Abstract:
Disclosed below are representative embodiments of methods, apparatus, and systems for monitoring and using data in an electric power grid. For example, one disclosed embodiment comprises a sensor for measuring an electrical characteristic of a power line, electrical generator, or electrical device; a network interface; a processor; and one or more computer-readable storage media storing computer-executable instructions. In this embodiment, the computer-executable instructions include instructions for implementing an authorization and authentication module for validating a software agent received at the network interface; instructions for implementing one or more agent execution environments for executing agent code that is included with the software agent and that causes data from the sensor to be collected; and instructions for implementing an agent packaging and instantiation module for storing the collected data in a data container of the software agent and for transmitting the software agent, along with the stored data, to a next destination.
Abstract:
A secure control system includes a network of multiplexers that control end/field devices of an infrastructure system, such as an electric power grid. The multiplexers have a default secure lockdown state that prevents remote access to data on the multiplexers and prevents modification of software or firmware of the multiplexer. One or more of the multiplexers include a physical authentication device that confirms the physical proximity of a trusted individual when remote access is requested. A user accesses the network and one of the multiplexers remotely by way of login credentials. The trusted individual confirms the identity of the remote user and operates the physical authentication device connected with and in proximity to that multiplexer, thereby confirming that the remote user can be trusted to access data and reconfigure the multiplexers. The multiplexer connected with the physical authentication device generates a token that is passed to each of the multiplexers that the remote user needs access to. The token may specify a time period, after which, the multiplexers will reenter secure lockdown mode.
Abstract:
A method for locking out a remote terminal unit includes: receiving a lockout request, wherein the lockout request includes at least a public key associated with a user, a user identifier, and a terminal identifier; identifying a user profile associated with the user based on the user identifier included in the received lockout request; verifying the public key included in the received lockout request and permission for the user to lockout a remote terminal unit associated with the terminal identifier included in the received lockout request based on data included in the identified user profile; generating a lockout permit, wherein the lockout permit includes at least the public key included in the received lockout request; and transmitting at least a lockout request and the generated lockout permit, wherein the lockout request includes an instruction to place a lockout on the remote terminal unit.
Abstract:
A communication apparatus includes first communication means having a first communication function for wirelessly communicating with a partner apparatus, and second communication means having an electric power supply function for wirelessly supplying electric power to the partner apparatus and a second communication function for wirelessly communicating with the partner apparatus. The second communication function is for transmitting specific data sequence to the partner apparatus in response to reception of specific data from the partner apparatus, and the electric power supply function is for supplying electric power to the partner apparatus in a case of receiving from the partner apparatus, with the first communication means, a signal indicating that the partner apparatus has received the data sequence.
Abstract:
A method of making a physical unclonable function (PUF) having magnetic and non-magnetic particles is disclosed. Measuring both magnetic field and image view makes the PUF difficult to counterfeit. PUF may be incorporated into a user-replaceable supply item for an imaging device. A PUF reader may be incorporated into an imaging device to read the PUF. Other methods are disclosed.
Abstract:
Technologies are generally provided to establish a secure connection between a wireless network access point and a wireless enabled device by sharing a secret key synthesized from one or more messages exchanged over power lines. Messages exchanged between devices within a location such as a household over power lines and/or with a power utility control center may be collected, for example, communication messages between a wireless enabled device and a smart meter or any other device. The wireless enabled device and a wireless network access point may synthesize a secret key from the collected messages and share the secret key to establish a secure wireless connection over a channel that is not secure.
Abstract:
A security management system comprises a key management sub-system, an asset/workload management sub-system, and an event management sub-system. The event management sub-system detects events. The asset/workload management sub-system correlates events (irrespective of type) with the assets that generate them, and the key management sub-system uses the event-asset associations determined by the asset/workload management sub-system to automatically orchestrate the necessary key management activities (e.g., key creation, revocation, refresh, etc.) across the impacted components in the information technology and operational realms to ensure data security. In one use case, a security event detected by the event management sub-system triggers one or more actions within the asset/workload management sub-system. Service configuration records are identified from this scan, and assets defined in those records are identified. An event-asset association is then supplied to the key management sub-system, which uses this information to determine a key management operation.
Abstract:
The present invention ensures more secure connections between devices that comply with a USB power delivery standard. In an embodiment, a power feeding system 1 selects one of a plurality of power supply voltages and performs a power feeding operation via a USB interface, and the power feeding system includes: a USB cable 30 including a security controller 38 that holds security information, and a host 10 that is connected to the USB cable 30, includes an authenticator controller 14, the authenticator controller 14 authenticating the USB cable 30 using the security information received from the USB cable 30, receives a voltage selection signal that selects one of the plurality of power supply voltages, and performs a power feeding operation based on the voltage selection signal. The host 10 carries out the power feeding operation based on the voltage selection signal when the authentication has been successfully performed.
Abstract:
A apparatus includes: a detector that detects a parameter that indicates a state of an electric power system; a first communication interface that communicates with a device that receives power supplied from the electric power system; a second communication interface that receives a demand response signal from a server that monitors a state of the electric power system; and a control circuit that controls the device via a first communication interface. The demand response signal contains either first information indicating an instruction for increasing the amount of power supplied from the electric power system to the device or second information indicating an instruction for decreasing the amount of power supplied from the electric power system to the device, and the control circuit determines whether control of the device is performed in accordance with the demand response signal based on the first information or second information contained and the detected parameter.
Abstract:
A power control device forms energy storage equipment together with a storage battery. The power control device includes: a communication portion that communicates with a power management device, which manages charge and discharge of the storage battery; a power conditioner that supplies electricity to a predetermined destination for supply; a control portion that controls operation of the power conditioner based on instructions from the power management device that are received by the communication portion; and an authentication processing portion that performs authentication processing with the power management device.