Patents by Inventor Robert A. Johnson
Robert A. Johnson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12225017Abstract: A method of creating secure endpoints on a network includes registering by a node using a random selection algorithm to choose which server to register to; receiving by the node a property set ID of a property set that the node is a member of; and authorizing by the node using the property set ID to look up its authorization details in the property set. A method of creating secure endpoints on a secure network having at least one community of interest, includes registering by a node using a random selection algorithm to choose which server to register to; receiving by the node a property set ID of a property set that the node is a member of; and authorizing by the node through an authorization server using the property set ID to look up its authorization details in the property set; wherein the node and the authorization server are a member of the at least one community of interest.Type: GrantFiled: July 27, 2021Date of Patent: February 11, 2025Assignee: UNISYS CORPORATIONInventors: Jared Poetter, Michael C Leap, Diane E Schaefer, Robert A Johnson, Michael Saunders, Robert R Buckwalter, Sarah K Inforzato, Eugene J Gretter, George Karian
-
Patent number: 12124563Abstract: Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may be logically organized into a number of community-of-interest (COI) groups. Each COI may use an encryption key to secure communications within the COI, such that only other virtual machines in the COI may decrypt the message. Remote devices may gain access to virtual machines in a network through a virtual device relay. The virtual device relay receives data from the remote device, such as a tablet or cellular phone, and forwards the data to one of the virtual machines, when the virtual device relay shares a COI with the destination virtual machine.Type: GrantFiled: June 3, 2021Date of Patent: October 22, 2024Assignee: Unisys CorporationInventors: Ralph Farina, Ted Hinaman, Robert A. Johnson, Steven Rajcan, James Trocki, Mark Vallevand
-
Patent number: 11729004Abstract: Methods and systems for remote dynamic isolation of IoT devices are provided. One system includes a first IoT device and a second IoT device configured with an active communication channel with the first IoT device and a role certificate. An operator device is configured to interact with a distributed ledger to issue and revoke role certificates for a plurality of devices including the first IoT device and the second IoT device. The first IoT device periodically validates a role certificate proof received from the second IoT device with an entry of the role certificate proof recorded on the distributed ledger.Type: GrantFiled: September 15, 2021Date of Patent: August 15, 2023Assignee: Unisys CorporationInventors: Sanket Panchamia, Kanupriya Pandey, Mehdi Entezari, Sachin B Patil, Amith Kk, Robert A Johnson
-
Adsorption processes and systems utilizing step lift control of hydraulically actuated poppet valves
Patent number: 11655910Abstract: A valve installation is provided, including a valve assembly having a valve, and a fluidized valve actuator coupled with the valve assembly. The actuator includes at least two cylinders and pistons positioned to communicate fluid to apply pressure to the valve assembly. Extension of each piston communicates pressure to the valve assembly and at least partially lifts the valve into an at least partially lifted and open position. The valve installation may be used to regulate fluid flow in various systems, including cyclical swing adsorption processes.Type: GrantFiled: October 2, 2020Date of Patent: May 23, 2023Assignee: ExxonMobil Technology and Engineering CompanyInventors: John W. Fulton, William N. Yunker, Bennett D. Marshall, Robert A. Johnson, Roland Mischler, Stefan Aschwanden -
Publication number: 20220393884Abstract: Methods and systems for remote dynamic isolation of IoT devices are provided. One system includes a first IoT device and a second IoT device configured with an active communication channel with the first IoT device and a role certificate. An operator device is configured to interact with a distributed ledger to issue and revoke role certificates for a plurality of devices including the first IoT device and the second IoT device. The first IoT device periodically validates a role certificate proof received from the second IoT device with an entry of the role certificate proof recorded on the distributed ledger.Type: ApplicationFiled: September 15, 2021Publication date: December 8, 2022Applicant: Unisys CorporationInventors: Sanket Panchamia, Kanupriya Pandey, Mehdi Entezari, Sachin B. Patil, Amith Kk, Robert A. Johnson
-
Publication number: 20220394028Abstract: Systems and method for flexible authentication of IoT devices that can accommodate non-IP environments are disclosed. One system includes a plurality of devices, with each device including a universal authentication agent and a verification certificate, wherein each verification certificate includes a proof that is recorded on an entry on a distributed ledger. The verification certificate proof is shared with one or more devices which verify the proof with the entry. A universal authentication service is configured with the universal authentication agent of at least one device to connect the at least one device with the distributed ledger.Type: ApplicationFiled: September 15, 2021Publication date: December 8, 2022Applicant: Unisys CorporationInventors: Sanket Panchamia, Kanupriya Pandey, Mehdi Entezari, Sachin B. Patil, Amith KK, Robert A. Johnson
-
