Abstract:
A method includes transitioning a device (202b) in an industrial process control and automation system (100) from a secondary role to a primary role during a switchover (408) and, in response to the switchover, clearing (410) one or more security values stored by the device. The method also includes receiving (412) a message at the device from a network node (204) and, in response to determining (414) that no security association is associated with the received message or the network node, exchanging (416) security credentials and establishing (418) a trust relationship with the network node. Transitioning the device includes assuming a network address of another device (202a) that previously operated in the primary role, that previously communicated with the network node, and that previously had a security association with the network node. Clearing the security value(s) can prevent the device from having the trust relationship associated with the network node when the device receives the message from the network node.
Abstract:
This disclosure provides a device (154) and method (300) for implementing legacy and improved control functions in controllers (156), including but not limited to in industrial control systems and other systems. A method includes maintaining (302), by a device (154) having a controller (156) and a memory (158), a function library (210) having a plurality of legacy control functions (220) and a plurality of improved control functions (222). The method includes receiving (304) a process to be executed by the controller (156). The method includes, when calling a function of the process, determining (306) whether a device setting indicates that the function is to be executed by one of the plurality of improved control functions (222). The method includes, when the device setting indicates that the function is to be executed by one of the plurality of improved control functions (222), executing (308) the function using the one of the improved control functions (222), and when the device setting does not indicate that the function is to be executed by one of the plurality of improved control functions (222), executing (310) the function using one of the legacy control functions (220).
Abstract:
A method includes transmitting (403), over a virtual private network (VPN) (234) to a remotely-located control platform (210), a request (316) for first information associated with a BOOTP protocol synchronization process (310). The method also includes receiving (405), from the control platform, a first response (318) comprising the requested first information. The method further includes receiving (407), over a local network (228) from an embedded device (106, 220a-220b) in a distributed control system (100, 200), a request (322) for second information associated with the BOOTP protocol. In addition, the method includes transmitting (409), to the embedded device, a second response (326) comprising the requested second information.