Securing devices to process control systems

作者: Ken J. Beoughter , Daniel D. Christensen , Deji Chen , Mark J. Nixon , James H. Moore

DOI:

关键词:

摘要: Techniques for securing a device use in or with process plant include provisioning the key generated at least part from data indicative of necessary conditions and/or attributes that must be met before is allowed access to network plant. Upon initialization, determines, based on key, whether not are met, and isolates itself accesses control accordingly. Keys conditions/attributes indicated therein may on, example, location, time, context, customer, supplier, particular plant, manufacturer, user, type, other criteria. Additionally, sub-keys associated another set conditions/attributes. Sub-keys provided by different entity than provider entity.

参考文章(333)
José Luis Agúndez Dominguez, Jesus Renero Quintero, Automatic data mining process control ,(2008)
Benjamin E. Nick, Shai Guday, Miller T. Abel, Provisioning of wireless connectivity for devices using nfc ,(2006)
David D. Brandt, Thong Nguyen, David W. Farchmin, Ramdas M. Pai, Machine associating method and apparatus ,(2002)
Trevor Duncan Schleiss, James S Cahill, Gary K Law, Use of a really simple syndication communication format in a process control system ,(2005)
Donald Craig Likes, Yurong Shi, Russell Clinton Brown, Richard Bruce Patty, David Alan Richardson, System and software for data collection and process control in semiconductor manufacturing and method thereof ,(2001)
Ray C. Delcher, James E. Dogul, George E. Rollins, George K. Schuster, Suresh Nair, Derek W. Jones, Richard Galera, Electronic token to provide sequential event control and monitoring ,(2007)