US20080077976A1 - Cryptographic authentication protocol - Google Patents
Cryptographic authentication protocol Download PDFInfo
- Publication number
- US20080077976A1 US20080077976A1 US11/535,773 US53577306A US2008077976A1 US 20080077976 A1 US20080077976 A1 US 20080077976A1 US 53577306 A US53577306 A US 53577306A US 2008077976 A1 US2008077976 A1 US 2008077976A1
- Authority
- US
- United States
- Prior art keywords
- authentication
- protocol
- component
- key
- computer readable
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Definitions
- the subject invention relates generally to industrial control systems and more particularly to providing a lightweight authentication protocol for industrial control systems that is resistant to commonly known attacks for public key authentication methods.
- any user of the client presents authentication information to the client. This may be with a customizable login prompt, where the user is expected to enter their username and password. Alternatively, the user may use a link framing protocol such as a Point-to-Point Protocol (PPP), which has authentication packets which carry this information.
- PPP Point-to-Point Protocol
- the client may decide to authenticate using RADIUS. To do so, the client creates an “Access-Request” containing such Attributes as the user's name, the user's password, the ID of the client and the Port ID which the user attempts to access.
- RSA Rivest-Shamir-Adleman Encryption Algorithm
- MD5 Message Digest Algorithm
- the Access-Request is submitted to the RADIUS server via the network. If no response is returned within a length of time, the request is re-sent a number of times.
- the client can also forward requests to an alternate server or servers in the event that the primary server is down or unreachable. An alternate server can be used either after a number of tries to the primary server fail, or in a round-robin manner.
- the RADIUS server receives the request, it validates the sending client. A request from a client for which the RADIUS server does not have a shared secret is silently discarded. If the client is valid, the RADIUS server consults a database of users to find the user whose name matches the request. The user entry in the database contains a list of requirements which must be met to allow access for the user. This includes verification of the password, but can also specify the client(s) or port(s) to which the user is allowed access.
- the Access-Challenge packet typically contains a Reply-Message including a challenge to be displayed to the user, such as a numeric value unlikely to be repeated. Typically this is obtained from an external server that knows what type of authenticator is in the possession of the authorized user and can therefore choose a random or non-repeating pseudorandom number of an appropriate radix and length.
- the user then enters the challenge into his device (or software) and it calculates a response, which the user enters into the client which forwards it to the RADIUS server via a second Access-Request. If the response matches the expected response the RADIUS server replies with an Access-Accept, otherwise an Access-Reject.
- the server takes the PAP ID and password and sends them in an Access-Request packet as the User-Name and User-Password.
- the server generates a random challenge (preferably 16 octets) and sends it to the user, who returns a CHAP response along with a CHAP ID and CHAP username.
- Kerberos is an authentication service developed by the Project Athena team at MIT. Kerberos employs secret-key ciphers for encryption and authentication. Unlike a public-key authentication system, Kerberos does not produce digital signatures. Instead, Kerberos was designed to authenticate requests for network resources rather than to authenticate authorship of documents.
- the Kerberos server In a Kerberos system, there is a designated site on each network, called the Kerberos server, which performs centralized key management and administrative functions. The server maintains a database containing the secret keys of all users, authenticates the identities of users, and distributes session keys to users and servers that desire to authenticate one another. Kerberos requires trust in a third party (the Kerberos server). If the server is compromised, the integrity of the system is lost.
- RADIUS, Kerberos, and other authentication schemes can be subject to network protocol attack that is unacceptable for sensitive industrial control applications. Another problem is that there may be large overhead associated with some of these authentication methods which may hinder the real time performance of the industrial control system.
- a lightweight industrial protocol is provided to enable authentication between industrial control components and/or users of the components, to mitigate network protocol attacks, and to facilitate system performance of the components.
- a cryptographic authentication protocol is provided that employs a mutual authentication scheme based in part on a symmetric key system that generally does not require a public key infrastructure to be present. The protocol is such that it is resistant to commonly known attacks for this class of protocol. Additional features are provided that allow the protocol to be used to negotiate private sessions keys and encryption of subsequent transmissions. In this manner, a cryptographic based authentication protocol provides a technical barrier to unauthorized applications and devices participating in an industrial automation architecture that includes controllers, I/O modules, factory devices, computers, servers, clients, and/or other network components.
- RSA protocol By employing private components within the protocol, industrial components can be hardened to mitigate RSA protocol attacks.
- Other aspects of the protocol are that it does not require a public key infrastructure, (PKI), supports a plurality of participants, utilizes a unique nonce structure to avoid replay or determinism, negotiates session keys and encryption, requires a limited set of cryptographic primitives to construct the protocol where a certificate revocation can be self administered, and mutual authentication is provided.
- PKI public key infrastructure
- the lightweight and private nature provides a more secure authentication solution for industrial automation systems over other public and possibly more complex authentication protocols.
- FIG. 1 is a schematic block diagram illustrating a cryptographic authentication component for an industrial automation system.
- FIG. 2 is a diagram illustrating components of an authentication protocol.
- FIG. 3 is a diagram illustrating authorizing and licensing considerations for an authentication protocol.
- FIG. 4 is a flow diagram illustrating general authentication protocol exchange process.
- FIG. 5 is a flow diagram illustrating a process for exchanging certificates between entities.
- FIG. 6 is a flow diagram illustrating a process for nonce exchange and confirmation between entities.
- FIG. 7 is a diagram illustrating a nonce concatenation to form a symmetric session key.
- FIG. 8 illustrates exemplary authentication protocol enhancements.
- FIG. 9 illustrates exemplary key management aspects for an industrial authentication protocol.
- FIG. 10 illustrates miscellaneous security considerations for an industrial authentication protocol.
- An authentication protocol for an industrial automation system includes at least one industrial control component that communicates security information across a network.
- Such networks can be public or private and are employed to communicate the security information including lightweight cryptographic data which is exchanged on the network to authenticate various components of the automation system.
- At least one protocol component is provided that employs mutual authentication data that is based in part on a private key exchange to facilitate authentication of the industrial control component via the network, where the private key exchange can be a symmetric key exchange.
- a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program and a computer.
- a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program and a computer.
- an application running on a server and the server can be components.
- One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers, industrial controllers, and/or modules communicating therewith.
- a system 100 illustrates a lightweight cryptographic authentication protocol component 110 (hereinafter referred to as protocol component) for an industrial automation system.
- the protocol component 110 can be employed by two or more components/users to authenticate between such components across a network 114 , where authenticate implies establishing a substantially secure and trusted connection to exchange data.
- components or users 120 may employ one or more computers, industrial components, or other network components that communicate across the network 114 to one or more industrial control components 130 such as represented by programmable logic controllers (PLCs) 130 (or other factory components as noted below).
- PLCs programmable logic controllers
- the protocol component provides a lightweight implementation of cryptographic primitives.
- the lightweight nature of the protocol component 110 facilitates improved efficiency such as reducing the code base of traditional solutions due in part to reducing communications with a third party or other trusted entities and also minimizes the number of crypto primitives that consume library space. Since communications with a trusted third party are reduced via the protocol component 110 , authentication speed across the network 114 can be increased.
- the lightweight nature of the protocol also enables faster execution speeds and provides more features than other protocols.
- the protocol component 110 supports a simplified architecture than can reduce processing requirements of the system 100 , for example.
- the protocol component 110 enables authentication between industrial control components 130 and components 120 , to mitigate network protocol attacks, and to facilitate system performance of the components.
- a cryptographic authentication protocol is provided by the protocol component 110 that employs a mutual authentication scheme based in part on a symmetric key system that generally does not require a public key infrastructure to be present. The protocol is such that it is resistant to commonly known attacks. Additional features are provided that allow the protocol to be used to negotiate private sessions keys and encryption of subsequent transmissions.
- a cryptographic-based authentication protocol provides a technical barrier to unauthorized applications and devices participating on an industrial automation network 114 that includes controllers, I/O modules, factory devices, computers, servers, clients, and/or other network components.
- the protocol component 110 provides strong and mutual authentication processes between components. This includes provisions for session management including signing and encryption.
- the lightweight nature minimizes the use of cryptographic primitives and generally does not require the use of clocks/calendars in the respective applications or devices.
- This also includes exportable world wide functionality.
- the protocol component 110 is generally not subject to replay; man in the middle; high jacking of authentication; or Lowe attacks.
- security generally does not depend on secrecy of protocol.
- the components 120 can include various computer or network components such as servers, clients, communications modules, mobile computers, wireless components, control components and so forth which are capable of interacting across the network 114 .
- the term PLC as used herein can include functionality that can be shared across multiple components, systems, and or networks 114 .
- one or more PLCs 130 can communicate and cooperate with various network devices across the network 114 . This can include substantially any type of control, communications module, computer, I/O device, sensor, Human Machine Interface (HMI)) that communicate via the network 114 which includes control, automation, and/or public networks.
- the PLC 130 can also communicate to and control various other devices such as Input/Output modules including Analog, Digital, Programmed/Intelligent I/O modules, other programmable controllers, communications modules, sensors, output devices, and the like.
- the network 114 can include public networks such as the Internet, Intranets, and automation networks such as Control and Information Protocol (CIP) networks including DeviceNet and ControlNet. Other networks include Ethernet, DH/DH+, Remote I/O, Fieldbus, Modbus, Profibus, wireless networks, serial protocols, and so forth.
- the network devices can include various possibilities (hardware and/or software components). These include components such as switches with virtual local area network (VLAN) capability, LANs, WANs, proxies, gateways, routers, firewalls, virtual private network (VPN) devices, servers, clients, computers, configuration tools, monitoring tools, and/or other devices.
- VLAN virtual local area network
- WANs wide area network
- proxies gateways
- routers virtual private network
- VPN virtual private network
- a concatenation component is provided. Concatenation is the combining of strings of characters by appending one to the other in the order shown. For example, concatenating “ABC” with “DEF” would yield “ABCDEF.” Programmatically this operation is shown as “ABC” & “DEF”.
- the random number generator 230 is generally a complex algorithm that produces a random number. The randomness of the generator has profound effects on the security of the protocol. Programmatically this operation is shown as RNG X .
- RNG X a Sequential Number Generator.
- the sequential number generator 240 can be a simple algorithm that produces the next sequential number from the number generated in the previous call. The sequential number is allowed to wrap to zero and restart when the maximum sequential number is reached. Programmatically this operation is shown as SNG X .
- a nonce component is provided.
