Patents by Inventor Jack M. Visoky
Jack M. Visoky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240019834Abstract: A security device includes one or more processors and a memory that includes instructions, that when executed by the processors, cause the processors to perform operations. The operations include monitoring data traffic between industrial automation devices in an industrial system and one or more devices in an external network, determining that a first industrial automation device does not include native security features for receiving secure data from the devices in the external network or transmitting secure data to the devices in the external network, and implementing one or more security techniques in response to determining that the first industrial automation device does not include the native security features.Type: ApplicationFiled: July 13, 2022Publication date: January 18, 2024Inventors: Jack M. Visoky, Taryl J. Jasper, Kyle E. Neet, Jessica E. Forguites, William J. Petro, David E. Huffman
-
Publication number: 20240004372Abstract: Embodiments of this present disclosure include an industrial automation system, including an operational technology (OT) industrial automation device. The OT industrial automation device may perform an operation for the industrial automation system. Further, the OT industrial automation device may receive data comprising instructions related to the operation. Embodiments also include a monitoring device to receive the data; identify the OT industrial automation device based on the data; retrieve one or more rules for providing communications to the OT industrial automation device in response to identifying the OT industrial automation device; and selectively forward the data to the OT industrial automation device based on the one or more rules.Type: ApplicationFiled: June 30, 2022Publication date: January 4, 2024Inventors: Chirag L. Malkan, Yutao Wang, Lee A. Lane, Eric A. Norrod, Jack M. Visoky
-
SYSTEMS AND METHODS FOR AUTOMATICALLY DEPLOYING SECURITY UPDATES IN AN OPERATIONS TECHNOLOGY NETWORK
Publication number: 20230421615Abstract: A system includes a first computing node of a cluster of computing nodes that are part of a container orchestration system, a control system for controlling one or more operations of an operation technology (OT) component, and a second node of the cluster of computing nodes. The control system is communicatively coupled to the first computing node and the OT component. The second computing node may transmit a pod to the first computing node. The pod may cause the first computing node to perform operations that include deploying a container as a digital representation of the OT component, testing a security update on the digital representation, determining that the security update is ready for implementation in the OT component, and transmitting an indication that the security update is available for implementation to the OT component after determining that the security update is ready for implementation.Type: ApplicationFiled: June 28, 2022Publication date: December 28, 2023Inventors: Jack M. Visoky, Taryl J. Jasper -
Patent number: 11768479Abstract: Secure data transmission between an input device and both industrial controllers in a high-availability system utilizes a secure connection established between the primary industrial controller and the input device. Data required to establish the secure connection is stored on the primary controller as part of the connection data corresponding to the secure connection. The input device transmits data to the primary controller over the secure connection according to the desired level of security. The primary controller transmits the connection data defining the secure connection to the secondary controller. If a failure occurs in the primary controller, the secondary controller establishes a connection to the input device using the connection data for the secure connection, such that the secondary controller may assume responsibility for the controller end of the secure connection. The primary controller transmits the input signals to the secondary controller via the dedicated connection between controllers.Type: GrantFiled: September 30, 2020Date of Patent: September 26, 2023Assignee: Rockwell Automation Technologies, Inc.Inventors: Kyle E. Neet, Jack M. Visoky, Krzysztof Glensk, Jonathan D. Bradford
-
Publication number: 20230006821Abstract: Techniques to facilitate feature licensing of an industrial controller employed in an industrial automation environment are disclosed. In one implementation, a first private key unique to an industrial controller and a security certificate is stored in a hardware root of trust within the controller. The security certificate is signed by a certificate authority for authenticating the controller. After being authenticated, the industrial controller receives a device information package provided by the certificate authority. The device information package is encrypted with a first public key paired with the first private key and signed using a second private key assigned to the certificate authority. The controller validates the device information package using a second public key paired with the second private key and decrypts the package using the first private key. One or more functions of the industrial controller are enabled based on a license included in the device information package.Type: ApplicationFiled: September 15, 2022Publication date: January 5, 2023Inventors: Jack M. Visoky, Diane E. Golden, Benjamin H. Nave
-
Publication number: 20220100165Abstract: Secure data transmission between an input device and both industrial controllers in a high-availability system utilizes a secure connection established between the primary industrial controller and the input device. Data required to establish the secure connection is stored on the primary controller as part of the connection data corresponding to the secure connection. The input device transmits data to the primary controller over the secure connection according to the desired level of security. The primary controller transmits the connection data defining the secure connection to the secondary controller. If a failure occurs in the primary controller, the secondary controller establishes a connection to the input device using the connection data for the secure connection, such that the secondary controller may assume responsibility for the controller end of the secure connection. The primary controller transmits the input signals to the secondary controller via the dedicated connection between controllers.Type: ApplicationFiled: September 30, 2020Publication date: March 31, 2022Inventors: Kyle E. Neet, Jack M. Visoky, Krzysztof Glensk, Jonathan D. Bradford
-
