Alarm/event encryption in an industrial environment
First Claim
Patent Images
1. A security system in an industrial automation environment, comprising:
- a receiver component that receives an alarm related to a field device;
an encryption component that encrypts the alarm with an encryption algorithm and secures delivery to an external entity; and
an automatic classifier system that facilitates the selection of the encryption algorithm, the classifier determining the necessity and type of encryption.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods that can enhance protection of alarms and events within an industrial control environment are provided. An alarm security component employs cryptographic mechanisms and techniques to encrypt alarms and/or events related to field devices of an industrial controller system. Also included is a two-way mutual authentication using cryptography, thereby ensuring that an alarm is a valid alarm and that the clients using the alarms are authorized alarm clients. Effectively, the innovation can regulate access to alarms and events by unauthorized external entities (e.g., monitors and/or users) by employing cryptographic mechanisms.
66 Citations
25 Claims
-
1. A security system in an industrial automation environment, comprising:
-
a receiver component that receives an alarm related to a field device; an encryption component that encrypts the alarm with an encryption algorithm and secures delivery to an external entity; and an automatic classifier system that facilitates the selection of the encryption algorithm, the classifier determining the necessity and type of encryption. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A security system in an industrial automation environment, comprising:
-
a receiver component that receives a request to subscribe to an alarm; and an encryption component that encrypts and communicates the alarm to an entity, the encryption component employing an encryption algorithm selected using an automatic classifier system. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for securing an alarm/event, comprising:
-
generating one of an alarm and an event within a field device; and encrypting the one of an alarm and an event using one of a cryptographic key pair, wherein locating the one of the cryptographic key pair is based at least in part upon a characteristic of the one of an alarm and an event. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification