Patents by Inventor Jack M. Visoky
Jack M. Visoky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12379714Abstract: Embodiments of this present disclosure include an industrial automation system, including an operational technology (OT) industrial automation device. The OT industrial automation device may perform an operation for the industrial automation system. Further, the OT industrial automation device may receive data comprising instructions related to the operation. Embodiments also include a monitoring device to receive the data; identify the OT industrial automation device based on the data; retrieve one or more rules for providing communications to the OT industrial automation device in response to identifying the OT industrial automation device; and selectively forward the data to the OT industrial automation device based on the one or more rules.Type: GrantFiled: June 30, 2022Date of Patent: August 5, 2025Assignee: Rockwell Automation Technologies, Inc.Inventors: Chirag L. Malkan, Yutao Wang, Lee A. Lane, Eric A. Norrod, Jack M. Visoky
-
Patent number: 12375529Abstract: An OT device includes a processor and a memory, accessible by the processor. The memory stores a first policy that includes a first set of settings associated with operation of the OT device. The memory also stores instructions that, when executed by the processor, cause the processor to enforce the first policy, receive a second policy and an indication of a trigger, wherein the second policy comprises a second set of settings associated with the operation of the OT device, receive an indication that the trigger is enabled, determine that the trigger is true, and, in response to the receiving the indication that the trigger is enabled and the determining that the trigger is true, enforce the second policy.Type: GrantFiled: February 23, 2023Date of Patent: July 29, 2025Assignee: ROCKWELL AUTOMATION TECHNOLOGIES, INC.Inventors: Roch Mikolajczyk, Jack M. Visoky, Taryl J. Jasper
-
Publication number: 20240291865Abstract: An OT device includes a processor and a memory, accessible by the processor. The memory stores a first policy that includes a first set of settings associated with operation of the OT device. The memory also stores instructions that, when executed by the processor, cause the processor to enforce the first policy, receive a second policy and an indication of a trigger, wherein the second policy comprises a second set of settings associated with the operation of the OT device, receive an indication that the trigger is enabled, determine that the trigger is true, and, in response to the receiving the indication that the trigger is enabled and the determining that the trigger is true, enforce the second policy.Type: ApplicationFiled: February 23, 2023Publication date: August 29, 2024Inventors: Roch Mikolajczyk, Jack M. Visoky, Taryl J. Jasper
-
Publication number: 20240223609Abstract: An OT device includes a processor and a memory. The memory stores a first policy, a second policy, and program instructions. The first policy includes a first set of settings associated with operation of the OT device. The second policy includes a second set of settings associated with the operation of the OT device. The program instructions, when executed by the processor, cause the processor to receive data associated with an event, identify a first action in response to the event based on the first policy, perform the identified first action, identify a second action in response to the event based on the second policy, and generate, in response to the first action being different from the second action, a record identifying a difference between the first action and the second action.Type: ApplicationFiled: January 3, 2023Publication date: July 4, 2024Inventors: Roch Mikolajczyk, Taryl J. Jasper, Jack M. Visoky
-
Publication number: 20240223610Abstract: An OT device includes a memory and a processor. The memory stores a first policy, a second policy, and program instructions. The first policy includes a first set of settings associated with the operation of the OT device. The second policy includes a second set of settings associated with the operation of the OT device. The program instructions, when executed by the processor, cause the processor to receive first data associated with a first event, identify a first action in response to the first event based on the first policy, perform the identified first action, receive a command to enforce the second policy and stop enforcing the first policy, receive second data associated with a second event, identify a second action in response to the second event based on the second policy, and perform the identified second action.Type: ApplicationFiled: January 3, 2023Publication date: July 4, 2024Inventors: Roch Mikolajczyk, Taryl J. Jasper, Jack M. Visoky
-