Patent number: 11271974Abstract: A device may include a communication component that may communicatively couple to a first network. The device may also include a processor that may transmit a first signal via the communication component to a network address translation (NAT) system, the first signal including a first request to discover a server device. The NAT system may communicatively couple to the first network and a second network, such that the first network is inaccessible to the second network. The processor may then receive location data associated with the server device and transmit a second signal addressed to the server device based on the location data. The second signal is transmitted to the NAT system, such that the second signal may include a second request for a security policy from the server device. The processor may then receive the security policy via the NAT system and adjust one or more communication operations based on the security policy.Type: GrantFiled: April 30, 2020Date of Patent: March 8, 2022Assignee: Rockwell Automation Technologies, Inc.Inventors: Jack M. Visoky, David E. Huffman, Taryl J. Jasper
-
Patent number: 11212322Abstract: An industrial security policy configuration system generates and implements security policies for industrial automation systems based on design data for the industrial systems generated by device manufacturers, system integrators, original equipment manufacturers, or the owners of the industrial assets during the design of the industrial systems. the collected design data to a security rule set defining device-level communication privileges. The system translates the collected design data to a security rule set defining device-level communication privileges, which are then translated to a comprehensive set of security policies customized to the requirements of the industrial systems represented by the design data. By leveraging the rich set of available design data to identify or infer security requirements and generate suitable security configurations, the system can mitigate the need to manually configure security policies based on human judgments regarding normal and abnormal network traffic.Type: GrantFiled: October 10, 2018Date of Patent: December 28, 2021Assignee: ROCKWELLL AUTOMATION TECHNOLOGIES, INC.Inventors: Alex L. Nicoll, Kyle Crum, Taryl J. Jasper, Michael A. Bush, Jack M. Visoky
-
Publication number: 20210344725Abstract: A device may include a communication component that may communicatively couple to a first network. The device may also include a processor that may transmit a first signal via the communication component to a network address translation (NAT) system, the first signal including a first request to discover a server device. The NAT system may communicatively couple to the first network and a second network, such that the first network is inaccessible to the second network. The processor may then receive location data associated with the server device and transmit a second signal addressed to the server device based on the location data. The second signal is transmitted to the NAT system, such that the second signal may include a second request for a security policy from the server device. The processor may then receive the security policy via the NAT system and adjust one or more communication operations based on the security policy.Type: ApplicationFiled: April 30, 2020Publication date: November 4, 2021Inventors: Jack M. Visoky, David E. Huffman, Taryl J. Jasper
-
Patent number: 10721223Abstract: A secure method for establishing communications to provision modules in an industrial control system generates a certificate signing request to obtain a signed security certificate. A mobile device is located proximate to the module with the certificate signing request, and the mobile device has previously established itself as a secure communication interface on the network. The mobile device establishes a first connection between the module and the mobile device via a short-range protocol and a s second connection between the mobile device and a signing server via a network. The mobile device retrieves the certificate signing request via the first connection and transmits the certificate signing request to the signing server via the second connection. Because the mobile device has previously established itself as a secure interface, the transmission of the certificate signing request to the signing server may be made via a secure connection.Type: GrantFiled: April 12, 2018Date of Patent: July 21, 2020Assignee: Rockwell Automation Technologies, Inc.Inventors: Taryl J. Jasper, Dukki Chung, Jack M. Visoky, Michael A. Bush
-
Publication number: 20200120143Abstract: An industrial security policy configuration system generates and implements security policies for industrial automation systems based on design data for the industrial systems generated by device manufacturers, system integrators, original equipment manufacturers, or the owners of the industrial assets during the design of the industrial systems. the collected design data to a security rule set defining device-level communication privileges. The system translates the collected design data to a security rule set defining device-level communication privileges, which are then translated to a comprehensive set of security policies customized to the requirements of the industrial systems represented by the design data. By leveraging the rich set of available design data to identify or infer security requirements and generate suitable security configurations, the system can mitigate the need to manually configure security policies based on human judgments regarding normal and abnormal network traffic.Type: ApplicationFiled: October 10, 2018Publication date: April 16, 2020Inventors: Alex L. Nicoll, Kyle Crum, Taryl J. Jasper, Michael A. Bush, Jack M. Visoky
-
Publication number: 20190319943Abstract: A secure method for establishing communications to provision modules in an industrial control system generates a certificate signing request to obtain a signed security certificate. A mobile device is located proximate to the module with the certificate signing request, and the mobile device has previously established itself as a secure communication interface on the network. The mobile device establishes a first connection between the module and the mobile device via a short-range protocol and a s second connection between the mobile device and a signing server via a network. The mobile device retrieves the certificate signing request via the first connection and transmits the certificate signing request to the signing server via the second connection. Because the mobile device has previously established itself as a secure interface, the transmission of the certificate signing request to the signing server may be made via a secure connection.Type: ApplicationFiled: April 12, 2018Publication date: October 17, 2019Inventors: Taryl J. Jasper, Dukki Chung, Jack M. Visoky, Michael A. Bush
