BLOCKCHAIN FOR SECURING DISTRIBUTED IIOT OR EDGE DEVICE DATA AT REST

    公开(公告)号:US20190297101A1

    公开(公告)日:2019-09-26

    申请号:US15927617

    申请日:2018-03-21

    Abstract: A method of securing data in an industrial processing facility (IPF) includes creating a private blockchain (PB) using a OPC UA standard functionality and storing the PB in an OPC UA address space adding it to an OPC UA communication protocol framework including edge-nodes coupled to a cloud-based or edge-located data storage. The edge-nodes are PB participant nodes, and a regulator or leader assigns them a single role as a blockmaker, block voter, or observer. The hash in the public ledger is updated once a new block is validated by a majority of the block voters, and the new block is propagated to all PB participant nodes. The regulator, leader or observer utilizes a time bound majority voting consensus to determine whether the PB participant nodes come to a consensus on a current state in the storage medium, and if a consensus the new block added to the public ledger.

    Malicious industrial internet of things node activity detection for connected plants

    公开(公告)号:US10432647B2

    公开(公告)日:2019-10-01

    申请号:US15634820

    申请日:2017-06-27

    Abstract: A method and apparatus for identifying malicious activity. At least one memory is configured to store historical communication data. At least one processor is configured to retrieve the historical communication data related to communications between a server and a plurality of clients in a system. The processor is further configured to cluster the historical communication data to group communications of the historical communication data. The processor is further configured to identify a plurality of patterns that indicate malicious activity based on the grouped communications. The processor is further configured to receive current communication data. The processor is further configured to determine whether the current communication data matches the one of the plurality of patterns. The processor is further configured to, responsive to a grouped element of the grouped communications matching the pattern, identifying a group of communications between the server and the plurality of clients as the malicious activity.

    AUTOMATIC TUNNELER IN A COMMUNICATION NETWORK OF AN INDUSTRIAL PROCESS FACILITY

    公开(公告)号:US20190312840A1

    公开(公告)日:2019-10-10

    申请号:US15948051

    申请日:2018-04-09

    Abstract: A method of controlling tunneling in a communication network of an industrial process facility including a client computer and server computer running different communication protocols coupled by the communication network. The method includes providing the client and server computer with a processor connected to a memory. The processor implements a tunneling reliability program including a training model including labeled groups representing reliability data and security data determined from data sources received across the communication network and a learning classifying algorithm for classifying the reliability data and security data as being reliable or not reliable. The processor determines if the communication network is reliable based on the classified reliability data and security data. In response to determining that the communication network is not reliable or secure a notification is generated for a user that the communication network is not reliable and the notification is transmitted to the user.

    Blockchain for securing distributed IIoT or edge device data at rest

    公开(公告)号:US10819722B2

    公开(公告)日:2020-10-27

    申请号:US15927617

    申请日:2018-03-21

    Abstract: A method of securing data in an industrial processing facility (IPF) includes creating a private blockchain (PB) using a OPC UA standard functionality and storing the PB in an OPC UA address space adding it to an OPC UA communication protocol framework including edge-nodes coupled to a cloud-based or edge-located data storage. The edge-nodes are PB participant nodes, and a regulator or leader assigns them a single role as a blockmaker, block voter, or observer. The hash in the public ledger is updated once a new block is validated by a majority of the block voters, and the new block is propagated to all PB participant nodes. The regulator, leader or observer utilizes a time bound majority voting consensus to determine whether the PB participant nodes come to a consensus on a current state in the storage medium, and if a consensus the new block added to the public ledger.

    INTELLIGENT AUTOMATED SECURITY VULNERABILITY DETECTION AND ANALYSIS FOR INDUSTRIAL INTERNET OF THINGS (IIOT) DEVICES

    公开(公告)号:US20190109872A1

    公开(公告)日:2019-04-11

    申请号:US16051069

    申请日:2018-07-31

    Abstract: A method, an electronic device, and a computer readable medium for vulnerability detection are disclosed. The method includes generating a mapped dataset of a portion of an OPC UA server by mapping the portion of the server, wherein the server is compatible with OPC UA machine to machine (M2M) protocol communication including transport encodings and services. The method also includes identifying input test data to test the portion of the server based in part on the mapped dataset set in order to detect errors. The method further includes performing a plurality of targeted attacks by loading the input test data onto the portion of the server. In response to loading the input test data into the server, the method includes monitoring responses of the server to detect an error. Further, in response to detecting the error the method includes generating a report that indicates the detect error.

Patent Agency Ranking