Publication number: 20240160720Abstract: Technology disclosed herein describes a system and method for aggregating event information in an industrial automation system for analysis and response. In an implementation, industrial automation devices perform industrial automation processes in an industrial automation environment. A computing device receives event data relating to events that occurred on an associated industrial automation device of the industrial automation devices. The computing device normalizes the event data to generate normalized event data which describes the events. The computing device supplements the normalized event data with context information relevant to the associated industrial automation device to generate complete event data. The computing device identifies an anomaly for an industrial automation device of the industrial automation devices based on analyzing the complete event data associated with the industrial automation device.Type: ApplicationFiled: May 16, 2023Publication date: May 16, 2024Inventors: Taryl J. Jasper, Jack M. Visoky, Ankur Mohan, David E. Huffman, Donald P. McCoy, David D. Brandt
-
Publication number: 20240019834Abstract: A security device includes one or more processors and a memory that includes instructions, that when executed by the processors, cause the processors to perform operations. The operations include monitoring data traffic between industrial automation devices in an industrial system and one or more devices in an external network, determining that a first industrial automation device does not include native security features for receiving secure data from the devices in the external network or transmitting secure data to the devices in the external network, and implementing one or more security techniques in response to determining that the first industrial automation device does not include the native security features.Type: ApplicationFiled: July 13, 2022Publication date: January 18, 2024Inventors: Jack M. Visoky, Taryl J. Jasper, Kyle E. Neet, Jessica E. Forguites, William J. Petro, David E. Huffman
-
Publication number: 20240004372Abstract: Embodiments of this present disclosure include an industrial automation system, including an operational technology (OT) industrial automation device. The OT industrial automation device may perform an operation for the industrial automation system. Further, the OT industrial automation device may receive data comprising instructions related to the operation. Embodiments also include a monitoring device to receive the data; identify the OT industrial automation device based on the data; retrieve one or more rules for providing communications to the OT industrial automation device in response to identifying the OT industrial automation device; and selectively forward the data to the OT industrial automation device based on the one or more rules.Type: ApplicationFiled: June 30, 2022Publication date: January 4, 2024Inventors: Chirag L. Malkan, Yutao Wang, Lee A. Lane, Eric A. Norrod, Jack M. Visoky
-
SYSTEMS AND METHODS FOR AUTOMATICALLY DEPLOYING SECURITY UPDATES IN AN OPERATIONS TECHNOLOGY NETWORK
Publication number: 20230421615Abstract: A system includes a first computing node of a cluster of computing nodes that are part of a container orchestration system, a control system for controlling one or more operations of an operation technology (OT) component, and a second node of the cluster of computing nodes. The control system is communicatively coupled to the first computing node and the OT component. The second computing node may transmit a pod to the first computing node. The pod may cause the first computing node to perform operations that include deploying a container as a digital representation of the OT component, testing a security update on the digital representation, determining that the security update is ready for implementation in the OT component, and transmitting an indication that the security update is available for implementation to the OT component after determining that the security update is ready for implementation.Type: ApplicationFiled: June 28, 2022Publication date: December 28, 2023Inventors: Jack M. Visoky, Taryl J. Jasper -
Patent number: 11768479Abstract: Secure data transmission between an input device and both industrial controllers in a high-availability system utilizes a secure connection established between the primary industrial controller and the input device. Data required to establish the secure connection is stored on the primary controller as part of the connection data corresponding to the secure connection. The input device transmits data to the primary controller over the secure connection according to the desired level of security. The primary controller transmits the connection data defining the secure connection to the secondary controller. If a failure occurs in the primary controller, the secondary controller establishes a connection to the input device using the connection data for the secure connection, such that the secondary controller may assume responsibility for the controller end of the secure connection. The primary controller transmits the input signals to the secondary controller via the dedicated connection between controllers.Type: GrantFiled: September 30, 2020Date of Patent: September 26, 2023Assignee: Rockwell Automation Technologies, Inc.Inventors: Kyle E. Neet, Jack M. Visoky, Krzysztof Glensk, Jonathan D. Bradford
-
