Securely deploying security policy and configuration through network address translation systems

    公开(公告)号:US11271974B2

    公开(公告)日:2022-03-08

    申请号:US16863699

    申请日:2020-04-30

    Abstract: A device may include a communication component that may communicatively couple to a first network. The device may also include a processor that may transmit a first signal via the communication component to a network address translation (NAT) system, the first signal including a first request to discover a server device. The NAT system may communicatively couple to the first network and a second network, such that the first network is inaccessible to the second network. The processor may then receive location data associated with the server device and transmit a second signal addressed to the server device based on the location data. The second signal is transmitted to the NAT system, such that the second signal may include a second request for a security policy from the server device. The processor may then receive the security policy via the NAT system and adjust one or more communication operations based on the security policy.

    Automated discovery of security policy from design data

    公开(公告)号:US11212322B2

    公开(公告)日:2021-12-28

    申请号:US16156305

    申请日:2018-10-10

    Abstract: An industrial security policy configuration system generates and implements security policies for industrial automation systems based on design data for the industrial systems generated by device manufacturers, system integrators, original equipment manufacturers, or the owners of the industrial assets during the design of the industrial systems. the collected design data to a security rule set defining device-level communication privileges. The system translates the collected design data to a security rule set defining device-level communication privileges, which are then translated to a comprehensive set of security policies customized to the requirements of the industrial systems represented by the design data. By leveraging the rich set of available design data to identify or infer security requirements and generate suitable security configurations, the system can mitigate the need to manually configure security policies based on human judgments regarding normal and abnormal network traffic.

    SECURELY DEPLOYING SECURITY POLICY AND CONFIGURATION THROUGH NETWORK ADDRESS TRANSLATION SYSTEMS

    公开(公告)号:US20210344725A1

    公开(公告)日:2021-11-04

    申请号:US16863699

    申请日:2020-04-30

    Abstract: A device may include a communication component that may communicatively couple to a first network. The device may also include a processor that may transmit a first signal via the communication component to a network address translation (NAT) system, the first signal including a first request to discover a server device. The NAT system may communicatively couple to the first network and a second network, such that the first network is inaccessible to the second network. The processor may then receive location data associated with the server device and transmit a second signal addressed to the server device based on the location data. The second signal is transmitted to the NAT system, such that the second signal may include a second request for a security policy from the server device. The processor may then receive the security policy via the NAT system and adjust one or more communication operations based on the security policy.

    Automation control and monitoring system and method
    27.
    发明授权
    Automation control and monitoring system and method 有权
    自动化控制与监控系统及方法

    公开(公告)号:US09128479B2

    公开(公告)日:2015-09-08

    申请号:US13653252

    申请日:2012-10-16

    Abstract: An automation control and monitoring system includes an operating system and a data model. The operating system is configured to receive a request for instantiation of an object representing an attribute of the automation control and monitoring system. The operating system is also configured to generate an object identifier when the request for instantiation is received, wherein the object identifier is unique from any other object identifiers employed by the operating system. The data model is configured to store and associate the object with the generated object identifier such that any component of the automation control and monitoring system may access the object by referencing the object identifier.

    Abstract translation: 自动化控制和监控系统包括操作系统和数据模型。 操作系统被配置为接收对表示自动化控制和监视系统的属性的对象的实例化的请求。 操作系统还被配置为当接收到用于实例化的请求时生成对象标识符,其中对象标识符是由操作系统使用的任何其他对象标识符唯一的。 数据模型被配置为存储并将对象与生成的对象标识符相关联,使得自动化控制和监视系统的任何组件可以通过引用对象标识符来访问对象。

    Data Resource Identity
    29.
    发明申请
    Data Resource Identity 有权
    数据资源标识

    公开(公告)号:US20130123944A1

    公开(公告)日:2013-05-16

    申请号:US13653252

    申请日:2012-10-16

    Abstract: An automation control and monitoring system includes an operating system and a data model. The operating system is configured to receive a request for instantiation of an object representing an attribute of the automation control and monitoring system. The operating system is also configured to generate an object identifier when the request for instantiation is received, wherein the object identifier is unique from any other object identifiers employed by the operating system. The data model is configured to store and associate the object with the generated object identifier such that any component of the automation control and monitoring system may access the object by referencing the object identifier.

    Abstract translation: 自动化控制和监控系统包括操作系统和数据模型。 操作系统被配置为接收对表示自动化控制和监视系统的属性的对象的实例化的请求。 操作系统还被配置为当接收到用于实例化的请求时生成对象标识符,其中对象标识符是由操作系统使用的任何其他对象标识符唯一的。 数据模型被配置为存储并将对象与生成的对象标识符相关联,使得自动化控制和监视系统的任何组件可以通过引用对象标识符来访问对象。

Patent Agency Ranking