Patents by Inventor Richard Norman

Richard Norman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10389747
    Abstract: Example implementations relate to facilitating scanning of protecting computing resources. In example implementations, a computing device receives a scan indicator that indicates an external agent is prepared to scan a protected resource of the computing device; identifies a protected action that may be performed by the data processor, the protected action facilitating scanning the protected resource of the computing device by the external agent, the protected action comprising a change in a state of the protected resource; performs the protected action; and provides the external agent with data indicating a current state of the protected resource.
    Type: Grant
    Filed: February 27, 2015
    Date of Patent: August 20, 2019
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Richard Brown, Jonathan Griffin, Andy Norman
  • Patent number: 9995507
    Abstract: The present invention is primarily directed to cost-effective systems for using large reflective elements that track the sun on two axes to concentrate solar energy onto a receiver that can convert the sun's optical energy to a form usable for extensive displacement of combustion of fossil fuels. The structures of the tracker frame, tracking mechanism and tracker supports are co-optimized with the optical elements and the receiver for high efficiency, low cost, and ease of assembly, making moderate and large-scale implementations cost-competitive with fossil fuels for peak power, and, with suitable storage, for base-load power and dispatchable peaking power in sunny locations. Improvement to small-tracker two-axis systems and one-axis tracking systems that focus in two dimensions are also included, as are improvements in systems for space-based solar power.
    Type: Grant
    Filed: April 15, 2009
    Date of Patent: June 12, 2018
    Inventors: Richard Norman, Philippe Dauphin, Frederick de St. Croix
  • Patent number: 9942033
    Abstract: A system for performing encryption and/or decryption may include a parent cryptographic device. The parent cryptographic device may be configured to receive a first cryptographic key. The parent cryptographic device may be configured to determine one or more session keys based on the first cryptographic key and/or internally generated random data bits. The parent cryptographic device may be configured to insert the one or more session keys onto one or more child cryptographic devices that are operably connected to the parent cryptographic device. The one or more child cryptographic devices may be configured to receive the one or more session keys from the parent cryptographic device, and perform one or more of encryption or decryption of communications exchanged with another child cryptographic device of the one or more child cryptographic devices. The one or more child cryptographic devices may perform encryption/decryption after separation from the parent cryptographic device.
    Type: Grant
    Filed: October 31, 2016
    Date of Patent: April 10, 2018
    Assignee: L3 TECHNOLOGIES, INC.
    Inventors: Richard Norman Winslow, Frank A. Costantini
  • Patent number: 9760731
    Abstract: Methods for configuring and utilizing a configurable data guard (CDG) implemented on a hardware-based programmable logic device are disclosed. The CDG may include integrated circuit portions comprising a plurality of arrays of generic comparison operations and a plurality of arrays of generic action operations. The CDG may receive a data guard configuration. The CDG may perform an authentication and integrity check procedure on the received data guard configuration. The CDG may configure a plurality of guard primitives based on the data guard configuration. Each guard primitive may be configured from at least one generic comparison operation and at least one generic action operation. The guard primitives may be used to enforce the complex data guard rules that correspond to the data guard configuration.
    Type: Grant
    Filed: October 6, 2015
    Date of Patent: September 12, 2017
    Assignee: L3 TECHNOLOGIES, INC.
    Inventors: Richard Norman Winslow, Frank Anthony Costantini, Steven Daniel Devlin, Robert M. Smith
  • Publication number: 20170098094
    Abstract: Methods for configuring and utilizing a configurable data guard (CDG) implemented on a hardware-based programmable logic device are disclosed. The CDG may include integrated circuit portions comprising a plurality of arrays of generic comparison operations and a plurality of arrays of generic action operations. The CDG may receive a data guard configuration. The CDG may perform an authentication and integrity check procedure on the received data guard configuration. The CDG may configure a plurality of guard primitives based on the data guard configuration. Each guard primitive may be configured from at least one generic comparison operation and at least one generic action operation. The guard primitives may be used to enforce the complex data guard rules that correspond to the data guard configuration.
