SYSTEM, METHOD, AND TEMPLATE FOR MANAGING VIRTUAL CONTROL UNITS IN AN INDUSTRIAL AUTOMATION FACILITY

    公开(公告)号:US20240111268A1

    公开(公告)日:2024-04-04

    申请号:US18478527

    申请日:2023-09-29

    CPC classification number: G05B19/4155 G05B2219/31368

    Abstract: A system, template, and method of managing virtual control units in an industrial automation facility are provided. The industrial automation facility includes machines. The method includes generating templates including deployment criteria for the virtual control units. Each of the virtual control units is capable of controlling at least one of the machines. The virtual control units are mapped to one or more compute nodes based on the deployment criteria. The virtual control units are instantiated on the mapped compute nodes when the controlled machines are in operation. The method includes validating that the instantiation of the virtual control units is in accordance with the templates using an attestation that confirms determined deployment parameters after deployment of the virtual control units. The machines perform the industrial process, according to control commands received from at least one of the virtual control units, when the virtual control units are validly instantiated.

    Device and method for protecting a security module from manipulation attempts in a field device

    公开(公告)号:US10528484B2

    公开(公告)日:2020-01-07

    申请号:US13979731

    申请日:2011-12-15

    Abstract: A device for protecting a security module from manipulation attempts in a field device. A control device is configured to control the field device, a security module is configured to provide cryptographic key data which is to be used by the control device, and an interface device is connected to the control device. The security module is configured to allow the control device access to the cryptographic key data in the security module and to prevent access to the cryptographic key data in the event of a manipulation attempt on the field device.

    Method and arrangement for detecting a quantity of plug cycles of a plug connection component

    公开(公告)号:US10431032B2

    公开(公告)日:2019-10-01

    申请号:US13823341

    申请日:2011-08-17

    Applicant: Rainer Falk

    Inventor: Rainer Falk

    Abstract: In order to monitor the number of plug cycles of a plug, such as a plug of a charging cable for an electric car, a plug cycle counter associated with the plug is counted up in an electronic memory after every plug cycle. A warning can thus be issued when a permitted quantity of plug cycles for the plug has been exceeded. Alternatively, the electrical connection at a charging station for an electric car or at a data cable for an automation system can also be cut off if the service life of the plug has been exceeded. High availability of the plug is thereby achieved, because the corresponding cable can be replaced in a timely manner. A hazard to persons due to defective current-carrying parts is also prevented.

    Secure provision of a key
    4.
    发明授权

    公开(公告)号:US09806883B2

    公开(公告)日:2017-10-31

    申请号:US14576458

    申请日:2014-12-19

    Applicant: Rainer Falk

    Inventor: Rainer Falk

    CPC classification number: H04L9/0816 G09C1/00 H04L9/0866 H04L9/14 H04L2209/24

    Abstract: The embodiments relate to a method and a digital circuit area for securely providing a key using a request unit and a provision unit. In this case, a key is derived from parameters, at least one of which is used for the key derivation in a non-predefinable manner by the request unit. In this case, the key derivation is carried out in a digital circuit area in which the request unit and the provision unit are implemented.

    Method for the secure unindirectional transmission of signals

    公开(公告)号:US09628278B2

    公开(公告)日:2017-04-18

    申请号:US13583970

    申请日:2011-02-14

    CPC classification number: H04L9/3236 H04L9/3271 H04L63/0442 H04L63/123

    Abstract: A method transmits a signal using a unidirectional communications link, which is protected by an asymmetric cryptography method. A counter value is incremented by a transmitter during a transmission operation. Subsequently, a challenge is determined by the transmitter on the basis of the counter value and a control command that can be executed by a receiver and, on the basis of the challenge that is determined a response is in turn determined. The challenge and the response are transmitted from the transmitter to the receiver. The challenge received is then checked by the receiver to see whether the counter value used in the challenge is greater than a counter value previously stored by the transmitting transmitter. The response received is checked on the basis of the challenge. Following successful checking of the challenge and response, the control command transmitted in the challenge is executed.