Publication number: 20230006821Abstract: Techniques to facilitate feature licensing of an industrial controller employed in an industrial automation environment are disclosed. In one implementation, a first private key unique to an industrial controller and a security certificate is stored in a hardware root of trust within the controller. The security certificate is signed by a certificate authority for authenticating the controller. After being authenticated, the industrial controller receives a device information package provided by the certificate authority. The device information package is encrypted with a first public key paired with the first private key and signed using a second private key assigned to the certificate authority. The controller validates the device information package using a second public key paired with the second private key and decrypts the package using the first private key. One or more functions of the industrial controller are enabled based on a license included in the device information package.Type: ApplicationFiled: September 15, 2022Publication date: January 5, 2023Inventors: Jack M. Visoky, Diane E. Golden, Benjamin H. Nave
-
Publication number: 20220100165Abstract: Secure data transmission between an input device and both industrial controllers in a high-availability system utilizes a secure connection established between the primary industrial controller and the input device. Data required to establish the secure connection is stored on the primary controller as part of the connection data corresponding to the secure connection. The input device transmits data to the primary controller over the secure connection according to the desired level of security. The primary controller transmits the connection data defining the secure connection to the secondary controller. If a failure occurs in the primary controller, the secondary controller establishes a connection to the input device using the connection data for the secure connection, such that the secondary controller may assume responsibility for the controller end of the secure connection. The primary controller transmits the input signals to the secondary controller via the dedicated connection between controllers.Type: ApplicationFiled: September 30, 2020Publication date: March 31, 2022Inventors: Kyle E. Neet, Jack M. Visoky, Krzysztof Glensk, Jonathan D. Bradford
-
Patent number: 11271974Abstract: A device may include a communication component that may communicatively couple to a first network. The device may also include a processor that may transmit a first signal via the communication component to a network address translation (NAT) system, the first signal including a first request to discover a server device. The NAT system may communicatively couple to the first network and a second network, such that the first network is inaccessible to the second network. The processor may then receive location data associated with the server device and transmit a second signal addressed to the server device based on the location data. The second signal is transmitted to the NAT system, such that the second signal may include a second request for a security policy from the server device. The processor may then receive the security policy via the NAT system and adjust one or more communication operations based on the security policy.Type: GrantFiled: April 30, 2020Date of Patent: March 8, 2022Assignee: Rockwell Automation Technologies, Inc.Inventors: Jack M. Visoky, David E. Huffman, Taryl J. Jasper
-
Patent number: 11212322Abstract: An industrial security policy configuration system generates and implements security policies for industrial automation systems based on design data for the industrial systems generated by device manufacturers, system integrators, original equipment manufacturers, or the owners of the industrial assets during the design of the industrial systems. the collected design data to a security rule set defining device-level communication privileges. The system translates the collected design data to a security rule set defining device-level communication privileges, which are then translated to a comprehensive set of security policies customized to the requirements of the industrial systems represented by the design data. By leveraging the rich set of available design data to identify or infer security requirements and generate suitable security configurations, the system can mitigate the need to manually configure security policies based on human judgments regarding normal and abnormal network traffic.Type: GrantFiled: October 10, 2018Date of Patent: December 28, 2021Assignee: ROCKWELLL AUTOMATION TECHNOLOGIES, INC.Inventors: Alex L. Nicoll, Kyle Crum, Taryl J. Jasper, Michael A. Bush, Jack M. Visoky
-
Publication number: 20210344725Abstract: A device may include a communication component that may communicatively couple to a first network. The device may also include a processor that may transmit a first signal via the communication component to a network address translation (NAT) system, the first signal including a first request to discover a server device. The NAT system may communicatively couple to the first network and a second network, such that the first network is inaccessible to the second network. The processor may then receive location data associated with the server device and transmit a second signal addressed to the server device based on the location data. The second signal is transmitted to the NAT system, such that the second signal may include a second request for a security policy from the server device. The processor may then receive the security policy via the NAT system and adjust one or more communication operations based on the security policy.Type: ApplicationFiled: April 30, 2020Publication date: November 4, 2021Inventors: Jack M. Visoky, David E. Huffman, Taryl J. Jasper
-
Patent number: 10721223Abstract: A secure method for establishing communications to provision modules in an industrial control system generates a certificate signing request to obtain a signed security certificate. A mobile device is located proximate to the module with the certificate signing request, and the mobile device has previously established itself as a secure communication interface on the network. The mobile device establishes a first connection between the module and the mobile device via a short-range protocol and a s second connection between the mobile device and a signing server via a network. The mobile device retrieves the certificate signing request via the first connection and transmits the certificate signing request to the signing server via the second connection. Because the mobile device has previously established itself as a secure interface, the transmission of the certificate signing request to the signing server may be made via a secure connection.Type: GrantFiled: April 12, 2018Date of Patent: July 21, 2020Assignee: Rockwell Automation Technologies, Inc.Inventors: Taryl J. Jasper, Dukki Chung, Jack M. Visoky, Michael A. Bush
-
Publication number: 20200120143Abstract: An industrial security policy configuration system generates and implements security policies for industrial automation systems based on design data for the industrial systems generated by device manufacturers, system integrators, original equipment manufacturers, or the owners of the industrial assets during the design of the industrial systems. the collected design data to a security rule set defining device-level communication privileges. The system translates the collected design data to a security rule set defining device-level communication privileges, which are then translated to a comprehensive set of security policies customized to the requirements of the industrial systems represented by the design data. By leveraging the rich set of available design data to identify or infer security requirements and generate suitable security configurations, the system can mitigate the need to manually configure security policies based on human judgments regarding normal and abnormal network traffic.Type: ApplicationFiled: October 10, 2018Publication date: April 16, 2020Inventors: Alex L. Nicoll, Kyle Crum, Taryl J. Jasper, Michael A. Bush, Jack M. Visoky
-
Publication number: 20190319943Abstract: A secure method for establishing communications to provision modules in an industrial control system generates a certificate signing request to obtain a signed security certificate. A mobile device is located proximate to the module with the certificate signing request, and the mobile device has previously established itself as a secure communication interface on the network. The mobile device establishes a first connection between the module and the mobile device via a short-range protocol and a s second connection between the mobile device and a signing server via a network. The mobile device retrieves the certificate signing request via the first connection and transmits the certificate signing request to the signing server via the second connection. Because the mobile device has previously established itself as a secure interface, the transmission of the certificate signing request to the signing server may be made via a secure connection.Type: ApplicationFiled: April 12, 2018Publication date: October 17, 2019Inventors: Taryl J. Jasper, Dukki Chung, Jack M. Visoky, Michael A. Bush
-
Patent number: 10097585Abstract: A model-based industrial security policy configuration system implements a plant-wide industrial asset security policy in accordance with security policy definitions provided by a user. The configuration system models the collection of industrial assets for which diverse security policies are to be implemented. An interface allows the user to define security policies for a plant environment at a high-level by grouping the industrial assets into security zones, and defining any additional communication permissions in terms of asset-to-asset, asset-to-zone, or zone-to-zone conduits. Based on the model and these policy definitions, the system generates asset-level security setting instructions configured to set appropriate security settings on one or more of the industrial assets, and deploys these instructions to the appropriate assets in order to implement the defined security policy.Type: GrantFiled: May 5, 2016Date of Patent: October 9, 2018Assignee: Rockwell Automation Technologies, Inc.Inventors: Michael A. Bush, Jack M. Visoky, Taryl J. Jasper
-
Publication number: 20180129793Abstract: An industrial precompile and encrypt system facilitates secure distribution of a digital industrial asset to a target device in an industrial automation environment while permitting common, expected user workflows such as interfacing with the asset; replacing failed target devices; verifying and validating the asset and its usage; securely troubleshooting the asset, editing the asset, or replacing the asset in a running system.Type: ApplicationFiled: December 19, 2016Publication date: May 10, 2018Inventors: Dylan A. Ulis, Kevin A. Fonner, Derek P. Miller, James J. Kay, Douglas W. Reid, Jack M. Visoky, Richard M. Cherney, John E. Belcher, Taryl J. Jasper