Patents by Inventor John C. Wilkinson

John C. Wilkinson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10360355
    Abstract: Techniques to facilitate protecting control programs used in an industrial automation environment are disclosed herein. In at least one implementation, control system content provided by a primary entity is received along with a primary security authority provided by the primary entity, wherein the primary security authority defines primary usage rights for the control system content granted to a secondary entity. A secondary security authority provided by the secondary entity is received, wherein the secondary security authority defines secondary usage rights for the control system content that further restrict the primary usage rights. A request is received from a user associated with the secondary entity to perform an action associated with the control system content, and the request is processed with the secondary security authority to determine if the user is authorized to perform the action associated with the control system content based on the secondary usage rights.
    Type: Grant
    Filed: February 15, 2017
    Date of Patent: July 23, 2019
    Assignee: Rockwell Automation Technologies, Inc.
    Inventors: Robert A. Brandt, Clark L. Case, John C. Wilkinson
  • Patent number: 10182954
    Abstract: Disclosed herein is a cushioning device that includes a first foam layer including a first top surface and a first bottom surface, the first foam layer including a plurality of first channels located in the first top surface. Further disclosed is a support fluid cell located in each of the plurality of first channels. Moreover, a second foam layer including a second top surface and a second bottom surface is disclosed, the second foam layer including a second channel located in the second top surface. The cushioning device includes a counterbalance fluid cell located in the second channel. The second foam layer is located underneath the first foam layer. The first foam layer, in combination with the support fluid cells, create a support surface configured to support a load of a person.
    Type: Grant
    Filed: September 8, 2014
    Date of Patent: January 22, 2019
    Assignee: WCW, INC.
    Inventors: John W. Wilkinson, John C. Wilkinson
  • Patent number: 10091208
    Abstract: Selectively enabling communication of dual protocol packets from a source device directed to a service of an object class at target devices is provided. Steps can include providing an access control database including an entry correlating a source device, an object class and a service of the object class; from a source device, receiving a dual protocol packet including a frame and a field according to a first network communication protocol and an encapsulated packet of a second network communication protocol; obtaining from the frame, an identification of the source device; obtaining from the encapsulated packet, an identification and a service of an object class to which the encapsulated packet is directed; comparing the identification of the source device, the identification and service of the object class, and the entry of the access control database; and selectively transmitting the dual protocol packet as a function of the comparison.
    Type: Grant
    Filed: May 27, 2016
    Date of Patent: October 2, 2018
    Assignee: ROCKWELL AUTOMATION TECHNOLOGIES, INC.
    Inventors: David D Brandt, Brian A Batke, Bryan L Singer, Craig D Anderson, Glenn B Schulz, Michael A Bush, John C Wilkinson, Jr., Ramdas M Pai, Steven J Scott
  • Patent number: 9767308
    Abstract: Techniques to facilitate controlling access to objects associated with an industrial automation environment are disclosed. In at least one implementation, a policy set associated with an object type is created, wherein the policy set defines one or more actions that are allowed for at least one user group to perform with respect to the object type. An object of the object type is identified for security configuration, and a selection of the policy set associated with the object type to apply to the object is received. In response to the selection of the policy set, security is configured for the object by applying the policy set associated with the object type to the object.
    Type: Grant
    Filed: May 27, 2016
    Date of Patent: September 19, 2017
    Assignee: Rockwell Automation Technologies, Inc.
    Inventors: John C. Wilkinson, Robert A. Brandt, Clark L. Case
  • Publication number: 20170161475
    Abstract: Techniques to facilitate protecting control programs used in an industrial automation environment are disclosed herein. In at least one implementation, control system content provided by a primary entity is received along with a primary security authority provided by the primary entity, wherein the primary security authority defines primary usage rights for the control system content granted to a secondary entity. A secondary security authority provided by the secondary entity is received, wherein the secondary security authority defines secondary usage rights for the control system content that further restrict the primary usage rights. A request is received from a user associated with the secondary entity to perform an action associated with the control system content, and the request is processed with the secondary security authority to determine if the user is authorized to perform the action associated with the control system content based on the secondary usage rights.
