Patent application number | Description | Published |
20090253624 | Pharmacologically active antiviral peptides and methods of use - This invention relates to peptides having antiviral properties. The antiviral peptides comprise membrane transiting peptides, and active fragments and derivatives of such peptides. The antiviral peptides exhibit activity against a broad spectrum of viruses, including enveloped and nonenveloped viruses, and are used in pharmaceutical compositions to prevent and/or treat viral infections. | 10-08-2009 |
20100040642 | NOVEL PEPTIDE ADJUVANT FOR INFLUENZA VACCINATION - The present disclosure generally relates to peptides having adjuvant properties, vaccines comprising the adjuvant peptides, and their use in prophylaxis or therapy for influenza. More particularly, the invention relates to adjuvant peptides that induce aggregation of influenza virus. The peptides can be included in influenza vaccines to increase the immune response to the vaccine. | 02-18-2010 |
20100041604 | NOVEL ANTIVIRAL PEPTIDES AGAINST INFLUENZA VIRUS - The present disclosure generally relates to peptides having antiviral properties. More particularly, the invention relates to peptides exhibiting activity against influenza viruses, to pharmaceutical compositions comprising the peptides, and to methods of using the peptides to prevent and/or treat influenza viral infections. | 02-18-2010 |
20120157376 | PHARMACOLOGICALLY ACTIVE ANTIVIRAL PEPTIDES AND METHODS OF THEIR USE - This invention relates to peptides having antiviral properties. The antiviral peptides comprise membrane transiting peptides, and active fragments and derivatives of such peptides. The antiviral peptides exhibit activity against a broad spectrum of viruses, including enveloped and nonenveloped viruses, and are used in pharmaceutical compositions to prevent and/or treat viral infections. | 06-21-2012 |
20130190228 | NOVEL ANTIVIRAL PEPTIDES AGAINST INFLUENZA VIRUS - The present disclosure generally relates to peptides having antiviral properties. More particularly, the invention relates to peptides exhibiting activity against influenza viruses, to pharmaceutical compositions comprising the peptides, and to methods of using the peptides to prevent and/or treat influenza viral infections. | 07-25-2013 |
Patent application number | Description | Published |
20100044567 | IN-CABINET THERMAL MONITORING METHOD AND SYSTEM - Thermographic imaging equipment is incorporated directly into cabinets housing electrical switchgear to provide for dedicated, nearly continuous monitoring of the contained equipment. A mechanical scanning technique may allow low-cost sensors to provide essentially continuous thermographic monitoring. Dedicated thermal imaging equipment allows automatic analysis through predefined temperature threshold maps. | 02-25-2010 |
20100079973 | ELECTRICAL SWITCHGEAR PROVIDING IMPROVED INFRARED PREDICTIVE/PREVENTIVE MAINTENANCE - One or more infrared transmitting ports are placed in the insulating housing of standard switchgear components to allow far infrared viewing of internal conductive components permitting earlier and more precise location of possible thermal failure through thermographic monitoring. | 04-01-2010 |
20100097186 | USER INTERFACE DEVICES FOR CONTROL OF MACHINE SYSTEMS - What is disclosed is a system for controlling a process, where the process is implemented by a machine system. The system includes a user interface device and a first transceiver coupled to the user interface device. The first transceiver is configured to receive communications from the user interface device and transfer the communications. The system also includes a second transceiver in communication with the first transceiver and configured to transfer power to the first transceiver, receive the communications from the first transceiver, and transfer the communications to control the process implemented by the machine system. | 04-22-2010 |
20100304683 | WIRELESS USER INTERFACE SYSTEM PERFORMANCE MONITORING - What is disclosed is a user interface system for controlling a process, where the process is implemented in a machine system. The user interface system includes a user interface configured to receive user input to control the process of the machine system. The user interface system also includes a first transceiver coupled to the user interface and configured to provide user power to the user interface, where the first transceiver is configured to wirelessly receive input power from a second transceiver. The user interface system also includes a processing system configured to monitor a performance factor of the first transceiver, process the performance factor to determine when a power transfer problem exists between the second transceiver and the first transceiver, and transfer an alert in response to the power transfer problem. | 12-02-2010 |
20110172838 | INDUSTRIAL CONTROL ENERGY OBJECT - An energy object extension to an industrial protocol having a comprehensive suite of attributes, messages and services utilized for the monitoring and control of energy consuming or producing resources by a manufacturing automation application is provided. The energy object includes an identifier associated with an energy resource that is associated with a manufacturing automation application and an energy type associated with the energy resource. This includes a measurement characteristic associated with the energy resource to facilitate energy management by the manufacturing automation application. | 07-14-2011 |