-
Patent number: 10097585Abstract: A model-based industrial security policy configuration system implements a plant-wide industrial asset security policy in accordance with security policy definitions provided by a user. The configuration system models the collection of industrial assets for which diverse security policies are to be implemented. An interface allows the user to define security policies for a plant environment at a high-level by grouping the industrial assets into security zones, and defining any additional communication permissions in terms of asset-to-asset, asset-to-zone, or zone-to-zone conduits. Based on the model and these policy definitions, the system generates asset-level security setting instructions configured to set appropriate security settings on one or more of the industrial assets, and deploys these instructions to the appropriate assets in order to implement the defined security policy.Type: GrantFiled: May 5, 2016Date of Patent: October 9, 2018Assignee: Rockwell Automation Technologies, Inc.Inventors: Michael A. Bush, Jack M. Visoky, Taryl J. Jasper
-
Publication number: 20180129793Abstract: An industrial precompile and encrypt system facilitates secure distribution of a digital industrial asset to a target device in an industrial automation environment while permitting common, expected user workflows such as interfacing with the asset; replacing failed target devices; verifying and validating the asset and its usage; securely troubleshooting the asset, editing the asset, or replacing the asset in a running system.Type: ApplicationFiled: December 19, 2016Publication date: May 10, 2018Inventors: Dylan A. Ulis, Kevin A. Fonner, Derek P. Miller, James J. Kay, Douglas W. Reid, Jack M. Visoky, Richard M. Cherney, John E. Belcher, Taryl J. Jasper
-
Patent number: 9881160Abstract: A method for installing embedded firmware is provided. The method includes generating one or more firmware file instances and generating one or more digital certificate instances that are separate instances from the firmware file instances. The method includes associating the one or more digital certificate instances with the one or more firmware file instances to facilitate updating signature-unaware modules with signature-aware firmware or to facilitate updating signature-aware modules with signature-unaware firmware.Type: GrantFiled: July 22, 2015Date of Patent: January 30, 2018Assignee: ROCKWELL AUTOMATION TECHNOLOGIES, INC.Inventors: Brian A. Batke, Jack M. Visoky, James J. Kay, Scott A. Mintz, William B. Cook
-
Publication number: 20170214717Abstract: A model-based industrial security policy configuration system implements a plant-wide industrial asset security policy in accordance with security policy definitions provided by a user. The configuration system models the collection of industrial assets for which diverse security policies are to be implemented. An interface allows the user to define security policies for a plant environment at a high-level by grouping the industrial assets into security zones, and defining any additional communication permissions in terms of asset-to-asset, asset-to-zone, or zone-to-zone conduits. Based on the model and these policy definitions, the system generates asset-level security setting instructions configured to set appropriate security settings on one or more of the industrial assets, and deploys these instructions to the appropriate assets in order to implement the defined security policy.Type: ApplicationFiled: May 5, 2016Publication date: July 27, 2017Inventors: Michael A. Bush, Jack M. Visoky, Taryl J. Jasper
-
Publication number: 20150324587Abstract: A method for installing embedded firmware is provided. The method includes generating one or more firmware file instances and generating one or more digital certificate instances that are separate instances from the firmware file instances. The method includes associating the one or more digital certificate instances with the one or more firmware file instances to facilitate updating signature-unaware modules with signature-aware firmware or to facilitate updating signature-aware modules with signature-unaware firmware.Type: ApplicationFiled: July 22, 2015Publication date: November 12, 2015Inventors: Brian A. Batke, Jack M. Visoky, James J. Kay, Scott A. Mintz, William B. Cook
-
Patent number: 9122876Abstract: A method for installing embedded firmware is provided. The method includes generating one or more firmware file instances and generating one or more digital certificate instances that are separate instances from the firmware file instances. The method includes associating the one or more digital certificate instances with the one or more firmware file instances to facilitate updating signature-unaware modules with signature-aware firmware or to facilitate updating signature-aware modules with signature-unaware firmware.Type: GrantFiled: May 23, 2014Date of Patent: September 1, 2015Assignee: Rockwell Automation Technologies, Inc.Inventors: Brian A. Batke, Jack M. Visoky, James J. Kay, Scott A. Mintz, William B. Cook
-
Publication number: 20140331038Abstract: A method for installing embedded firmware is provided. The method includes generating one or more firmware file instances and generating one or more digital certificate instances that are separate instances from the firmware file instances. The method includes associating the one or more digital certificate instances with the one or more firmware file instances to facilitate updating signature-unaware modules with signature-aware firmware or to facilitate updating signature-aware modules with signature-unaware firmware.Type: ApplicationFiled: May 23, 2014Publication date: November 6, 2014Applicant: Rockwell Automation Technologies, Inc.Inventors: Brian A. Batke, Jack M. Visoky, James J. Kay, Scott A. Mintz, William B. Cook
-
Patent number: 8738894Abstract: A method for installing embedded firmware is provided. The method includes generating one or more firmware file instances and generating one or more digital certificate instances that are separate instances from the firmware file instances. The method includes associating the one or more digital certificate instances with the one or more firmware file instances to facilitate updating signature-unaware modules with signature-aware firmware or to facilitate updating signature-aware modules with signature-unaware firmware.Type: GrantFiled: April 22, 2013Date of Patent: May 27, 2014Assignee: Rockwell Automation Technologies, Inc.Inventors: Brian A. Batke, Jack M. Visoky, James J. Kay, Scott A. Mintz, William B. Cook