    Type: Application
    Filed: October 6, 2015
    Publication date: April 6, 2017
    Applicant: L-3 Communications Corporation
    Inventors: Richard Norman Winslow, Frank Anthony Costantini, Steven Daniel Devlin, Robert M. Smith
  • Patent number: 9596075
    Abstract: Disclosed herein are methods and systems for configuring and using one or more block ciphering techniques in order to encrypt/decrypt serial data streams while maintaining cryptographic synchronization and attempting to minimize the amount of overhead introduced into the stream. The techniques disclosed herein may be used to encrypt and decrypt serial data streams using a block cipher in a manner that can be substantially transparent to the devices involved in the serial communication session. For example, the serial user data may be left unframed by the encryption device while monitoring for opportunistic times to transmit framed cryptographic synchronization information during periods of relative inactivity in an asynchronous serial data stream. A cryptographic device implementing the techniques described herein may be configured to implement one or more of an encryption device or a decryption device.
    Type: Grant
    Filed: June 3, 2014
    Date of Patent: March 14, 2017
    Assignee: L3 Technologies, Inc.
    Inventors: Richard Norman Winslow, Todd David Heinrich, Steven Daniel Devlin, Frank Anthony Costantini
  • Publication number: 20170048214
    Abstract: A system for performing encryption and/or decryption may include a parent cryptographic device. The parent cryptographic device may be configured to receive a first cryptographic key. The parent cryptographic device may be configured to determine one or more session keys based on the first cryptographic key and/or internally generated random data bits. The parent cryptographic device may be configured to insert the one or more session keys onto one or more child cryptographic devices that are operably connected to the parent cryptographic device. The one or more child cryptographic devices may be configured to receive the one or more session keys from the parent cryptographic device, and perform one or more of encryption or decryption of communications exchanged with another child cryptographic device of the one or more child cryptographic devices. The one or more child cryptographic devices may perform encryption/decryption after separation from the parent cryptographic device.
    Type: Application
    Filed: October 31, 2016
    Publication date: February 16, 2017
    Applicant: L-3 COMMUNICATIONS CORPORATION
    Inventors: Richard Norman Winslow, Frank A. Costantini
  • Patent number: 9567080
    Abstract: A method and apparatus for determining actions for entities (4, 6) such that a goal is accomplished constraints are satisfied. The method comprises: determining an initial plan comprising actions that, if performed by the entities (4, 6), the goal would be accomplished; determining that a constraint would not be satisfied if the initial plan was implemented; and iteratively performing steps (i) to (v) until a final plan that accomplishes the goal and satisfies the is determined. Step (i) comprises identifying a constraint that is not satisfied in part of the current plan. Step (ii) comprises determining a remedy that, if implemented, satisfies the identified constraint. Step (iii) comprises updating the goal specification to include the remedy. Step (iv) comprises, using the updated goal specification, determining a further plan that accomplishes the goal and the remedy. Step (v) comprises determining whether or not the further plan satisfies each constraint.
    Type: Grant
    Filed: May 2, 2014
    Date of Patent: February 14, 2017
    Assignee: BAE SYSTEMS plc
    Inventors: John Paterson Bookless, Markus Deittert, Richard Norman Herring, Elizabeth Jane Cullen
  • Publication number: 20170024672
    Abstract: A technique for performing commercial venture analysis involves establishing an empirically-derived structure and evaluating companies using analytical techniques within that structure. The technique may involve defining jobs, or goals a customer is attempting to reach, with dozens or even hundreds of outcomes. Ideally, the structure and tools facilitate analysis that would not be possible otherwise. Moreover, the nature of the system enables real-time input for changing conditions and the ability to calculate returns for new markets in which products or services do not exist. A computer program product and business method is described for generating a market growth strategy. The computer program product in a computer-readable medium having instructions for directing a computer to focus on the core job that needs to be performed. A specific sequence is executed in several phases: market selection, target generation, business generation and portfolio generation strategies.
    Type: Application
    Filed: October 10, 2016
    Publication date: January 26, 2017
    Applicant: Strategyn Holdings, LLC
    Inventors: Anthony W. Ulwick, Lance Bettencourt, Richard Norman, Urquhart Wood, James M. Haynes, III
  • Patent number: 9515823
    Abstract: A system for performing encryption and/or decryption may include a parent cryptographic device. The parent cryptographic device may be configured to receive a first cryptographic key. The parent cryptographic device may be configured to determine one or more session keys based on the first cryptographic key and/or internally generated random data bits. The parent cryptographic device may be configured to insert the one or more session keys onto one or more child cryptographic devices that are operably connected to the parent cryptographic device. The one or more child cryptographic devices may be configured to receive the one or more session keys from the parent cryptographic device, and perform one or more of encryption or decryption of communications exchanged with another child cryptographic device of the one or more child cryptographic devices. The one or more child cryptographic devices may perform encryption/decryption after separation from the parent cryptographic device.
