SYSTEM AND METHOD FOR GRID BASED CYBER SECURITY
First Claim
1. A method for obtaining a decryption key for use in a secure communication session, comprising:
- receiving, by an intelligent communicating device (ICD) via an electrical distribution grid on a low voltage side of a transformer, a first request from a computing device coupled to the electrical distribution grid via an electrical outlet for a decryption key for use in the secure communication session;
sending, via the electrical distribution grid to a receiver coupled to the electrical distribution grid on a high voltage side of the transformer, a second request for the decryption key;
receiving, from a transmitter coupled to the electrical distribution grid on the high voltage side of the transformer, the decryption key; and
sending the decryption key to the computing device via the electrical distribution grid.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and system for providing a secure communication network using an electrical distribution grid is disclosed. A device connected to the electrical distribution grid initiates a request for a secured key token by signaling an intelligent communicating device residing at or near an edge of the grid. The intelligent communicating device forwards the request to a receiver at a distribution substation on the electrical grid. This receiver enhances the properties of the request such that a grid location for the request can be inferred. The enhanced request is forwarded to a server at the distribution substation, which compares the request grid location to a Grid Map and Policies of known secure grid locations. Any inconsistencies between the grid location inferred from the enhanced request and the Grid Map and Policies locations are considered evidence of tampering, and the server rejects the request.
14 Citations
8 Claims
-
1. A method for obtaining a decryption key for use in a secure communication session, comprising:
-
receiving, by an intelligent communicating device (ICD) via an electrical distribution grid on a low voltage side of a transformer, a first request from a computing device coupled to the electrical distribution grid via an electrical outlet for a decryption key for use in the secure communication session; sending, via the electrical distribution grid to a receiver coupled to the electrical distribution grid on a high voltage side of the transformer, a second request for the decryption key; receiving, from a transmitter coupled to the electrical distribution grid on the high voltage side of the transformer, the decryption key; and sending the decryption key to the computing device via the electrical distribution grid. - View Dependent Claims (2, 3, 4)
-
-
5. An intelligent communicating device (ICD) for obtaining a decryption key for use in a secure communication session, comprising:
-
a communication interface configured to be coupled to a low voltage side of an electrical distribution grid; a processor device coupled to the communication interface and configured to; receive, via the electrical distribution grid, a first request from a computing device coupled to the electrical distribution grid via an electrical outlet for a decryption key for use in the secure communication session; send, via the electrical distribution grid to a receiver coupled to the electrical distribution grid on a high voltage side of the transformer, a second request for the decryption key; receive, from a transmitter coupled to the electrical distribution grid on the high voltage side of the transformer, the decryption key; and send the decryption key to the computing device via the electrical distribution grid. - View Dependent Claims (6, 7, 8)
-
Specification