G06F2212/175

OPERATOR ACTION AUTHENTICATION IN AN INDUSTRIAL CONTROL SYSTEM

Operator actions and/or other commands or requests are secured via an authentication path from an action originator to a communications/control module or any other industrial element/controller. In implementations, an industrial control system includes an action authenticator configured to sign an action request generated by the action originator. The destination communications/control module or any other industrial element/controller is configured to receive the signed action request, verify the authenticity of the signed action request, and perform a requested action when the authenticity of the signed action request is verified.

OPERATOR ACTION AUTHENTICATION IN AN INDUSTRIAL CONTROL SYSTEM

Operator actions and/or other commands or requests are secured via an authentication path from an action originator to a communications/control module or any other industrial element/controller. In implementations, an industrial control system includes an action authenticator configured to sign an action request generated by the action originator. The destination communications/control module or any other industrial element/controller is configured to receive the signed action request, verify the authenticity of the signed action request, and perform a requested action when the authenticity of the signed action request is verified.

Operator action authentication in an industrial control system

Operator actions and/or other commands or requests are secured via an authentication path from an action originator to a communications/control module or any other industrial element/controller. In implementations, an industrial control system includes an action authenticator configured to sign an action request generated by the action originator. The destination communications/control module or any other industrial element/controller is configured to receive the signed action request, verify the authenticity of the signed action request, and perform a requested action when the authenticity of the signed action request is verified.

Industrial control system redundant communication/control modules authentication

A set of redundant industrial control system communications/control modules includes at least a first communications/control module and a second communications/control module. The first and second communications/control modules are configured to perform an authentication sequence including: transmitting a request datagram from the first communications/control module to the second communications/control module, the request datagram including a first nonce, a first device authentication key certificate, and a first identity attribute certificate; transmitting a response datagram from the second communications/control module to the first communications/control module, the response datagram including a second nonce, a first signature associated with the first and second nonces, a second device authentication key certificate, and a second identity attribute certificate; and transmitting an authentication datagram from the first communications/control module to the second communications/control module when the response datagram is valid, the authentication datagram including a second signature associated with the first and second nonces.

Secure industrial control system

A secure industrial control system is disclosed herein. The industrial control system includes a plurality of industrial elements (e.g., modules, cables) which are provisioned during manufacture with their own unique security credentials. A key management entity of the secure industrial control system monitors and manages the security credentials of the industrial elements starting from the time they are manufactured up to and during their implementation within the industrial control system for promoting security of the industrial control system. An authentication process, based upon the security credentials, for authenticating the industrial elements being implemented in the industrial control system is performed for promoting security of the industrial control system. In one or more implementations, all industrial elements of the secure industrial control system are provisioned with the security credentials for providing security at multiple (e.g., all) levels of the system.

Authentication between industrial elements in an industrial control system

A set of redundant industrial control system communications/control modules includes at least a first communications/control module and a second communications/control module. The first and second communications/control modules are configured to perform an authentication sequence including: transmitting a request datagram from the first communications/control module to the second communications/control module, the request datagram including a first nonce, a first device authentication key certificate, and a first identity attribute certificate; transmitting a response datagram from the second communications/control module to the first communications/control module, the response datagram including a second nonce, a first signature associated with the first and second nonces, a second device authentication key certificate, and a second identity attribute certificate; and transmitting an authentication datagram from the first communications/control module to the second communications/control module when the response datagram is valid, the authentication datagram including a second signature associated with the first and second nonces.

Secure industrial control system

A zero trust industrial control system is disclosed herein. The industrial control system includes a plurality of industrial elements (e.g., modules, cables) which are provisioned during manufacture with their own unique security credentials. A key management entity of the zero trust industrial control system monitors and manages the security credentials of the industrial elements starting from the time they are manufactured up to and during their implementation within the industrial control system for promoting security of the industrial control system. An authentication process, based upon the security credentials, for authenticating the industrial elements being implemented in the industrial control system is performed for promoting security of the industrial control system. In one or more implementations, all industrial elements of the zero trust industrial control system are provisioned with the security credentials for providing security at multiple (e.g., all) levels of the system.

INDUSTRIAL CONTROL SYSTEM REDUNDANT COMMUNICATION/CONTROL MODULES AUTHENTICATION

A set of redundant industrial control system communications/control modules includes at least a first communications/control module and a second communications/control module. The first and second communications/control modules are configured to perform an authentication sequence including: transmitting a request datagram from the first communications/control module to the second communications/control module, the request datagram including a first nonce, a first device authentication key certificate, and a first identity attribute certificate; transmitting a response datagram from the second communications/control module to the first communications/control module, the response datagram including a second nonce, a first signature associated with the first and second nonces, a second device authentication key certificate, and a second identity attribute certificate; and transmitting an authentication datagram from the first communications/control module to the second communications/control module when the response datagram is valid, the authentication datagram including a second signature associated with the first and second nonces.

System and Method for Optimal Serverless Deployment of Analytics Tasks Across Hierarchical Edge Network

A computer-implemented method for orchestrating execution of workloads on nodes includes determining a set of requirements for resources needed for execution of the workload; determining for each compute node an availability of the resources required; establishing multiple candidate configurations having an assignment of each compute workload to at least one pair of a compute node and a working class, wherein different working classes differ at least in the degree of retention of the compute workload in memory and/or in at least one cache of the compute node after execution; computing for each candidate configuration at least one figure of merit with respect to at least one given optimization goal; and determining a candidate configuration with the best figure of merit as the optimal configuration.

Master/slave management for redundant process controller modules
10002091 · 2018-06-19 · ·

A system comprising first and second redundant controller modules, each controller module comprising mode management circuitry configured to identify whether the corresponding controller module operates in a master mode or a slave mode. The mode management circuitry in each controller module is configured to couple to the mode management circuitry in the other controller module. The mode management circuitries in the controller modules are configured to collectively operate so that one of the controller modules is assigned the master mode and the other of the controller modules is assigned the slave mode. At least one of the mode management circuitries in the controller modules is configured to assign the master mode to the corresponding controller module based on a takeover signal when the mode management circuitry in the corresponding controller module is ready for use.