    Type: Grant
    Filed: August 30, 2013
    Date of Patent: December 6, 2016
    Assignee: L-3 COMMUNICATIONS CORPORATION
    Inventors: Richard Norman Winslow, Frank A. Costantini
  • Publication number: 20160156462
    Abstract: A system for performing encryption and/or decryption may include a parent cryptographic device. The parent cryptographic device may be configured to receive a first cryptographic key. The parent cryptographic device may be configured to determine one or more session keys based on the first cryptographic key and/or internally generated random data bits. The parent cryptographic device may be configured to insert the one or more session keys onto one or more child cryptographic devices that are operably connected to the parent cryptographic device. The one or more child cryptographic devices may be configured to receive the one or more session keys from the parent cryptographic device, and perform one or more of encryption or decryption of communications exchanged with another child cryptographic device of the one or more child cryptographic devices. The one or more child cryptographic devices may perform encryption/decryption after separation from the parent cryptographic device.
    Type: Application
    Filed: August 30, 2013
    Publication date: June 2, 2016
    Applicant: L-3 Communications Corporation
    Inventors: Richard Norman Winslow, Frank A. Costantini
  • Publication number: 20160149696
    Abstract: Disclosed herein are methods and systems for configuring and using one or more block ciphering techniques in order to encrypt/decrypt serial data streams while maintaining cryptographic synchronization and attempting to minimize the amount of overhead introduced into the stream. The techniques disclosed herein may be used to encrypt and decrypt serial data streams using a block cipher in a manner that can be substantially transparent to the devices involved in the serial communication session. For example, the serial user data may be left unframed by the encryption device while monitoring for opportunistic times to transmit framed cryptographic synchronization information during periods of relative inactivity in an asynchronous serial data stream. A cryptographic device implementing the techniques described herein may be configured to implement one or more of an encryption device or a decryption device.
    Type: Application
    Filed: June 3, 2014
    Publication date: May 26, 2016
    Applicant: L-3 Communications Corporation
    Inventors: Richard Norman Winslow, Todd David Heinrich, Steven Daniel Devlin, Frank Anthony Costantini
  • Publication number: 20160068268
    Abstract: A method and apparatus for determining actions for entities (4, 6) such that a goal is accomplished constraints are satisfied. The method comprises: determining an initial plan comprising actions that, if performed by the entities (4, 6), the goal would be accomplished; determining that a constraint would not be satisfied if the initial plan was implemented; and iteratively performing steps (i) to (v) until a final plan that accomplishes the goal and satisfies the is determined. Step (i) comprises identifying a constraint that is not satisfied in part of the current plan. Step (ii) comprises determining a remedy that, if implemented, satisfies the identified constraint. Step (iii) comprises updating the goal specification to include the remedy. Step (iv) comprises, using the updated goal specification, determining a further plan that accomplishes the goal and the remedy. Step (v) comprises determining whether or not the further plan satisfies each constraint.
    Type: Application
    Filed: May 2, 2014
    Publication date: March 10, 2016
    Applicant: BAE SYSTEMS PLC
    Inventors: JOHN PATERSON BOOKLESS, MARKUS DEITTERT, RICHARD NORMAN HERRING, ELIZABETH JANE CULLEN
  • Publication number: 20150067352
    Abstract: Disclosed is a cryptographic device that may automatically configure its traffic interfaces and cryptographic modes when it is inserted into an electrically keyed receptacle in a host system. Such automatic configuration may enable a single cryptographic module to support a range of input/output interfaces, such as SPI, Ethernet, RS-232 Serial, and RS-485 Serial, for example, and also to support a range of cryptographic modes, such as Cipher Block Chaining, Galois Counter Mode, or Long Cycle Mode, for Communications Security (COMSEC) and Transmission Security (TRANSEC) purposes. In addition, such automatic configuration may include parameters that affect power consumption, such as device clock rate or other power management features.
    Type: Application
    Filed: August 30, 2013
    Publication date: March 5, 2015
    Inventor: Richard Norman Winslow
  • Patent number: 8909930
    Abstract: Methods and systems for increasing the security or trust associated with an untrusted device are provided. For example, a trusted hardware component may send a request to the untrusted device. The request may indicate one or more challenges to be performed by a secure application executing on the untrusted device. The trusted hardware component may determine an expected response to the one or more challenges. The expected response may be determined at the secure hardware component based on an expected configuration of the untrusted device. The trusted hardware component may receive a response to the request from the untrusted device. The trusted hardware component may determine a security status of the untrusted device based on the expected response and the received response.
