作者: Ken J. Beoughter , Daniel D. Christensen , Deji Chen , Mark J. Nixon , James H. Moore
DOI:
关键词:
摘要: Techniques for securing a device use in or with process plant include provisioning the key generated at least part from data indicative of necessary conditions and/or attributes that must be met before is allowed access to network plant. Upon initialization, determines, based on key, whether not are met, and isolates itself accesses control accordingly. Keys conditions/attributes indicated therein may on, example, location, time, context, customer, supplier, particular plant, manufacturer, user, type, other criteria. Additionally, sub-keys associated another set conditions/attributes. Sub-keys provided by different entity than provider entity.