Patents by Inventor Robert A. Johnson

Robert A. Johnson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12225017
    Abstract: A method of creating secure endpoints on a network includes registering by a node using a random selection algorithm to choose which server to register to; receiving by the node a property set ID of a property set that the node is a member of; and authorizing by the node using the property set ID to look up its authorization details in the property set. A method of creating secure endpoints on a secure network having at least one community of interest, includes registering by a node using a random selection algorithm to choose which server to register to; receiving by the node a property set ID of a property set that the node is a member of; and authorizing by the node through an authorization server using the property set ID to look up its authorization details in the property set; wherein the node and the authorization server are a member of the at least one community of interest.
    Type: Grant
    Filed: July 27, 2021
    Date of Patent: February 11, 2025
    Assignee: UNISYS CORPORATION
    Inventors: Jared Poetter, Michael C Leap, Diane E Schaefer, Robert A Johnson, Michael Saunders, Robert R Buckwalter, Sarah K Inforzato, Eugene J Gretter, George Karian
  • Patent number: 12124563
    Abstract: Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may be logically organized into a number of community-of-interest (COI) groups. Each COI may use an encryption key to secure communications within the COI, such that only other virtual machines in the COI may decrypt the message. Remote devices may gain access to virtual machines in a network through a virtual device relay. The virtual device relay receives data from the remote device, such as a tablet or cellular phone, and forwards the data to one of the virtual machines, when the virtual device relay shares a COI with the destination virtual machine.
    Type: Grant
    Filed: June 3, 2021
    Date of Patent: October 22, 2024
    Assignee: Unisys Corporation
    Inventors: Ralph Farina, Ted Hinaman, Robert A. Johnson, Steven Rajcan, James Trocki, Mark Vallevand
  • Patent number: 11729004
    Abstract: Methods and systems for remote dynamic isolation of IoT devices are provided. One system includes a first IoT device and a second IoT device configured with an active communication channel with the first IoT device and a role certificate. An operator device is configured to interact with a distributed ledger to issue and revoke role certificates for a plurality of devices including the first IoT device and the second IoT device. The first IoT device periodically validates a role certificate proof received from the second IoT device with an entry of the role certificate proof recorded on the distributed ledger.
    Type: Grant
    Filed: September 15, 2021
    Date of Patent: August 15, 2023
    Assignee: Unisys Corporation
    Inventors: Sanket Panchamia, Kanupriya Pandey, Mehdi Entezari, Sachin B Patil, Amith Kk, Robert A Johnson
  • Patent number: 11655910
    Abstract: A valve installation is provided, including a valve assembly having a valve, and a fluidized valve actuator coupled with the valve assembly. The actuator includes at least two cylinders and pistons positioned to communicate fluid to apply pressure to the valve assembly. Extension of each piston communicates pressure to the valve assembly and at least partially lifts the valve into an at least partially lifted and open position. The valve installation may be used to regulate fluid flow in various systems, including cyclical swing adsorption processes.
    Type: Grant
    Filed: October 2, 2020
    Date of Patent: May 23, 2023
    Assignee: ExxonMobil Technology and Engineering Company
    Inventors: John W. Fulton, William N. Yunker, Bennett D. Marshall, Robert A. Johnson, Roland Mischler, Stefan Aschwanden
  • Publication number: 20220393884
    Abstract: Methods and systems for remote dynamic isolation of IoT devices are provided. One system includes a first IoT device and a second IoT device configured with an active communication channel with the first IoT device and a role certificate. An operator device is configured to interact with a distributed ledger to issue and revoke role certificates for a plurality of devices including the first IoT device and the second IoT device. The first IoT device periodically validates a role certificate proof received from the second IoT device with an entry of the role certificate proof recorded on the distributed ledger.
    Type: Application
    Filed: September 15, 2021
    Publication date: December 8, 2022
    Applicant: Unisys Corporation
    Inventors: Sanket Panchamia, Kanupriya Pandey, Mehdi Entezari, Sachin B. Patil, Amith Kk, Robert A. Johnson
  • Publication number: 20220394028
    Abstract: Systems and method for flexible authentication of IoT devices that can accommodate non-IP environments are disclosed. One system includes a plurality of devices, with each device including a universal authentication agent and a verification certificate, wherein each verification certificate includes a proof that is recorded on an entry on a distributed ledger. The verification certificate proof is shared with one or more devices which verify the proof with the entry. A universal authentication service is configured with the universal authentication agent of at least one device to connect the at least one device with the distributed ledger.
    Type: Application
    Filed: September 15, 2021
    Publication date: December 8, 2022
    Applicant: Unisys Corporation
    Inventors: Sanket Panchamia, Kanupriya Pandey, Mehdi Entezari, Sachin B. Patil, Amith KK, Robert A. Johnson
  • Publication number: 20220393883
    Abstract: Methods and systems for direct, machine-to-machine authentication through a trusted chain of ownership are disclosed. One method includes receiving, at a first device from a second device, a request for a certificate proof. The method also includes transmitting, to the second device, and in response to the request, the certificate proof from the first device, an entry of the proof being recorded on a distributed ledger. The certificate proof is useable by the second device to authenticate the first device based on a comparison of the proof and the entry on the distributed ledger, thereby establishing trust with the first device at the second device.
