Method and system for integration of wireless devices with a distributed control system
First Claim
Patent Images
1. A method comprising:
- loading first and second gateway security keys into first and second gateway nodes, respectively, by a key server;
communicating to the key server first and second gateway authentication information from the first and second gateway nodes, respectively, wherein the first and second gateway authentication information is prepared using the first and second gateway security keys, respectively;
authenticating the first and second gateway nodes at the key server using the first and second gateway authentication information, respectively;
loading a leaf node security key into a leaf node by the key server;
communicating leaf node authentication information from the leaf node to the key server via at least one of the first and second gateway nodes, wherein the leaf node authentication information is prepared using the leaf node security key;
authenticating the leaf node at the key server using the leaf node authentication information;
receiving a subscription message from a process data consumer at one or more of the first and second gateway nodes, the subscription message identifying the leaf node and requesting that information supplied by the leaf node be published at a first rate;
determining first and second communication paths from the leaf node to the first and second gateway nodes, respectively;
repeatedly encrypting leaf node information using the leaf node security key and sending, at a second rate, wireless messages from the leaf node to the first and second gateway nodes via the first and second communication paths, respectively, wherein the wireless messages comprise the encrypted leaf node information;
receiving, by at least one of the first and second gateway nodes, the wireless messages sent by the leaf node at the second rate;
decrypting, at one or more of the first and second gateway nodes, the encrypted leaf node information; and
communicating, by the one or more of the first and second gateway nodes, the decrypted leaf node information to the process data consumer at the first rate.
2 Assignments
0 Petitions
Accused Products
Abstract
A method includes determining first and second communication paths from a leaf node of a plurality of leaf nodes to first and second gateway nodes, respectively, of a plurality of gateway nodes. The first and second communication paths may include first and second intermediate nodes, respectively, of a plurality of intermediate nodes. A wireless message is sent from the leaf node to the first and second gateway nodes via the first and second communication paths, respectively. Information in the wireless message is communicated from at least one of the first and second gateway nodes to a component of a process control system.
54 Citations
21 Claims
-
1. A method comprising:
-
loading first and second gateway security keys into first and second gateway nodes, respectively, by a key server; communicating to the key server first and second gateway authentication information from the first and second gateway nodes, respectively, wherein the first and second gateway authentication information is prepared using the first and second gateway security keys, respectively; authenticating the first and second gateway nodes at the key server using the first and second gateway authentication information, respectively; loading a leaf node security key into a leaf node by the key server; communicating leaf node authentication information from the leaf node to the key server via at least one of the first and second gateway nodes, wherein the leaf node authentication information is prepared using the leaf node security key; authenticating the leaf node at the key server using the leaf node authentication information; receiving a subscription message from a process data consumer at one or more of the first and second gateway nodes, the subscription message identifying the leaf node and requesting that information supplied by the leaf node be published at a first rate; determining first and second communication paths from the leaf node to the first and second gateway nodes, respectively; repeatedly encrypting leaf node information using the leaf node security key and sending, at a second rate, wireless messages from the leaf node to the first and second gateway nodes via the first and second communication paths, respectively, wherein the wireless messages comprise the encrypted leaf node information; receiving, by at least one of the first and second gateway nodes, the wireless messages sent by the leaf node at the second rate; decrypting, at one or more of the first and second gateway nodes, the encrypted leaf node information; and communicating, by the one or more of the first and second gateway nodes, the decrypted leaf node information to the process data consumer at the first rate. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system, comprising:
-
first and second gateway nodes each configured to communicate with a process data consumer and to communicate wirelessly with a leaf node; and a key server configured to; communicate with the first and second gateway nodes; and authenticate the first and second gateway nodes and the leaf node using authentication information received from the first and second gateway nodes and the leaf node, wherein; the first gateway node is further configured to determine a first communication path from the leaf node to the first gateway node; the second gateway node is further configured to determine a second communication path from the leaf node to the second gateway node; the first and second gateway nodes are further configured to; load first and second gateway security keys, respectively, the first and second gateway security keys created by the key server; prepare first and second gateway authentication information using the first and second gateway security keys, respectively; communicate the first and second gateway authentication information, respectively, to the key server for authentication; and communicate wirelessly with the leaf node, wherein at least one of the first and second gateway nodes is configured to receive a subscription message from the process data consumer, wherein the subscription message identifies the leaf node, requests information supplied by the leaf node, and requests that the information be published at a first rate; the leaf node is configured to; load a leaf node security key created by the key server; send to at least one of the first and second gateway nodes a wireless leaf node authentication message comprising leaf node authentication information prepared using the leaf node security key; and repeatedly encrypt leaf node information using the leaf node security key and send, at a second rate, a wireless messages containing the encrypted leaf node information to the first and second gateway nodes; the first and second gateway nodes are further configured to; communicate the leaf node authentication information to the key server for authentication; receive the wireless messages from the leaf node via the first and second communication paths, respectively, at the second rate; and decrypt the encrypted leaf node information; and at least one of the first and second gateway nodes is further configured to send the decrypted leaf node information to the process data consumer at the first rate. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A system, comprising:
-
a key server; first and second gateway nodes each configured to communicate wirelessly with a leaf node; and first and second intermediate nodes each configured to communicate wirelessly with at least one of the gateway nodes and with the leaf node; wherein; at least one of the first and second gateway nodes is configured to receive a subscription message from a process data consumer, wherein the subscription message identifies the leaf node, requests information supplied by the identified leaf node, and requests that the information be published at a first rate; the identified leaf node is configured to; load a security key created by the key server; repeatedly encrypt leaf node information using the security key and send, at a second rate, wireless messages to the first and second gateway nodes via the first and second intermediate nodes, respectively, wherein each of the wireless messages comprises the encrypted leaf node information; and the first and second gateway nodes are configured to; receive the wireless messages sent by the leaf node at the second rate; decrypt the encrypted leaf node information; and send the decrypted leaf node information to the process data consumer at the first rate. - View Dependent Claims (21)
-
Specification