Patents by Inventor Richard Norman

Richard Norman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240155855
    Abstract: A sensing and/or beacon device comprising: a flexible substrate; a flexible organic photovoltaic (OPV) module comprising a plurality of organic photovoltaic cells disposed on the flexible substrate; a top electrode and a bottom electrode incorporated into the flexible OPV module, wherein the top electrode and the bottom electrode are at least partially exposed; a first encapsulation covering the flexible substrate and the flexible OPV modules, a flexible hybrid electronics (FHE) device disposed on a side of the first encapsulation, wherein the FHE device comprises flexible electronics and die components, the flexible electronics comprising conductive traces, and wherein the FHE device completes an electrical contact with the fop electrode and the bottom electrode; a second encapsulation covering the flexible substrate, the flexible OPV module, the first encapsulation, and the FHE device; and an adhesive disposed on the second encapsulation.
    Type: Application
    Filed: October 19, 2020
    Publication date: May 9, 2024
    Inventors: Richard FIELD,III, Steven WOLGAST, Olga GRIFFITH, Adam BARITO, J. Norman ALLEN
  • Patent number: 11208048
    Abstract: A shelf system that may be used with a vehicle is described. The shelf system may have a shelf member that selectively pivots between a raised position and a lowered position. The shelf system may have a frame system as well as a sub-frame system to support it within the vehicle.
    Type: Grant
    Filed: July 1, 2020
    Date of Patent: December 28, 2021
    Assignee: Adrian Steel Company
    Inventors: Elizabeth Herriman, Mark Anthoney Henry, Jr., Richard Norman Beauleaux, Jr., Timothy Alan Mouch, Thomas Michael Willis, William Wood, III, Mark Alan Mohr
  • Publication number: 20210021230
    Abstract: The present invention is primarily directed to reducing the cost of photovoltaic systems in general, and high-concentration photovoltaic systems in particular, through reducing the cost of concentrating light to the high-concentration needed to make ultra-efficient cells affordable, reducing the cost of interconnecting and cooling the photovoltaic cells, and increasing the optical and electrical efficiency of the photovoltaic system as a whole.
    Type: Application
    Filed: March 18, 2019
    Publication date: January 21, 2021
    Inventor: Richard NORMAN
  • Publication number: 20210009041
    Abstract: A shelf system that may be used with a vehicle is described. The shelf system may have a shelf member that selectively pivots between a raised position and a lowered position. The shelf system may have a frame system as well as a sub-frame system to support it within the vehicle.
    Type: Application
    Filed: July 1, 2020
    Publication date: January 14, 2021
    Inventors: Elizabeth Herriman, Mark Anthoney Henry, JR., Richard Norman Beauleaux, JR., Timothy Alan Mouch, Thomas Michael Willis, William Wood, III, Mark Alan Mohr
  • Publication number: 20200070088
    Abstract: The disclosure provides a method of treating flue gas that has one or more components. The method comprises passing a solution through both a magnetic field and an electric field to form an activated solution. The method also comprises contacting the activated solution with the flue gas so that the one or more components of the flue gas are at least partially absorbed by the activated solution to form a residue solution.
    Type: Application
    Filed: March 2, 2018
    Publication date: March 5, 2020
    Inventors: Paul Steding, Richard Norman McDaniell
  • Patent number: 9995507
    Abstract: The present invention is primarily directed to cost-effective systems for using large reflective elements that track the sun on two axes to concentrate solar energy onto a receiver that can convert the sun's optical energy to a form usable for extensive displacement of combustion of fossil fuels. The structures of the tracker frame, tracking mechanism and tracker supports are co-optimized with the optical elements and the receiver for high efficiency, low cost, and ease of assembly, making moderate and large-scale implementations cost-competitive with fossil fuels for peak power, and, with suitable storage, for base-load power and dispatchable peaking power in sunny locations. Improvement to small-tracker two-axis systems and one-axis tracking systems that focus in two dimensions are also included, as are improvements in systems for space-based solar power.