- the Nonce 250 is a message digest of the SHA-1 hash of a random number, RNG, concatenated with a sequential number, SGN, both of which are generated by the device or application.
- a Nonce X SHA-1[RNG X & SNG X ].
- an RSA is provided which is an asymmetric (public/private key) encryption and decryption standard.
- the public key of owner X is designated as K X while the private key of owner X is designated as K X ⁇ 1 .
- a message encrypted with a public key can be decrypted with a matching private key.
- a message encrypted with a private key can be decrypted with a matching public key.
- a digital signature is an RSA encrypted message of the SHA1 message digest of the message being signed.
- CERT X unique certificate
- entity CA cryptographic authorizer
- K X and K X ⁇ 1 public key of the CA
- K CA public key of the CA
- the certificate 310 can include the unique name of the participant (NAME X ); the public key of the participant (K X ); and a digital signature (DSIGN CA ) of the CA.
- Other data may be carried in the certificate 310 provided it is included in the calculation of the DSIGN discussed above.
- the private key of the participate (K X ⁇ 1 ) and the public key of the CA (K CA ) at 320 are generally held in strong secrecy by the participant.
- FIGS. 4-6 illustrate an exchange process employing an authentication protocol for an industrial automation system. While, for purposes of simplicity of explanation, the methodologies are shown and described as a series of acts, it is to be understood and appreciated that the methodology is not limited by the order of acts, as some acts may occur in different orders and/or concurrently with other acts from that shown and described herein. For example, those skilled in the art will understand and appreciate that a methodology could alternatively be represented as a series of interrelated states or events, such as in a state diagram. Moreover, not all illustrated acts may be required to implement a methodology as described herein.
- FIG. 4 illustrates a general authentication protocol exchange process 400 .
- exchange of an industrial authentication protocol occurs between one or more entities such as between an Entity 1 and an Entity 2 .
- Entity 1 is also referred to as “Alice”
- Entity 2 is also referred to as “Bob,” where the name Alice refers to a device or application associated with Entity 1 and the name “Bob” refers to a device or application associated with Entity 2 .
- the process 400 depicts a generic exchange between Alice and Bob where authentication protocol exchanges are signed and the recipient validates the signature as well as the data integrity of each transmission.
- the protocol provides a mutual authentication of the parties as follows: At 410 , Alice and Bob exchange and validate each other's certificate; at 420 , Alice and Bob exchange and validate each other's encrypted nonces; and if the steps of the authentication protocol are sequentially validated, a session is established at 430 .
- FIG. 5 illustrates a process 500 for exchanging certificates between entities.
- Alice transmits a Certificate.
- Alice transmits her certificate (CERT ALICE ) to Bob.
- Bob validates Alice's Certificate and transmits a Certificate to Alice.
- K CA secretly held public key of the CA
- Bob validates the signature of the certificate and its data integrity. If not valid, Bob resets the protocol. If valid, Bob transmits his certificate (CERT BOB ).
- Alice validates Bob's Certificate. In this case, using the secretly held public key of the CA (K CA ), Alice validates the signature of the certificate and its data integrity. If not valid, Alice resets the protocol. If valid, Alice proceeds to the nonce exchange and authentication exchange depicted in FIG. 6 .
- FIG. 6 illustrates a process 600 for nonce exchange and confirmation between entities.
- Alice sends a Nonce to Bob at 610 .
- Alice transmits her Nonce sequence: RSA[Nonce ALICE, K BOB ] & NAME ALICE & DSIGN ALICE.
- Bob validates Alice and sends a Nonce. In this case, Bob validates the digital signature of Alice's message, its data integrity, and that the NAME matches that in Alice's certificate. If not valid at 620 , Bob resets the protocol. If valid, Bob decodes Nonce ALICE using K BOB ⁇ 1 .
- Bob responds with his Nonce sequence: RSA [Nonce ALICE & Nonce BOB, K ALICE ] & NAME BOB & DSIGN BOB.
- Alice validates Bob. Thus, Alice validates the digital signature of Bob's message, its data integrity, and that the NAME matches that in Bob's certificate. If not valid at 630 , Alice resets the protocol. If valid, Alice decodes Nonce ALICE and Nonce BOB using K ALICE ⁇ 1 . If Nonce ALICE as returned by Bob does not match Nonce ALICE as sent by Alice earlier, Alice resets the protocol. If it matches, Alice responds with confirmation to Bob: RSA [Nonce BOB , K BOB ] & NAME ALICE & DSIGN ALICE.
- Bob allows a Session.
- Bob validates the digital signature of Alice's message, its data integrity, and that the NAME matches that in Alice's certificate. If not valid at 640 , Bob resets the protocol. If valid, Bob decodes Nonce BOB using K BOB ⁇ 1 . If Nonce BOB as returned by Alice does not match Nonce BOB as sent by Bob earlier, Bob resets the protocol. If it matches, the mutual authentication is complete and the session may proceed between authenticated entities.
- a system 700 illustrates a nonce concatenation to form a symmetric session key.
- nonces between entities such as between Entity 1 at 710 and Enity 2 at 720 (e.g., between Alice and Bob applications described above) can be concatenated at 700 to form a symmetric key.
- the two Nonces described above, NonceALICE and NonceBOB can be concatenated to form a symmetric key (KSYM) at 700 . This is practical since neither Nonce is passed in the clear; Bob and Alice have knowledge of both Nonces; and the Nonces were generated by independent entities thereby increasing the randomness of the key.
- the symmetric key can be used for all transmissions after authentication to digitally sign the transmissions or to encrypt subsequent transmissions.
- a symmetric key results in significant speed improvements for these functions compared to using asymmetric keys.
- the negotiation for encryption and signing of transmissions can be accommodated during the exchange of nonces by appending desired features after NAME in the exchange.
- FIG. 8 illustrates exemplary authentication protocol enhancements 800 that can be employed.
- Request for Certificates are considered.
- the need to exchange certificates can become unnecessary when Alice and Bob have successfully passed the authentication protocol. This suggests that the protocol could be enhanced to only present a certificate upon request thereby freeing network bandwidth. If revocation certificates are utilized, a provision can be made to allow their presentation at any time.
- inclusion of addresses in the protocol are considered. The security of the system can be improved by including the logical or physical address of the device or application within each exchange. This will differentiate multiple instances of the same licensed device or application and can provide further protection against impersonation.
- an Authentication Phase may be provided.
- the possibility of having authentication steps out of phase between entities such as application or devices such as Alice and Bob in these examples may be reduced by including a unique authentication phase in each exchange by concatenating it after the NAME field.
- invalid attempt entropy may be provided.
- Security can be enhanced if Bob logs invalid certificates from Alice (and vice versa) and begins to geometrically lengthen time between retries. This will spoil attempts at spoofing certificates. Care should be exercised to prevent this from being used as a denial of service attack.
- certificate form versioning can be provided.
- the protocol may include a certificate version number in the body of the certificate to allow different decoding methods as requirements or circumstances dictate.
- a certificate form can be created that is a revocation certificate. This would require devices participating in the architecture to issue all known revocation certificates at the start of a session authentication. Thus, the devices register their own revocation certificates as well as those transmitted by others and then reject certificates that match the revoked list.
- exemplary key management aspects 900 are illustrated for an industrial authentication protocol.
- the private key of the CA (K CA ⁇ 1 ) should be strongly protected.
- a strongly protected, current copy of the K CA ⁇ 1 , a copy of all certificates issued, and a copy of all private keys issued should be maintained in a physically and logically secure environment well removed from the CA.
- network access to the CA should be restricted.
- the CA should not be connected to any networks. Patching and updates to the CA should only occur if the function of the CA requires it to continue its ability to issue and maintain certificates. Access to the CA should be well controlled through physical and logical entry techniques.
- CA public key K CA
- the respective participants' public and private keys should be unique, not deterministic, and not predictable, where the NAME in each certificate should also be unique.
- FIG. 10 illustrates miscellaneous security considerations for an industrial authentication protocol.
- the considerations 1000 contemplate security breaches that should be considered in addition to the protocol aspects described above.
- auditing and diagnostic aspects are considered in view of security for the overall system and particular authentication between entities.
- secret information e.g., private keys
- secret information should not be disclosed in any form in audit trails or diagnostic messages, for example.
- CA public keys should not be disclosed in an audit trail or diagnostic message.
- Random Number Generators are considered in view of potential security concerns. One of the more significant contributors to the security of a protocol is the randomness of the random number generator.
- the above authentication protocols can be processed on various types of computing devices and resources, where some of these devices may be associated with an industrial control component and other devices associated with standalone or networked computing devices.
- computers can be provided to execute the above protocols that include a processing unit, a system memory, and a system bus, for example.
- the system bus couples system components including, but not limited to, the system memory to the processing unit that can be any of various available processors. Dual microprocessors and other multiprocessor architectures also can be employed as the processing unit.
- the system bus can be any of several types of bus structure(s) including the memory bus or memory controller, a peripheral bus or external bus, and/or a local bus using any variety of available bus architectures including, but not limited to, 11-bit bus, Industrial Standard Architecture (ISA), Micro-Channel Architecture (MSA), Extended ISA (EISA), Intelligent Drive Electronics (IDE), VESA Local Bus (VLB), Peripheral Component Interconnect (PCI), Universal Serial Bus (USB), Advanced Graphics Port (AGP), Personal Computer Memory Card International Association bus (PCMCIA), and Small Computer Systems Interface (SCSI).
- ISA Industrial Standard Architecture
- MSA Micro-Channel Architecture
- EISA Extended ISA
- IDE Intelligent Drive Electronics
- VLB VESA Local Bus
- PCI Peripheral Component Interconnect
- USB Universal Serial Bus
- AGP Advanced Graphics Port
- PCMCIA Personal Computer Memory Card International Association bus
- SCSI Small Computer Systems Interface
- the system memory includes volatile memory and nonvolatile memory.
- the basic input/output system (BIOS) containing the basic routines to transfer information between elements within the computer, such as during start-up, is stored in nonvolatile memory.
- nonvolatile memory can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory.
- Volatile memory includes random access memory (RAM), which acts as external cache memory.
- RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).
- SRAM synchronous RAM
- DRAM dynamic RAM
- SDRAM synchronous DRAM
- DDR SDRAM double data rate SDRAM
- ESDRAM enhanced SDRAM
- SLDRAM Synchlink DRAM
- DRRAM direct Rambus RAM
- Computing devices also includes removable/non-removable, volatile/non-volatile computer storage media.
