnector 22 for filtration modules 18 which have axially extending tubes 90. The interconnector 22 is a rigid tubular member having conical tapered portion 88 at opposite ends to join fluid tight connections with the filtration modules.
    Type: Grant
    Filed: September 15, 1983
    Date of Patent: May 14, 1985
    Assignee: Millipore Corporation
    Inventors: Michael A. Driscoll, James H. Edwards