Centrally managed proxy-based security for legacy automation systems
First Claim
Patent Images
1. A system that facilitates enhanced security with respect to an industrial automation environment, comprising:
- a central access authority that provides access rules relating to a legacy device; and
a proxy that receives the access rules and an access request directed to the legacy device, the proxy determines whether the access request is permitted based at least in part upon characteristics of the access request and the access rules.
1 Assignment
0 Petitions
Accused Products
Abstract
A system that facilitates enhanced security with respect to an industrial automation environment comprises a legacy device that is existent within an industrial automation system and a central access authority that provides access rules to a proxy. The proxy receives an access request directed to the legacy device and determines whether the access request is permitted based at least in part upon characteristics of the access request and the access rules provided by the central access authority.
94 Citations
32 Claims
-
1. A system that facilitates enhanced security with respect to an industrial automation environment, comprising:
-
a central access authority that provides access rules relating to a legacy device; and
a proxy that receives the access rules and an access request directed to the legacy device, the proxy determines whether the access request is permitted based at least in part upon characteristics of the access request and the access rules. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. An automation security system for an industrial system, comprising:
-
a central access authority that generates access rules relating to a legacy device within the industrial system; and
a proxy that one of permits and denies access to the legacy device based at least in part upon the generated rules and characteristics associated with the request.
-
-
24. A method for enhancing security in an industrial automation system that includes one or more legacy devices, comprising:
-
associating a legacy device with a proxy, the proxy receives access rules relating to the legacy device; and
receiving an access request relating to the legacy device, access is one of permitted and denied based at least in part upon the access rules and characteristics relating to the request. - View Dependent Claims (25, 26, 27, 28, 29, 30)
-
-
31. An enhanced security system, comprising:
-
means for associating a legacy device with a proxy;
means for centrally providing the proxy with access rules relating to the legacy device; and
means for determining whether an entity requesting access to the legacy device should obtain such access.
-
-
32. A factory floor security system, comprising:
-
a component that receives an access request with respect to a factory floor device; and
a location component that regulates access to the factory floor device based at least in part upon a location of an entity initiating the access request and a location of the factory floor device.
-
Specification