20110283350 | Firewall Method and Apparatus for Industrial Systems - Method and apparatus for use with systems including networked resources where communication between resources is via dual packet protocols wherein a first protocol includes a frame that specifies a destination device/resource and a data field and the second protocol specifies a final destination device/resource and includes a data field, where the second packets are encapsulated in the first protocol packet frames, the method including specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to the first protocol destination resource, examining a subset of the additional embedded packet information to identify one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function of the identified access control information. | 11-17-2011 |
20130096727 | INDUSTRIAL CONTROL ENERGY OBJECT - An energy object extension to an industrial protocol having a comprehensive suite of attributes, messages and services utilized for the monitoring and control of energy consuming or producing resources by a manufacturing automation application is provided. The energy object includes an identifier associated with an energy resource that is associated with a manufacturing automation application and an energy type associated with the energy resource. This includes a measurement characteristic associated with the energy resource to facilitate energy management by the manufacturing automation application. | 04-18-2013 |
20130178984 | PLUG AND PLAY MOTOR CONTROL SYSTEM - A motor control system is provided that includes a communication gateway that facilitates connection of components, such as a motor starter, an operator interface, and a terminal block, through a digital communication link. The communication gateway includes control logic designed to discover interface and operational components connected to the digital communication link upon start-up of the motor control system. The control logic may then set up an operational profile for the motor control system based on the discovered components. For example, the control logic may retrieve and load an operational profile that corresponds to the set of discovered components from a storage of the communication gateway. The operational profile can then be used during operation of the motor control system to govern the functionality of the motor control system. | 07-11-2013 |
20130238892 | METHOD FOR OBSCURING A CONTROL DEVICE'S NETWORK PRESENCE BY DYNAMICALLY CHANGING THE DEVICE'S NETWORK ADDRESSES USING A CRYPTOGRAPHY-BASED PATTERN - A network security system comprises a first component that generates an address for identifying a communicating device on a network. A second component receives the address generated by the first component and facilitates transitioning from an existent address to the generated address. Such transitioning is effectuated in order to protect the network against attack while providing seamless communications with respect to the communicating device. | 09-12-2013 |
20130338798 | WIRELESS USER INTERFACE SYSTEM PERFORMANCE MONITORING - What is disclosed is a wireless push button device. The wireless push button device includes a user interface configured to receive user input to control a process of a machine system. The wireless push button device also includes a first transceiver coupled to the user interface and configured to wirelessly receive input power from a second transceiver, provide user power to the user interface, and wirelessly transfer communications related to the user input to the second transceiver. The wireless push button device also includes a processing system configured to determine when a power transfer problem exists between the second transceiver and the first transceiver, and transfer an alert in response to the power transfer problem. | 12-19-2013 |
20140244003 | RECOGNITION-BASED INDUSTRIAL AUTOMATION CONTROL WITH REDUNDANT SYSTEM INPUT SUPPORT - The present disclosure generally relates to a method for performing industrial automation control in an industrial automation system. The method may include detecting, via a sensor system, positions and/or motions of a human. The method may then determine a possible automation command corresponding to the detected positions and/or motions, receive an automation system signal from at least one additional control component, and implement a control and/or notification action based upon the determined possible automation command and the received automation system signal. | 08-28-2014 |
20140244036 | RECOGNITION-BASED INDUSTRIAL AUTOMATION CONTROL WITH CONFIDENCE-BASED DECISION SUPPORT - The present disclosure generally relates to a method for performing industrial automation control in an industrial automation system. As such, the method may include detecting, via a sensor system, positions and/or motions of a human. The method may then include determining a possible automation command corresponding to the detected positions and/or motions. After determining the possible automation command, the method may implement a control and/or notification action based upon the detected positions and/or motions. | 08-28-2014 |
