Distributed Ledger Arrangement For Supporting Service Transactions In An Industrial System

    公开(公告)号:US20220198392A1

    公开(公告)日:2022-06-23

    申请号:US17644633

    申请日:2021-12-16

    Applicant: ABB Schweiz AG

    Inventor: Thomas Locher

    Abstract: A distributed ledger arrangement for supporting service transactions in an industrial system includes: a plurality of nodes of a network, each configured to maintain a distributed ledger copy; a plurality of machine-to-ledger interfaces, each configured to receive, from a device acting as service provider and/or service consumer in the industrial system, service condition inquiries and requests to record transactions; and one or more manager-to-ledger interfaces, each configured to receive, from a device owner authorized to specify service conditions with effect on the devices, requests to record service conditions.

    AUTOMATIC COMMUNICATION NETWORK SYSTEM HARDENING

    公开(公告)号:US20200007572A1

    公开(公告)日:2020-01-02

    申请号:US16559791

    申请日:2019-09-04

    Applicant: ABB Schweiz AG

    Abstract: A method for automatically improving security of a network system includes: collecting security relevant information from network devices of the network system, the security relevant information including security settings and operational information of the network devices; analyzing the security relevant information for determining weak security settings of a network device, the weak security settings being not necessary for a regular operation of the network system; determining hardened security settings for the network devices based on the weak security settings, the hardened security settings restricting a possible operation of the network device but allow a regular operation of the network system; and applying the hardened security settings to the network device.

    Automatic communication network system hardening

    公开(公告)号:US11070583B2

    公开(公告)日:2021-07-20

    申请号:US16559791

    申请日:2019-09-04

    Applicant: ABB Schweiz AG

    Abstract: A method for automatically improving security of a network system includes: collecting security relevant information from network devices of the network system, the security relevant information including security settings and operational information of the network devices; analyzing the security relevant information for determining weak security settings of a network device, the weak security settings being not necessary for a regular operation of the network system; determining hardened security settings for the network devices based on the weak security settings, the hardened security settings restricting a possible operation of the network device but allow a regular operation of the network system; and applying the hardened security settings to the network device.

    Privacy-Preserving Log Analysis
    8.
    发明申请

    公开(公告)号:US20210097195A1

    公开(公告)日:2021-04-01

    申请号:US16760856

    申请日:2018-10-30

    Applicant: ABB Schweiz AG

    Abstract: A method can be used to analyze a log of a device or a plurality of devices of a first entity. The method includes generating an encrypted log by encrypting the log at the first entity, generating an encrypted query by encrypting a query at the first entity, transferring the encrypted log and the encrypted query from the first entity to a second entity, analyzing the encrypted log on the second entity by using the encrypted query, generating an encrypted analysis result at the second entity, transferring the encrypted analysis result from the second entity to the first entity, decrypting the encrypted analysis result on the first entity, and verifying the decrypted analysis result at the first entity.

    Secure code optimization method and system

    公开(公告)号:US10795990B2

    公开(公告)日:2020-10-06

    申请号:US16102045

    申请日:2018-08-13

    Applicant: ABB Schweiz AG

    Abstract: A method of automatically generating secure code includes: receiving source code and security constraints for the source code, the security constraints encoding, to what extend a variable in the source code is considered secure; and generating secure code from the source code and the security constraints by replacing non-secure operations in the source code, which operate on the variables considered as secure, with secure operations; wherein a secure operation is an operation, which, when applied to at least one encrypted variable, generates an encrypted result, which, when decrypted, is the result of the non-secure operation applied to the not encrypted variable.

Patent Agency Ranking