Patents by Inventor John C. Wilkinson
John C. Wilkinson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10360355Abstract: Techniques to facilitate protecting control programs used in an industrial automation environment are disclosed herein. In at least one implementation, control system content provided by a primary entity is received along with a primary security authority provided by the primary entity, wherein the primary security authority defines primary usage rights for the control system content granted to a secondary entity. A secondary security authority provided by the secondary entity is received, wherein the secondary security authority defines secondary usage rights for the control system content that further restrict the primary usage rights. A request is received from a user associated with the secondary entity to perform an action associated with the control system content, and the request is processed with the secondary security authority to determine if the user is authorized to perform the action associated with the control system content based on the secondary usage rights.Type: GrantFiled: February 15, 2017Date of Patent: July 23, 2019Assignee: Rockwell Automation Technologies, Inc.Inventors: Robert A. Brandt, Clark L. Case, John C. Wilkinson
-
Patent number: 10182954Abstract: Disclosed herein is a cushioning device that includes a first foam layer including a first top surface and a first bottom surface, the first foam layer including a plurality of first channels located in the first top surface. Further disclosed is a support fluid cell located in each of the plurality of first channels. Moreover, a second foam layer including a second top surface and a second bottom surface is disclosed, the second foam layer including a second channel located in the second top surface. The cushioning device includes a counterbalance fluid cell located in the second channel. The second foam layer is located underneath the first foam layer. The first foam layer, in combination with the support fluid cells, create a support surface configured to support a load of a person.Type: GrantFiled: September 8, 2014Date of Patent: January 22, 2019Assignee: WCW, INC.Inventors: John W. Wilkinson, John C. Wilkinson
-
Patent number: 10091208Abstract: Selectively enabling communication of dual protocol packets from a source device directed to a service of an object class at target devices is provided. Steps can include providing an access control database including an entry correlating a source device, an object class and a service of the object class; from a source device, receiving a dual protocol packet including a frame and a field according to a first network communication protocol and an encapsulated packet of a second network communication protocol; obtaining from the frame, an identification of the source device; obtaining from the encapsulated packet, an identification and a service of an object class to which the encapsulated packet is directed; comparing the identification of the source device, the identification and service of the object class, and the entry of the access control database; and selectively transmitting the dual protocol packet as a function of the comparison.Type: GrantFiled: May 27, 2016Date of Patent: October 2, 2018Assignee: ROCKWELL AUTOMATION TECHNOLOGIES, INC.Inventors: David D Brandt, Brian A Batke, Bryan L Singer, Craig D Anderson, Glenn B Schulz, Michael A Bush, John C Wilkinson, Jr., Ramdas M Pai, Steven J Scott
-
Patent number: 9767308Abstract: Techniques to facilitate controlling access to objects associated with an industrial automation environment are disclosed. In at least one implementation, a policy set associated with an object type is created, wherein the policy set defines one or more actions that are allowed for at least one user group to perform with respect to the object type. An object of the object type is identified for security configuration, and a selection of the policy set associated with the object type to apply to the object is received. In response to the selection of the policy set, security is configured for the object by applying the policy set associated with the object type to the object.Type: GrantFiled: May 27, 2016Date of Patent: September 19, 2017Assignee: Rockwell Automation Technologies, Inc.Inventors: John C. Wilkinson, Robert A. Brandt, Clark L. Case
-
Publication number: 20170161475Abstract: Techniques to facilitate protecting control programs used in an industrial automation environment are disclosed herein. In at least one implementation, control system content provided by a primary entity is received along with a primary security authority provided by the primary entity, wherein the primary security authority defines primary usage rights for the control system content granted to a secondary entity. A secondary security authority provided by the secondary entity is received, wherein the secondary security authority defines secondary usage rights for the control system content that further restrict the primary usage rights. A request is received from a user associated with the secondary entity to perform an action associated with the control system content, and the request is processed with the secondary security authority to determine if the user is authorized to perform the action associated with the control system content based on the secondary usage rights.Type: ApplicationFiled: February 15, 2017Publication date: June 8, 2017Inventors: Robert A. Brandt, Clark L. Case, John C. Wilkinson