- software components can be provided that act as an intermediary between users and the basic computer resources described in suitable operating environment.
- Such software includes an operating system which can be stored on disk storage, acts to control and allocate resources of the computer system.
- System applications take advantage of the management of resources by operating system through program modules and program data stored either in system memory or on disk storage. It is to be appreciated that the present invention can be implemented with various operating systems or combinations of operating systems or shared with control systems.
- Computers can operate in a networked environment using logical connections to one or more remote computers, such as remote computer(s).
- the remote computer(s) can be a personal computer, a server, a router, a network PC, a workstation, a microprocessor based appliance, a peer device or other common network node and the like, and typically includes many or all of the elements described relative to computer.
- Remote computers can be logically connected through a network interface and then physically connected via communication connection.
- Network interfaces encompass communication networks such as local-area networks (LAN) and wide-area networks (WAN).
- LAN technologies include Fiber Distributed Data Interface (FDDI), Copper Distributed Data Interface (CDDI), Ethernet/IEEE 1102.3, Token Ring/IEEE 1102.5 and the like.
- WAN technologies include, but are not limited to, point-to-point links, circuit switching networks like Integrated Services Digital Networks (ISDN) and variations thereon, packet switching networks, and Digital Subscriber Lines (DSL), and wireless networks.
- ISDN
- the systems described above employing the authentication protocols can include one or more client(s).
- the client(s) can be hardware and/or software (e.g., threads, processes, computing/control devices).
- the systems can also include one or more server(s).
- the server(s) can also be hardware and/or software (e.g., threads, processes, computing/control devices).
- the servers can house threads to perform transformations by employing the authentication protocol, for example.
- One possible communication between a client and a server may be in the form of a data packet adapted to be transmitted between two or more computer processes.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
An authentication protocol for an industrial automation system is provided. This includes at least one industrial control component that communicates security information across a network. At least one protocol component is provided that employs mutual authentication data that is based in part on a private key exchange to facilitate authentication of the industrial control component via the network.
Description
- The subject invention relates generally to industrial control systems and more particularly to providing a lightweight authentication protocol for industrial control systems that is resistant to commonly known attacks for public key authentication methods.
- Industrial controllers historically have operated in tightly-controlled factory networks were a plurality of controllers and associated modules communicate. These lower level control elements often are in communication with higher level computing systems or servers that aggregate data from the controllers and help to manage day-to-day activities of an enterprise. In recent years however, control systems have increasingly become adapted for Ethernet communications which have opened these systems up to global networks such as the Internet. While it is advantageous for control systems to communicate across such global networks, other problems have ensued such as how to protect sensitive control systems and related intellectual property stored thereon from corruption or worse—cyber attack. Until now, various methods have been employed to authenticate network parties that need to communicate to control systems over public networks. Some of these authentication methods include RADIUS and Kerberos authentication schemes which are described in further detail below.
- When a client is configured for RADIUS, any user of the client presents authentication information to the client. This may be with a customizable login prompt, where the user is expected to enter their username and password. Alternatively, the user may use a link framing protocol such as a Point-to-Point Protocol (PPP), which has authentication packets which carry this information. When the client has obtained such information, it may decide to authenticate using RADIUS. To do so, the client creates an “Access-Request” containing such Attributes as the user's name, the user's password, the ID of the client and the Port ID which the user attempts to access. When a password is present, it is hidden using a method based on a Rivest-Shamir-Adleman Encryption Algorithm (RSA) which can include a Message Digest Algorithm (MD5).
- Generally, the Access-Request is submitted to the RADIUS server via the network. If no response is returned within a length of time, the request is re-sent a number of times. The client can also forward requests to an alternate server or servers in the event that the primary server is down or unreachable. An alternate server can be used either after a number of tries to the primary server fail, or in a round-robin manner. When the RADIUS server receives the request, it validates the sending client. A request from a client for which the RADIUS server does not have a shared secret is silently discarded. If the client is valid, the RADIUS server consults a database of users to find the user whose name matches the request. The user entry in the database contains a list of requirements which must be met to allow access for the user. This includes verification of the password, but can also specify the client(s) or port(s) to which the user is allowed access.
- In challenge/response authentication, the user is given an unpredictable number and challenged to encrypt it and give back the result. Authorized users are equipped with special devices such as smart cards or software that facilitate calculation of the correct response with ease. Unauthorized users, lacking the appropriate device or software and lacking knowledge of the secret key necessary to emulate such a device or software can only guess at the response. The Access-Challenge packet typically contains a Reply-Message including a challenge to be displayed to the user, such as a numeric value unlikely to be repeated. Typically this is obtained from an external server that knows what type of authenticator is in the possession of the authorized user and can therefore choose a random or non-repeating pseudorandom number of an appropriate radix and length.
- The user then enters the challenge into his device (or software) and it calculates a response, which the user enters into the client which forwards it to the RADIUS server via a second Access-Request. If the response matches the expected response the RADIUS server replies with an Access-Accept, otherwise an Access-Reject. For PAP protocols, the server takes the PAP ID and password and sends them in an Access-Request packet as the User-Name and User-Password. The server may include an Attributes Service-Type=Framed-User and Framed-Protocol=PPP as a hint to the RADIUS server that PPP service is expected. For CHAP protocols, the server generates a random challenge (preferably 16 octets) and sends it to the user, who returns a CHAP response along with a CHAP ID and CHAP username.
- Kerberos is an authentication service developed by the Project Athena team at MIT. Kerberos employs secret-key ciphers for encryption and authentication. Unlike a public-key authentication system, Kerberos does not produce digital signatures. Instead, Kerberos was designed to authenticate requests for network resources rather than to authenticate authorship of documents. In a Kerberos system, there is a designated site on each network, called the Kerberos server, which performs centralized key management and administrative functions. The server maintains a database containing the secret keys of all users, authenticates the identities of users, and distributes session keys to users and servers that desire to authenticate one another. Kerberos requires trust in a third party (the Kerberos server). If the server is compromised, the integrity of the system is lost. Unfortunately, RADIUS, Kerberos, and other authentication schemes can be subject to network protocol attack that is unacceptable for sensitive industrial control applications. Another problem is that there may be large overhead associated with some of these authentication methods which may hinder the real time performance of the industrial control system.
- The following presents a simplified summary in order to provide a basic understanding of some aspects described herein. This summary is not an extensive overview nor is intended to identify key/critical elements or to delineate the scope of the various aspects described herein. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is presented later.
- A lightweight industrial protocol is provided to enable authentication between industrial control components and/or users of the components, to mitigate network protocol attacks, and to facilitate system performance of the components. In one aspect, a cryptographic authentication protocol is provided that employs a mutual authentication scheme based in part on a symmetric key system that generally does not require a public key infrastructure to be present. The protocol is such that it is resistant to commonly known attacks for this class of protocol. Additional features are provided that allow the protocol to be used to negotiate private sessions keys and encryption of subsequent transmissions. In this manner, a cryptographic based authentication protocol provides a technical barrier to unauthorized applications and devices participating in an industrial automation architecture that includes controllers, I/O modules, factory devices, computers, servers, clients, and/or other network components.
- By employing private components within the protocol, industrial components can be hardened to mitigate RSA protocol attacks. Other aspects of the protocol are that it does not require a public key infrastructure, (PKI), supports a plurality of participants, utilizes a unique nonce structure to avoid replay or determinism, negotiates session keys and encryption, requires a limited set of cryptographic primitives to construct the protocol where a certificate revocation can be self administered, and mutual authentication is provided. The lightweight and private nature provides a more secure authentication solution for industrial automation systems over other public and possibly more complex authentication protocols.
- To the accomplishment of the foregoing and related ends, certain illustrative aspects are described herein in connection with the following description and the annexed drawings. These aspects are indicative of various ways which can be practiced, all of which are intended to be covered herein. Other advantages and novel features may become apparent from the following detailed description when considered in conjunction with the drawings.
-
FIG. 1 is a schematic block diagram illustrating a cryptographic authentication component for an industrial automation system. -
FIG. 2 is a diagram illustrating components of an authentication protocol. -
FIG. 3 is a diagram illustrating authorizing and licensing considerations for an authentication protocol. -
FIG. 4 is a flow diagram illustrating general authentication protocol exchange process. -
FIG. 5 is a flow diagram illustrating a process for exchanging certificates between entities. -
FIG. 6 is a flow diagram illustrating a process for nonce exchange and confirmation between entities. -
FIG. 7 is a diagram illustrating a nonce concatenation to form a symmetric session key. -
FIG. 8 illustrates exemplary authentication protocol enhancements. -
FIG. 9 illustrates exemplary key management aspects for an industrial authentication protocol. -
FIG. 10 illustrates miscellaneous security considerations for an industrial authentication protocol. - An authentication protocol for an industrial automation system is provided. This includes at least one industrial control component that communicates security information across a network. Such networks can be public or private and are employed to communicate the security information including lightweight cryptographic data which is exchanged on the network to authenticate various components of the automation system. At least one protocol component is provided that employs mutual authentication data that is based in part on a private key exchange to facilitate authentication of the industrial control component via the network, where the private key exchange can be a symmetric key exchange. By employing an architecture that is not based substantially on public key exchanges or trusted third parties, the protocol component mitigates protocol attacks.
- It is noted that as used in this application, terms such as “component,” “protocol,” “model, ” and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution as applied to an automation system for industrial control. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program and a computer. By way of illustration, both an application running on a server and the server can be components. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers, industrial controllers, and/or modules communicating therewith.
