Authentication between industrial elements in an industrial control system

    公开(公告)号:US11977622B2

    公开(公告)日:2024-05-07

    申请号:US17094013

    申请日:2020-11-10

    摘要: A set of redundant industrial control system communications/control modules includes at least a first communications/control module and a second communications/control module. The first and second communications/control modules are configured to perform an authentication sequence including: transmitting a request datagram from the first communications/control module to the second communications/control module, the request datagram including a first nonce, a first device authentication key certificate, and a first identity attribute certificate; transmitting a response datagram from the second communications/control module to the first communications/control module, the response datagram including a second nonce, a first signature associated with the first and second nonces, a second device authentication key certificate, and a second identity attribute certificate; and transmitting an authentication datagram from the first communications/control module to the second communications/control module when the response datagram is valid, the authentication datagram including a second signature associated with the first and second nonces.

    Secure industrial control system
    2.
    发明授权

    公开(公告)号:US12032675B2

    公开(公告)日:2024-07-09

    申请号:US17836464

    申请日:2022-06-09

    摘要: A zero trust industrial control system is disclosed herein. The industrial control system includes a plurality of industrial elements (e.g., modules, cables) which are provisioned during manufacture with their own unique security credentials. A key management entity of the zero trust industrial control system monitors and manages the security credentials of the industrial elements starting from the time they are manufactured up to and during their implementation within the industrial control system for promoting security of the industrial control system. An authentication process, based upon the security credentials, for authenticating the industrial elements being implemented in the industrial control system is performed for promoting security of the industrial control system. In one or more implementations, all industrial elements of the zero trust industrial control system are provisioned with the security credentials for providing security at multiple (e.g., all) levels of the system.