    Type: Application
    Filed: February 15, 2017
    Publication date: June 8, 2017
    Inventors: Robert A. Brandt, Clark L. Case, John C. Wilkinson
  • Patent number: 9613195
    Abstract: Techniques to facilitate protecting control programs used in an industrial automation environment are disclosed herein. In at least one implementation, control system content provided by a primary entity is received along with a primary security authority provided by the primary entity, wherein the primary security authority defines primary usage rights for the control system content granted to a secondary entity. A secondary security authority provided by the secondary entity is received, wherein the secondary security authority defines secondary usage rights for the control system content that further restrict the primary usage rights. A request is received from a user associated with the secondary entity to perform an action associated with the control system content, and the request is processed with the secondary security authority to determine if the user is authorized to perform the action associated with the control system content based on the secondary usage rights.
    Type: Grant
    Filed: May 20, 2016
    Date of Patent: April 4, 2017
    Assignee: Rockwell Automation Technologies, Inc.
    Inventors: Robert A. Brandt, Clark L. Case, John C. Wilkinson
  • Publication number: 20160350521
    Abstract: Techniques to facilitate protecting control programs used in an industrial automation environment are disclosed herein. In at least one implementation, control system content provided by a primary entity is received along with a primary security authority provided by the primary entity, wherein the primary security authority defines primary usage rights for the control system content granted to a secondary entity. A secondary security authority provided by the secondary entity is received, wherein the secondary security authority defines secondary usage rights for the control system content that further restrict the primary usage rights. A request is received from a user associated with the secondary entity to perform an action associated with the control system content, and the request is processed with the secondary security authority to determine if the user is authorized to perform the action associated with the control system content based on the secondary usage rights.
    Type: Application
    Filed: May 20, 2016
    Publication date: December 1, 2016
    Inventors: Robert A. Brandt, Clark L. Case, John C. Wilkinson
  • Publication number: 20160350559
    Abstract: Techniques to facilitate controlling access to objects associated with an industrial automation environment are disclosed. In at least one implementation, a policy set associated with an object type is created, wherein the policy set defines one or more actions that are allowed for at least one user group to perform with respect to the object type. An object of the object type is identified for security configuration, and a selection of the policy set associated with the object type to apply to the object is received. In response to the selection of the policy set, security is configured for the object by applying the policy set associated with the object type to the object.
    Type: Application
    Filed: May 27, 2016
    Publication date: December 1, 2016
    Inventors: John C. Wilkinson, Robert A. Brandt, Clark L. Case
  • Publication number: 20160277416
    Abstract: Selectively enabling communication of dual protocol packets from a source device directed to a service of an object class at target devices is provided. Steps can include providing an access control database including an entry correlating a source device, an object class and a service of the object class; from a source device, receiving a dual protocol packet including a frame and a field according to a first network communication protocol and an encapsulated packet of a second network communication protocol; obtaining from the frame, an identification of the source device; obtaining from the encapsulated packet, an identification and a service of an object class to which the encapsulated packet is directed; comparing the identification of the source device, the identification and service of the object class, and the entry of the access control database; and selectively transmitting the dual protocol packet as a function of the comparison.
    Type: Application
    Filed: May 27, 2016
    Publication date: September 22, 2016
    Inventors: DAVID D BRANDT, BRIAN A BATKE, BRYAN L SINGER, CRAIG D ANDERSON, GLENN B SCHULZ, MICHAEL A BUSH, JOHN C WILKINSON, RAMDAS M PAI, STEVEN J SCOTT
  • Patent number: 9369436
    Abstract: Method and apparatus for use with systems including networked resources where communication between resources is via dual packet protocols wherein a first protocol includes a frame that specifies a destination device/resource and a data field and the second protocol specifies a final destination device/resource and includes a data field, where the second packets are encapsulated in the first protocol packet frames, the method including specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to the first protocol destination resource, examining a subset of the additional embedded packet information to identify one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function of
    Type: Grant
    Filed: May 15, 2014
    Date of Patent: June 14, 2016
    Assignee: Rockwell Automation Technologies, Inc.
