×

Operator action authentication in an industrial control system

  • US 10,834,094 B2
  • Filed: 10/20/2014
  • Issued: 11/10/2020
  • Est. Priority Date: 08/06/2013
  • Status: Active Grant
First Claim
Patent Images

1. A secure industrial control system, comprising:

  • an action originator configured to transmit an action request received at the action originator;

    an action authenticator located physically remotely from the action originator and including at least one processor in communication with a storage medium having a private key provisioned by the key management entity stored thereon configured to;

    receive the action request from the action originator,determine whether the received action request is an authorized action request independent of the action originator,sign the received action request with the private key thereby generating a signed version of the action request based on the determinationtransmit the action request; and

    a communications/control module in communication with one or more industrial elements, the one or more industrial elements including at least one input/output module operable to receive industrial sensor information or send control information to an industrial actuator or motor, the communications/control module including at least one processor and a non-transitory medium bearing a set of instructions executable by the at least one processor, the set of instructions including instructions to;

    receive the action request from the action authenticator, the action request forming a part of a request datagram, the request datagram comprising a first nonce, a first device authenticating key certificate, and a first identity attribute certificate;

    authenticate the received action request based on a determination of whether the received action is the signed version of the action request, wherein authenticating the received action request further comprises;

    verifying that the request datagram is valid;

    sending a response datagram to the action authenticator, the response datagram comprising a second nonce, a first signature associated with the first nonce and the second nonce, and a second identity attribute certificate;

    receiving an authentication datagram from the action authenticator, the authentication datagram comprising a second signature associated with the first nonce and the second nonce;

    validating the authentication datagram by verifying the second signature associated with the first nonce and the second nonce; and

    execute the action request based on whether the received action request is an authenticated action request, wherein the action request includes operator control actions, including;

    reading or changing control set points, controlling one or more actuators, and executing control commands from an operator interface or an engineering interface.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×