-
Patent number: 9613195Abstract: Techniques to facilitate protecting control programs used in an industrial automation environment are disclosed herein. In at least one implementation, control system content provided by a primary entity is received along with a primary security authority provided by the primary entity, wherein the primary security authority defines primary usage rights for the control system content granted to a secondary entity. A secondary security authority provided by the secondary entity is received, wherein the secondary security authority defines secondary usage rights for the control system content that further restrict the primary usage rights. A request is received from a user associated with the secondary entity to perform an action associated with the control system content, and the request is processed with the secondary security authority to determine if the user is authorized to perform the action associated with the control system content based on the secondary usage rights.Type: GrantFiled: May 20, 2016Date of Patent: April 4, 2017Assignee: Rockwell Automation Technologies, Inc.Inventors: Robert A. Brandt, Clark L. Case, John C. Wilkinson
-
Publication number: 20160350521Abstract: Techniques to facilitate protecting control programs used in an industrial automation environment are disclosed herein. In at least one implementation, control system content provided by a primary entity is received along with a primary security authority provided by the primary entity, wherein the primary security authority defines primary usage rights for the control system content granted to a secondary entity. A secondary security authority provided by the secondary entity is received, wherein the secondary security authority defines secondary usage rights for the control system content that further restrict the primary usage rights. A request is received from a user associated with the secondary entity to perform an action associated with the control system content, and the request is processed with the secondary security authority to determine if the user is authorized to perform the action associated with the control system content based on the secondary usage rights.Type: ApplicationFiled: May 20, 2016Publication date: December 1, 2016Inventors: Robert A. Brandt, Clark L. Case, John C. Wilkinson
-
Publication number: 20160350559Abstract: Techniques to facilitate controlling access to objects associated with an industrial automation environment are disclosed. In at least one implementation, a policy set associated with an object type is created, wherein the policy set defines one or more actions that are allowed for at least one user group to perform with respect to the object type. An object of the object type is identified for security configuration, and a selection of the policy set associated with the object type to apply to the object is received. In response to the selection of the policy set, security is configured for the object by applying the policy set associated with the object type to the object.Type: ApplicationFiled: May 27, 2016Publication date: December 1, 2016Inventors: John C. Wilkinson, Robert A. Brandt, Clark L. Case
-
Publication number: 20160277416Abstract: Selectively enabling communication of dual protocol packets from a source device directed to a service of an object class at target devices is provided. Steps can include providing an access control database including an entry correlating a source device, an object class and a service of the object class; from a source device, receiving a dual protocol packet including a frame and a field according to a first network communication protocol and an encapsulated packet of a second network communication protocol; obtaining from the frame, an identification of the source device; obtaining from the encapsulated packet, an identification and a service of an object class to which the encapsulated packet is directed; comparing the identification of the source device, the identification and service of the object class, and the entry of the access control database; and selectively transmitting the dual protocol packet as a function of the comparison.Type: ApplicationFiled: May 27, 2016Publication date: September 22, 2016Inventors: DAVID D BRANDT, BRIAN A BATKE, BRYAN L SINGER, CRAIG D ANDERSON, GLENN B SCHULZ, MICHAEL A BUSH, JOHN C WILKINSON, RAMDAS M PAI, STEVEN J SCOTT
-
