-
31.
公开(公告)号:US20250004450A1
公开(公告)日:2025-01-02
申请号:US18343551
申请日:2023-06-28
Applicant: Rockwell Automation Technologies, Inc
Inventor: Michael J. Anthony , Clark L. Case , Michael P. D'Amico , Taryl J. Jasper , Aaron D. Manela , David C. Mazur , Jonathan A. Mills , Nathaniel S. Sandler , Kurt D. Sneen , David A. Snyder
IPC: G05B19/418
Abstract: The present technology relates to artificial intelligence assisted device troubleshooting. In an implementation, an interface service of a human machine interface application trains a machine learning model on the content of an embeddings database. The interface service then receives an input comprising a context of an automation system design. The interface service generates a prompt that includes an instruction for the ML model to identify an anomaly type associated with the context of the automation system design and to generate a solution that addresses the anomaly type. The interface service transmits the prompt to the ML model and receives a response from the ML model that includes the anomaly type and the requested solution. After receiving a response, the interface service may modify the automation system design based on the content of the response and surface a graphical user interface that includes the modified design.
-
公开(公告)号:US20240223609A1
公开(公告)日:2024-07-04
申请号:US18092734
申请日:2023-01-03
Applicant: Rockwell Automation Technologies, Inc.
Inventor: Roch Mikolajczyk , Taryl J. Jasper , Jack M. Visoky
CPC classification number: H04L63/20 , G06F9/45508
Abstract: An OT device includes a processor and a memory. The memory stores a first policy, a second policy, and program instructions. The first policy includes a first set of settings associated with operation of the OT device. The second policy includes a second set of settings associated with the operation of the OT device. The program instructions, when executed by the processor, cause the processor to receive data associated with an event, identify a first action in response to the event based on the first policy, perform the identified first action, identify a second action in response to the event based on the second policy, and generate, in response to the first action being different from the second action, a record identifying a difference between the first action and the second action.
-
公开(公告)号:US20240077852A1
公开(公告)日:2024-03-07
申请号:US17929070
申请日:2022-09-01
Applicant: Rockwell Automation Technologies, Inc.
Inventor: Taryl J. Jasper , Charles M. Rischar , Radek Bartman , Eryn Amara Danielle Manela , Clark L. Case , Roman Vitek
IPC: G05B19/418
CPC classification number: G05B19/41835 , G05B2219/31368
Abstract: An industrial topology discovery system autonomously discovers and documents industrial automation system topologies using orchestrated discovery agents of various types. The topology discovery system can reside on a cloud platform or another high level network and deploy discovery agents on plant networks and devices within an industrial facility. These discovery agents can implement different strategies for discovering system information, and can include agents configured to monitor and report on communication traffic across respective types of networks, agents configured to probe respective device types for identity and configuration information, and other types of agents. Discovery services executed by the topology discovery system can collect device and network information obtained by the agents and use this information to document the topology of the automation system as well as to orchestrate the discovery behavior of the agents to extract further information about the system based on defined discovery rules.
-
34.
公开(公告)号:US20240031445A1
公开(公告)日:2024-01-25
申请号:US17867931
申请日:2022-07-19
Applicant: Rockwell Automation Technologies, Inc.
Inventor: Timothy C. Mirth , Taryl J. Jasper , Terence S. Tenorio , Thaddeus A. Palus
IPC: H04L67/51 , H04L67/1061
CPC classification number: H04L67/51 , H04L67/1061 , H04W48/16
Abstract: Performing multi-layer network discovery of an operational technology (OT) network includes receiving a plurality of discovery data sets, each identifying a respective subset of a plurality of nodes within an OT network having a plurality of network layers, wherein the respective subset of the plurality of nodes for a first discovery data set are disposed within at least two network layers of the plurality of network layers, identifying a set of nodes within the OT network that appear in two or more of the plurality of discovery data sets, generating a holistic discovery data set for the OT network based on the plurality of discovery data sets and the identified set of nodes within the OT network that appear in the two or more of the plurality of discovery data sets, and generating a visualization of the plurality of nodes within the OT network based on the holistic discovery data set.
-
公开(公告)号:US20240028009A1
公开(公告)日:2024-01-25
申请号:US17870352
申请日:2022-07-21
Applicant: Rockwell Automation Technologies, Inc.
Inventor: Timothy C. Mirth , Taryl J. Jasper , Terence S. Tenorio , Thaddeus A. Palus
IPC: G05B19/418
CPC classification number: G05B19/4185
Abstract: A method includes receiving, from an enterprise network, data associated with one or more industrial automation systems operated by an enterprise, wherein the data includes design artifacts of the one or more industrial automation systems, run time data collected from the one or more industrial automation systems, or both, inputting the data to a machine learning-based security policy development engine to generate a set of recommended security policies for the enterprise based on the data, receiving the set of recommended security policies for the one or more industrial automation systems output by the security policy development engine, wherein the set of recommended security policies define access, use, or both, of the one or more industrial automation systems operated by the enterprise; and transmitting the set of recommended security policies to the enterprise.