20140244037 | RECOGNITION-BASED INDUSTRIAL AUTOMATION CONTROL WITH PERSON AND OBJECT DISCRIMINATION - The present disclosure generally relates to a method for performing industrial automation control in an industrial automation system may include detecting, via a sensor system, positions and/or motions of one or more humans and/or one or more objects in an industrial automation system and distinguishing, via a programmed computer system, between one or more humans and one or more objects based upon the detected positions and/or motions. The method may then include implementing a control and/or notification action based upon the distinction. | 08-28-2014 |
20140250493 | FIREWALL METHOD AND APPARATUS FOR INDUSTRIAL SYSTEMS - Method and apparatus for use with systems including networked resources where communication between resources is via dual packet protocols wherein a first protocol includes a frame that specifies a destination device/resource and a data field and the second protocol specifies a final destination device/resource and includes a data field, where the second packets are encapsulated in the first protocol packet frames, the method including specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to the first protocol destination resource, examining a subset of the additional embedded packet information to identify one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function of the identified access control information. | 09-04-2014 |
20140250520 | FIREWALL METHOD AND APPARATUS FOR INDUSTRIAL SYSTEMS - Method and apparatus for use with systems including networked resources where communication between resources is via dual packet protocols wherein a first protocol includes a frame that specifies a destination device/resource and a data field and the second protocol specifies a final destination device/resource and includes a data field, where the second packets are encapsulated in the first protocol packet frames, the method including specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to the first protocol destination resource, examining a subset of the additional embedded packet information to identify one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function of the identified access control information. | 09-04-2014 |
20140257586 | INDUSTRIAL CONTROL ENERGY OBJECT - An energy object extension to an industrial protocol having a comprehensive suite of attributes, messages and services utilized for the monitoring and control of energy consuming or producing resources by a manufacturing automation application is provided. The energy object includes an identifier associated with an energy resource that is associated with a manufacturing automation application and an energy type associated with the energy resource. This includes a measurement characteristic associated with the energy resource to facilitate energy management by the manufacturing automation application. | 09-11-2014 |
20140259099 | FIREWALL METHOD AND APPARATUS FOR INDUSTRIAL SYSTEMS - Methods and apparatus for controlling access in an electronic network include receiving a communication from a source device, the communication comprising a first protocol packet having first protocol packet information including a first protocol destination resource identifier, wherein a second protocol packet is embedded in the first protocol packet; retrieving at least one access rule based on at least one characteristic of the second protocol packet; applying the at least one access rule to at least one characteristic of the first protocol packet to determine an access rule outcome; and controlling access of the communication to a first protocol destination resource associated with the first protocol destination resource identifier according to the access rule outcome. | 09-11-2014 |
20140277806 | EXTENSIBLE ENERGY MANAGEMENT ARCHITECTURE - An energy management system may include a plurality of industrial automation devices and a first energy agent embedded within an industrial automation device of the plurality of industrial automation devices. The first energy agent may monitor one or more energy properties that correspond to the industrial automation device. Also, the first energy agent may adjust one or more operations of the industrial automation device based at least in part on the energy properties and an energy objective. | 09-18-2014 |
Patent application number | Description | Published |
20080319567 | Location Based Programming And Data Management In An Automated Environment - A method and system for providing information related to a set of automated resources that may cooperate in an environment to perform an automated process, the method comprising the steps of associating a specific environment location with the automated process, determining the locations of resources with respect to the specific location and, where resources are proximate the specific location, providing information related to the automated process. Also a method for facility communication between distributed resources where location or an attribute akin thereto is used to tag data and to monitor network data for specific required data. | 12-25-2008 |
