Patents by Inventor Robert A. Brandt
Robert A. Brandt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10565390Abstract: An automation control system is provided that includes an interface device configured to enable a user to monitor, control, or monitor and control processes of the automation control system. The interface device includes a display that presents a graphical-user-interface that enables the user to monitor, control, or monitor and control the process of the automation control system. Further, a processor renders a plurality of interface screens to the display. The processor determines a current set of access rights of a protected interface screen of the plurality of interface screens, at least one object of the protected interface screen, or both. The access rights are inherited from access rights associated with one or more of the plurality of interface screens, a folder containing the at least one interface screen, or both. Further, the processor provides access, via the protected interface screen, to monitor, control, or monitor and control the processes based upon the set of access rights.Type: GrantFiled: April 6, 2016Date of Patent: February 18, 2020Assignee: Rockwell Automation Technologies, Inc.Inventors: Michael A. Bush, Robert A. Brandt, Ronald E. Bliss, Michael B. Miller
-
Patent number: 10360355Abstract: Techniques to facilitate protecting control programs used in an industrial automation environment are disclosed herein. In at least one implementation, control system content provided by a primary entity is received along with a primary security authority provided by the primary entity, wherein the primary security authority defines primary usage rights for the control system content granted to a secondary entity. A secondary security authority provided by the secondary entity is received, wherein the secondary security authority defines secondary usage rights for the control system content that further restrict the primary usage rights. A request is received from a user associated with the secondary entity to perform an action associated with the control system content, and the request is processed with the secondary security authority to determine if the user is authorized to perform the action associated with the control system content based on the secondary usage rights.Type: GrantFiled: February 15, 2017Date of Patent: July 23, 2019Assignee: Rockwell Automation Technologies, Inc.Inventors: Robert A. Brandt, Clark L. Case, John C. Wilkinson
-
Patent number: 9767308Abstract: Techniques to facilitate controlling access to objects associated with an industrial automation environment are disclosed. In at least one implementation, a policy set associated with an object type is created, wherein the policy set defines one or more actions that are allowed for at least one user group to perform with respect to the object type. An object of the object type is identified for security configuration, and a selection of the policy set associated with the object type to apply to the object is received. In response to the selection of the policy set, security is configured for the object by applying the policy set associated with the object type to the object.Type: GrantFiled: May 27, 2016Date of Patent: September 19, 2017Assignee: Rockwell Automation Technologies, Inc.Inventors: John C. Wilkinson, Robert A. Brandt, Clark L. Case
-
Publication number: 20170161475Abstract: Techniques to facilitate protecting control programs used in an industrial automation environment are disclosed herein. In at least one implementation, control system content provided by a primary entity is received along with a primary security authority provided by the primary entity, wherein the primary security authority defines primary usage rights for the control system content granted to a secondary entity. A secondary security authority provided by the secondary entity is received, wherein the secondary security authority defines secondary usage rights for the control system content that further restrict the primary usage rights. A request is received from a user associated with the secondary entity to perform an action associated with the control system content, and the request is processed with the secondary security authority to determine if the user is authorized to perform the action associated with the control system content based on the secondary usage rights.Type: ApplicationFiled: February 15, 2017Publication date: June 8, 2017Inventors: Robert A. Brandt, Clark L. Case, John C. Wilkinson
-
Patent number: 9613195Abstract: Techniques to facilitate protecting control programs used in an industrial automation environment are disclosed herein. In at least one implementation, control system content provided by a primary entity is received along with a primary security authority provided by the primary entity, wherein the primary security authority defines primary usage rights for the control system content granted to a secondary entity. A secondary security authority provided by the secondary entity is received, wherein the secondary security authority defines secondary usage rights for the control system content that further restrict the primary usage rights. A request is received from a user associated with the secondary entity to perform an action associated with the control system content, and the request is processed with the secondary security authority to determine if the user is authorized to perform the action associated with the control system content based on the secondary usage rights.Type: GrantFiled: May 20, 2016Date of Patent: April 4, 2017Assignee: Rockwell Automation Technologies, Inc.Inventors: Robert A. Brandt, Clark L. Case, John C. Wilkinson
-
Publication number: 20160350521Abstract: Techniques to facilitate protecting control programs used in an industrial automation environment are disclosed herein. In at least one implementation, control system content provided by a primary entity is received along with a primary security authority provided by the primary entity, wherein the primary security authority defines primary usage rights for the control system content granted to a secondary entity. A secondary security authority provided by the secondary entity is received, wherein the secondary security authority defines secondary usage rights for the control system content that further restrict the primary usage rights. A request is received from a user associated with the secondary entity to perform an action associated with the control system content, and the request is processed with the secondary security authority to determine if the user is authorized to perform the action associated with the control system content based on the secondary usage rights.Type: ApplicationFiled: May 20, 2016Publication date: December 1, 2016Inventors: Robert A. Brandt, Clark L. Case, John C. Wilkinson
