×

Cryptographic manager tool system

  • US 8,316,232 B1
  • Filed: 07/18/2012
  • Issued: 11/20/2012
  • Est. Priority Date: 07/18/2012
  • Status: Active Grant
First Claim
Patent Images

1. A cryptographic manager tool system that configures and maintains an auditable cryptographic communication system over a network for a plurality of industrial devices each having messaging protocols, wherein the cryptographic manager tool system comprises:

  • a. a server with a processor in communication with data storage having a plurality of input/output ports for communication with an industrial device;

    b. a plurality of virtual cryptographic modules in the data storage, wherein each virtual cryptographic module comprises;

    (i) computer instructions to receive plain text commands from the enterprise server to start at least one virtual cryptographic module of the plurality of virtual cryptographic modules and provide routine commands to the at least one virtual cryptographic module during operation;

    (ii) computer instructions to receive plain text setting commands from the cryptographic manager tool;

    (iii) computer instructions to transmit plain text setting information to the cryptographic manager tool;

    (iv) computer instructions to transmit in-band plain text commands during start up to a physical cryptographic module;

    (v) computer instructions to transmit out-of-band plain text commands during start up to the physical cryptographic module;

    (vi) computer instructions to receive in-band plain text and status and measurement data from the physical cryptographic module during start up;

    (vii) computer instructions to receive out-of-band plain text messages from the physical cryptographic module during start up;

    (viii) computer instructions to receive out-of-band encrypted log information with status and measurement data from the physical cryptographic module;

    (ix) computer instructions to receive out-of-band alarm messages from the physical cryptographic module;

    (x) computer instructions to transmit out-of-band encrypted commands to the physical cryptographic module;

    (xi) computer instructions to receive in-band encrypted status and measurement data from the physical cryptographic module;

    (xii) computer instructions to transmit in-band encrypted commands to the physical cryptographic module;

    (xiii) computer instructions to transmit encrypted collected log information to the enterprise server;

    (xiv) computer instructions to transmit decrypted status and measurement data in the messaging protocol of the industrial device from the industrial device to the enterprise server;

    (xv) computer instructions to monitor, configure and reconfigure online and on demand, continuously, the plurality of cryptographic pipes simultaneously;

    (xvi) computer instructions to monitor, configure, reconfigure online and on demand, continuously, the plurality of physical cryptographic modules, simultaneously;

    (xvii) computer instructions to monitor, configure, reconfigure online and on demand, continuously, the plurality of virtual cryptographic modules simultaneously;

    (xviii) computer instructions to generate cryptographic keys for;

    1. digital signatures in authentication certificates;

    2. cryptographic key exchange; and

    3. cryptographic communication sessions between the plurality of virtual cryptographic modules and the plurality of physical cryptographic modules, without human intervention, allowing online encryption and decryption of plain text commands, status and measurement data, messages, log information, and alarm messages without turning off any operating industrial devices, and without turning off the enterprise server and while creating an auditable communication pathway from the enterprise server to operating industrial devices;

    (xix) computer instructions to transmit plain text setting information to the cryptographic pipes;

    (xx) computer instructions to receive plain text setting information from at least one cryptographic pipe of the plurality of cryptographic pipes;

    (xxi) a library of virtual cryptographic module settings;

    (xxii) a library of physical cryptographic module settings;

    (xxiii) computer instructions to schedule generation of cryptographic keys by the virtual cryptographic module, by the physical cryptographic module, or combinations thereof, using cryptographic time outs; and

    c. wherein each cryptographic pipe of the plurality of cryptographic pipes communicates with one of the virtual cryptographic modules, enabling each industrial device to receive encrypted commands and transmit encrypted status and measurement data to the enterprise server using each industrial device messaging protocol.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×