    Method for monitoring a tamper protection and monitoring system for a field device having tamper protection
    6.
    发明授权
    Method for monitoring a tamper protection and monitoring system for a field device having tamper protection 有权
    用于监控具有防篡改的现场设备的防篡改和监控系统的方法

    公开(公告)号:US09147088B2

    公开(公告)日:2015-09-29

    申请号:US14112534

    申请日:2012-04-11

    CPC classification number: G06F21/86 G05B19/0425 G05B2219/37038

    Abstract: The embodiments relate to tamper protection of a field device. The method includes: checking whether manipulation of the field device has taken place; outputting a non-manipulation certificate in case a negative inspection result is determined; transferring the non-manipulation certificate; a registration device checking the non-manipulation certificate; determining an active status of the field device in case the non-manipulation certificate is valid; checking the field device by querying the status of the field device; transferring field device data to the monitoring device; and accepting the field device data if the field device has an active status. The invention further relates to a monitoring system for a field device and a use.

    Abstract translation: 实施例涉及现场设备的防篡改。 该方法包括:检查现场设备的操作是否发生; 在确定负检查结果的情况下输出非操作证书; 转移非操作证书; 检查非操作证书的注册设备; 在非操作证书有效的情况下确定现场设备的活动状态; 通过查询现场设备的状态来检查现场设备; 将现场设备数据传送到监控设备; 并且如果现场设备具有活动状态,则接受现场设备数据。 本发明还涉及现场设备的监视系统和用途。

    Method and arrangement for providing a wireless mesh network
    8.
    发明授权
    Method and arrangement for providing a wireless mesh network 有权
    提供无线网状网络的方法和装置

    公开(公告)号:US09131372B2

    公开(公告)日:2015-09-08

    申请号:US12525456

    申请日:2008-01-25

    Abstract: The invention relates to a method for providing a wireless local network, wherein stationary communication devices and mobile communication devices are connected in the manner of a mesh as the sub-network, which is particularly connected to an infrastructure network and configured such that it can exchange authentication messages with at least one communication device, which is particularly disposed in the infrastructure network and provides an authentication function. During an attempt to establish a first link by a first communication device connected to a communication device providing the authentication function to a second communication device connected to the communication device providing the authentication function, an authenticator role to be assigned as part of an authentication process is associated with the first and second communication devices, wherein at least one property correlating with the connection is analyzed for meeting a criterion. The invention further relates to an arrangement comprising means for carrying out the method.

    Abstract translation: 本发明涉及一种用于提供无线局域网的方法,其中固定通信设备和移动通信设备以网格的方式连接为子网,该子网特别地连接到基础设施网络并且被配置为使得其可以交换 具有至少一个通信设备的认证消息,其特别地设置在基础设施网络中并提供认证功能。 在通过连接到提供认证功能的通信设备的第一通信设备建立到连接到提供认证功能的通信设备的第二通信设备的尝试中,作为认证过程的一部分被分配的认证者角色是 与第一和第二通信设备相关联,其中分析与连接相关联的至少一个属性以满足标准。 本发明还涉及包括用于执行该方法的装置的装置。

    Secure Transmission of a Message
    9.
    发明申请
    Secure Transmission of a Message 有权
    安全传输消息

    公开(公告)号:US20150149779A1

    公开(公告)日:2015-05-28

    申请号:US14403907

    申请日:2013-04-24

    CPC classification number: H04L9/0847 H04L9/0866 H04L9/3247

    Abstract: The embodiments relate to methods and apparatuses for producing secure transmission of a message. The methods are based on production of a basic key that is used for producing respective transmitter keys for a plurality of transmitters. For the ascertainment of the receiver keys by respective receivers, the basic key is transmitted to the receivers, which for their part are able to ascertain a receiver key for checking the integrity of the message from a respective transmitter on the basis of the basic key and an identifier for the transmitter. The receiver ascertains a cryptographic checksum, which, in the course of the integrity check, is compared with a cryptographic checksum that has been produced by the transmitter and sent along by the respective message. The embodiments may be used within the context of automation and sensor networks.

    Abstract translation: 实施例涉及用于产生消息的安全传输的方法和装置。 该方法基于用于产生用于多个发射机的相应发射机密钥的基本密钥的生成。 为了确定相应接收机的接收机密钥,基本密钥被发送到接收机,接收机能够基于基本密钥确定用于从相应发射机检查消息的完整性的接收机密钥,以及 发射机的标识符。 接收机确定加密校验和,其在完整性检查过程中与由发送器产生并由相应消息一起发送的加密校验和进行比较。 实施例可以在自动化和传感器网络的上下文中使用。

Patent Agency Ranking