Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure process control communication

A communication channel, edge gateway technology, applied in the field of secure communication between remote systems, which can solve problems such as exposure to hazardous materials, uncontrolled processes, loss of human life, etc.

Active Publication Date: 2022-07-12
FISHER-ROSEMOUNT SYST INC
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the other hand, the interconnection of process plants and / or process control systems with enterprise and / or external networks and systems increases the Risk of network intrusion and / or malicious network attack due to anticipated hazards
Cyber ​​intrusions and malicious cyber-attacks on process plants, networks, and / or control systems can negatively impact the confidentiality, integrity, and / or availability of information assets, which is, in general, a similar hazard to general-purpose computing networks
However, unlike general-purpose computer networks, cyber intrusions of process plants, networks, and / or control systems can also result in damage, destruction, and / or loss of not only plant equipment, products, and other physical assets, but loss of human life
For example, a cyber intrusion may allow a process to become uncontrolled, resulting in explosions, fires, floods, exposure to hazardous materials, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure process control communication
  • Secure process control communication
  • Secure process control communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] As mentioned above, protecting process control plants and systems from network intrusions and malicious network attacks typically utilizes a layered or hierarchical security hierarchy, wherein at least some of the layers or levels are protected through the use of firewalls and other security mechanisms. For example, as previously about figure 1 As discussed, process plant systems, networks and equipment at security levels 0-3 may be protected from attacks from the enterprise network at security levels 4-5 and / or from any external network above level 5 utilizing the enterprise network. Threats, for example, through the use of DMZ 22 and one or more firewalls 12A-12C. However, as more and more services and applications that operate on process plant data are moved to execute remotely, such as on networks and systems outside the process plant (eg, at level 4 and / or within an enterprise or business) or Level 5), and / or even on networks and systems external to the enterprise...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Securely transmitting data across a one-way data diode interconnecting a process plant and a remote system involves supplying the diode at the sending device at the factory end using the connection keying material to the receiving device at the remote end. The connection keying material is used to securely share the network keying material used to encrypt / decrypt messages or packets transmitted across the diode, and its payload includes data generated by a factory update or reset. Shared network keying material uses connection keying material cyclically, and the cyclic interval may be based on tolerance for lost data and other characteristics of the application, service, or consumer.

Description

[0001] Related References [0002] The present disclosure is related to the following patent applications: Co-owned US Patent Application No. 14 / 507,188, filed Oct. 6, 2014, and entitled "Regional BigData in Process Control Systems;" Commonly owned US Patent Application No. 15 / 274,519 for "Data Analytics Services for Distributed Industrial Performance Monitoring"; US Patent Application No. 15 / 274,233; and commonly owned US Patent Application No. 15 / 332,521, filed October 24, 2016, entitled "Process Device Condition and Performance Monitoring," the entire disclosures of which are incorporated herein by reference. technical field [0003] The present disclosure relates generally to process plants and process control systems, and more particularly, to security between a local process plant / process control system and a remote system (eg, a pervasive sensing system) serving the local process control plant / system communication. Background technique [0004] Distributed process ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G05B19/418
CPCG05B19/4186G05B2219/31177H04L9/0822H04L9/0827H04L2209/76H04L63/0209H04L67/12H04W4/70H04L63/0428H04W12/041H04W12/088Y02P90/02G05B19/4185H04L12/4604H04L63/105H04L67/125H04L9/0869H04L9/14H04L12/66H04L63/065
Inventor E·罗特沃尔德M·J·尼克松
Owner FISHER-ROSEMOUNT SYST INC