20130031037 | SYSTEM AND METHODOLOGY PROVIDING AUTOMATION SECURITY ANALYSIS AND NETWORK INTRUSION PROTECTION IN AN INDUSTRIAL ENVIRONMENT - The present invention relates to a system and methodology facilitating automation security in a networked-based industrial controller environment. Various components, systems and methodologies are provided to facilitate varying levels of automation security in accordance with security analysis tools, security validation tools and/or security learning systems. The security analysis tool receives abstract factory models or descriptions for input and generates an output that can include security guidelines, components, topologies, procedures, rules, policies, and the like for deployment in an automation security network. The validation tools are operative in the automation security network, wherein the tools perform security checking and/or auditing functions, for example, to determine if security components are in place and/or in suitable working order. The security learning system monitors/learns network traffic patterns during a learning phase, fires alarms or events based upon detected deviations from the learned patterns, and/or causes other automated actions to occur. | 01-31-2013 |
20150067844 | SYSTEM AND METHODOLOGY PROVIDING AUTOMATION SECURITY ANALYSIS, VALIDATION, AND LEARNING IN AN INDUSTRIAL CONTROLLER ENVIRONMENT - The present invention relates to a system and methodology facilitating automation security in a networked-based industrial controller environment. Various components, systems and methodologies are provided to facilitate varying levels of automation security in accordance with security analysis tools, security validation tools and/or security learning systems. The security analysis tool receives abstract factory models or descriptions for input and generates an output that can include security guidelines, components, topologies, procedures, rules, policies, and the like for deployment in an automation security network. The validation tools are operative in the automation security network, wherein the tools perform security checking and/or auditing functions, for example, to determine if security components are in place and/or in suitable working order. The security learning system monitors/learns network traffic patterns during a learning phase, fires alarms or events based upon detected deviations from the learned patterns, and/or causes other automated actions to occur. | 03-05-2015 |
20150213369 | SYSTEM AND METHODOLOGY PROVIDING AUTOMATION SECURITY ANALYSIS AND NETWORK INTRUSION PROTECTION IN AN INDUSTRIAL ENVIRONMENT - Automation security in a networked-based industrial controller environment is implemented. Various components, systems and methodologies are provided to facilitate varying levels of automation security in accordance with security analysis tools, security validation tools and/or security learning systems. The security analysis tool receives abstract factory models or descriptions for input and generates an output that can include security guidelines, components, topologies, procedures, rules, policies, and the like for deployment in an automation security network. The validation tools are operative in the automation security network, wherein the tools perform security checking and/or auditing functions, for example, to determine if security components are in place and/or in suitable working order. The security learning system monitors/learns network traffic patterns during a learning phase, fires alarms or events based upon detected deviations from the learned patterns, and/or causes other automated actions to occur. | 07-30-2015 |
Patent application number | Description | Published |
20120096272 | SECURITY MODEL FOR INDUSTRIAL DEVICES - Systems and/or methods are described relating to a security model that provides interoperability with foreign security domains while remaining scalable to small embedded devices. A security token service is provided, which is configured to issue, renew, and/or validate security tokens in response to a token request. A communication protocol, corresponding message structures, and the security tokens are defined in accordance with protocol buffer definitions. | 04-19-2012 |
20130125233 | FLEXIBLE SECURITY CONTROL ENVIRONMENT - An automation control system is provided with an interface device configured to enable a user to monitor, control, or monitor and control processes of the automation control system. Upon power on or initialization of the interface device or when a previously logged in user is logged off, the interface device logs in a guest account associated with a user role having a defined set of access rights and provides access to monitor, control, or monitor and control the processes based upon the set of access rights. | 05-16-2013 |
20130298217 | SECURITY MODEL FOR INDUSTRIAL DEVICES - Systems and/or methods are described relating to a security model that provides interoperability with foreign security domains while remaining scalable to small embedded devices. A security token service is provided, which is configured to issue, renew, and/or validate security tokens in response to a token request. A communication protocol, corresponding message structures, and the security tokens are defined in accordance with protocol buffer definitions. | 11-07-2013 |
20150229640 | SECURITY MODEL FOR INDUSTRIAL DEVICES - Systems and/or methods are described relating to a security model that provides interoperability with foreign security domains while remaining scalable to small embedded devices. A security token service is provided, which is configured to issue, renew, and/or validate security tokens in response to a token request. A communication protocol, corresponding message structures, and the security tokens are defined in accordance with protocol buffer definitions. | 08-13-2015 |