System and methodology providing multi-tier security for network data with industrial control components
First Claim
Patent Images
1. An industrial control system, comprising:
- an industrial controller configured to communicate with a network based in part on at least one configured security layer; and
the at least one configured security layer mapped according to a mapping to at least one of a respective area or module associated with the industrial controller, the mapping relates the at least one configured security layer to at least one security component that facilitates variation of levels of data access to the industrial controller, and the at least one configured security layer is associated with at least one of similar security components or dissimilar security components.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to a system and methodology facilitating network security and data access in an industrial control environment. An industrial control system is provided that includes an industrial controller to communicate with a network. At least one security layer can be configured in the industrial controller, wherein the security layer can be associated with one or more security components to control and/or restrict data access to the controller. An operating system manages the security layer in accordance with a processor to limit or mitigate communications from the network based upon the configured security layer or layers.
84 Citations
20 Claims
-
1. An industrial control system, comprising:
-
an industrial controller configured to communicate with a network based in part on at least one configured security layer; and the at least one configured security layer mapped according to a mapping to at least one of a respective area or module associated with the industrial controller, the mapping relates the at least one configured security layer to at least one security component that facilitates variation of levels of data access to the industrial controller, and the at least one configured security layer is associated with at least one of similar security components or dissimilar security components. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method to facilitate secure data exchange in an industrial controller network, comprising:
-
storing one or more security layers, including at least one of configurable or selectable security protocols associated with an industrial controller; mapping the one or more security layers to at least one of a respective area associated with the industrial controller or a respective module associated with the industrial controller; and establishing communications with a network device based in part on at least one of the mapping, the one or more security layers or associated one or more security components selected for the one or more security layers. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A non transitory computer readable storage medium comprising computer-executable instructions that, in response to execution by a system, cause the system to perform operations, comprising:
-
storing one or more security layers associated with an industrial controller that include at least one of a configurable or selectable security protocol; mapping one of the one or more security layers to at least one of a respective area or module associated with the industrial controller; and communicating with a network device based in part on at least one of the mapping, the one or more security layers or associated security components selected for one of the one or more security layers.
-
Specification