Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cyber security for physical systems

a physical system and cyber security technology, applied in the field of cyber security systems and methods, can solve the problems of new vulnerabilities and susceptibilities of controlling and controlled equipment to be operated in an unwanted manner

Inactive Publication Date: 2017-09-21
MISSION SECURE INC
View PDF4 Cites 50 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The system effectively detects and corrects cyber security threats in real-time, minimizing disruptions and enhancing the resilience of protected systems by providing a layered defense mechanism and global operational awareness.

Problems solved by technology

The increasingly ubiquitous use of computers and processors for controlling equipment and systems has led to new vulnerabilities and susceptibilities of the controlling and controlled equipment to be operated in an unwanted manner due to, for example, hacking and other malicious or unauthorized access for command and control of the affected systems.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cyber security for physical systems
  • Cyber security for physical systems
  • Cyber security for physical systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012]Embodiments relate generally to a cyber security system comprising at least one component, either a first or a second component, adapted to be coupled to a secured system, and may further include additional first or second components with the second component or components operatively coupled to one or more of the first components configured to monitor, control, and interact with the one or more first components based on sensed information received from the one or more first components, and a third component configured to receive information from and to monitor at least one of the second components or one or more first components as well as one or more of the third components to analyze the sensed information and the security information to determine global operational awareness. The second component is further configured to output security information to a user and to the third component. However, in some embodiments, the first component can also output security information t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A cyber security system and method that includes one or more devices configured to determine a cyber security threat or breach event based on analysis of operational information of a protected system.

Description

CROSS REFERENCE TO RELATED APPLICATIONS[0001]This application is a Continuation application of U.S. application Ser. No. 14 / 742,581, filed Jun. 17, 2015, the contents all of which are incorporated herein by reference in their entireties.FIELD OF THE INVENTION[0002]Embodiments relate generally to cyber security systems and methods and, in particular, to systems and methods for detecting and correcting unwanted operating conditions or modes.BACKGROUND OF THE INVENTION[0003]The increasingly ubiquitous use of computers and processors for controlling equipment and systems has led to new vulnerabilities and susceptibilities of the controlling and controlled equipment to be operated in an unwanted manner due to, for example, hacking and other malicious or unauthorized access for command and control of the affected systems. There is also an increasing likelihood of such systems being provided in networked communications, and the advent of control being provided at ever more minute levels. E...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F21/55
CPCG06F21/552G06F21/554G06F2221/034
Inventor PARK, DANIEL D.BRABEC, FRANTISEKJONES, RICK A.SUHLER, EDWARD C.DRESCHER, DAVID R.M.PERNOTTO, EDWARD P.
Owner MISSION SECURE INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products