Embedded Security Architecture for Process Control Systems
An embedded and secure technology, applied in the field of communication network, can solve problems such as system damage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] discussed below Figures 1 to 9 The various examples used to describe the principles of the invention in this patent document are by way of illustration only and should not be construed in any way as limiting the scope of the invention. Those skilled in the art will understand that the principles of the invention may be implemented in any suitable way and in any type of suitably arranged device or system.
[0018] One or more embodiments recognize that employing encrypted communications comes at the expense of significant performance degradation and robust security design. Encrypted communication alone is insufficient to address other security concerns, such as malware exploits injected through firmware on embedded nodes through regular and non-standard channels. The use of open systems combined with the availability of hardware through indirect channels further makes it easier for rogue individuals to acquire hardware and perform malware attacks.
[0019] One or more...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


