SYSTEM AND METHOD FOR SYNCHRONIZING SECURITY SETTINGS OF CONTROL SYSTEMS
First Claim
1. A method for communicating data between a first control system and a second control system, said first control system operable for controlling a first process having first security data in a first data security format for limiting access to said first process, comprising the steps of:
- modifying said first security data from being in said first data security format into modified security data in a modified security format, said modified security format compatible with said second control system;
subsequent to said modifying step, receiving a request from a user of said second control system, said request including a user type and at least one process parameter associated with said first process for information regarding said process parameter or to change a value of said process parameter;
referencing said user type and said process parameter to said modified security data; and
based on results of said referencing, blocking or allowing said request.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for communicating data between a first and second control system (FCS and SCS). FCS (202) controls a first process (FP) having first security data (FSD) in a first data security format (FDSF). The method involves modifying the FSD (214) from being in the FDSF into modified security data (MSD) in a modified security format (MSDF) compatible with SCS (226). Subsequent to the modifying, a request is received from an SCS user. The request includes a user type, process parameter (PP) associated with the FP, and request for information regarding the PP or a request to change a PP value. The method also involves referencing the user type and PP to the MSD. The method further involves blocking or allowing the request based on results of the referencing. If results indicate that the request is allowed, then an access level can be impersonated for changing the PP value in FCS.
-
Citations
18 Claims
-
1. A method for communicating data between a first control system and a second control system, said first control system operable for controlling a first process having first security data in a first data security format for limiting access to said first process, comprising the steps of:
-
modifying said first security data from being in said first data security format into modified security data in a modified security format, said modified security format compatible with said second control system; subsequent to said modifying step, receiving a request from a user of said second control system, said request including a user type and at least one process parameter associated with said first process for information regarding said process parameter or to change a value of said process parameter; referencing said user type and said process parameter to said modified security data; and based on results of said referencing, blocking or allowing said request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A control system, comprising:
-
a first control system operable for controlling a first process having first security data in a first data security format for limiting access to said first process; a second control system configured to enable a user request including a user type and at least one process parameter associated with said first process for information regarding said at least one process parameter or to change a value of said at least one process parameter; and an intermediary processing device coupled between said first and second control systems, said intermediary processing device configured for (a) modifying said first security data from being in said first data security format into modified security data in a modified security format compatible with said second control system, (b) receiving said user request from a user of said second control system, (c) referencing said user type and said process parameter to said modified security data, and (d) blocking or allowing said user request based on results of said referencing. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification