CRYPTOGRAPHIC AUTHENTICATION PROTOCOL
First Claim
Patent Images
1. An authentication protocol for an industrial automation system, comprising:
- at least one industrial control component that communicates security information across a network; and
at least one protocol component that employs mutual authentication data that is based in part on a private key exchange to facilitate authentication of the industrial control component via the network.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentication protocol for an industrial automation system is provided. This includes at least one industrial control component that communicates security information across a network. At least one protocol component is provided that employs mutual authentication data that is based in part on a private key exchange to facilitate authentication of the industrial control component via the network.
137 Citations
37 Claims
-
1. An authentication protocol for an industrial automation system, comprising:
-
at least one industrial control component that communicates security information across a network; and at least one protocol component that employs mutual authentication data that is based in part on a private key exchange to facilitate authentication of the industrial control component via the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer readable medium having a data structure stored thereon to facilitate authentication in an industrial automation environment, comprising:
-
a first data field to specify nonce information for a first control entity; a second data field to specify nonce information for a second control entity; and a third data field that concatenates the nonce information for the first control entity and the second control entity in order to generate a symmetric key for an authentication. - View Dependent Claims (17, 18)
-
-
19. An authentication method for industrial control components, comprising:
-
validating digital certificates between at least two entities; validating encrypted nonces between the at least two entities; and establishing a session between the at least two entities based in part on the digital signatures, the encrypted nonces, and at least a portion of an authentication sequence that includes a private session key. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. An authentication system for an industrial control environment, comprising:
-
means for generating certificates across an industrial control network; means for generating nonces in response to the digital signatures; and means for negotiating a communications session based on a concatenated key associated with the nonces. - View Dependent Claims (30)
-
-
31. A computer readable medium having computer readable instructions stored thereon, comprising:
-
exchanging one or more digital certificates between at least two entities; exchanging one or more encrypted nonces between the at least two entities; and establishing a communications session between the at least two entities based in part on a symmetric session key formed from at least two of the encrypted nonces. - View Dependent Claims (32, 33, 34, 35, 36, 37)
-
Specification