- Referring initially to
FIG. 1 , asystem 100 illustrates a lightweight cryptographic authentication protocol component 110 (hereinafter referred to as protocol component) for an industrial automation system. Theprotocol component 110 can be employed by two or more components/users to authenticate between such components across anetwork 114, where authenticate implies establishing a substantially secure and trusted connection to exchange data. As illustrated, components orusers 120 may employ one or more computers, industrial components, or other network components that communicate across thenetwork 114 to one or moreindustrial control components 130 such as represented by programmable logic controllers (PLCs) 130 (or other factory components as noted below). - In general, the protocol component provides a lightweight implementation of cryptographic primitives. The lightweight nature of the
protocol component 110 facilitates improved efficiency such as reducing the code base of traditional solutions due in part to reducing communications with a third party or other trusted entities and also minimizes the number of crypto primitives that consume library space. Since communications with a trusted third party are reduced via theprotocol component 110, authentication speed across thenetwork 114 can be increased. The lightweight nature of the protocol also enables faster execution speeds and provides more features than other protocols. As will be described in more detail below, theprotocol component 110 supports a simplified architecture than can reduce processing requirements of thesystem 100, for example. - As noted above, the
protocol component 110 enables authentication betweenindustrial control components 130 andcomponents 120, to mitigate network protocol attacks, and to facilitate system performance of the components. In one aspect, a cryptographic authentication protocol is provided by theprotocol component 110 that employs a mutual authentication scheme based in part on a symmetric key system that generally does not require a public key infrastructure to be present. The protocol is such that it is resistant to commonly known attacks. Additional features are provided that allow the protocol to be used to negotiate private sessions keys and encryption of subsequent transmissions. In this manner, a cryptographic-based authentication protocol provides a technical barrier to unauthorized applications and devices participating on anindustrial automation network 114 that includes controllers, I/O modules, factory devices, computers, servers, clients, and/or other network components. - In general, the
protocol component 110 provides strong and mutual authentication processes between components. This includes provisions for session management including signing and encryption. The lightweight nature minimizes the use of cryptographic primitives and generally does not require the use of clocks/calendars in the respective applications or devices. This also includes exportable world wide functionality. In a Dolev-Yao threat model for example, theprotocol component 110 is generally not subject to replay; man in the middle; high jacking of authentication; or Lowe attacks. Furthermore, security generally does not depend on secrecy of protocol. - Before proceeding, it is noted that the
components 120 can include various computer or network components such as servers, clients, communications modules, mobile computers, wireless components, control components and so forth which are capable of interacting across thenetwork 114. Similarly, the term PLC as used herein can include functionality that can be shared across multiple components, systems, and ornetworks 114. For example, one ormore PLCs 130 can communicate and cooperate with various network devices across thenetwork 114. This can include substantially any type of control, communications module, computer, I/O device, sensor, Human Machine Interface (HMI)) that communicate via thenetwork 114 which includes control, automation, and/or public networks. ThePLC 130 can also communicate to and control various other devices such as Input/Output modules including Analog, Digital, Programmed/Intelligent I/O modules, other programmable controllers, communications modules, sensors, output devices, and the like. - The
network 114 can include public networks such as the Internet, Intranets, and automation networks such as Control and Information Protocol (CIP) networks including DeviceNet and ControlNet. Other networks include Ethernet, DH/DH+, Remote I/O, Fieldbus, Modbus, Profibus, wireless networks, serial protocols, and so forth. In addition, the network devices can include various possibilities (hardware and/or software components). These include components such as switches with virtual local area network (VLAN) capability, LANs, WANs, proxies, gateways, routers, firewalls, virtual private network (VPN) devices, servers, clients, computers, configuration tools, monitoring tools, and/or other devices. - Referring now to
FIG. 2 , a various components of anauthentication protocol 200 are illustrated. One or more of the following components can be used to create theauthentication protocol 200. At 210, a concatenation component is provided. Concatenation is the combining of strings of characters by appending one to the other in the order shown. For example, concatenating “ABC” with “DEF” would yield “ABCDEF.” Programmatically this operation is shown as “ABC” & “DEF”. At 220, a hash algorithm is provided which is shown as SHA-1, for example. In this example, SHA-1 is a one way hash of a string of substantially any length that returns a 160 bit digest of the message. The digest has the principal properties of low collision rates (low chance of two different messages having the same digest) and it is not reversible to the original message. Programmatically this operation is shown as: Message Digest=SHA-1 [message]. - Another component of the
authentication protocol 200 includes aRandom Number Generator 230. Therandom number generator 230 is generally a complex algorithm that produces a random number. The randomness of the generator has profound effects on the security of the protocol. Programmatically this operation is shown as RNGX. At 240, a Sequential Number Generator is provided. Thesequential number generator 240 can be a simple algorithm that produces the next sequential number from the number generated in the previous call. The sequential number is allowed to wrap to zero and restart when the maximum sequential number is reached. Programmatically this operation is shown as SNGX. - At 250, a nonce component is provided. The
Nonce 250 is a message digest of the SHA-1 hash of a random number, RNG, concatenated with a sequential number, SGN, both of which are generated by the device or application. Programmatically, a NonceX=SHA-1[RNGX& SNGX]. At 260, an RSA is provided which is an asymmetric (public/private key) encryption and decryption standard. The public key of owner X is designated as KX while the private key of owner X is designated as KX −1. A message encrypted with a public key can be decrypted with a matching private key. Similarly, a message encrypted with a private key can be decrypted with a matching public key. Programmatically RSA is shown as: Message2=RSA[Message1, KX −1] where a Message1=RSA[Message2, KX −1]. At 270, a digital signature is an RSA encrypted message of the SHA1 message digest of the message being signed. Programmatically the digital signature for participant X is DSIGNX=RSA[SHA1[message], KX −1]. It is noted that unless otherwise designated, DSIGNX can be used to indicate the digital signature of the entire, immediate preceding message. - Turning to
FIG. 3 , authorizing andlicensing considerations 300 for an authentication protocol are illustrated. Generally, all participants employing the cryptographic authentication protocol (CAP) discussed above are initially issued a unique certificate (CERTX) 310 from an entity CA (cryptographic authorizer), a pair of public and private keys unique to the participant (KX and KX −1) at 320, and a public key of the CA (KCA) at 330. Thecertificate 310 can include the unique name of the participant (NAMEX); the public key of the participant (KX); and a digital signature (DSIGNCA) of the CA. Other data may be carried in thecertificate 310 provided it is included in the calculation of the DSIGN discussed above. The private key of the participate (KX −1) and the public key of the CA (KCA) at 320 are generally held in strong secrecy by the participant. Programmatically the minimum certificate for participant X is CERTX=NAMEX & KX & DSIGNCA. -
FIGS. 4-6 illustrate an exchange process employing an authentication protocol for an industrial automation system. While, for purposes of simplicity of explanation, the methodologies are shown and described as a series of acts, it is to be understood and appreciated that the methodology is not limited by the order of acts, as some acts may occur in different orders and/or concurrently with other acts from that shown and described herein. For example, those skilled in the art will understand and appreciate that a methodology could alternatively be represented as a series of interrelated states or events, such as in a state diagram. Moreover, not all illustrated acts may be required to implement a methodology as described herein. -
FIG. 4 illustrates a general authenticationprotocol exchange process 400. In general, exchange of an industrial authentication protocol occurs between one or more entities such as between an Entity1 and an Entity2. In the following examples illustrated inFIGS. 4-6 , Entity1 is also referred to as “Alice” and Entity2 is also referred to as “Bob,” where the name Alice refers to a device or application associated with Entity1 and the name “Bob” refers to a device or application associated with Entity2. Thus, theprocess 400 depicts a generic exchange between Alice and Bob where authentication protocol exchanges are signed and the recipient validates the signature as well as the data integrity of each transmission. The protocol provides a mutual authentication of the parties as follows: At 410, Alice and Bob exchange and validate each other's certificate; at 420, Alice and Bob exchange and validate each other's encrypted nonces; and if the steps of the authentication protocol are sequentially validated, a session is established at 430. -
FIG. 5 illustrates aprocess 500 for exchanging certificates between entities. At 510, Alice transmits a Certificate. In this case, Alice transmits her certificate (CERTALICE) to Bob. At 520, Bob validates Alice's Certificate and transmits a Certificate to Alice. Using the secretly held public key of the CA (KCA), Bob validates the signature of the certificate and its data integrity. If not valid, Bob resets the protocol. If valid, Bob transmits his certificate (CERTBOB). At 530, Alice validates Bob's Certificate. In this case, using the secretly held public key of the CA (KCA), Alice validates the signature of the certificate and its data integrity. If not valid, Alice resets the protocol. If valid, Alice proceeds to the nonce exchange and authentication exchange depicted inFIG. 6 . -
FIG. 6 illustrates aprocess 600 for nonce exchange and confirmation between entities. Proceeding from 530 ofFIG. 5 , Alice sends a Nonce to Bob at 610. Thus, Alice transmits her Nonce sequence: RSA[NonceALICE, KBOB] & NAMEALICE & DSIGNALICE. At 620, Bob validates Alice and sends a Nonce. In this case, Bob validates the digital signature of Alice's message, its data integrity, and that the NAME matches that in Alice's certificate. If not valid at 620, Bob resets the protocol. If valid, Bob decodes NonceALICE using KBOB −1. Bob responds with his Nonce sequence: RSA [NonceALICE & NonceBOB, KALICE] & NAMEBOB & DSIGNBOB. At 630, Alice validates Bob. Thus, Alice validates the digital signature of Bob's message, its data integrity, and that the NAME matches that in Bob's certificate. If not valid at 630, Alice resets the protocol. If valid, Alice decodes NonceALICE and NonceBOB using KALICE −1. If NonceALICE as returned by Bob does not match NonceALICE as sent by Alice earlier, Alice resets the protocol. If it matches, Alice responds with confirmation to Bob: RSA [NonceBOB, KBOB] & NAMEALICE & DSIGNALICE. - At 640, assuming the proceeding acts were validated, Bob allows a Session. In general, Bob validates the digital signature of Alice's message, its data integrity, and that the NAME matches that in Alice's certificate. If not valid at 640, Bob resets the protocol. If valid, Bob decodes NonceBOB using KBOB −1. If NonceBOB as returned by Alice does not match NonceBOB as sent by Bob earlier, Bob resets the protocol. If it matches, the mutual authentication is complete and the session may proceed between authenticated entities.
