-
公开(公告)号:US20190297101A1
公开(公告)日:2019-09-26
申请号:US15927617
申请日:2018-03-21
Applicant: HONEYWELL INTERNATIONAL INC.
Inventor: Chandirasekaran Dhakshinamoorthy , Basavaraju Vasamurthy , Rod Stein
Abstract: A method of securing data in an industrial processing facility (IPF) includes creating a private blockchain (PB) using a OPC UA standard functionality and storing the PB in an OPC UA address space adding it to an OPC UA communication protocol framework including edge-nodes coupled to a cloud-based or edge-located data storage. The edge-nodes are PB participant nodes, and a regulator or leader assigns them a single role as a blockmaker, block voter, or observer. The hash in the public ledger is updated once a new block is validated by a majority of the block voters, and the new block is propagated to all PB participant nodes. The regulator, leader or observer utilizes a time bound majority voting consensus to determine whether the PB participant nodes come to a consensus on a current state in the storage medium, and if a consensus the new block added to the public ledger.
-
公开(公告)号:US10432647B2
公开(公告)日:2019-10-01
申请号:US15634820
申请日:2017-06-27
Applicant: Honeywell International Inc.
Inventor: Chandirasekaran Dhakshinamoorthy , Lekshmi Premkumar , Rod Stein , Satheesh Kumar Bhuvaneswaran , Prosanta Mondal
Abstract: A method and apparatus for identifying malicious activity. At least one memory is configured to store historical communication data. At least one processor is configured to retrieve the historical communication data related to communications between a server and a plurality of clients in a system. The processor is further configured to cluster the historical communication data to group communications of the historical communication data. The processor is further configured to identify a plurality of patterns that indicate malicious activity based on the grouped communications. The processor is further configured to receive current communication data. The processor is further configured to determine whether the current communication data matches the one of the plurality of patterns. The processor is further configured to, responsive to a grouped element of the grouped communications matching the pattern, identifying a group of communications between the server and the plurality of clients as the malicious activity.
-
3.
公开(公告)号:US10747206B2
公开(公告)日:2020-08-18
申请号:US16044783
申请日:2018-07-25
Applicant: Honeywell International Inc.
IPC: G06F15/16 , G05B19/418 , G10L15/26 , H04L12/28 , G06F16/2452
Abstract: A method, an electronic device, and a computer readable medium for vulnerability detection are disclosed. The method includes receiving a request, from a computing device, for data associated with an industrial plant. The method also includes generating a session with the computing device. The method further includes gathering nodes from one or more servers associated with the industrial plant, wherein each of the nodes includes data associated a particular feature of the industrial plant. Additionally the method includes deriving contextual links between the nodes and the received request for data to identify levels of similarity between the nodes and the request for data. The method also includes ranking the nodes based on the identified levels of similarity.
-
公开(公告)号:US20190312840A1
公开(公告)日:2019-10-10
申请号:US15948051
申请日:2018-04-09
Applicant: HONEYWELL INTERNATIONAL INC.
Inventor: Chandirasekaran Dhakshinamoorthy , Mohit Agarwal , Manibhushan Reddy Pottem , Satheesh Bhuvaneswaran , Rod Stein
IPC: H04L29/06 , H04L12/911 , H04L12/851 , H04L29/08 , G06F15/18
Abstract: A method of controlling tunneling in a communication network of an industrial process facility including a client computer and server computer running different communication protocols coupled by the communication network. The method includes providing the client and server computer with a processor connected to a memory. The processor implements a tunneling reliability program including a training model including labeled groups representing reliability data and security data determined from data sources received across the communication network and a learning classifying algorithm for classifying the reliability data and security data as being reliable or not reliable. The processor determines if the communication network is reliable based on the classified reliability data and security data. In response to determining that the communication network is not reliable or secure a notification is generated for a user that the communication network is not reliable and the notification is transmitted to the user.
-
公开(公告)号:US10764319B2
公开(公告)日:2020-09-01
申请号:US16051069
申请日:2018-07-31
Applicant: Honeywell International Inc.