    Inventors: David D Brandt, Brian A Batke, Bryan L Singer, Craig D Anderson, Glenn B Schulz, Michael A Bush, John C Wilkinson, Jr., Ramdas M Pai, Steven J Scott
  • Publication number: 20160067128
    Abstract: Disclosed herein is a cushioning device that includes a first foam layer including a first top surface and a first bottom surface, the first foam layer including a plurality of first channels located in the first top surface. Further disclosed is a support fluid cell located in each of the plurality of first channels. Moreover, a second foam layer including a second top surface and a second bottom surface is disclosed, the second foam layer including a second channel located in the second top surface. The cushioning device includes a counterbalance fluid cell located in the second channel. The second foam layer is located underneath the first foam layer. The first foam layer, in combination with the support fluid cells, create a support surface configured to support a load of a person.
    Type: Application
    Filed: September 8, 2014
    Publication date: March 10, 2016
    Inventors: John W. Wilkinson, John C. Wilkinson
  • Patent number: 9078795
    Abstract: Disclosed herein is a cushioning device. The cushioning device includes a plurality of support fluid cells between a head end and a foot end of a support surface. The plurality of support fluid cells is configured for supporting a load of a person. Each of the plurality of support fluid cells includes a reforming element. The cushioning device includes a counterbalance system that has a structure configured to transfer fluid from a first support fluid cell located at a first location along the support surface to a first counterbalance fluid cell located at a second location when the pressure is increased in the first support fluid cell of the support surface. The first counterbalance fluid cell is positioned for counterbalancing a load on the plurality of support fluid cells of the support surface.
    Type: Grant
    Filed: September 8, 2014
    Date of Patent: July 14, 2015
    Assignee: WCW, INC.
    Inventors: John W. Wilkinson, John C. Wilkinson
  • Publication number: 20140259099
    Abstract: Methods and apparatus for controlling access in an electronic network include receiving a communication from a source device, the communication comprising a first protocol packet having first protocol packet information including a first protocol destination resource identifier, wherein a second protocol packet is embedded in the first protocol packet; retrieving at least one access rule based on at least one characteristic of the second protocol packet; applying the at least one access rule to at least one characteristic of the first protocol packet to determine an access rule outcome; and controlling access of the communication to a first protocol destination resource associated with the first protocol destination resource identifier according to the access rule outcome.
    Type: Application
    Filed: May 23, 2014
    Publication date: September 11, 2014
    Inventors: David D. Brandt, Brian A. Batke, Bryan L. Singer, Craig D. Anderson, Glenn B. Schulz, Michael A. Bush, John C. Wilkinson, JR., Ramdas M. Pai, Steven J. Scott
  • Publication number: 20140250493
    Abstract: Method and apparatus for use with systems including networked resources where communication between resources is via dual packet protocols wherein a first protocol includes a frame that specifies a destination device/resource and a data field and the second protocol specifies a final destination device/resource and includes a data field, where the second packets are encapsulated in the first protocol packet frames, the method including specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to the first protocol destination resource, examining a subset of the additional embedded packet information to identify one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function of
    Type: Application
    Filed: May 15, 2014
    Publication date: September 4, 2014
    Inventors: David D. Brandt, Brian A. Batke, Bryan L. Singer, Craig D. Anderson, Glenn B. Schulz, Michael A. Bush, John C. Wilkinson, JR., Ramdas M. Pai, Steven J. Scott
  • Publication number: 20140250520
    Abstract: Method and apparatus for use with systems including networked resources where communication between resources is via dual packet protocols wherein a first protocol includes a frame that specifies a destination device/resource and a data field and the second protocol specifies a final destination device/resource and includes a data field, where the second packets are encapsulated in the first protocol packet frames, the method including specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to the first protocol destination resource, examining a subset of the additional embedded packet information to identify one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function of
    Type: Application
    Filed: May 15, 2014
    Publication date: September 4, 2014
    Inventors: David D. Brandt, Brian A. Batke, Bryan L. Singer, Craig D. Anderson, Glenn B. Schulz, Michael A. Bush, John C. Wilkinson, JR., Ramdas M. Pai, Steven J. Scott
  • Patent number: 8774186
    Abstract: Method and apparatus for use with systems including networked resources where communication between resources is via dual packet protocols wherein a first protocol includes a frame that specifies a destination device/resource and a data field and the second protocol specifies a final destination device/resource and includes a data field, where the second packets are encapsulated in the first protocol packet frames, the method including specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to the first protocol destination resource, examining a subset of the additional embedded packet information to identify one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function of
    Type: Grant
    Filed: July 14, 2011
    Date of Patent: July 8, 2014
    Assignee: Rockwell Automation Technologies, Inc.