- Now turning to
FIG. 7 , asystem 700 illustrates a nonce concatenation to form a symmetric session key. In this case, nonces between entities such as between Entity1 at 710 and Enity2 at 720 (e.g., between Alice and Bob applications described above) can be concatenated at 700 to form a symmetric key. For example, the two Nonces described above, NonceALICE and NonceBOB, can be concatenated to form a symmetric key (KSYM) at 700. This is practical since neither Nonce is passed in the clear; Bob and Alice have knowledge of both Nonces; and the Nonces were generated by independent entities thereby increasing the randomness of the key. The symmetric key can be used for all transmissions after authentication to digitally sign the transmissions or to encrypt subsequent transmissions. A symmetric key results in significant speed improvements for these functions compared to using asymmetric keys. The negotiation for encryption and signing of transmissions can be accommodated during the exchange of nonces by appending desired features after NAME in the exchange. -
FIG. 8 illustrates exemplaryauthentication protocol enhancements 800 that can be employed. At 810, Request for Certificates are considered. Generally, the need to exchange certificates can become unnecessary when Alice and Bob have successfully passed the authentication protocol. This suggests that the protocol could be enhanced to only present a certificate upon request thereby freeing network bandwidth. If revocation certificates are utilized, a provision can be made to allow their presentation at any time. At 820, inclusion of addresses in the protocol are considered. The security of the system can be improved by including the logical or physical address of the device or application within each exchange. This will differentiate multiple instances of the same licensed device or application and can provide further protection against impersonation. - At 830, inclusion of an Authentication Phase may be provided. The possibility of having authentication steps out of phase between entities such as application or devices such as Alice and Bob in these examples may be reduced by including a unique authentication phase in each exchange by concatenating it after the NAME field. At 840, invalid attempt entropy may be provided. Security can be enhanced if Bob logs invalid certificates from Alice (and vice versa) and begins to geometrically lengthen time between retries. This will spoil attempts at spoofing certificates. Care should be exercised to prevent this from being used as a denial of service attack. At 850, certificate form versioning can be provided. In this case, the protocol may include a certificate version number in the body of the certificate to allow different decoding methods as requirements or circumstances dictate. This could also be used if the CA private key is compromised. At 860, a certificate form can be created that is a revocation certificate. This would require devices participating in the architecture to issue all known revocation certificates at the start of a session authentication. Thus, the devices register their own revocation certificates as well as those transmitted by others and then reject certificates that match the revoked list.
- Referring to
FIG. 9 , exemplarykey management aspects 900 are illustrated for an industrial authentication protocol. In one aspect at 910, the private key of the CA (KCA −1) should be strongly protected. Thus, substantially, the only use for this key is within the CA. A strongly protected, current copy of the KCA −1, a copy of all certificates issued, and a copy of all private keys issued should be maintained in a physically and logically secure environment well removed from the CA. At 920, network access to the CA should be restricted. In general, the CA should not be connected to any networks. Patching and updates to the CA should only occur if the function of the CA requires it to continue its ability to issue and maintain certificates. Access to the CA should be well controlled through physical and logical entry techniques. Media inserted into the CA for purposes of issuing certificates and backup should be certified to be blank and free of Malware or other extraneous/superfluous objects. It is desirable, but not essential, that the CA public key (KCA) be held in confidence and well protected by all participants. Thus, the respective participants' public and private keys should be unique, not deterministic, and not predictable, where the NAME in each certificate should also be unique. -
FIG. 10 illustrates miscellaneous security considerations for an industrial authentication protocol. In general, theconsiderations 1000 contemplate security breaches that should be considered in addition to the protocol aspects described above. Thus, at 1010 auditing and diagnostic aspects are considered in view of security for the overall system and particular authentication between entities. In general, secret information (e.g., private keys) should not be disclosed in any form in audit trails or diagnostic messages, for example. Consider a hash of a public key if some record is needed but one should not hash or otherwise reference a private key. Also, CA public keys should not be disclosed in an audit trail or diagnostic message. At 1020, Random Number Generators are considered in view of potential security concerns. One of the more significant contributors to the security of a protocol is the randomness of the random number generator. Therefore, care should be applied when using random number generators such that they are of uniform distribution, non-deterministic, and non-predictable, for example. In one case, to increase overall security, a minimum size for the random number generator can be specified. At 1030, Sequential Number Generators are considered in view of potential security threats. In this case it is desirable, though not required, that the serial number generator retain its last state if the respective application or device is reset or restarted. - It is noted that the above authentication protocols can be processed on various types of computing devices and resources, where some of these devices may be associated with an industrial control component and other devices associated with standalone or networked computing devices. Thus, computers can be provided to execute the above protocols that include a processing unit, a system memory, and a system bus, for example. The system bus couples system components including, but not limited to, the system memory to the processing unit that can be any of various available processors. Dual microprocessors and other multiprocessor architectures also can be employed as the processing unit.
- The system bus can be any of several types of bus structure(s) including the memory bus or memory controller, a peripheral bus or external bus, and/or a local bus using any variety of available bus architectures including, but not limited to, 11-bit bus, Industrial Standard Architecture (ISA), Micro-Channel Architecture (MSA), Extended ISA (EISA), Intelligent Drive Electronics (IDE), VESA Local Bus (VLB), Peripheral Component Interconnect (PCI), Universal Serial Bus (USB), Advanced Graphics Port (AGP), Personal Computer Memory Card International Association bus (PCMCIA), and Small Computer Systems Interface (SCSI).
- The system memory includes volatile memory and nonvolatile memory. The basic input/output system (BIOS), containing the basic routines to transfer information between elements within the computer, such as during start-up, is stored in nonvolatile memory. By way of illustration, and not limitation, nonvolatile memory can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory. Volatile memory includes random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM). Computing devices also includes removable/non-removable, volatile/non-volatile computer storage media.
- It is to be appreciated that software components can be provided that act as an intermediary between users and the basic computer resources described in suitable operating environment. Such software includes an operating system which can be stored on disk storage, acts to control and allocate resources of the computer system. System applications take advantage of the management of resources by operating system through program modules and program data stored either in system memory or on disk storage. It is to be appreciated that the present invention can be implemented with various operating systems or combinations of operating systems or shared with control systems.
- Computers can operate in a networked environment using logical connections to one or more remote computers, such as remote computer(s). The remote computer(s) can be a personal computer, a server, a router, a network PC, a workstation, a microprocessor based appliance, a peer device or other common network node and the like, and typically includes many or all of the elements described relative to computer. Remote computers can be logically connected through a network interface and then physically connected via communication connection. Network interfaces encompass communication networks such as local-area networks (LAN) and wide-area networks (WAN). LAN technologies include Fiber Distributed Data Interface (FDDI), Copper Distributed Data Interface (CDDI), Ethernet/IEEE 1102.3, Token Ring/IEEE 1102.5 and the like. WAN technologies include, but are not limited to, point-to-point links, circuit switching networks like Integrated Services Digital Networks (ISDN) and variations thereon, packet switching networks, and Digital Subscriber Lines (DSL), and wireless networks.
- The systems described above employing the authentication protocols can include one or more client(s). The client(s) can be hardware and/or software (e.g., threads, processes, computing/control devices). The systems can also include one or more server(s). The server(s) can also be hardware and/or software (e.g., threads, processes, computing/control devices). The servers can house threads to perform transformations by employing the authentication protocol, for example. One possible communication between a client and a server may be in the form of a data packet adapted to be transmitted between two or more computer processes.
- What has been described above includes various exemplary aspects. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing these aspects, but one of ordinary skill in the art may recognize that many further combinations and permutations are possible. Accordingly, the aspects described herein are intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims. Furthermore, to the extent that the term “includes” is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term “comprising” as “comprising” is interpreted when employed as a transitional word in a claim.
Claims (37)
1. An authentication protocol for an industrial automation system, comprising:
at least one industrial control component that communicates security information across a network; and
at least one protocol component that employs mutual authentication data that is based in part on a private key exchange to facilitate authentication of the industrial control component via the network.
2. The system of claim 1 , the private key exchange is a symmetric key exchange.
3. The system of claim 1 , the private key exchange is associated with a public key component.
4. The system of claim 1 , further comprising employing a reduced subset of cryptographic primitives to facilitate authentication.
5. The system of claim 1 , the protocol component employs a cryptographic authentication protocol.
6. The system of claim 1 , further comprising a component to negotiate private session keys and provide encryption of subsequent transmissions.
7. The system of claim 1 , the protocol component includes provisions for session management including signing and encryption functions.
8. The system of claim 1 , a concatenation component to combine of strings of authentication characters.
9. The system of claim 1 , further comprising at least one hash algorithm that is employed with the protocol component.
10. The system of claim 9 , the hash algorithm includes an SHA-1 protocol.
11. The system of claim 1 , the protocol component further comprising a Random Number Generator to facilitate protocol security.
12. The system of claim 1 , the protocol component further comprising a sequential number generator that produces a next sequential number from a number generated in a previous call.
13. The system of claim 1 , the protocol component further comprising a nonce generator to facilitate mutual authentication.
14. The system of claim 1 , further comprising a component that provides an asymmetric public and private key encryption and decryption standard.
15. The system of claim 1 , further comprising a component to generate a digital signature.
16. A computer readable medium having a data structure stored thereon to facilitate authentication in an industrial automation environment, comprising:
a first data field to specify nonce information for a first control entity;
a second data field to specify nonce information for a second control entity; and
a third data field that concatenates the nonce information for the first control entity and the second control entity in order to generate a symmetric key for an authentication.
17. The computer readable medium of claim 16 , the symmetric key is employed to digitally sign a transmission or to encrypt one or more subsequent transmissions.
18. The computer readable medium of claim 16 , further comprising a negotiation field that is associated with a transmission.
19. An authentication method for industrial control components, comprising:
validating digital certificates between at least two entities;
validating encrypted nonces between the at least two entities; and
establishing a session between the at least two entities based in part on the digital signatures, the encrypted nonces, and at least a portion of an authentication sequence that includes a private session key.
20. The method of claim 19 , further comprising combining the private session key with a public session key.
21. The method of claim 19 , further comprising combining at least two encrypted nonces to form a symmetric authentication exchange.
22. The method of claim 19 , further comprising exchanging the digital certificates between the at least two entities.
23. The method of claim 19 , further comprising exchanging the encrypted nonces between the at least two entities.
24. The method of claim 19 , further comprising employing a public key to validate a signature associated with the digital certificates.
25. The method of claim 24 , further comprising resetting an authentication protocol if a signature is determined invalid.
26. The method of claim 19 , further comprising exchanging a nonce after at least one validation procedure.
27. The method of claim 26 , further comprising decoding the nonce.
28. The method of claim 19 , further comprising enabling a communications session after validating a digital signature and decoding a nonce.
29. An authentication system for an industrial control environment, comprising:
means for generating certificates across an industrial control network;
means for generating nonces in response to the digital signatures; and
means for negotiating a communications session based on a concatenated key associated with the nonces.
30. The system of claim 29 , further comprising means for processing a private session key and a public session key.
31. A computer readable medium having computer readable instructions stored thereon, comprising:
exchanging one or more digital certificates between at least two entities;
exchanging one or more encrypted nonces between the at least two entities; and
establishing a communications session between the at least two entities based in part on a symmetric session key formed from at least two of the encrypted nonces.
32. The computer readable medium of claim 31 , further comprising presenting a certificate based upon a request.
33. The computer readable medium of claim 31 , further comprising including a logical or physical address of a device within an authentication exchange.