    Type: Grant
    Filed: April 15, 2009
    Date of Patent: June 12, 2018
    Inventors: Richard Norman, Philippe Dauphin, Frederick de St. Croix
  • Patent number: 9942033
    Abstract: A system for performing encryption and/or decryption may include a parent cryptographic device. The parent cryptographic device may be configured to receive a first cryptographic key. The parent cryptographic device may be configured to determine one or more session keys based on the first cryptographic key and/or internally generated random data bits. The parent cryptographic device may be configured to insert the one or more session keys onto one or more child cryptographic devices that are operably connected to the parent cryptographic device. The one or more child cryptographic devices may be configured to receive the one or more session keys from the parent cryptographic device, and perform one or more of encryption or decryption of communications exchanged with another child cryptographic device of the one or more child cryptographic devices. The one or more child cryptographic devices may perform encryption/decryption after separation from the parent cryptographic device.
    Type: Grant
    Filed: October 31, 2016
    Date of Patent: April 10, 2018
    Assignee: L3 TECHNOLOGIES, INC.
    Inventors: Richard Norman Winslow, Frank A. Costantini
  • Patent number: 9760731
    Abstract: Methods for configuring and utilizing a configurable data guard (CDG) implemented on a hardware-based programmable logic device are disclosed. The CDG may include integrated circuit portions comprising a plurality of arrays of generic comparison operations and a plurality of arrays of generic action operations. The CDG may receive a data guard configuration. The CDG may perform an authentication and integrity check procedure on the received data guard configuration. The CDG may configure a plurality of guard primitives based on the data guard configuration. Each guard primitive may be configured from at least one generic comparison operation and at least one generic action operation. The guard primitives may be used to enforce the complex data guard rules that correspond to the data guard configuration.
    Type: Grant
    Filed: October 6, 2015
    Date of Patent: September 12, 2017
    Assignee: L3 TECHNOLOGIES, INC.
    Inventors: Richard Norman Winslow, Frank Anthony Costantini, Steven Daniel Devlin, Robert M. Smith
  • Publication number: 20170098094
    Abstract: Methods for configuring and utilizing a configurable data guard (CDG) implemented on a hardware-based programmable logic device are disclosed. The CDG may include integrated circuit portions comprising a plurality of arrays of generic comparison operations and a plurality of arrays of generic action operations. The CDG may receive a data guard configuration. The CDG may perform an authentication and integrity check procedure on the received data guard configuration. The CDG may configure a plurality of guard primitives based on the data guard configuration. Each guard primitive may be configured from at least one generic comparison operation and at least one generic action operation. The guard primitives may be used to enforce the complex data guard rules that correspond to the data guard configuration.
    Type: Application
    Filed: October 6, 2015
    Publication date: April 6, 2017
    Applicant: L-3 Communications Corporation
    Inventors: Richard Norman Winslow, Frank Anthony Costantini, Steven Daniel Devlin, Robert M. Smith
  • Patent number: 9596075
    Abstract: Disclosed herein are methods and systems for configuring and using one or more block ciphering techniques in order to encrypt/decrypt serial data streams while maintaining cryptographic synchronization and attempting to minimize the amount of overhead introduced into the stream. The techniques disclosed herein may be used to encrypt and decrypt serial data streams using a block cipher in a manner that can be substantially transparent to the devices involved in the serial communication session. For example, the serial user data may be left unframed by the encryption device while monitoring for opportunistic times to transmit framed cryptographic synchronization information during periods of relative inactivity in an asynchronous serial data stream. A cryptographic device implementing the techniques described herein may be configured to implement one or more of an encryption device or a decryption device.
    Type: Grant
    Filed: June 3, 2014
    Date of Patent: March 14, 2017
    Assignee: L3 Technologies, Inc.
    Inventors: Richard Norman Winslow, Todd David Heinrich, Steven Daniel Devlin, Frank Anthony Costantini
  • Publication number: 20170048214
    Abstract: A system for performing encryption and/or decryption may include a parent cryptographic device. The parent cryptographic device may be configured to receive a first cryptographic key. The parent cryptographic device may be configured to determine one or more session keys based on the first cryptographic key and/or internally generated random data bits. The parent cryptographic device may be configured to insert the one or more session keys onto one or more child cryptographic devices that are operably connected to the parent cryptographic device. The one or more child cryptographic devices may be configured to receive the one or more session keys from the parent cryptographic device, and perform one or more of encryption or decryption of communications exchanged with another child cryptographic device of the one or more child cryptographic devices. The one or more child cryptographic devices may perform encryption/decryption after separation from the parent cryptographic device.