Patent number: 9369436Abstract: Method and apparatus for use with systems including networked resources where communication between resources is via dual packet protocols wherein a first protocol includes a frame that specifies a destination device/resource and a data field and the second protocol specifies a final destination device/resource and includes a data field, where the second packets are encapsulated in the first protocol packet frames, the method including specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to the first protocol destination resource, examining a subset of the additional embedded packet information to identify one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function ofType: GrantFiled: May 15, 2014Date of Patent: June 14, 2016Assignee: Rockwell Automation Technologies, Inc.Inventors: David D Brandt, Brian A Batke, Bryan L Singer, Craig D Anderson, Glenn B Schulz, Michael A Bush, John C Wilkinson, Jr., Ramdas M Pai, Steven J Scott
-
Publication number: 20160067128Abstract: Disclosed herein is a cushioning device that includes a first foam layer including a first top surface and a first bottom surface, the first foam layer including a plurality of first channels located in the first top surface. Further disclosed is a support fluid cell located in each of the plurality of first channels. Moreover, a second foam layer including a second top surface and a second bottom surface is disclosed, the second foam layer including a second channel located in the second top surface. The cushioning device includes a counterbalance fluid cell located in the second channel. The second foam layer is located underneath the first foam layer. The first foam layer, in combination with the support fluid cells, create a support surface configured to support a load of a person.Type: ApplicationFiled: September 8, 2014Publication date: March 10, 2016Inventors: John W. Wilkinson, John C. Wilkinson
-
Patent number: 9078795Abstract: Disclosed herein is a cushioning device. The cushioning device includes a plurality of support fluid cells between a head end and a foot end of a support surface. The plurality of support fluid cells is configured for supporting a load of a person. Each of the plurality of support fluid cells includes a reforming element. The cushioning device includes a counterbalance system that has a structure configured to transfer fluid from a first support fluid cell located at a first location along the support surface to a first counterbalance fluid cell located at a second location when the pressure is increased in the first support fluid cell of the support surface. The first counterbalance fluid cell is positioned for counterbalancing a load on the plurality of support fluid cells of the support surface.Type: GrantFiled: September 8, 2014Date of Patent: July 14, 2015Assignee: WCW, INC.Inventors: John W. Wilkinson, John C. Wilkinson
-
Publication number: 20140259099Abstract: Methods and apparatus for controlling access in an electronic network include receiving a communication from a source device, the communication comprising a first protocol packet having first protocol packet information including a first protocol destination resource identifier, wherein a second protocol packet is embedded in the first protocol packet; retrieving at least one access rule based on at least one characteristic of the second protocol packet; applying the at least one access rule to at least one characteristic of the first protocol packet to determine an access rule outcome; and controlling access of the communication to a first protocol destination resource associated with the first protocol destination resource identifier according to the access rule outcome.Type: ApplicationFiled: May 23, 2014Publication date: September 11, 2014Inventors: David D. Brandt, Brian A. Batke, Bryan L. Singer, Craig D. Anderson, Glenn B. Schulz, Michael A. Bush, John C. Wilkinson, JR., Ramdas M. Pai, Steven J. Scott
-
Publication number: 20140250493Abstract: Method and apparatus for use with systems including networked resources where communication between resources is via dual packet protocols wherein a first protocol includes a frame that specifies a destination device/resource and a data field and the second protocol specifies a final destination device/resource and includes a data field, where the second packets are encapsulated in the first protocol packet frames, the method including specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to the first protocol destination resource, examining a subset of the additional embedded packet information to identify one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function ofType: ApplicationFiled: May 15, 2014Publication date: September 4, 2014Inventors: David D. Brandt, Brian A. Batke, Bryan L. Singer, Craig D. Anderson, Glenn B. Schulz, Michael A. Bush, John C. Wilkinson, JR., Ramdas M. Pai, Steven J. Scott
-