    Inventors: David D. Brandt, Brian A. Batke, Bryan L. Singer, Craig D. Anderson, Glenn B. Schulz, Michael A. Bush, John C. Wilkinson, Jr., Ramdas M. Pai, Steven J. Scott
  • Patent number: 8327130
    Abstract: Systems and methods are provided for issuing unique identification credentials to a plurality of devices, and their constituent components, in an industrial control system. Identification credentials are granted by an identification authority and conveyed to each of the credentialed devices and/or component through an identity token. The identification credentials include (1) a unique device identifier, (2) an identification authority component identifier, and (3) an indication of the location of the identification authority component. To secure the issued credentials, such credentials are encrypted and the identification token can be embedded with biometrics features. Identification credentials provide for the following prominent features: (i) Secure access to a device form a client and (ii) determination a topology of a set of credentialed devices in an industrial control system. The topology is network agnostic and facilitates organizational modeling of processes in the industrial control system.
    Type: Grant
    Filed: September 25, 2007
    Date of Patent: December 4, 2012
    Assignee: Rockwell Automation Technologies, Inc.
    Inventors: John C. Wilkinson, Jr., Kenwood Henry Hall, Taryl Jon Jasper, Michael Dean Kalan
  • Publication number: 20110283350
    Abstract: Method and apparatus for use with systems including networked resources where communication between resources is via dual packet protocols wherein a first protocol includes a frame that specifies a destination device/resource and a data field and the second protocol specifies a final destination device/resource and includes a data field, where the second packets are encapsulated in the first protocol packet frames, the method including specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to the first protocol destination resource, examining a subset of the additional embedded packet information to identify one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function of
    Type: Application
    Filed: July 14, 2011
    Publication date: November 17, 2011
    Inventors: David D. Brandt, Brian A. Batke, Bryan L. Singer, Craig D. Anderson, Glenn B. Schulz, Michael A. Bush, John C. Wilkinson, JR., Ramdas M. Pai, Steven J. Scott
  • Patent number: 8015409
    Abstract: An industrial automation system is provided. This includes at least one license component that is granted by a third party to permit access to a portion of an industrial control component. At least one protocol component that is based in part on a private key exchange facilitates authentication and access to the portion of the industrial control component.
    Type: Grant
    Filed: January 26, 2007
    Date of Patent: September 6, 2011
    Assignee: Rockwell Automation Technologies, Inc.
    Inventors: John C. Wilkinson, Jr., Taryl J. Jasper, Michael D. Kalan, Nicholas L. Perrotto, Jr., Glenn B. Schulz, James A. Meeker, Kevin M. Tambascio, Jack M. Visoky
  • Patent number: 7990967
    Abstract: The invention includes a method including the steps of specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to a first protocol destination resource, examining embedded packet information to identify at least one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function of the identified access control information.
    Type: Grant
    Filed: January 6, 2006
    Date of Patent: August 2, 2011
    Assignee: Rockwell Automation Technologies, Inc.
    Inventors: David D. Brandt, Brian A. Batke, Bryan L. Singer, Craig D. Anderson, Glenn B. Schulz, Michael A. Bush, John C. Wilkinson, Jr., Ramdas M. Pai, Steven J. Scott