    Type: Application
    Filed: October 31, 2016
    Publication date: February 16, 2017
    Applicant: L-3 COMMUNICATIONS CORPORATION
    Inventors: Richard Norman Winslow, Frank A. Costantini
  • Patent number: 9567080
    Abstract: A method and apparatus for determining actions for entities (4, 6) such that a goal is accomplished constraints are satisfied. The method comprises: determining an initial plan comprising actions that, if performed by the entities (4, 6), the goal would be accomplished; determining that a constraint would not be satisfied if the initial plan was implemented; and iteratively performing steps (i) to (v) until a final plan that accomplishes the goal and satisfies the is determined. Step (i) comprises identifying a constraint that is not satisfied in part of the current plan. Step (ii) comprises determining a remedy that, if implemented, satisfies the identified constraint. Step (iii) comprises updating the goal specification to include the remedy. Step (iv) comprises, using the updated goal specification, determining a further plan that accomplishes the goal and the remedy. Step (v) comprises determining whether or not the further plan satisfies each constraint.
    Type: Grant
    Filed: May 2, 2014
    Date of Patent: February 14, 2017
    Assignee: BAE SYSTEMS plc
    Inventors: John Paterson Bookless, Markus Deittert, Richard Norman Herring, Elizabeth Jane Cullen
  • Publication number: 20170024672
    Abstract: A technique for performing commercial venture analysis involves establishing an empirically-derived structure and evaluating companies using analytical techniques within that structure. The technique may involve defining jobs, or goals a customer is attempting to reach, with dozens or even hundreds of outcomes. Ideally, the structure and tools facilitate analysis that would not be possible otherwise. Moreover, the nature of the system enables real-time input for changing conditions and the ability to calculate returns for new markets in which products or services do not exist. A computer program product and business method is described for generating a market growth strategy. The computer program product in a computer-readable medium having instructions for directing a computer to focus on the core job that needs to be performed. A specific sequence is executed in several phases: market selection, target generation, business generation and portfolio generation strategies.
    Type: Application
    Filed: October 10, 2016
    Publication date: January 26, 2017
    Applicant: Strategyn Holdings, LLC
    Inventors: Anthony W. Ulwick, Lance Bettencourt, Richard Norman, Urquhart Wood, James M. Haynes, III
  • Patent number: 9515823
    Abstract: A system for performing encryption and/or decryption may include a parent cryptographic device. The parent cryptographic device may be configured to receive a first cryptographic key. The parent cryptographic device may be configured to determine one or more session keys based on the first cryptographic key and/or internally generated random data bits. The parent cryptographic device may be configured to insert the one or more session keys onto one or more child cryptographic devices that are operably connected to the parent cryptographic device. The one or more child cryptographic devices may be configured to receive the one or more session keys from the parent cryptographic device, and perform one or more of encryption or decryption of communications exchanged with another child cryptographic device of the one or more child cryptographic devices. The one or more child cryptographic devices may perform encryption/decryption after separation from the parent cryptographic device.
    Type: Grant
    Filed: August 30, 2013
    Date of Patent: December 6, 2016
    Assignee: L-3 COMMUNICATIONS CORPORATION
    Inventors: Richard Norman Winslow, Frank A. Costantini
  • Publication number: 20160156462
    Abstract: A system for performing encryption and/or decryption may include a parent cryptographic device. The parent cryptographic device may be configured to receive a first cryptographic key. The parent cryptographic device may be configured to determine one or more session keys based on the first cryptographic key and/or internally generated random data bits. The parent cryptographic device may be configured to insert the one or more session keys onto one or more child cryptographic devices that are operably connected to the parent cryptographic device. The one or more child cryptographic devices may be configured to receive the one or more session keys from the parent cryptographic device, and perform one or more of encryption or decryption of communications exchanged with another child cryptographic device of the one or more child cryptographic devices. The one or more child cryptographic devices may perform encryption/decryption after separation from the parent cryptographic device.