    Type: Application
    Filed: September 15, 2021
    Publication date: December 8, 2022
    Applicant: Unisys Corporation
    Inventors: Sanket Panchamia, Akshvir Singh Soni, Kanupriya Pandey, Mehdi Entezari, Amith KK, Sachin B Patil, Robert A. Johnson
  • Patent number: 11413567
    Abstract: Provided are apparatus and systems for performing a swing adsorption process. This swing adsorption process may involve performing modeling to generate a swing adsorption system to manage a feed stream to produce a product stream within specification. The process may be utilized for swing adsorption processes, such as TSA and/or PSA, which are utilized to remove one or more contaminants from a gaseous feed stream.
    Type: Grant
    Filed: January 31, 2019
    Date of Patent: August 16, 2022
    Assignee: ExxonMobil Upstream Research Company
    Inventor: Robert A. Johnson
  • Publication number: 20220029996
    Abstract: A network model includes nodes, node property sets, authorization groups and authorization servers. The node property sets define how the nodes operate and authenticate. The nodes are member of the node property sets. The authorization groups are associated with the node property set. And, authorization servers are member of the authorization groups. In addition, a network model in a secure network environment has at least one community of interest. The network model includes at least one node being a member of a node property set that defines how the node operates and authenticates.
    Type: Application
    Filed: July 27, 2021
    Publication date: January 27, 2022
    Applicant: Unisys Corporation
    Inventors: Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Di Domenico, Philippe Jolly, Richard W. Phelps, Robert A.` Johnson, Michael Saunders, Robert R. Buckwalter, Sarah K. Inforzato, Eugene J. Gretter, George Karian
  • Publication number: 20220030001
    Abstract: A method of creating secure endpoints on a network includes registering by a node using a random selection algorithm to choose which server to register to; receiving by the node a property set ID of a property set that the node is a member of; and authorizing by the node using the property set ID to look up its authorization details in the property set. A method of creating secure endpoints on a secure network having at least one community of interest, includes registering by a node using a random selection algorithm to choose which server to register to; receiving by the node a property set ID of a property set that the node is a member of; and authorizing by the node through an authorization server using the property set ID to look up its authorization details in the property set; wherein the node and the authorization server are a member of the at least one community of interest.
    Type: Application
    Filed: July 27, 2021
    Publication date: January 27, 2022
    Applicant: Unisys Corporation
    Inventors: Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Di Domenico, Philippe Jolly, Richard W. Phelps, Robert A. Johnson, Michael Saunders, Robert R. Buckwalter, Sarah K. lnforzato, Eugene J. Gretter, George Karian
  • Publication number: 20220030032
    Abstract: A generic endpoint package includes a generic node configuration, which can be used by all nodes within a network, containing consolidated configuration information regardless of the operating system, the generic node configuration including: node property sets; common information containing rules to apply to nodes while in service mode and prior to authorization; and registration information directing the node to a pre-defined registration servers. A method of using a generic endpoint package includes deploying the generic endpoint package having a generic node configuration, which can be used by all nodes within a network, containing consolidated configuration information regardless of the operating system, the generic node configuration including: node property sets; common information containing rules to apply to nodes while in service mode and prior to authorization; and registration information directing the node to a pre-defined registration servers.
    Type: Application
    Filed: July 27, 2021
    Publication date: January 27, 2022
    Applicant: Unisys Corporation
    Inventors: Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Di Domenico, Philippe Jolly, Richard W. Phelps, Robert A. Johnson, Michael Saunders, Robert R. Buckwalter, Sarah K. Inforzato, Eugene J. Gretter, George Karian
  • Publication number: 20210326353
    Abstract: A method of deploying a solution in a network secured network environment using a network visualization software application is disclosed. The method includes receiving, by a processor, a user selected solution to deploy; queuing, by the processor, the solution to deploy; determining, by the processor, if the user desires to synchronize the solution; if the user desires to synchronize the solution, synchronizing, by the processor, the solution; and if the user does not desire to synchronize the solution, failing, by the processor the solution.
    Type: Application
    Filed: July 23, 2020
    Publication date: October 21, 2021
    Inventors: Jared Poetter, Michael C. Leap, Robert A. Johnson, Philippe Jolly, Richard W. Phelps, Michael J. Di Domenico, Diane Schaefer
  • Publication number: 20210326322
    Abstract: A method of tracking changes in a network visualization software application includes creating, by a processor, a log table corresponding to an object table for an object in the software application; monitoring, by the processor, the object for a user action; determining, by the processor if the object has been acted upon by the user; and if the object has been acted upon by the user, then inserting, by the processor, a new row in the log table reflecting the action on the object.
