Patents by Inventor Michael C. StJohns
Michael C. StJohns has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10609562Abstract: To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.Type: GrantFiled: April 10, 2018Date of Patent: March 31, 2020Assignee: ITRON NETWORKED SOLUTIONS, INC.Inventors: Raj Vaswani, Wilson Chuen Yew Yeung, Cristina Seibert, Nelson Bruce Bolyard, Benjamin N. Damm, Michael C. Stjohns
-
Patent number: 10455420Abstract: To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.Type: GrantFiled: May 2, 2016Date of Patent: October 22, 2019Assignee: ITRON NETWORKED SOLUTIONS, INC.Inventors: Raj Vaswani, Wilson Chuen Yew Yeung, Cristina Seibert, Nelson Bruce Bolyard, Benjamin N. Damm, Michael C. StJohns
-
Publication number: 20180234850Abstract: To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.Type: ApplicationFiled: April 10, 2018Publication date: August 16, 2018Applicant: Itron Networked Solutions, Inc.Inventors: Raj VASWANI, Wilson Chuen Yew YEUNG, Cristina SEIBERT, Nelson Bruce BOYLARD, Benjamin N. DAMM, Michael C. STJOHNS
-
Patent number: 9961550Abstract: To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.Type: GrantFiled: November 4, 2010Date of Patent: May 1, 2018Assignee: ITRON NETWORKED SOLUTIONS, INC.Inventors: Raj Vaswani, Wilson Chuen Yew Yeung, Cristina Seibert, Nelson Bruce Bolyard, Benjamin N. Damm, Michael C. StJohns
-
Patent number: 9542713Abstract: Securing the manufacturing supply chain with digital certificates. A token is coupled to a manufacturing station and enabled via a personal identification number. The token includes a counter limiting the maximum number of certificates to be signed, and compares a serial number of a digital certificate to a tracked serial number. In some embodiments, the token is linked to a particular manufacturing station once the token is enabled.Type: GrantFiled: September 9, 2012Date of Patent: January 10, 2017Assignee: SILVER SPRING NETWORKS, INC.Inventors: Michael C. StJohns, Robert G. Boehm, Jr., Aditi Hilbert
-
Publication number: 20160249220Abstract: To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.Type: ApplicationFiled: May 2, 2016Publication date: August 25, 2016Applicant: Silver Spring Networks, Inc.Inventors: Raj VASWANI, Wilson Chuen Yew YEUNG, Cristina SEIBERT, Nelson Bruce BOLYARD, Benjamin N. DAMM, Michael C. STJOHNS
-
Publication number: 20120116602Abstract: To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.Type: ApplicationFiled: November 4, 2010Publication date: May 10, 2012Applicant: Silver Spring Networks, Inc.Inventors: Raj VASWANI, Wilson Chuen Yew Yeung, Cristina Seibert, Nelson Bruce Bolyard, Benjamin N. Damm, Michael C. StJohns