Systems and Methods for Securing Control Systems
First Claim
1. A security system for identifying operators accessing a control system for critical infrastructure, complex networks, and/or industrial processing facilities, the security system comprising:
- A proximity-based user identification device that generates a computer-readable identification of operators who are in proximity to a control device in the control system;
An imaging device that captures a visual likeness of operators in proximity to the control device;
A network sensor that reads operation data from the control system;
An overlay network interconnecting the proximity-based identification device, the imaging device, and the network sensor, wherein the overlay network is interfaced to the control system without modifying the control system; and
Processing hardware executing processor-implemented instructions to generate a correlation between at least a portion of the operation data in the control system, the computer-readable identification, and the visual likeness and to associate the correlation with the portion of the operation data.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and a method for securing control systems for critical infrastructure, complex networks and/or industrial processing facilities. Aspects of the invention can include a proximity-based user identification device that generates a computer-readable identification of operators who are in proximity to a control device in the control system and an imaging device that captures a visual likeness of operators in proximity to the control device. A network sensor can read operation data from the control system. An overlay network can interconnect the proximity-based identification device, the imaging device, and the network sensor, and can interface to the control system without modifying the control system. Processing hardware can execute processor-implemented instructions to generate a correlation between at least a portion of the operation data and the control system, the computer-readable identification, and the visual likeness. The processor can then associate the correlation with the portion of the operation data.
-
Citations
14 Claims
-
1. A security system for identifying operators accessing a control system for critical infrastructure, complex networks, and/or industrial processing facilities, the security system comprising:
-
A proximity-based user identification device that generates a computer-readable identification of operators who are in proximity to a control device in the control system; An imaging device that captures a visual likeness of operators in proximity to the control device; A network sensor that reads operation data from the control system; An overlay network interconnecting the proximity-based identification device, the imaging device, and the network sensor, wherein the overlay network is interfaced to the control system without modifying the control system; and Processing hardware executing processor-implemented instructions to generate a correlation between at least a portion of the operation data in the control system, the computer-readable identification, and the visual likeness and to associate the correlation with the portion of the operation data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for identifying operators accessing a control system for critical infrastructure, complex networks, and/or industrial processing facilities, the method comprising:
-
Generating a proximity-based, computer-readable identification of an operator who is located in proximity to a control device in the control system; Capturing a visual likeness of the operator who is located in proximity to the control device; Reading operation data from the control system; Generating a correlation between at least a portion of the operation data in the control system, die computer-readable identification, and the visual likeness without modifying the control system; and Associating the correlation with the portion of the operation data. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification