Patent classifications
G05B2219/31255
IOT security mechanisms for industrial applications
The disclosure provides methods and systems for securing internet of thing systems. One method includes receiving, at a computing device, a token, wherein the token comprises a cryptographically signed list of rights that the computing device is authorized to request. The method also includes requesting, using the computing device, an action of a receiving device in an industrial location, wherein requesting the action comprises sending the token with the request to cause the receiving device to authenticate the user of the computing device and confirm the user is authorized to perform the action.
APPARATUS FOR PROTECTING ACCESS TO SEGMENTS IN DISTRIBUTED SYSTEMS
An apparatus for protecting access to a segment in distributed systems is provided, the apparatus including: an input device configured to acquire access data for a first field device; and a verification device configured to verify the acquired access data from a second field device, the first field device and the second field device being coupled to the segment. A computer network segment comprising at least two apparatuses, a method of protecting access to a segment in distributed systems, and a nontransitory computer-readable storage medium are also provided.
IOT SECURITY MECHANISMS FOR INDUSTRIAL APPLICATIONS
The disclosure provides methods and systems for securing internet of thing systems. One method includes receiving, at a computing device, a token, wherein the token comprises a cryptographically signed list of rights that the computing device is authorized to request. The method also includes requesting, using the computing device, an action of a receiving device in an industrial location, wherein requesting the action comprises sending the token with the request to cause the receiving device to authenticate the user of the computing device and confirm the user is authorized to perform the action.
Method for safe access to a field device
A method for providing safe access of a mobile control unit (1) to a field device (2), wherein, in particular, the field device is protected against unauthorized access via a mobile control unit is achieved in that a connection for transmitting data is established between the mobile control unit (1) and the field device (2), that access data for access is exchanged, that a comparison is made between the access data and stored comparison data and a comparison result is generated, and that access of the mobile control unit (1) to the field device (1) is permitted based on the comparison result.
METHOD FOR SAFE ACCESS TO A FIELD DEVICE
A method for providing safe access of a mobile control unit (1) to a field device (2), wherein, in particular, the field device is protected against unauthorized access via a mobile control unit is achieved in that a connection for transmitting data is established between the mobile control unit (1) and the field device (2), that access data for access is exchanged, that a comparison is made between the access data and stored comparison data and a comparison result is generated, and that access of the mobile control unit (1) to the field device (1) is permitted based on the comparison result.