Automatic endpoint security policy assignment by zero-touch enrollment

    公开(公告)号:US11588856B2

    公开(公告)日:2023-02-21

    申请号:US16870117

    申请日:2020-05-08

    Abstract: A model-based industrial security policy configuration system implements a plant-wide industrial asset security policy in accordance with security policy definitions provided by a user. The configuration system models the collection of industrial assets for which diverse security policies are to be implemented. An interface allows the user to define zone-specific security configuration and event management policies for a plant environment at a high-level based on a security model that groups the industrial assets into security zones. When new industrial devices are subsequently installed on the plant floor, the system determines whether a security policy defined by the model is applicable to the new device and commissions the new device to comply with any relevant security policies. This mitigates the necessity for a system administrator to manually configure individual devices to comply with plant-wide security policies.

    User security credentials as an element of functional safety

    公开(公告)号:US11522833B2

    公开(公告)日:2022-12-06

    申请号:US16894076

    申请日:2020-06-05

    Abstract: An industrial safety architecture integrates employee identity and enterprise-level security policy into plant-floor functional safety systems, allowing control and safety systems on the plant floor to regulate safe interactions with hazardous controlled machinery based on user identity or role. The architecture leverages existing employee identity and security policy data maintained on the corporate level of an industrial enterprise to manage identity- and/or role-based control and safety on the plant level. Safety authority systems at both the corporate level and the plant level of the industrial enterprise obtain employee and security policy data from corporate-level systems and provides this data in as SIL-rated manner to industrial control and safety systems on the plant floor, where the identity and security policy information is used by functional safety systems to control access to industrial systems as a function of user identity, role, certifications, or other qualifications.

    Industrial automation control system content protection

    公开(公告)号:US10901393B2

    公开(公告)日:2021-01-26

    申请号:US16523856

    申请日:2019-07-26

    Abstract: Techniques to facilitate protection of control system content used in an industrial automation environment are disclosed herein. In at least one implementation, the control system content for use in the industrial automation environment is received, wherein the control system content comprises controller program code that directs an industrial controller to drive a machine system. Content protection instructions for the control system content are also received, wherein the content protection instructions comprise restrictions on execution of the control system content. An execution license that includes process-related constraints for the control system content is generated based on the content protection instructions. The execution license is applied to the control system content to generate protected content, wherein use of the control system content is granted subject to the process-related constraints of the execution license.

    INDUSTRIAL AUTOMATION CONTROL SYSTEM CONTENT PROTECTION
    16.
    发明申请
    INDUSTRIAL AUTOMATION CONTROL SYSTEM CONTENT PROTECTION 审中-公开
    工业自动化控制系统内容保护

    公开(公告)号:US20160252895A1

    公开(公告)日:2016-09-01

    申请号:US15052862

    申请日:2016-02-24

    Abstract: Techniques to facilitate protection of control system content used in an industrial automation environment are disclosed herein. In at least one implementation, the control system content for use in the industrial automation environment is received, wherein the control system content comprises controller program code that directs an industrial controller to drive a machine system. Content protection instructions for the control system content are also received, wherein the content protection instructions comprise restrictions on execution of the control system content. An execution license that includes process-related constraints for the control system content is generated based on the content protection instructions. The execution license is applied to the control system content to generate protected content, wherein use of the control system content is granted subject to the process-related constraints of the execution license.

    Abstract translation: 本文公开了用于在工业自动化环境中使用的控制系统内容的保护的技术。 在至少一个实施方案中,接收在工业自动化环境中使用的控制系统内容,其中控制系统内容包括指示工业控制器驱动机器系统的控制器程序代码。 还接收用于控制系统内容的内容保护指令,其中内容保护指令包括对控制系统内容的执行的限制。 基于内容保护指令生成包含与控制系统内容有关的过程相关约束的执行许可证。 执行许可证被应用于控制系统内容以生成受保护内容,其中根据执行许可证的过程相关约束来授予控制系统内容的使用。

    AGILE CONTROL MODEL SYSTEM AND METHOD
    18.
    发明申请
    AGILE CONTROL MODEL SYSTEM AND METHOD 有权
    AGILE控制模型系统和方法

    公开(公告)号:US20130123946A1

    公开(公告)日:2013-05-16

    申请号:US13662258

    申请日:2012-10-26

    Abstract: A control and monitoring system is provided that includes an automation controller. The system includes a distributed model stored on the automation controller. Changes to the distributed model are provided via delta scripts that define only the changes to the model. Further, the control and monitoring system 24 includes distributed execution engines that execute commands based upon trigger events determined in the system. a plurality of automation control components networked together and with the automation controller, wherein the plurality of automation control components are capable of load balancing among the plurality of automation control components in response to performance demands of the control and monitoring system. These features of the control and monitoring system enable load balancing, data and processing redundancy, and collaborative design within the control and monitoring system.

    Abstract translation: 提供了包括自动化控制器的控制和监控系统。 该系统包括存储在自动化控制器上的分布式模型。 通过增量脚本提供对分布式模型的更改,该脚本仅定义模型的更改。 此外,控制和监视系统24包括基于在系统中确定的触发事件执行命令的分布式执行引擎。 多个自动化控制组件联网在一起并与自动化控制器组合,其中多个自动化控制组件能够响应于控制和监视系统的性能要求在多个自动化控制组件之间进行负载平衡。 控制和监控系统的这些功能使得负载平衡,数据和处理冗余以及控制和监控系统内的协同设计成为可能。

    CENTRALIZED SECURITY EVENT GENERATION POLICY

    公开(公告)号:US20230136308A1

    公开(公告)日:2023-05-04

    申请号:US18149292

    申请日:2023-01-03

    Abstract: A model-based industrial security policy configuration system implements a plant-wide industrial asset security policy in accordance with security policy definitions provided by a user. The configuration system models the collection of industrial assets for which diverse security policies are to be implemented. An interface allows the user to define zone-specific security configuration and event management policies for a plant environment at a high-level based on a security model that groups the industrial assets into security zones. Based on the model and these policy definitions, the system generates asset-level security setting instructions configured to set appropriate device settings on one or more of the industrial assets to implement the security event management policies, and deploys these instructions to the appropriate assets in order to implement the defined policies.

    AUTOMATIC ENDPOINT SECURITY POLICY ASSIGNMENT BY ZERO-TOUCH ENROLLMENT

    公开(公告)号:US20210352110A1

    公开(公告)日:2021-11-11

    申请号:US16870117

    申请日:2020-05-08

    Abstract: A model-based industrial security policy configuration system implements a plant-wide industrial asset security policy in accordance with security policy definitions provided by a user. The configuration system models the collection of industrial assets for which diverse security policies are to be implemented. An interface allows the user to define zone-specific security configuration and event management policies for a plant environment at a high-level based on a security model that groups the industrial assets into security zones. When new industrial devices are subsequently installed on the plant floor, the system determines whether a security policy defined by the model is applicable to the new device and commissions the new device to comply with any relevant security policies. This mitigates the necessity for a system administrator to manually configure individual devices to comply with plant-wide security policies.

Patent Agency Ranking