-
36.
公开(公告)号:US20230421615A1
公开(公告)日:2023-12-28
申请号:US17852017
申请日:2022-06-28
Applicant: ROCKWELL AUTOMATION TECHNOLOGIES, INC.
Inventor: Jack M. Visoky , Taryl J. Jasper
IPC: H04L9/40
CPC classification number: H04L63/205
Abstract: A system includes a first computing node of a cluster of computing nodes that are part of a container orchestration system, a control system for controlling one or more operations of an operation technology (OT) component, and a second node of the cluster of computing nodes. The control system is communicatively coupled to the first computing node and the OT component. The second computing node may transmit a pod to the first computing node. The pod may cause the first computing node to perform operations that include deploying a container as a digital representation of the OT component, testing a security update on the digital representation, determining that the security update is ready for implementation in the OT component, and transmitting an indication that the security update is available for implementation to the OT component after determining that the security update is ready for implementation.
-
公开(公告)号:US20190319943A1
公开(公告)日:2019-10-17
申请号:US15951464
申请日:2018-04-12
Applicant: Rockwell Automation Technologies, Inc.
Inventor: Taryl J. Jasper , Dukki Chung , Jack M. Visoky , Michael A. Bush
Abstract: A secure method for establishing communications to provision modules in an industrial control system generates a certificate signing request to obtain a signed security certificate. A mobile device is located proximate to the module with the certificate signing request, and the mobile device has previously established itself as a secure communication interface on the network. The mobile device establishes a first connection between the module and the mobile device via a short-range protocol and a s second connection between the mobile device and a signing server via a network. The mobile device retrieves the certificate signing request via the first connection and transmits the certificate signing request to the signing server via the second connection. Because the mobile device has previously established itself as a secure interface, the transmission of the certificate signing request to the signing server may be made via a secure connection.
-
38.
公开(公告)号:US10075450B2
公开(公告)日:2018-09-11
申请号:US15153663
申请日:2016-05-12
Applicant: Rockwell Automation Technologies, Inc.
Inventor: Michael A. Bush , Clark L. Case , Taryl J. Jasper
IPC: H04L29/06
CPC classification number: H04L63/105 , G05B2219/24154 , H04L63/0428 , H04L63/0838
Abstract: Techniques to facilitate temporary escalation of access privileges for a control program associated with a machine system in an industrial automation environment are disclosed. In at least one implementation, a request is received from a user for a temporary access level increase to utilize protected functions of the control program. An encrypted string is generated comprising a temporary password authorized to access the protected functions of the control program. The encrypted string is provided to the user, wherein the user provides the encrypted string to an administrator and the administrator authenticates the user for the temporary access level increase, decrypts the temporary password, and provides the temporary password to the user. A login request is received from the user with the temporary password, and the temporary access level increase is responsively granted to allow the user to utilize the protected functions of the control program.
-
公开(公告)号:US09467289B2
公开(公告)日:2016-10-11
申请号:US13868016
申请日:2013-04-22
Applicant: Rockwell Automation Technologies, Inc.
Inventor: Mark B. Anderson , David D. Brandt , Ramdas M. Pai , Taryl J. Jasper
CPC classification number: H04L9/12 , G06F21/73 , G06F2221/2129 , H04L63/0428 , H04L63/1466
Abstract: A network security system comprises a first component that generates an address for identifying a communicating device on a network. A second component receives the address generated by the first component and facilitates transitioning from an existent address to the generated address. Such transitioning is effectuated in order to protect the network against attack while providing seamless communications with respect to the communicating device.
-
40.
公开(公告)号:US20140336790A1
公开(公告)日:2014-11-13
申请号:US14341391
申请日:2014-07-25
Applicant: ROCKWELL AUTOMATION TECHNOLOGIES, INC.
Inventor: David A. Vasko , Charles Martin Rischar , Kenwood H. Hall , Subbian Govindaraj , Robert J. Kretschmann , Michael D. Kalan , Paul R. D'Mura , Taryl J. Jasper , Eugene Liberman , Raymond J. Staron
IPC: G05B13/02
CPC classification number: G05B13/024 , G05B19/41845 , G05B23/0291 , G05B2219/32019 , Y02P90/16
Abstract: An industrial control configuration can be a dynamic entity where different controllers are added, are subtracted, fail, etc. When dynamic functions occur, bindings of the configuration can benefit from a modification. Therefore, automatic adjustment of bindings can occur to facilitated improved operation. Automatic adjustment can be practiced when the industrial control configuration is a distributed control configuration without reliance upon a central database.
Abstract translation: 工业控制配置可以是动态实体,其中添加了不同的控制器,被减去,失败等。当发生动态功能时,配置的绑定可以受益于修改。 因此,可以进行绑定的自动调整,以促进改进的操作。 当工业控制配置是分布式控制配置而不依赖于中央数据库时,可以实现自动调整。
-
-
-
-
-
-
-
-
-