    Type: Grant
    Filed: October 31, 2012
    Date of Patent: December 9, 2014
    Assignee: L-3 Communications Corporation
    Inventors: Richard Norman Winslow, Jerry Hutchison, Robert Louis Coia, Jr.
  • Patent number: 8826384
    Abstract: A device that includes a first processor, a second processor, and an encryption module in communication with the first processor and the second processor may be used to accept conditions for access to the network. The first processor may receive condition data, and in response, may send an acceptance signal via the encryption module to the second processor. The second processor may receive the acceptance signal and, in response, may send acceptance data to a gatekeeper. The encryption module may block unencrypted data other than the acceptance signal from being communicated from the first processor to the second processor. The encryption module may support type 1 encryption.
    Type: Grant
    Filed: July 13, 2007
    Date of Patent: September 2, 2014
    Assignee: L-3 Communications Corporation
    Inventor: Richard Norman Winslow
  • Publication number: 20140226584
    Abstract: Disclosed herein is an adaptive communications network and a method of adapting the network. The network comprises, at least a first and second base station operable to communicate with one another and with a plurality of mobile client platforms (MCPs), at least a first and second MCP, each provided with a communications module, a processing module, and a means of manoeuvring. The first MCP is provided with and operable to execute: a first initial route plan and a first initial communications plan for maintaining a communication link with either of the base stations. Further, the first MCP is operable to collect and transmit first situational awareness data. Similarly, the second MCP is provided with and operable to execute: a second initial route plan and a second initial communications plan for maintaining a communication link with at least one of the base stations, and is operable to collect and transmit second situational awareness data.
    Type: Application
    Filed: August 16, 2012
    Publication date: August 14, 2014
    Applicant: BAE SYSTEMS PLC
    Inventors: Elizabeth Jane Cullen, Richard Norman Herring, David John Robert Robson
  • Patent number: 8436454
    Abstract: The present invention is directed to a system that programmably interconnects integrated circuit chips and other components at near-intra-chip density. The system's contact structure allows it to adapt to components with a wide variety of contact spacings and interconnection requirements, the use of releasable attachment means allows component placement to be modified as needed, the system identifies the contacts and the components to facilitate specifying the inter-component connections, and the system provides signal conditioning and retiming to minimize issues with signal integrity and signal skew.
    Type: Grant
    Filed: February 23, 2012
    Date of Patent: May 7, 2013
    Inventor: Richard Norman
  • Patent number: 8396798
    Abstract: According to one embodiment, the present invention relates to a method and a system for facilitating settlement processing within a network of financial institutions may include receiving one or more payment items from a plurality of payment entities, at a centralized agent; aggregating the payment items into one or more categories; identifying a payee financial institution and a payor financial institution for each payment items, wherein the payee financial institution and the payor financial institution are different; determining whether the payee financial institution and the payor financial institution are within the network of financial institutions; for the payee and payor within the network, determining at the centralized agent a settlement path within the network of financial institutions for each payment item; and for the payee and payor that are not within the network, forwarding the payment items to a third party settlement entity.
    Type: Grant
    Filed: January 20, 2012
    Date of Patent: March 12, 2013
    Assignee: JPMorgan Chase Bank, N.A.
    Inventors: Richard Norman, Tommy J. Vicknair, Carl Shishmanian, John Spence Stephens, Jr., W. Earl Jennings, David L. James
  • Patent number: 8316228
    Abstract: A device having an encryption module in communication with first and second communication ports may facilitate connecting to an access network, without requiring a non-secure hard drive to initiate the network access. The encryption module may define a normal mode and a bypass mode. In normal mode, data from the first port may be sent encrypted to the second port, for communicating securely in an encrypted environment. In bypass mode, data from the first port may be sent unencrypted to the second port. The data being sent may be intercepted and presented to the user for approval in a human readable format. The user may confirm that the data is appropriate for being sent unencrypted. This data may be sent unencrypted in response to a request for information (e.g., an assent to terms and conditions) from the access network, such as at a hotel or public wireless hotspot, for example.
    Type: Grant
    Filed: December 17, 2008
    Date of Patent: November 20, 2012
    Assignee: L-3 Communications Corporation
    Inventor: Richard Norman Winslow