Publication number: 20140250520Abstract: Method and apparatus for use with systems including networked resources where communication between resources is via dual packet protocols wherein a first protocol includes a frame that specifies a destination device/resource and a data field and the second protocol specifies a final destination device/resource and includes a data field, where the second packets are encapsulated in the first protocol packet frames, the method including specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to the first protocol destination resource, examining a subset of the additional embedded packet information to identify one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function ofType: ApplicationFiled: May 15, 2014Publication date: September 4, 2014Inventors: David D. Brandt, Brian A. Batke, Bryan L. Singer, Craig D. Anderson, Glenn B. Schulz, Michael A. Bush, John C. Wilkinson, JR., Ramdas M. Pai, Steven J. Scott
-
Patent number: 8774186Abstract: Method and apparatus for use with systems including networked resources where communication between resources is via dual packet protocols wherein a first protocol includes a frame that specifies a destination device/resource and a data field and the second protocol specifies a final destination device/resource and includes a data field, where the second packets are encapsulated in the first protocol packet frames, the method including specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to the first protocol destination resource, examining a subset of the additional embedded packet information to identify one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function ofType: GrantFiled: July 14, 2011Date of Patent: July 8, 2014Assignee: Rockwell Automation Technologies, Inc.Inventors: David D. Brandt, Brian A. Batke, Bryan L. Singer, Craig D. Anderson, Glenn B. Schulz, Michael A. Bush, John C. Wilkinson, Jr., Ramdas M. Pai, Steven J. Scott
-
Patent number: 8327130Abstract: Systems and methods are provided for issuing unique identification credentials to a plurality of devices, and their constituent components, in an industrial control system. Identification credentials are granted by an identification authority and conveyed to each of the credentialed devices and/or component through an identity token. The identification credentials include (1) a unique device identifier, (2) an identification authority component identifier, and (3) an indication of the location of the identification authority component. To secure the issued credentials, such credentials are encrypted and the identification token can be embedded with biometrics features. Identification credentials provide for the following prominent features: (i) Secure access to a device form a client and (ii) determination a topology of a set of credentialed devices in an industrial control system. The topology is network agnostic and facilitates organizational modeling of processes in the industrial control system.Type: GrantFiled: September 25, 2007Date of Patent: December 4, 2012Assignee: Rockwell Automation Technologies, Inc.Inventors: John C. Wilkinson, Jr., Kenwood Henry Hall, Taryl Jon Jasper, Michael Dean Kalan
-
Publication number: 20110283350Abstract: Method and apparatus for use with systems including networked resources where communication between resources is via dual packet protocols wherein a first protocol includes a frame that specifies a destination device/resource and a data field and the second protocol specifies a final destination device/resource and includes a data field, where the second packets are encapsulated in the first protocol packet frames, the method including specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to the first protocol destination resource, examining a subset of the additional embedded packet information to identify one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function ofType: ApplicationFiled: July 14, 2011Publication date: November 17, 2011Inventors: David D. Brandt, Brian A. Batke, Bryan L. Singer, Craig D. Anderson, Glenn B. Schulz, Michael A. Bush, John C. Wilkinson, JR., Ramdas M. Pai, Steven J. Scott
-
Patent number: 8015409Abstract: An industrial automation system is provided. This includes at least one license component that is granted by a third party to permit access to a portion of an industrial control component. At least one protocol component that is based in part on a private key exchange facilitates authentication and access to the portion of the industrial control component.Type: GrantFiled: January 26, 2007Date of Patent: September 6, 2011Assignee: Rockwell Automation Technologies, Inc.Inventors: John C. Wilkinson, Jr., Taryl J. Jasper, Michael D. Kalan, Nicholas L. Perrotto, Jr., Glenn B. Schulz, James A. Meeker, Kevin M. Tambascio, Jack M. Visoky
-
Patent number: 7990967Abstract: The invention includes a method including the steps of specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to a first protocol destination resource, examining embedded packet information to identify at least one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function of the identified access control information.Type: GrantFiled: January 6, 2006Date of Patent: August 2, 2011Assignee: Rockwell Automation Technologies, Inc.Inventors: David D. Brandt, Brian A. Batke, Bryan L. Singer, Craig D. Anderson, Glenn B. Schulz, Michael A. Bush, John C. Wilkinson, Jr., Ramdas M. Pai, Steven J. Scott