×

Auditable cryptographic protected cloud computing communications system

  • US 8,898,481 B1
  • Filed: 03/04/2014
  • Issued: 11/25/2014
  • Est. Priority Date: 07/18/2012
  • Status: Active Grant
First Claim
Patent Images

1. An auditable cryptographic protected cloud computing communication system comprising:

  • a. a plurality of industrial devices, wherein each industrial device has an individualized messaging protocol enabling each industrial device to receive commands and transmit status and measurement data using the individualized messaging protocol for each industrial device;

    b. a computing cloud in communication with the plurality of industrial devices, wherein the computing cloud provides at least one data storage service, shared hardware resources, and shared software applications to each of the plurality of industrial devices, and wherein the shared hardware resources comprise;

    (i) one or more data storages;

    (ii) one or more processors; and

    (iii) one or more enterprise servers having an enterprise processor, wherein the enterprise processor is in communication with an enterprise data storage, one or more data storages in the computing cloud, or combinations thereof, wherein the enterprise server communicates in each individualized messaging protocol of each industrial device using in-band and out-of-band messages; and

    c. a plurality of physical cryptographic modules, each physical cryptographic module comprising;

    (i) a physical cryptographic module processor;

    (ii) a physical cryptographic module data storage; and

    (iii) at least one of;

    a non-removable, non-over-writable public key installed in the physical cryptographic module data storage, and a non-removable, non-over-writable digest of a public key installed in the physical cryptographic module data storage;

    wherein the plurality of physical cryptographic modules are disposed between the enterprise server in the computing cloud and each industrial device for communicating in-band messages to each industrial device using the messaging protocol of each industrial device; and

    further wherein each physical cryptographic module will, for each industrial device;

    1. authenticate individual unique digital signatures resident in each of;

    a boot loader, an operating system, and an applicational firmware, wherein the boot loader, the operating system, and the applicational firmware are resident in one or more data storages in the computing cloud;

    2. compute a digest for each of the boot loader, the operating system, and the applicational firmware by using a hash function, thereby creating a computed digest;

    3. decrypt the digital signature resident in each of the boot loader, the operating system, and the applicational firmware to produce a second digest by using the non-removable, non-over-writable public electronic key for each of the boot loader, the operating system, and the applicational firmware respectively;

    4. compare each second digest of the boot loader, the operating system and the applicational firmware to each computed digest of the boot loader, the operating system and the applicational firmware respectively;

    5. allow the boot loader to run on one of the processors in the computing cloud if the computed digest for the boot loader and the second digest for the boot loader match;

    6. allow the operating system to run on one of the processors in the computing cloud if the computed digest for the operating system and the second digest for the operating system match;

    7. allow the applicational firmware to run on one of the processors in the computing cloud if the computed digest for the applicational firmware and the second digest for the applicational firmware match; and

    8. terminate cloud computing processes associated with the boot loader, the operating system and the applicational firmware respectively when any computed digest does not match the second digest for the boot loader, the operating system and the applicational firmware respectively;

    (iv) wherein each physical cryptographic module comprises;

    1. computer instructions to receive in-band plain text status and measurement data in the individualized messaging protocol of the industrial device in communication therewith;

    2. computer instructions to transmit in-band decrypted commands to the industrial device, in communication therewith;

    3. computer instructions for providing encrypted messaging both in-band and out-of-band from the industrial device, in communication therewith, using the individualized messaging protocol of the industrial device; and

    4. computer instructions to generate cryptographic keys; and

    d. a plurality of virtual cryptographic modules resident in one of the processors of the computing cloud, each virtual cryptographic module comprising;

    (i) computer instructions for receiving bidirectional out-of-band plain text commands during start up to the physical cryptographic module;

    (ii) computer instructions for sending bidirectional in-band plain text and status and measurement data during start up from the physical cryptographic module;

    (iii) computer instructions for receiving bidirectional out-of-band encrypted commands to the physical cryptographic module;

    (iv) computer instructions for sending bidirectional in-band encrypted status and measurement data from the physical cryptographic module;

    (v) computer instructions to transmit encrypted collected log information to the enterprise server;

    (vi) computer instructions to transmit decrypted status and measurement data in the messaging protocol of the industrial device from the industrial device to the enterprise server;

    (vii) computer instructions to monitor, configure, reconfigure online and on demand, continuously, the plurality of physical cryptographic modules, simultaneously;

    (viii) computer instructions to monitor, configure, reconfigure online and on demand, continuously, at least one of the plurality of virtual cryptographic modules, simultaneously;

    (ix) computer instructions to generate cryptographic keys for;

    digital signatures in authentication certificates and cryptographic key exchanges;

    (x) computer instructions to create cryptographic communication sessions between the plurality of virtual cryptographic modules and the plurality of physical cryptographic modules, without human intervention, allowing cloud computing based encryption and decryption of plain text commands, status and measurement data, messages, log information, and alarm messages without turning off any operating industrial devices, and without turning off the enterprise server in the computing cloud, and while creating an auditable communication pathway from the enterprise server in the computing cloud to operating industrial devices;

    (xi) computer instructions for bidirectional plain text setting information to at least one cryptographic pipe of the plurality of the cryptographic pipes;

    (xii) a library of virtual and physical cryptographic module settings; and

    (xiii) computer instructions to schedule generation of cryptographic keys by the virtual cryptographic module, by the physical cryptographic module, or combinations thereof, using cryptographic time outs; and

    wherein at least one cryptographic pipe of the plurality of cryptographic pipes communicates with at least one virtual cryptographic module of the plurality of virtual cryptographic modules.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×