-
1.
公开(公告)号:US20220198392A1
公开(公告)日:2022-06-23
申请号:US17644633
申请日:2021-12-16
Applicant: ABB Schweiz AG
Inventor: Thomas Locher
Abstract: A distributed ledger arrangement for supporting service transactions in an industrial system includes: a plurality of nodes of a network, each configured to maintain a distributed ledger copy; a plurality of machine-to-ledger interfaces, each configured to receive, from a device acting as service provider and/or service consumer in the industrial system, service condition inquiries and requests to record transactions; and one or more manager-to-ledger interfaces, each configured to receive, from a device owner authorized to specify service conditions with effect on the devices, requests to record service conditions.
-
公开(公告)号:US20200007572A1
公开(公告)日:2020-01-02
申请号:US16559791
申请日:2019-09-04
Applicant: ABB Schweiz AG
Inventor: Thanikesavan Sivanthi , Thomas Locher
IPC: H04L29/06
Abstract: A method for automatically improving security of a network system includes: collecting security relevant information from network devices of the network system, the security relevant information including security settings and operational information of the network devices; analyzing the security relevant information for determining weak security settings of a network device, the weak security settings being not necessary for a regular operation of the network system; determining hardened security settings for the network devices based on the weak security settings, the hardened security settings restricting a possible operation of the network device but allow a regular operation of the network system; and applying the hardened security settings to the network device.
-
公开(公告)号:US20190081984A1
公开(公告)日:2019-03-14
申请号:US16131194
申请日:2018-09-14
Applicant: ABB Schweiz AG
Inventor: Thomas Locher , Thanikesavan Sivanthi
IPC: H04L29/06 , G05B19/418 , G06F21/57
Abstract: To commission an industrial automation control system, IACS, a computing device generates commands to automatically set or verify a security configuration of the IACS. The commands are generated by the computing device based on a machine-readable security baseline, and, optionally, based on a machine-readable configuration file of the IACS.
-
4.
公开(公告)号:US11868489B2
公开(公告)日:2024-01-09
申请号:US17197432
申请日:2021-03-10
Applicant: ABB Schweiz AG
Inventor: Thomas Locher , Manuel Oriol , Georgia Giannopoulou , Maelle Kabir-Querrec , Michael Wahler , Andrei Dan , Ognjen Vukovic , Der-Yeuan Yu
CPC classification number: G06F21/604 , G06F21/6245
Abstract: Techniques for configuring data protection settings for data of an industrial system or an electric power system are provided. The industrial system or the electric power system includes at least one gateway via which the data are transmitted to a computing resource for processing and/or storing. One or several privacy-preserving techniques to be applied to the data are automatically determined. The one or several privacy-preserving techniques being determined based on data privacy requirements for the data and processing operations to be performed on the data by the computing resource. The determined one or several privacy-preserving techniques are automatically applied.
-
公开(公告)号:US20230330847A1
公开(公告)日:2023-10-19
申请号:US18042490
申请日:2021-08-12
Applicant: ABB Schweiz AG
Inventor: Sandro Schoenborn , Andrei Dan , Robert René Maria Birke , Philipp Sommer , Thomas Locher
IPC: B25J9/16
CPC classification number: B25J9/163 , B25J9/1697
Abstract: A method and system are provided for training a robot to recognize objects in the workspace of the robot. Objects in the workspace are identified by the user, and the robot determines candidate objects. Feedback may be used in order for the user to confirm whether the candidate object determined by the robot system matches the object intended by the user. Gripping information for the object may also be identified by the user to train the robot how to grip the object.
-
公开(公告)号:US11438380B2
公开(公告)日:2022-09-06
申请号:US16131194
申请日:2018-09-14
Applicant: ABB Schweiz AG
Inventor: Thomas Locher , Thanikesavan Sivanthi
IPC: G06F21/57 , H04L9/40 , G05B19/418 , G06F11/36
Abstract: To commission an industrial automation control system, IACS, a computing device generates commands to automatically set or verify a security configuration of the IACS. The commands are generated by the computing device based on a machine-readable security baseline, and, optionally, based on a machine-readable configuration file of the IACS.
-
公开(公告)号:US11070583B2
公开(公告)日:2021-07-20
申请号:US16559791
申请日:2019-09-04
Applicant: ABB Schweiz AG
Inventor: Thanikesavan Sivanthi , Thomas Locher
IPC: H04L29/06
Abstract: A method for automatically improving security of a network system includes: collecting security relevant information from network devices of the network system, the security relevant information including security settings and operational information of the network devices; analyzing the security relevant information for determining weak security settings of a network device, the weak security settings being not necessary for a regular operation of the network system; determining hardened security settings for the network devices based on the weak security settings, the hardened security settings restricting a possible operation of the network device but allow a regular operation of the network system; and applying the hardened security settings to the network device.
-
公开(公告)号:US20210097195A1
公开(公告)日:2021-04-01
申请号:US16760856
申请日:2018-10-30
Applicant: ABB Schweiz AG
Inventor: Carsten Franke , Theo Widmer , Thomas Locher , Yvonne-Anne Pignolet
Abstract: A method can be used to analyze a log of a device or a plurality of devices of a first entity. The method includes generating an encrypted log by encrypting the log at the first entity, generating an encrypted query by encrypting a query at the first entity, transferring the encrypted log and the encrypted query from the first entity to a second entity, analyzing the encrypted log on the second entity by using the encrypted query, generating an encrypted analysis result at the second entity, transferring the encrypted analysis result from the second entity to the first entity, decrypting the encrypted analysis result on the first entity, and verifying the decrypted analysis result at the first entity.
-
公开(公告)号:US10795990B2
公开(公告)日:2020-10-06
申请号:US16102045
申请日:2018-08-13
Applicant: ABB Schweiz AG
Inventor: Johannes Schneider , Matus Harvan , Sebastian Obermeier , Thomas Locher , Yvonne-Anne Pignolet
Abstract: A method of automatically generating secure code includes: receiving source code and security constraints for the source code, the security constraints encoding, to what extend a variable in the source code is considered secure; and generating secure code from the source code and the security constraints by replacing non-secure operations in the source code, which operate on the variables considered as secure, with secure operations; wherein a secure operation is an operation, which, when applied to at least one encrypted variable, generates an encrypted result, which, when decrypted, is the result of the non-secure operation applied to the not encrypted variable.
-
公开(公告)号:US20190005233A1
公开(公告)日:2019-01-03
申请号:US16102045
申请日:2018-08-13
Applicant: ABB Schweiz AG
Inventor: Johannes Schneider , Matus Harvan , Sebastian Obermeier , Thomas Locher , Yvonne-Anne Pignolet
CPC classification number: G06F21/54 , G06F8/30 , G06F21/125 , G06F21/14 , G06F21/602 , G06F2221/033 , G06F2221/0748 , H04L9/008
Abstract: A method of automatically generating secure code includes: receiving source code and security constraints for the source code, the security constraints encoding, to what extend a variable in the source code is considered secure; and generating secure code from the source code and the security constraints by replacing non-secure operations in the source code, which operate on the variables considered as secure, with secure operations; wherein a secure operation is an operation, which, when applied to at least one encrypted variable, generates an encrypted result, which, when decrypted, is the result of the non-secure operation applied to the not encrypted variable.
-
-
-
-
-
-
-
-
-