Publication number: 20220393883Abstract: Methods and systems for direct, machine-to-machine authentication through a trusted chain of ownership are disclosed. One method includes receiving, at a first device from a second device, a request for a certificate proof. The method also includes transmitting, to the second device, and in response to the request, the certificate proof from the first device, an entry of the proof being recorded on a distributed ledger. The certificate proof is useable by the second device to authenticate the first device based on a comparison of the proof and the entry on the distributed ledger, thereby establishing trust with the first device at the second device.Type: ApplicationFiled: September 15, 2021Publication date: December 8, 2022Applicant: Unisys CorporationInventors: Sanket Panchamia, Akshvir Singh Soni, Kanupriya Pandey, Mehdi Entezari, Amith KK, Sachin B Patil, Robert A. Johnson
-
Patent number: 11413567Abstract: Provided are apparatus and systems for performing a swing adsorption process. This swing adsorption process may involve performing modeling to generate a swing adsorption system to manage a feed stream to produce a product stream within specification. The process may be utilized for swing adsorption processes, such as TSA and/or PSA, which are utilized to remove one or more contaminants from a gaseous feed stream.Type: GrantFiled: January 31, 2019Date of Patent: August 16, 2022Assignee: ExxonMobil Upstream Research CompanyInventor: Robert A. Johnson
-
Publication number: 20220029996Abstract: A network model includes nodes, node property sets, authorization groups and authorization servers. The node property sets define how the nodes operate and authenticate. The nodes are member of the node property sets. The authorization groups are associated with the node property set. And, authorization servers are member of the authorization groups. In addition, a network model in a secure network environment has at least one community of interest. The network model includes at least one node being a member of a node property set that defines how the node operates and authenticates.Type: ApplicationFiled: July 27, 2021Publication date: January 27, 2022Applicant: Unisys CorporationInventors: Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Di Domenico, Philippe Jolly, Richard W. Phelps, Robert A.` Johnson, Michael Saunders, Robert R. Buckwalter, Sarah K. Inforzato, Eugene J. Gretter, George Karian
-
Publication number: 20220030001Abstract: A method of creating secure endpoints on a network includes registering by a node using a random selection algorithm to choose which server to register to; receiving by the node a property set ID of a property set that the node is a member of; and authorizing by the node using the property set ID to look up its authorization details in the property set. A method of creating secure endpoints on a secure network having at least one community of interest, includes registering by a node using a random selection algorithm to choose which server to register to; receiving by the node a property set ID of a property set that the node is a member of; and authorizing by the node through an authorization server using the property set ID to look up its authorization details in the property set; wherein the node and the authorization server are a member of the at least one community of interest.Type: ApplicationFiled: July 27, 2021Publication date: January 27, 2022Applicant: Unisys CorporationInventors: Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Di Domenico, Philippe Jolly, Richard W. Phelps, Robert A. Johnson, Michael Saunders, Robert R. Buckwalter, Sarah K. lnforzato, Eugene J. Gretter, George Karian
-
Publication number: 20220030032Abstract: A generic endpoint package includes a generic node configuration, which can be used by all nodes within a network, containing consolidated configuration information regardless of the operating system, the generic node configuration including: node property sets; common information containing rules to apply to nodes while in service mode and prior to authorization; and registration information directing the node to a pre-defined registration servers. A method of using a generic endpoint package includes deploying the generic endpoint package having a generic node configuration, which can be used by all nodes within a network, containing consolidated configuration information regardless of the operating system, the generic node configuration including: node property sets; common information containing rules to apply to nodes while in service mode and prior to authorization; and registration information directing the node to a pre-defined registration servers.Type: ApplicationFiled: July 27, 2021Publication date: January 27, 2022Applicant: Unisys CorporationInventors: Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Di Domenico, Philippe Jolly, Richard W. Phelps, Robert A. Johnson, Michael Saunders, Robert R. Buckwalter, Sarah K. Inforzato, Eugene J. Gretter, George Karian
-
Publication number: 20210326353Abstract: A method of deploying a solution in a network secured network environment using a network visualization software application is disclosed. The method includes receiving, by a processor, a user selected solution to deploy; queuing, by the processor, the solution to deploy; determining, by the processor, if the user desires to synchronize the solution; if the user desires to synchronize the solution, synchronizing, by the processor, the solution; and if the user does not desire to synchronize the solution, failing, by the processor the solution.Type: ApplicationFiled: July 23, 2020Publication date: October 21, 2021Inventors: Jared Poetter, Michael C. Leap, Robert A. Johnson, Philippe Jolly, Richard W. Phelps, Michael J. Di Domenico, Diane Schaefer