34. The computer readable medium of claim 33 , further comprising including a unique authentication phase in the authentication exchange.
35. The computer readable medium of claim 31 , further comprising employing a component to track invalid certificates.
36. The computer readable medium of claim 31 , further comprising employing a certificate version number in an authentication exchange.
37. The computer readable medium of claim 31 , further comprising employing a revocation certificate in an authentication exchange.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/535,773 US20080077976A1 (en) | 2006-09-27 | 2006-09-27 | Cryptographic authentication protocol |
EP07117185A EP1906586A1 (en) | 2006-09-27 | 2007-09-25 | Cryptographic authentication protocol |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/535,773 US20080077976A1 (en) | 2006-09-27 | 2006-09-27 | Cryptographic authentication protocol |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080077976A1 true US20080077976A1 (en) | 2008-03-27 |
Family
ID=38739918
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/535,773 Abandoned US20080077976A1 (en) | 2006-09-27 | 2006-09-27 | Cryptographic authentication protocol |
Country Status (2)
Country | Link |
---|---|
US (1) | US20080077976A1 (en) |
EP (1) | EP1906586A1 (en) |
Cited By (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090037985A1 (en) * | 2007-08-01 | 2009-02-05 | Avaya Technology Llc | Automated Peer Authentication |
US20100064345A1 (en) * | 2007-08-01 | 2010-03-11 | Avaya Inc. | Continual Peer Authentication |
US20100296552A1 (en) * | 2009-05-22 | 2010-11-25 | Honeywell International Inc. | Apparatus and method for hybrid diversity combining and adaptive beam forming in industrial control and automation systems |
US20120331104A1 (en) * | 2011-04-19 | 2012-12-27 | International Business Machines Corporation | Controlling communication among multiple industrial control systems |
US20130191907A1 (en) * | 2010-09-30 | 2013-07-25 | Siemens Aktiengesellschaft | Method and System for Secure Data Transmission with a VPN Box |
WO2013119337A1 (en) * | 2012-02-10 | 2013-08-15 | International Business Machines Corporation | Detecting and combating attack in protection system of an industrial control system |
WO2013163273A1 (en) * | 2012-04-25 | 2013-10-31 | Andreadis Christopher L | Security method and apparatus having digital and analog components |
US20130340064A1 (en) * | 2012-06-15 | 2013-12-19 | Nokia Corporation | Mechanisms for Certificate Revocation Status Verification on Constrained Devices |
US20140019749A1 (en) * | 2008-09-10 | 2014-01-16 | Verizon Patent And Licensing Inc. | Securing information exchanged via a network |
US20150003615A1 (en) * | 2013-06-27 | 2015-01-01 | Infosec Global Inc. | Key agreement protocol |
US20150046701A1 (en) * | 2013-08-06 | 2015-02-12 | Bedrock Automation Platforms Inc. | Secure industrial control system |
US20150046710A1 (en) * | 2013-08-06 | 2015-02-12 | Bedrock Automation Platforms Inc. | Industrial control system redundant communications/control modules authentication |
CN105531635A (en) * | 2013-08-06 | 2016-04-27 | 基岩自动化平台公司 | Secure industrial control system |
WO2016187690A1 (en) * | 2015-05-26 | 2016-12-01 | Infosec Global Inc. | Key agreement protocol |
US10613567B2 (en) | 2013-08-06 | 2020-04-07 | Bedrock Automation Platforms Inc. | Secure power supply for an industrial control system |
US10628361B2 (en) | 2011-12-30 | 2020-04-21 | Bedrock Automation Platforms Inc. | Switch fabric having a serial communications interface and a parallel communications interface |
US10832861B2 (en) | 2011-12-30 | 2020-11-10 | Bedrock Automation Platforms Inc. | Electromagnetic connector for an industrial control system |
US10834820B2 (en) | 2013-08-06 | 2020-11-10 | Bedrock Automation Platforms Inc. | Industrial control system cable |
US10834094B2 (en) | 2013-08-06 | 2020-11-10 | Bedrock Automation Platforms Inc. | Operator action authentication in an industrial control system |
US10848012B2 (en) | 2011-12-30 | 2020-11-24 | Bedrock Automation Platforms Inc. | Electromagnetic connectors for an industrial control system |
US10896145B2 (en) | 2011-12-30 | 2021-01-19 | Bedrock Automation Platforms Inc. | Communications control system with a serial communications interface and a parallel communications interface |
US11055246B2 (en) | 2011-12-30 | 2021-07-06 | Bedrock Automation Platforms Inc. | Input-output module with multi-channel switching capability |
US11102226B2 (en) * | 2017-05-26 | 2021-08-24 | Shenyang Institute Of Automation, Chinese Academy Of Sciences | Dynamic security method and system based on multi-fusion linkage response |
US20210288805A1 (en) * | 2020-03-15 | 2021-09-16 | Nec Corporation Of America | Authentication devices and methods for industrial control devices |
US11144630B2 (en) | 2011-12-30 | 2021-10-12 | Bedrock Automation Platforms Inc. | Image capture devices for a secure industrial control system |
US11146540B2 (en) * | 2018-05-09 | 2021-10-12 | Datalogic Ip Tech S.R.L. | Systems and methods for public key exchange employing a peer-to-peer protocol |
US20210320906A1 (en) * | 2014-06-23 | 2021-10-14 | Airwatch Llc | Cryptographic proxy service |
US20220046426A1 (en) * | 2020-08-07 | 2022-02-10 | Nokia Technologies Oy | Security procedure |
US11314854B2 (en) | 2011-12-30 | 2022-04-26 | Bedrock Automation Platforms Inc. | Image capture devices for a secure industrial control system |
US11967839B2 (en) | 2011-12-30 | 2024-04-23 | Analog Devices, Inc. | Electromagnetic connector for an industrial control system |
US11966349B2 (en) | 2011-12-30 | 2024-04-23 | Analog Devices, Inc. | Electromagnetic connector for for an industrial control system |
US12061685B2 (en) | 2011-12-30 | 2024-08-13 | Analog Devices, Inc. | Image capture devices for a secure industrial control system |
US12120819B2 (en) | 2014-07-07 | 2024-10-15 | Analog Devices, Inc. | Industrial control system cable |
EP4307141A4 (en) * | 2021-03-11 | 2025-02-19 | Omron Tateisi Electronics Co | CONTROL SYSTEM AND CONTROL METHODS THEREFOR |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8458776B2 (en) * | 2009-10-21 | 2013-06-04 | Microsoft Corporation | Low-latency peer session establishment |
US8973124B2 (en) | 2012-04-30 | 2015-03-03 | General Electric Company | Systems and methods for secure operation of an industrial controller |
DE102014106727A1 (en) * | 2014-05-13 | 2015-11-19 | Endress + Hauser Conducta Gesellschaft für Mess- und Regeltechnik mbH + Co. KG | Method for sending / receiving a message by means of an encrypted wireless connection |
DE102017119406A1 (en) * | 2017-08-24 | 2019-02-28 | Samson Aktiengesellschaft | Communication method for a control device |
FR3115646B1 (en) | 2020-10-28 | 2023-09-29 | Accumulateurs Fixes | Method for securing the operation of an industrial system and associated devices |
Citations (84)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4200770A (en) * | 1977-09-06 | 1980-04-29 | Stanford University | Cryptographic apparatus and method |
US4882752A (en) * | 1986-06-25 | 1989-11-21 | Lindman Richard S | Computer security system |
US5051837A (en) * | 1990-06-06 | 1991-09-24 | Mcjunkin Thomas N | Home entertainment equipment control apparatus |
US5202997A (en) * | 1985-03-10 | 1993-04-13 | Isolation Systems Limited | Device for controlling access to computer peripherals |
US5371794A (en) * | 1993-11-02 | 1994-12-06 | Sun Microsystems, Inc. | Method and apparatus for privacy and authentication in wireless networks |
US5535276A (en) * | 1994-11-09 | 1996-07-09 | Bell Atlantic Network Services, Inc. | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography |
US5539906A (en) * | 1993-05-04 | 1996-07-23 | International Business Machines Corporation | Method and apparatus for controlling access to data elements in a data processing system based on status of an industrial process |
US5604914A (en) * | 1991-07-10 | 1997-02-18 | Mitsubishi Denki Kabushiki Kaisha | Communication device for use with a factory automation network having multiple stations for accessing a factory automated device using address variables specific to the factory automated device |
US5917840A (en) * | 1992-03-13 | 1999-06-29 | Foxboro Company | Protection against communications crosstalk in a factory process control system |
US5923756A (en) * | 1997-02-12 | 1999-07-13 | Gte Laboratories Incorporated | Method for providing secure remote command execution over an insecure computer network |
US6088679A (en) * | 1997-12-01 | 2000-07-11 | The United States Of America As Represented By The Secretary Of Commerce | Workflow management employing role-based access control |
US6088804A (en) * | 1998-01-12 | 2000-07-11 | Motorola, Inc. | Adaptive system and method for responding to computer network security attacks |
US6108785A (en) * | 1997-03-31 | 2000-08-22 | Intel Corporation | Method and apparatus for preventing unauthorized usage of a computer system |
US20010013098A1 (en) * | 1997-08-29 | 2001-08-09 | Michael F. Angelo | Remote security technology |
US6298445B1 (en) * | 1998-04-30 | 2001-10-02 | Netect, Ltd. | Computer security |
US20020006790A1 (en) * | 1998-10-21 | 2002-01-17 | Werner Blumenstock | System and method for remote maintenance and/or remote diagnosis of an automation system by means of electronic mail |
US20020023231A1 (en) * | 2000-07-28 | 2002-02-21 | Jan Pathuel | Method and system of securing data and systems |
US6374358B1 (en) * | 1998-08-05 | 2002-04-16 | Sun Microsystems, Inc. | Adaptive countermeasure selection method and apparatus |
US20020078153A1 (en) * | 2000-11-02 | 2002-06-20 | Chit Chung | Providing secure, instantaneous, directory-integrated, multiparty, communications services |
US6421571B1 (en) * | 2000-02-29 | 2002-07-16 | Bently Nevada Corporation | Industrial plant asset management system: apparatus and method |
US20020099959A1 (en) * | 2000-11-13 | 2002-07-25 | Redlich Ron M. | Data security system and method responsive to electronic attacks |
US20020112152A1 (en) * | 2001-02-12 | 2002-08-15 | Vanheyningen Marc D. | Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols |
US20020120728A1 (en) * | 2000-12-22 | 2002-08-29 | Jason Braatz | Method and apparatus for network-enablement of devices using device intelligence and network architecture |
US20020147820A1 (en) * | 2001-04-06 | 2002-10-10 | Docomo Communications Laboratories Usa, Inc. | Method for implementing IP security in mobile IP networks |
US20020152289A1 (en) * | 1997-09-10 | 2002-10-17 | Schneider Automation Inc. | System and method for accessing devices in a factory automation network |
US20020161905A1 (en) * | 2001-04-26 | 2002-10-31 | Nokia Corporation | IP security and mobile networking |
US20020163920A1 (en) * | 2001-05-01 | 2002-11-07 | Walker Philip M. | Method and apparatus for providing network security |
US20020188870A1 (en) * | 2001-06-11 | 2002-12-12 | Mcnc | Intrusion tolerant server system |
US20020199122A1 (en) * | 2001-06-22 | 2002-12-26 | Davis Lauren B. | Computer security vulnerability analysis methodology |
US20030014500A1 (en) * | 2001-07-10 | 2003-01-16 | Schleiss Trevor D. | Transactional data communications for process control systems |
US20030033516A1 (en) * | 2001-08-08 | 2003-02-13 | Michael Howard | Rapid application security threat analysis |
US6542993B1 (en) * | 1999-03-12 | 2003-04-01 | Lucent Technologies Inc. | Security management system and method |
US20030093521A1 (en) * | 2001-11-09 | 2003-05-15 | Xerox Corporation. | Asset management system for network-based and non-network-based assets and information |
US6571141B1 (en) * | 1995-05-30 | 2003-05-27 | Roy-G-Biv Corporation | Application programs for motion control devices including access limitations |
US20030105535A1 (en) * | 2001-11-05 | 2003-06-05 | Roman Rammler | Unit controller with integral full-featured human-machine interface |
US20030126472A1 (en) * | 2001-12-31 | 2003-07-03 | Banzhof Carl E. | Automated computer vulnerability resolution system |
US20030140094A1 (en) * | 2002-01-24 | 2003-07-24 | David Collier | Methods and systems for management and control of an automation control module |
US6615258B1 (en) * | 1997-09-26 | 2003-09-02 | Worldcom, Inc. | Integrated customer interface for web based data management |
US20030200437A1 (en) * | 2002-04-17 | 2003-10-23 | Kazuomi Oishi | Public key certification providing apparatus |
US20030221124A1 (en) * | 2002-05-23 | 2003-11-27 | International Business Machines Corporation | File level security for a metadata controller in a storage area network |
US20030229812A1 (en) * | 2002-06-05 | 2003-12-11 | Cristina Buchholz | Authorization mechanism |
US20030233573A1 (en) * | 2002-06-18 | 2003-12-18 | Phinney Thomas L. | System and method for securing network communications |
US20040015619A1 (en) * | 2002-07-18 | 2004-01-22 | International Business Machines Corporation | Method and system for monitoring the status and operation of devices from a central location |
US20040027875A1 (en) * | 2001-09-27 | 2004-02-12 | Clemens Dinges | Dynamic access to automation resources |
US20040034774A1 (en) * | 2002-08-15 | 2004-02-19 | Le Saint Eric F. | System and method for privilege delegation and control |
US20040049674A1 (en) * | 2002-09-10 | 2004-03-11 | David Scott Collier | Methods and systems for management and control of an automation control module |
US20040059920A1 (en) * | 2002-09-19 | 2004-03-25 | International Business Machines Corporation | Security health checking tool |
US20040073800A1 (en) * | 2002-05-22 | 2004-04-15 | Paragi Shah | Adaptive intrusion detection system |
US20040075590A1 (en) * | 2002-09-25 | 2004-04-22 | Pearson Esther Mae | E-learning biometric identification information system |
US6735601B1 (en) * | 2000-12-29 | 2004-05-11 | Vmware, Inc. | System and method for remote file access by computer |
US20040107345A1 (en) * | 2002-10-21 | 2004-06-03 | Brandt David D. | System and methodology providing automation security protocols and intrusion detection in an industrial controller environment |
US20040125146A1 (en) * | 2002-09-16 | 2004-07-01 | Siemens Aktiengesellschaft | System for detection and indication of a secure status of appliances |
US6760782B1 (en) * | 2000-08-04 | 2004-07-06 | Schneider Automation Inc. | Apparatus for controlling internetwork communications |
US20040139353A1 (en) * | 2002-11-19 | 2004-07-15 | Forcade Jonathan Brett | Methodology and system for real time information system application intrusion detection |
US20040153172A1 (en) * | 2001-05-16 | 2004-08-05 | Robert Rousseau | Predictive diagnostic system in a programmable automaton |
US20040260954A1 (en) * | 2003-06-19 | 2004-12-23 | Schneider Automation Inc. | Biometrics PLC access and control system and method |
US6842860B1 (en) * | 1999-07-23 | 2005-01-11 | Networks Associates Technology, Inc. | System and method for selectively authenticating data |
US20050021839A1 (en) * | 2003-06-23 | 2005-01-27 | Russell Thomas C. | Method and apparatus for providing a selectively isolated equipment area network for machine elements with data communication therebetween and with remote sites |
US20050091492A1 (en) * | 2003-10-27 | 2005-04-28 | Benson Glenn S. | Portable security transaction protocol |
US6920558B2 (en) * | 2001-03-20 | 2005-07-19 | Networks Associates Technology, Inc. | Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system |
US6944761B2 (en) * | 1999-08-05 | 2005-09-13 | Sun Microsystems, Inc. | Log-on service providing credential level change without loss of session continuity |
US20050228998A1 (en) * | 2004-04-02 | 2005-10-13 | Microsoft Corporation | Public key infrastructure scalability certificate revocation status validation |
US6957348B1 (en) * | 2000-01-10 | 2005-10-18 | Ncircle Network Security, Inc. | Interoperability of vulnerability and intrusion detection systems |
US20050235148A1 (en) * | 1998-02-13 | 2005-10-20 | Scheidt Edward M | Access system utilizing multiple factor identification and authentication |
US6961584B2 (en) * | 2000-03-22 | 2005-11-01 | Mlr, Llc | Tiered wireless, multi-modal access system and method |
US6981142B1 (en) * | 1999-01-28 | 2005-12-27 | International Business Machines Corporation | Electronic access control system and method |
US7010590B1 (en) * | 1999-09-15 | 2006-03-07 | Datawire Communications Networks, Inc. | System and method for secure transactions over a network |
US7013395B1 (en) * | 2001-03-13 | 2006-03-14 | Sandra Corporation | Method and tool for network vulnerability analysis |
US7020701B1 (en) * | 1999-10-06 | 2006-03-28 | Sensoria Corporation | Method for collecting and processing data using internetworked wireless integrated network sensors (WINS) |
US7035898B1 (en) * | 1997-09-10 | 2006-04-25 | Schneider Automation Inc. | System for programming a factory automation device using a web browser |
US20060095771A1 (en) * | 2004-11-02 | 2006-05-04 | Guido Appenzeller | Security device for cryptographic communications |
US7047423B1 (en) * | 1998-07-21 | 2006-05-16 | Computer Associates Think, Inc. | Information security analysis system |
US7058154B1 (en) * | 2000-08-08 | 2006-06-06 | General Electric Company | Systems and methods for managing assets using an interactive database |
US7093121B2 (en) * | 2002-01-10 | 2006-08-15 | Mcafee, Inc. | Transferring data via a secure network connection |
US7100196B2 (en) * | 1996-02-22 | 2006-08-29 | Kvaser Consultant Ab | Device in a system operating with CAN-protocol and in a control and/or supervision system |
US20060206932A1 (en) * | 2005-03-14 | 2006-09-14 | Microsoft Corporation | Trusted third party authentication for web services |
US7127526B1 (en) * | 2000-03-20 | 2006-10-24 | Nortel Networks Limited | Method and apparatus for dynamically loading and managing software services on a network device |
US7139843B1 (en) * | 1995-05-30 | 2006-11-21 | Roy-G-Biv Corporation | System and methods for generating and communicating motion data through a distributed network |
US7193993B2 (en) * | 2002-05-23 | 2007-03-20 | Intel Corporation | Integrated medium access control device and physical layer device |
US7254601B2 (en) * | 2001-12-20 | 2007-08-07 | Questra Corporation | Method and apparatus for managing intelligent assets in a distributed environment |
US20080016569A1 (en) * | 2000-10-10 | 2008-01-17 | Internet Security Systems, Inc. | Method and System for Creating a Record for One or More Computer Security Incidents |
US7349987B2 (en) * | 2000-11-13 | 2008-03-25 | Digital Doors, Inc. | Data security system and method with parsing and dispersion techniques |
US7370350B1 (en) * | 2002-06-27 | 2008-05-06 | Cisco Technology, Inc. | Method and apparatus for re-authenticating computing devices |
US7536548B1 (en) * | 2002-06-04 | 2009-05-19 | Rockwell Automation Technologies, Inc. | System and methodology providing multi-tier-security for network data exchange with industrial control components |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5852665A (en) * | 1995-04-13 | 1998-12-22 | Fortress U & T Ltd. | Internationally regulated system for one to one cryptographic communications with national sovereignty without key escrow |
-
2006
- 2006-09-27 US US11/535,773 patent/US20080077976A1/en not_active Abandoned
-
2007
- 2007-09-25 EP EP07117185A patent/EP1906586A1/en not_active Withdrawn
Patent Citations (87)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4200770A (en) * | 1977-09-06 | 1980-04-29 | Stanford University | Cryptographic apparatus and method |
US5202997A (en) * | 1985-03-10 | 1993-04-13 | Isolation Systems Limited | Device for controlling access to computer peripherals |
US4882752A (en) * | 1986-06-25 | 1989-11-21 | Lindman Richard S | Computer security system |
US5051837A (en) * | 1990-06-06 | 1991-09-24 | Mcjunkin Thomas N | Home entertainment equipment control apparatus |
US5604914A (en) * | 1991-07-10 | 1997-02-18 | Mitsubishi Denki Kabushiki Kaisha | Communication device for use with a factory automation network having multiple stations for accessing a factory automated device using address variables specific to the factory automated device |
US5917840A (en) * | 1992-03-13 | 1999-06-29 | Foxboro Company | Protection against communications crosstalk in a factory process control system |