Inventor: Chandirasekaran Dhakshinamoorthy , Rodney Stein , Ashoka Settihalli
Abstract: A method, an electronic device, and a computer readable medium for vulnerability detection are disclosed. The method includes generating a mapped dataset of a portion of an OPC UA server by mapping the portion of the server, wherein the server is compatible with OPC UA machine to machine (M2M) protocol communication including transport encodings and services. The method also includes identifying input test data to test the portion of the server based in part on the mapped dataset set in order to detect errors. The method further includes performing a plurality of targeted attacks by loading the input test data onto the portion of the server. In response to loading the input test data into the server, the method includes monitoring responses of the server to detect an error. Further, in response to detecting the error the method includes generating a report that indicates the detect error.
-
6.
公开(公告)号:US20190107827A1
公开(公告)日:2019-04-11
申请号:US16044783
申请日:2018-07-25
Applicant: Honeywell International Inc.
IPC: G05B19/418 , H04L12/28 , G06F17/30 , G10L15/26
Abstract: A method, an electronic device, and a computer readable medium for vulnerability detection are disclosed. The method includes receiving a request, from a computing device, for data associated with an industrial plant. The method also includes generating a session with the computing device. The method further includes gathering nodes from one or more servers associated with the industrial plant, wherein each of the nodes includes data associated a particular feature of the industrial plant. Additionally the method includes deriving contextual links between the nodes and the received request for data to identify levels of similarity between the nodes and the request for data. The method also includes ranking the nodes based on the identified levels of similarity.
-
公开(公告)号:US10819722B2
公开(公告)日:2020-10-27
申请号:US15927617
申请日:2018-03-21
Applicant: HONEYWELL INTERNATIONAL INC.
Inventor: Chandirasekaran Dhakshinamoorthy , Basavaraju Vasamurthy , Rod Stein
Abstract: A method of securing data in an industrial processing facility (IPF) includes creating a private blockchain (PB) using a OPC UA standard functionality and storing the PB in an OPC UA address space adding it to an OPC UA communication protocol framework including edge-nodes coupled to a cloud-based or edge-located data storage. The edge-nodes are PB participant nodes, and a regulator or leader assigns them a single role as a blockmaker, block voter, or observer. The hash in the public ledger is updated once a new block is validated by a majority of the block voters, and the new block is propagated to all PB participant nodes. The regulator, leader or observer utilizes a time bound majority voting consensus to determine whether the PB participant nodes come to a consensus on a current state in the storage medium, and if a consensus the new block added to the public ledger.
-
公开(公告)号:US20190392076A1
公开(公告)日:2019-12-26
申请号:US16014349
申请日:2018-06-21
Applicant: Honeywell International Inc.
Abstract: This disclosure provides an apparatus and method for intelligent data access using latent semantic analysis and topic modeling. A method includes receiving, by a semantic query processing engine, a set of operator logbooks that include computer-readable text, receiving a natural language query, performing latent semantic analysis on the set of operator logbooks that include computer-readable text and the natural language query, and generating an ordered list of operator logbooks from the set of operator logbooks that include computer-readable text, wherein the ordered list of operator logbooks is ordered by relevance to the natural language query as determined using the latent semantic analysis.
-
9.
公开(公告)号:US20190109872A1
公开(公告)日:2019-04-11
申请号:US16051069
申请日:2018-07-31
Applicant: Honeywell International Inc.
Inventor: Chandirasekaran Dhakshinamoorthy , Rodney Stein , Ashoka Settihalli
Abstract: A method, an electronic device, and a computer readable medium for vulnerability detection are disclosed. The method includes generating a mapped dataset of a portion of an OPC UA server by mapping the portion of the server, wherein the server is compatible with OPC UA machine to machine (M2M) protocol communication including transport encodings and services. The method also includes identifying input test data to test the portion of the server based in part on the mapped dataset set in order to detect errors. The method further includes performing a plurality of targeted attacks by loading the input test data onto the portion of the server. In response to loading the input test data into the server, the method includes monitoring responses of the server to detect an error. Further, in response to detecting the error the method includes generating a report that indicates the detect error.
-
-
-
-
-
-
-
-