-
Publication number: 20210326322Abstract: A method of tracking changes in a network visualization software application includes creating, by a processor, a log table corresponding to an object table for an object in the software application; monitoring, by the processor, the object for a user action; determining, by the processor if the object has been acted upon by the user; and if the object has been acted upon by the user, then inserting, by the processor, a new row in the log table reflecting the action on the object.Type: ApplicationFiled: July 23, 2020Publication date: October 21, 2021Inventors: Jared Poetter, Michael C. Leap, Robert A. Johnson, Philippe Jolly, Richard W. Phelps, Michael J. Di Domenico, Daniel O'Lone, Roman Senyszyn, Ben Conner Llewelyn
-
Patent number: 11153348Abstract: Methods and systems for providing integration between an enterprise security management configuration tool and third party network traffic software are disclosed. By defining a software interface through which configuration data for third party networking devices can be queried and configuration data accessed, the enterprise security management configuration tool can compare overall network traffic to the configuration provided by the third party networking software to assess an overall security level within an enterprise network.Type: GrantFiled: July 23, 2019Date of Patent: October 19, 2021Assignee: Unisys CorporationInventors: Michael Didomenico, Michael C. Leap, Emily M. Shoup, Richard W. Phelps, Robert A. Johnson, Philippe Jolly, Jared Poetter
-
Publication number: 20210294891Abstract: Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may be logically organized into a number of community-of-interest (COI) groups. Each COI may use an encryption key to secure communications within the COI, such that only other virtual machines in the COI may decrypt the message. Remote devices may gain access to virtual machines in a network through a virtual device relay. The virtual device relay receives data from the remote device, such as a tablet or cellular phone, and forwards the data to one of the virtual machines, when the virtual device relay shares a COI with the destination virtual machine.Type: ApplicationFiled: June 3, 2021Publication date: September 23, 2021Inventors: Ralph Farina, Ted Hinaman, Robert A. Johnson, Steven Rajcan, James Trocki, Mark Vallevand
-
Patent number: 11110388Abstract: Provided are apparatus and systems for performing a swing adsorption process. This swing adsorption process may involve passing an input feed stream through two swing adsorption systems as a purge stream to remove contaminants, such as water, from the respective adsorbent bed units. The wet purge product stream is passed to a solvent based gas treating system, which forms a wet hydrocarbon rich stream and a wet acid gas stream. Then, the wet hydrocarbon rich stream and the wet acid gas stream are passed through one of the respective swing adsorption systems to remove some of the moisture from the respective wet streams.Type: GrantFiled: August 23, 2019Date of Patent: September 7, 2021Assignee: ExxonMobil Upstream Research CompanyInventors: Robert D. Denton, Ananda K. Nagavarapu, Bruce T. Kelley, Robert A. Johnson, Bennett D. Marshall
-
Publication number: 20210266289Abstract: A method of securing containers within clusters is disclosed. The method includes configuring service access points within clusters as secure endpoints; associating services within clusters with secure identities to constrain which communities-of-interest can reach which services; and wherein each cluster is cryptographically isolated such that no information will leak in or out of the cluster through an associated network.Type: ApplicationFiled: February 21, 2020Publication date: August 26, 2021Applicant: Unisys CorporationInventors: David Maw, Robert A Johnson, Alex Dorrell, Arthur J Nilson
-
Patent number: 11063982Abstract: Methods and systems for configuring a common security policy for a plurality of nodes included within an enterprise network. Example methods can include grouping nodes within profiles based on IP address, in addition to concordance data. Additionally, nodes may be added to profiles based on a classification of the node being common to classifications of nodes within the profile. Still further, profiles may be grouped into a solution based at least in part on classification of the profile, in addition to grouping of profiles into solutions based on affinitization using concordance data. The methods described also include determining a common security policy to apply to each of the nodes within the profile.Type: GrantFiled: January 25, 2019Date of Patent: July 13, 2021Assignee: Unisys CorporationInventors: Michael Di Domenico, Robert A. Johnson, Philippe Jolly, Michael C. Leap, Richard W. Phelps, Emily M. Shoup
-
Patent number: 11033852Abstract: Provided are apparatus and systems for performing a swing adsorption process. This swing adsorption process may involve performing a startup mode process prior to beginning a normal operation mode process to remove contaminants from a gaseous feed stream. The startup mode process may be utilized for swing adsorption processes, such as TSA and/or PSA, which are utilized to remove one or more contaminants from a gaseous feed stream.Type: GrantFiled: August 20, 2019Date of Patent: June 15, 2021Assignee: ExxonMobil Upstream Research CompanyInventors: Ananda Krishna Nagavarapu, William Barnes, Bennett D. Marshall, Bruce T. Kelley, Robert A. Johnson
-
Patent number: D924883Type: GrantFiled: May 5, 2017Date of Patent: July 13, 2021Assignee: Unisys CorporationInventors: Robert A Johnson, Michael J DiDomenico, Philippe Jolly, Michael C Leap, Richard W Phelps