    Type: Application
    Filed: August 30, 2013
    Publication date: June 2, 2016
    Applicant: L-3 Communications Corporation
    Inventors: Richard Norman Winslow, Frank A. Costantini
  • Publication number: 20160149696
    Abstract: Disclosed herein are methods and systems for configuring and using one or more block ciphering techniques in order to encrypt/decrypt serial data streams while maintaining cryptographic synchronization and attempting to minimize the amount of overhead introduced into the stream. The techniques disclosed herein may be used to encrypt and decrypt serial data streams using a block cipher in a manner that can be substantially transparent to the devices involved in the serial communication session. For example, the serial user data may be left unframed by the encryption device while monitoring for opportunistic times to transmit framed cryptographic synchronization information during periods of relative inactivity in an asynchronous serial data stream. A cryptographic device implementing the techniques described herein may be configured to implement one or more of an encryption device or a decryption device.
    Type: Application
    Filed: June 3, 2014
    Publication date: May 26, 2016
    Applicant: L-3 Communications Corporation
    Inventors: Richard Norman Winslow, Todd David Heinrich, Steven Daniel Devlin, Frank Anthony Costantini
  • Publication number: 20160068268
    Abstract: A method and apparatus for determining actions for entities (4, 6) such that a goal is accomplished constraints are satisfied. The method comprises: determining an initial plan comprising actions that, if performed by the entities (4, 6), the goal would be accomplished; determining that a constraint would not be satisfied if the initial plan was implemented; and iteratively performing steps (i) to (v) until a final plan that accomplishes the goal and satisfies the is determined. Step (i) comprises identifying a constraint that is not satisfied in part of the current plan. Step (ii) comprises determining a remedy that, if implemented, satisfies the identified constraint. Step (iii) comprises updating the goal specification to include the remedy. Step (iv) comprises, using the updated goal specification, determining a further plan that accomplishes the goal and the remedy. Step (v) comprises determining whether or not the further plan satisfies each constraint.
    Type: Application
    Filed: May 2, 2014
    Publication date: March 10, 2016
    Applicant: BAE SYSTEMS PLC
    Inventors: JOHN PATERSON BOOKLESS, MARKUS DEITTERT, RICHARD NORMAN HERRING, ELIZABETH JANE CULLEN
  • Publication number: 20150067352
    Abstract: Disclosed is a cryptographic device that may automatically configure its traffic interfaces and cryptographic modes when it is inserted into an electrically keyed receptacle in a host system. Such automatic configuration may enable a single cryptographic module to support a range of input/output interfaces, such as SPI, Ethernet, RS-232 Serial, and RS-485 Serial, for example, and also to support a range of cryptographic modes, such as Cipher Block Chaining, Galois Counter Mode, or Long Cycle Mode, for Communications Security (COMSEC) and Transmission Security (TRANSEC) purposes. In addition, such automatic configuration may include parameters that affect power consumption, such as device clock rate or other power management features.
    Type: Application
    Filed: August 30, 2013
    Publication date: March 5, 2015
    Inventor: Richard Norman Winslow
  • Patent number: 8909930
    Abstract: Methods and systems for increasing the security or trust associated with an untrusted device are provided. For example, a trusted hardware component may send a request to the untrusted device. The request may indicate one or more challenges to be performed by a secure application executing on the untrusted device. The trusted hardware component may determine an expected response to the one or more challenges. The expected response may be determined at the secure hardware component based on an expected configuration of the untrusted device. The trusted hardware component may receive a response to the request from the untrusted device. The trusted hardware component may determine a security status of the untrusted device based on the expected response and the received response.
    Type: Grant
    Filed: October 31, 2012
    Date of Patent: December 9, 2014
    Assignee: L-3 Communications Corporation
    Inventors: Richard Norman Winslow, Jerry Hutchison, Robert Louis Coia, Jr.
  • Patent number: 8826384
    Abstract: A device that includes a first processor, a second processor, and an encryption module in communication with the first processor and the second processor may be used to accept conditions for access to the network. The first processor may receive condition data, and in response, may send an acceptance signal via the encryption module to the second processor. The second processor may receive the acceptance signal and, in response, may send acceptance data to a gatekeeper. The encryption module may block unencrypted data other than the acceptance signal from being communicated from the first processor to the second processor. The encryption module may support type 1 encryption.
    Type: Grant
    Filed: July 13, 2007
    Date of Patent: September 2, 2014
    Assignee: L-3 Communications Corporation
    Inventor: Richard Norman Winslow