SYSTEMS AND METHODS FOR AUTOMATICALLY DEPLOYING SECURITY UPDATES IN AN OPERATIONS TECHNOLOGY NETWORK

    公开(公告)号:EP4354280A2

    公开(公告)日:2024-04-17

    申请号:EP23180275.2

    申请日:2023-06-20

    IPC分类号: G06F8/65 H04L9/40

    CPC分类号: H04L63/205 G06F8/65

    摘要: A system includes a first computing node of a cluster of computing nodes that are part of a container orchestration system, a control system for controlling one or more operations of an operation technology (OT) component, and a second node of the cluster of computing nodes. The control system is communicatively coupled to the first computing node and the OT component. The second computing node may transmit a pod to the first computing node. The pod may cause the first computing node to perform operations that include deploying a container as a digital representation of the OT component, testing a security update on the digital representation, determining that the security update is ready for implementation in the OT component, and transmitting an indication that the security update is available for implementation to the OT component after determining that the security update is ready for implementation.

    NETWORK MONITORING SYSTEM FOR OPERATIONAL TECHNOLOGY DEVICES

    公开(公告)号:EP4300889A1

    公开(公告)日:2024-01-03

    申请号:EP23177937.2

    申请日:2023-06-07

    IPC分类号: H04L9/40

    摘要: Embodiments of this present disclosure include an industrial automation system, including an operational technology (OT) industrial automation device. The OT industrial automation device may perform an operation for the industrial automation system. Further, the OT industrial automation device may receive data comprising instructions related to the operation. Embodiments also include a monitoring device to receive the data; identify the OT industrial automation device based on the data, retrieve one or more rules for providing communications to the OT industrial automation device in response to identifying the OT industrial automation device; and selectively forward the data to the OT industrial automation device based on the one or more rules.

    USE OF PHYSICAL UNCLONABLE FUNCTIONS TO PREVENT COUNTERFEITING OF INDUSTRIAL CONTROL PRODUCTS

    公开(公告)号:EP4156600A1

    公开(公告)日:2023-03-29

    申请号:EP22196341.6

    申请日:2022-09-19

    IPC分类号: H04L9/32

    摘要: Techniques for authenticating industrial devices in an industrial automation environment are disclosed herein. In at least one implementation, a physical unclonable function response of an industrial device is extracted. The industrial device transmits a security certificate signed by a certificate authority that includes a device public key to a system, wherein the system validates the security certificate, encrypts an authentication challenge using the device public key, and transmits the authentication challenge to the industrial device. The industrial device generates a device private key using the physical unclonable function response and decrypts the authentication challenge using the device private key. The industrial device generates an authentication response based on the authentication challenge, encrypts the authentication response using the device private key, and transmits the authentication response to the system, wherein the system decrypts the authentication response using the device public key and authenticates the industrial device based on the authentication response.

    SYSTEM AND METHOD FOR SECURE CONNECTIONS IN A HIGH AVAILABILITY INDUSTRIAL CONTROLLER

    公开(公告)号:EP3979078A1

    公开(公告)日:2022-04-06

    申请号:EP21195891.3

    申请日:2021-09-10

    IPC分类号: G06F11/20 G05B9/03 G05B19/418

    摘要: Secure data transmission between an input device and both industrial controllers in a high-availability system utilizes a secure connection established between the primary industrial controller and the input device. Data required to establish the secure connection is stored on the primary controller as part of the connection data corresponding to the secure connection. The input device transmits data to the primary controller over the secure connection according to the desired level of security. The primary controller transmits the connection data defining the secure connection to the secondary controller. If a failure occurs in the primary controller, the secondary controller establishes a connection to the input device using the connection data for the secure connection, such that the secondary controller may assume responsibility for the controller end of the secure connection. The primary controller transmits the input signals to the secondary controller via the dedicated connection between controllers.