Unlock instant, AI-driven research and patent intelligence for your innovation.

Embedded Security Architecture for Process Control Systems

An embedded and secure technology, applied in the field of communication network, can solve problems such as system damage

Active Publication Date: 2021-11-23
HONEYWELL INT INC
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to extensive knowledge about the vulnerabilities of open systems, these systems have become more vulnerable to exploits

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded Security Architecture for Process Control Systems
  • Embedded Security Architecture for Process Control Systems
  • Embedded Security Architecture for Process Control Systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] discussed below Figures 1 to 9 The various examples used to describe the principles of the invention in this patent document are by way of illustration only and should not be construed in any way as limiting the scope of the invention. Those skilled in the art will understand that the principles of the invention may be implemented in any suitable way and in any type of suitably arranged device or system.

[0018] One or more embodiments recognize that employing encrypted communications comes at the expense of significant performance degradation and robust security design. Encrypted communication alone is insufficient to address other security concerns, such as malware exploits injected through firmware on embedded nodes through regular and non-standard channels. The use of open systems combined with the availability of hardware through indirect channels further makes it easier for rogue individuals to acquire hardware and perform malware attacks.

[0019] One or more...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An apparatus includes a first distributed control system (DCS) node (202). The first DCS includes at least one interface configured to communicate with the second DCS node (204) over the network (128). The first DCS node also includes at least one processing device. The processing device is configured to exchange security association policies with the second DCS node (411). The processing device is also configured to exchange public keys with the second DCS node using the security association policy (412). The processing device is further configured to send the public key (542) of the second DCS node to the field programmable gate array (402) of the first DCS node. The processing device is also configured to receive the shared secret from the field programmable gate array (544). The processing device is also configured to generate a hash of the message using the shared secret (546).

Description

technical field [0001] The present disclosure is generally directed to communication networks. More specifically, the present disclosure is directed to apparatus and methods for embedded security architectures that incorporate the use of secure microcontrollers and field programmable gate array (FPGA) components. Background technique [0002] As industrial control systems (ICS) have evolved from closed proprietary systems in the early 1990s to convenient, connected, and open systems over the years (now with the advent of the cloud and the Internet of Things (IoT)), it has required Industrial Control Systems (ICS) employ an ever-increasing level of security defense mechanisms. The adoption of open systems in the mid to late nineties provided a trend shift towards increased convenience, improved connectivity and thus improved productivity. However, due to extensive knowledge about the vulnerabilities of open systems, these systems have become more vulnerable to exploits. To...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30H04L29/06
CPCH04L9/0841H04L2209/12G06F21/64G06F21/72G06F21/74G06F21/76G06F21/78H04L9/0825H04L9/0877H04L9/3263H04L63/0428H04L63/061H04L63/0823H04L63/123H04L63/126H04L63/20H04L9/0819
Inventor H.S.哈里达斯A.彻尔诺古佐夫M.霍西克S.戈泽利奇M.古迪
Owner HONEYWELL INT INC