Systems and methods for network discovery in a multi-layer operational technology network

    公开(公告)号:US12003594B2

    公开(公告)日:2024-06-04

    申请号:US17867931

    申请日:2022-07-19

    CPC classification number: H04L67/51 H04L67/1061 H04W48/16

    Abstract: Performing multi-layer network discovery of an operational technology (OT) network includes receiving a plurality of discovery data sets, each identifying a respective subset of a plurality of nodes within an OT network having a plurality of network layers, wherein the respective subset of the plurality of nodes for a first discovery data set are disposed within at least two network layers of the plurality of network layers, identifying a set of nodes within the OT network that appear in two or more of the plurality of discovery data sets, generating a holistic discovery data set for the OT network based on the plurality of discovery data sets and the identified set of nodes within the OT network that appear in the two or more of the plurality of discovery data sets, and generating a visualization of the plurality of nodes within the OT network based on the holistic discovery data set.

    MODEL-BASED SECURITY POLICY CONFIGURATION AND ENFORCEMENT IN AN INDUSTRIAL AUTOMATION SYSTEM

    公开(公告)号:US20170214717A1

    公开(公告)日:2017-07-27

    申请号:US15147667

    申请日:2016-05-05

    Abstract: A model-based industrial security policy configuration system implements a plant-wide industrial asset security policy in accordance with security policy definitions provided by a user. The configuration system models the collection of industrial assets for which diverse security policies are to be implemented. An interface allows the user to define security policies for a plant environment at a high-level by grouping the industrial assets into security zones, and defining any additional communication permissions in terms of asset-to-asset, asset-to-zone, or zone-to-zone conduits. Based on the model and these policy definitions, the system generates asset-level security setting instructions configured to set appropriate security settings on one or more of the industrial assets, and deploys these instructions to the appropriate assets in order to implement the defined security policy.

    SECURITY MODEL FOR INDUSTRIAL DEVICES
    15.
    发明申请
    SECURITY MODEL FOR INDUSTRIAL DEVICES 有权
    工业设备安全模型

    公开(公告)号:US20150229640A1

    公开(公告)日:2015-08-13

    申请号:US14693376

    申请日:2015-04-22

    CPC classification number: H04L63/0853 G06F21/34 H04L63/20

    Abstract: Systems and/or methods are described relating to a security model that provides interoperability with foreign security domains while remaining scalable to small embedded devices. A security token service is provided, which is configured to issue, renew, and/or validate security tokens in response to a token request. A communication protocol, corresponding message structures, and the security tokens are defined in accordance with protocol buffer definitions.

    Abstract translation: 描述了与提供与国外安全域的互操作性同时保持可扩展到小型嵌入式设备的安全模型的系统和/或方法。 提供安全令牌服务,其被配置为响应于令牌请求发布,更新和/或验证安全令牌。 根据协议缓冲器定义来定义通信协议,相应的消息结构和安全令牌。

    Systems and methods for enterprise-level security policy management tool

    公开(公告)号:US12206710B2

    公开(公告)日:2025-01-21

    申请号:US17889671

    申请日:2022-08-17

    Abstract: An enterprise-level security policy management tool receives, via a graphical user interface (GUI), inputs defining a security policy configured to be deployed within an enterprise that operates one or more operational technology (OT) networks, generates the security policy based on the inputs, and transmits the security policy to one or more computing devices running respective other instantiations of the enterprise-level security policy management tool, wherein the respective other instantiations of the enterprise-level security policy management tool are configured to facilitate enforcement of the security policy within the one or more OT networks operated by the enterprise.

Patent Agency Ranking