OPERATOR ACTION AUTHENTICATION IN AN INDUSTRIAL CONTROL SYSTEM
First Claim
1. A secure industrial control system, comprising:
- an action originator;
an action authenticator configured to sign an action request generated by the action originator; and
a communications/control module in communication with one or more industrial elements, the communications/control module being configured to receive the signed action request, verify the authenticity of the signed action request, and perform a requested action when the authenticity of the signed action request is verified.
5 Assignments
0 Petitions
Accused Products
Abstract
Operator actions and/or other commands or requests are secured via an authentication path from an action originator to a communications/control module or any other industrial element/controller. In implementations, an industrial control system includes an action authenticator configured to sign an action request generated by the action originator. The destination communications/control module or any other industrial element/controller is configured to receive the signed action request, verify the authenticity of the signed action request, and perform a requested action when the authenticity of the signed action request is verified.
104 Citations
20 Claims
-
1. A secure industrial control system, comprising:
-
an action originator; an action authenticator configured to sign an action request generated by the action originator; and a communications/control module in communication with one or more industrial elements, the communications/control module being configured to receive the signed action request, verify the authenticity of the signed action request, and perform a requested action when the authenticity of the signed action request is verified. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 14, 15, 16)
-
-
13. A communications/control module, comprising:
-
at least one processor; and a non-transitory medium bearing a set of instructions executable by the at least one processor, the set of instructions including instructions to; receive an action request initiated by an action originator and signed by an action authenticator; verify the authenticity of the signed action request; and perform a requested action when the authenticity of the signed action request is verified.
-
-
17. A method of authenticating a requested action, comprising:
-
signing an action request with an action authenticator; sending the signed action request to a communications/control module; verifying the authenticity of the signed action request; and performing a requested action with the communications/control module when the authenticity of the signed action request is verified. - View Dependent Claims (18, 19, 20)
-
Specification