System and methodology providing automation security protocols and intrusion detection in an industrial controller environment
First Claim
1. An automation security system, comprising:
- a factory protocol to transport data among end points of a communication channel; and
at least one security field associated with the factory protocol to authenticate at least one of a requester of the data and a supplier of the data.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to a system and methodology facilitating automation security in a networked-based industrial controller environment. Various components, systems and methodologies are provided to facilitate varying levels of automation security depending on considerations of system performance while promoting security in accordance with one or more security protocols. The security protocols can include protocol extensions that are adapted to factory networks. Dynamic security operations are provided that include altering security patterns or interfaces based on such factors as performance, time, and the nature of network communications. The security protocols can also include integrity mechanisms, encryption mechanisms, session management protocols, intrusion detection components, and wireless considerations.
225 Citations
31 Claims
-
1. An automation security system, comprising:
-
a factory protocol to transport data among end points of a communication channel; and
at least one security field associated with the factory protocol to authenticate at least one of a requester of the data and a supplier of the data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method to facilitate factory automation network security, comprising:
-
determining network security requirements for an industrial automation system;
adapting a wireless security protocol to the industrial automation system; and
employing the wireless security protocol to communicate with the industrial automation system. - View Dependent Claims (18, 19)
-
-
20. A method to facilitate automation network security, comprising:
-
establishing a communications session with an automation asset via a strong security protocol; and
exchanging data with the automation asset in accordance with real time communications via a lightweight security protocol that induces minimal impact on a system'"'"'s performance. - View Dependent Claims (21, 22, 23)
-
-
24. An automation security system, comprising:
-
means for encoding a security component within a factory protocol;
means for transmitting the security component and the factory protocol across a network; and
means for decoding the security component in order to facilitate a secure communications channel across the network.
-
-
25. An automation security system, comprising:
-
an automation device adapted for network communications;
a factory protocol utilized by the automation device for network communications; and
an intrusion detection component adapted for the factory protocol to detect network attacks directed to the automation device. - View Dependent Claims (26, 27)
-
-
28. A security violation detection methodology, comprising:
-
adapting an industrial network protocol in accordance with an intrusion detection technology; and
monitoring the industrial network protocol for an attack via the intrusion detection technology. - View Dependent Claims (29, 30, 31)
-
Specification