    Type: Application
    Filed: July 23, 2020
    Publication date: October 21, 2021
    Inventors: Jared Poetter, Michael C. Leap, Robert A. Johnson, Philippe Jolly, Richard W. Phelps, Michael J. Di Domenico, Daniel O'Lone, Roman Senyszyn, Ben Conner Llewelyn
  • Patent number: 11153348
    Abstract: Methods and systems for providing integration between an enterprise security management configuration tool and third party network traffic software are disclosed. By defining a software interface through which configuration data for third party networking devices can be queried and configuration data accessed, the enterprise security management configuration tool can compare overall network traffic to the configuration provided by the third party networking software to assess an overall security level within an enterprise network.
    Type: Grant
    Filed: July 23, 2019
    Date of Patent: October 19, 2021
    Assignee: Unisys Corporation
    Inventors: Michael Didomenico, Michael C. Leap, Emily M. Shoup, Richard W. Phelps, Robert A. Johnson, Philippe Jolly, Jared Poetter
  • Publication number: 20210294891
    Abstract: Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may be logically organized into a number of community-of-interest (COI) groups. Each COI may use an encryption key to secure communications within the COI, such that only other virtual machines in the COI may decrypt the message. Remote devices may gain access to virtual machines in a network through a virtual device relay. The virtual device relay receives data from the remote device, such as a tablet or cellular phone, and forwards the data to one of the virtual machines, when the virtual device relay shares a COI with the destination virtual machine.
    Type: Application
    Filed: June 3, 2021
    Publication date: September 23, 2021
    Inventors: Ralph Farina, Ted Hinaman, Robert A. Johnson, Steven Rajcan, James Trocki, Mark Vallevand
  • Patent number: 11110388
    Abstract: Provided are apparatus and systems for performing a swing adsorption process. This swing adsorption process may involve passing an input feed stream through two swing adsorption systems as a purge stream to remove contaminants, such as water, from the respective adsorbent bed units. The wet purge product stream is passed to a solvent based gas treating system, which forms a wet hydrocarbon rich stream and a wet acid gas stream. Then, the wet hydrocarbon rich stream and the wet acid gas stream are passed through one of the respective swing adsorption systems to remove some of the moisture from the respective wet streams.
    Type: Grant
    Filed: August 23, 2019
    Date of Patent: September 7, 2021
    Assignee: ExxonMobil Upstream Research Company
    Inventors: Robert D. Denton, Ananda K. Nagavarapu, Bruce T. Kelley, Robert A. Johnson, Bennett D. Marshall
  • Publication number: 20210266289
    Abstract: A method of securing containers within clusters is disclosed. The method includes configuring service access points within clusters as secure endpoints; associating services within clusters with secure identities to constrain which communities-of-interest can reach which services; and wherein each cluster is cryptographically isolated such that no information will leak in or out of the cluster through an associated network.
    Type: Application
    Filed: February 21, 2020
    Publication date: August 26, 2021
    Applicant: Unisys Corporation
    Inventors: David Maw, Robert A Johnson, Alex Dorrell, Arthur J Nilson
  • Patent number: 11063982
    Abstract: Methods and systems for configuring a common security policy for a plurality of nodes included within an enterprise network. Example methods can include grouping nodes within profiles based on IP address, in addition to concordance data. Additionally, nodes may be added to profiles based on a classification of the node being common to classifications of nodes within the profile. Still further, profiles may be grouped into a solution based at least in part on classification of the profile, in addition to grouping of profiles into solutions based on affinitization using concordance data. The methods described also include determining a common security policy to apply to each of the nodes within the profile.
    Type: Grant
    Filed: January 25, 2019
    Date of Patent: July 13, 2021
    Assignee: Unisys Corporation
    Inventors: Michael Di Domenico, Robert A. Johnson, Philippe Jolly, Michael C. Leap, Richard W. Phelps, Emily M. Shoup
  • Patent number: 11033852
    Abstract: Provided are apparatus and systems for performing a swing adsorption process. This swing adsorption process may involve performing a startup mode process prior to beginning a normal operation mode process to remove contaminants from a gaseous feed stream. The startup mode process may be utilized for swing adsorption processes, such as TSA and/or PSA, which are utilized to remove one or more contaminants from a gaseous feed stream.
    Type: Grant
    Filed: August 20, 2019
    Date of Patent: June 15, 2021
    Assignee: ExxonMobil Upstream Research Company
    Inventors: Ananda Krishna Nagavarapu, William Barnes, Bennett D. Marshall, Bruce T. Kelley, Robert A. Johnson
  • Patent number: D924883
    Type: Grant
    Filed: May 5, 2017
    Date of Patent: July 13, 2021
    Assignee: Unisys Corporation
    Inventors: Robert A Johnson, Michael J DiDomenico, Philippe Jolly, Michael C Leap, Richard W Phelps