-
Publication number: 20160350559Abstract: Techniques to facilitate controlling access to objects associated with an industrial automation environment are disclosed. In at least one implementation, a policy set associated with an object type is created, wherein the policy set defines one or more actions that are allowed for at least one user group to perform with respect to the object type. An object of the object type is identified for security configuration, and a selection of the policy set associated with the object type to apply to the object is received. In response to the selection of the policy set, security is configured for the object by applying the policy set associated with the object type to the object.Type: ApplicationFiled: May 27, 2016Publication date: December 1, 2016Inventors: John C. Wilkinson, Robert A. Brandt, Clark L. Case
-
Publication number: 20160217298Abstract: An automation control system is provided that includes an interface device configured to enable a user to monitor, control, or monitor and control processes of the automation control system. The interface device includes a display that presents a graphical-user-interface that enables the user to monitor, control, or monitor and control the process of the automation control system. Further, a processor renders a plurality of interface screens to the display. The processor determines a current set of access rights of a protected interface screen of the plurality of interface screens, at least one object of the protected interface screen, or both. The access rights are inherited from access rights associated with one or more of the plurality of interface screens, a folder containing the at least one interface screen, or both. Further, the processor provides access, via the protected interface screen, to monitor, control, or monitor and control the processes based upon the set of access rights.Type: ApplicationFiled: April 6, 2016Publication date: July 28, 2016Inventors: Michael A. Bush, Robert A. Brandt, Ronald E. Bliss, Michael B. Miller
-
Patent number: 9386015Abstract: Systems and/or methods are described relating to a security model that provides interoperability with foreign security domains while remaining scalable to small embedded devices. A security token service is provided, which is configured to issue, renew, and/or validate security tokens in response to a token request. A communication protocol, corresponding message structures, and the security tokens are defined in accordance with protocol buffer definitions.Type: GrantFiled: April 22, 2015Date of Patent: July 5, 2016Assignee: ROCKWELL AUTOMATION TECHNOLOGIES, INCInventors: Taryl J. Jasper, Michael B. Miller, Robert A. Brandt
-
Patent number: 9323245Abstract: An automation control system is provided with an interface device configured to enable a user to monitor, control, or monitor and control processes of the automation control system. Upon power on or initialization of the interface device or when a previously logged in user is logged off, the interface device logs in a guest account associated with a user role having a defined set of access rights and provides access to monitor, control, or monitor and control the processes based upon the set of access rights.Type: GrantFiled: November 2, 2012Date of Patent: April 26, 2016Assignee: Rockwell Automation Technologies, Inc.Inventors: Michael A. Bush, Robert A. Brandt, Ronald E. Bliss, Michael B. Miller
-
Publication number: 20150229640Abstract: Systems and/or methods are described relating to a security model that provides interoperability with foreign security domains while remaining scalable to small embedded devices. A security token service is provided, which is configured to issue, renew, and/or validate security tokens in response to a token request. A communication protocol, corresponding message structures, and the security tokens are defined in accordance with protocol buffer definitions.Type: ApplicationFiled: April 22, 2015Publication date: August 13, 2015Inventors: Taryl J. Jasper, Michael B. Miller, Robert A. Brandt
-
Patent number: 9043600Abstract: Systems and/or methods are described relating to a security model that provides interoperability with foreign security domains while remaining scalable to small embedded devices. A security token service is provided, which is configured to issue, renew, and/or validate security tokens in response to a token request. A communication protocol, corresponding message structures, and the security tokens are defined in accordance with protocol buffer definitions.Type: GrantFiled: July 3, 2013Date of Patent: May 26, 2015Assignee: ROCKWELL AUTOMATION TECHNOLOGIES, INC.Inventors: Taryl J. Jasper, Michael B. Miller, Robert A. Brandt
-
Publication number: 20130298217Abstract: Systems and/or methods are described relating to a security model that provides interoperability with foreign security domains while remaining scalable to small embedded devices. A security token service is provided, which is configured to issue, renew, and/or validate security tokens in response to a token request. A communication protocol, corresponding message structures, and the security tokens are defined in accordance with protocol buffer definitions.Type: ApplicationFiled: July 3, 2013Publication date: November 7, 2013Inventors: Taryl J. Jasper, Michael B. Miller, Robert A. Brandt
-
Patent number: 8504837Abstract: Systems and/or methods are described relating to a security model that provides interoperability with foreign security domains while remaining scalable to small embedded devices. A security token service is provided, which is configured to issue, renew, and/or validate security tokens in response to a token request. A communication protocol, corresponding message structures, and the security tokens are defined in accordance with protocol buffer definitions.Type: GrantFiled: October 15, 2010Date of Patent: August 6, 2013Assignee: Rockwell Automation Technologies, Inc.Inventors: Taryl J. Jasper, Michael B. Miller, Robert A. Brandt
-
Publication number: 20120096272Abstract: Systems and/or methods are described relating to a security model that provides interoperability with foreign security domains while remaining scalable to small embedded devices. A security token service is provided, which is configured to issue, renew, and/or validate security tokens in response to a token request. A communication protocol, corresponding message structures, and the security tokens are defined in accordance with protocol buffer definitions.Type: ApplicationFiled: October 15, 2010Publication date: April 19, 2012Applicant: ROCKWELL AUTOMATION TECHNOLOGIES, INC.Inventors: Taryl J. Jasper, Michael B. Miller, Robert A. Brandt