US5539906A (en) * | 1993-05-04 | 1996-07-23 | International Business Machines Corporation | Method and apparatus for controlling access to data elements in a data processing system based on status of an industrial process |
US5371794A (en) * | 1993-11-02 | 1994-12-06 | Sun Microsystems, Inc. | Method and apparatus for privacy and authentication in wireless networks |
US5535276A (en) * | 1994-11-09 | 1996-07-09 | Bell Atlantic Network Services, Inc. | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography |
US6571141B1 (en) * | 1995-05-30 | 2003-05-27 | Roy-G-Biv Corporation | Application programs for motion control devices including access limitations |
US7139843B1 (en) * | 1995-05-30 | 2006-11-21 | Roy-G-Biv Corporation | System and methods for generating and communicating motion data through a distributed network |
US7100196B2 (en) * | 1996-02-22 | 2006-08-29 | Kvaser Consultant Ab | Device in a system operating with CAN-protocol and in a control and/or supervision system |
US5923756A (en) * | 1997-02-12 | 1999-07-13 | Gte Laboratories Incorporated | Method for providing secure remote command execution over an insecure computer network |
US6108785A (en) * | 1997-03-31 | 2000-08-22 | Intel Corporation | Method and apparatus for preventing unauthorized usage of a computer system |
US6418533B2 (en) * | 1997-08-29 | 2002-07-09 | Compaq Information Technologies Group, L.P. | “J” system for securing a portable computer which optionally requires an entry of an invalid power on password (POP), by forcing an entry of a valid POP |
US20010013098A1 (en) * | 1997-08-29 | 2001-08-09 | Michael F. Angelo | Remote security technology |
US7035898B1 (en) * | 1997-09-10 | 2006-04-25 | Schneider Automation Inc. | System for programming a factory automation device using a web browser |
US20020152289A1 (en) * | 1997-09-10 | 2002-10-17 | Schneider Automation Inc. | System and method for accessing devices in a factory automation network |
US6615258B1 (en) * | 1997-09-26 | 2003-09-02 | Worldcom, Inc. | Integrated customer interface for web based data management |
US20040019808A1 (en) * | 1997-09-26 | 2004-01-29 | Worldcom, Inc. | Secure customer interface for web based data management |
US6088679A (en) * | 1997-12-01 | 2000-07-11 | The United States Of America As Represented By The Secretary Of Commerce | Workflow management employing role-based access control |
US6088804A (en) * | 1998-01-12 | 2000-07-11 | Motorola, Inc. | Adaptive system and method for responding to computer network security attacks |
US20050235148A1 (en) * | 1998-02-13 | 2005-10-20 | Scheidt Edward M | Access system utilizing multiple factor identification and authentication |
US6298445B1 (en) * | 1998-04-30 | 2001-10-02 | Netect, Ltd. | Computer security |
US7047423B1 (en) * | 1998-07-21 | 2006-05-16 | Computer Associates Think, Inc. | Information security analysis system |
US6374358B1 (en) * | 1998-08-05 | 2002-04-16 | Sun Microsystems, Inc. | Adaptive countermeasure selection method and apparatus |
US20020006790A1 (en) * | 1998-10-21 | 2002-01-17 | Werner Blumenstock | System and method for remote maintenance and/or remote diagnosis of an automation system by means of electronic mail |
US6981142B1 (en) * | 1999-01-28 | 2005-12-27 | International Business Machines Corporation | Electronic access control system and method |
US6542993B1 (en) * | 1999-03-12 | 2003-04-01 | Lucent Technologies Inc. | Security management system and method |
US6842860B1 (en) * | 1999-07-23 | 2005-01-11 | Networks Associates Technology, Inc. | System and method for selectively authenticating data |
US6944761B2 (en) * | 1999-08-05 | 2005-09-13 | Sun Microsystems, Inc. | Log-on service providing credential level change without loss of session continuity |
US7010590B1 (en) * | 1999-09-15 | 2006-03-07 | Datawire Communications Networks, Inc. | System and method for secure transactions over a network |
US7020701B1 (en) * | 1999-10-06 | 2006-03-28 | Sensoria Corporation | Method for collecting and processing data using internetworked wireless integrated network sensors (WINS) |
US6957348B1 (en) * | 2000-01-10 | 2005-10-18 | Ncircle Network Security, Inc. | Interoperability of vulnerability and intrusion detection systems |
US6421571B1 (en) * | 2000-02-29 | 2002-07-16 | Bently Nevada Corporation | Industrial plant asset management system: apparatus and method |
US7127526B1 (en) * | 2000-03-20 | 2006-10-24 | Nortel Networks Limited | Method and apparatus for dynamically loading and managing software services on a network device |
US6961584B2 (en) * | 2000-03-22 | 2005-11-01 | Mlr, Llc | Tiered wireless, multi-modal access system and method |
US20020023231A1 (en) * | 2000-07-28 | 2002-02-21 | Jan Pathuel | Method and system of securing data and systems |
US6760782B1 (en) * | 2000-08-04 | 2004-07-06 | Schneider Automation Inc. | Apparatus for controlling internetwork communications |
US7058154B1 (en) * | 2000-08-08 | 2006-06-06 | General Electric Company | Systems and methods for managing assets using an interactive database |
US20080016569A1 (en) * | 2000-10-10 | 2008-01-17 | Internet Security Systems, Inc. | Method and System for Creating a Record for One or More Computer Security Incidents |
US20020078153A1 (en) * | 2000-11-02 | 2002-06-20 | Chit Chung | Providing secure, instantaneous, directory-integrated, multiparty, communications services |
US20020099959A1 (en) * | 2000-11-13 | 2002-07-25 | Redlich Ron M. | Data security system and method responsive to electronic attacks |
US7349987B2 (en) * | 2000-11-13 | 2008-03-25 | Digital Doors, Inc. | Data security system and method with parsing and dispersion techniques |
US20020120728A1 (en) * | 2000-12-22 | 2002-08-29 | Jason Braatz | Method and apparatus for network-enablement of devices using device intelligence and network architecture |
US6735601B1 (en) * | 2000-12-29 | 2004-05-11 | Vmware, Inc. | System and method for remote file access by computer |
US20020112152A1 (en) * | 2001-02-12 | 2002-08-15 | Vanheyningen Marc D. | Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols |
US7013395B1 (en) * | 2001-03-13 | 2006-03-14 | Sandra Corporation | Method and tool for network vulnerability analysis |
US6920558B2 (en) * | 2001-03-20 | 2005-07-19 | Networks Associates Technology, Inc. | Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system |
US20020147820A1 (en) * | 2001-04-06 | 2002-10-10 | Docomo Communications Laboratories Usa, Inc. | Method for implementing IP security in mobile IP networks |
US20020161905A1 (en) * | 2001-04-26 | 2002-10-31 | Nokia Corporation | IP security and mobile networking |
US20020163920A1 (en) * | 2001-05-01 | 2002-11-07 | Walker Philip M. | Method and apparatus for providing network security |
US20040153172A1 (en) * | 2001-05-16 | 2004-08-05 | Robert Rousseau | Predictive diagnostic system in a programmable automaton |
US20020188870A1 (en) * | 2001-06-11 | 2002-12-12 | Mcnc | Intrusion tolerant server system |
US20020199122A1 (en) * | 2001-06-22 | 2002-12-26 | Davis Lauren B. | Computer security vulnerability analysis methodology |
US7162534B2 (en) * | 2001-07-10 | 2007-01-09 | Fisher-Rosemount Systems, Inc. | Transactional data communications for process control systems |
US20030014500A1 (en) * | 2001-07-10 | 2003-01-16 | Schleiss Trevor D. | Transactional data communications for process control systems |
US20030033516A1 (en) * | 2001-08-08 | 2003-02-13 | Michael Howard | Rapid application security threat analysis |
US20040027875A1 (en) * | 2001-09-27 | 2004-02-12 | Clemens Dinges | Dynamic access to automation resources |
US20030105535A1 (en) * | 2001-11-05 | 2003-06-05 | Roman Rammler | Unit controller with integral full-featured human-machine interface |
US20030093521A1 (en) * | 2001-11-09 | 2003-05-15 | Xerox Corporation. | Asset management system for network-based and non-network-based assets and information |
US7254601B2 (en) * | 2001-12-20 | 2007-08-07 | Questra Corporation | Method and apparatus for managing intelligent assets in a distributed environment |
US20030126472A1 (en) * | 2001-12-31 | 2003-07-03 | Banzhof Carl E. | Automated computer vulnerability resolution system |
US7093121B2 (en) * | 2002-01-10 | 2006-08-15 | Mcafee, Inc. | Transferring data via a secure network connection |
US20030140094A1 (en) * | 2002-01-24 | 2003-07-24 | David Collier | Methods and systems for management and control of an automation control module |
US20030200437A1 (en) * | 2002-04-17 | 2003-10-23 | Kazuomi Oishi | Public key certification providing apparatus |
US20040073800A1 (en) * | 2002-05-22 | 2004-04-15 | Paragi Shah | Adaptive intrusion detection system |
US20030221124A1 (en) * | 2002-05-23 | 2003-11-27 | International Business Machines Corporation | File level security for a metadata controller in a storage area network |
US7193993B2 (en) * | 2002-05-23 | 2007-03-20 | Intel Corporation | Integrated medium access control device and physical layer device |
US7536548B1 (en) * | 2002-06-04 | 2009-05-19 | Rockwell Automation Technologies, Inc. | System and methodology providing multi-tier-security for network data exchange with industrial control components |
US20030229812A1 (en) * | 2002-06-05 | 2003-12-11 | Cristina Buchholz | Authorization mechanism |
US20030233573A1 (en) * | 2002-06-18 | 2003-12-18 | Phinney Thomas L. | System and method for securing network communications |
US7370350B1 (en) * | 2002-06-27 | 2008-05-06 | Cisco Technology, Inc. | Method and apparatus for re-authenticating computing devices |
US20040015619A1 (en) * | 2002-07-18 | 2004-01-22 | International Business Machines Corporation | Method and system for monitoring the status and operation of devices from a central location |
US20040034774A1 (en) * | 2002-08-15 | 2004-02-19 | Le Saint Eric F. | System and method for privilege delegation and control |
US20040049674A1 (en) * | 2002-09-10 | 2004-03-11 | David Scott Collier | Methods and systems for management and control of an automation control module |
US20040125146A1 (en) * | 2002-09-16 | 2004-07-01 | Siemens Aktiengesellschaft | System for detection and indication of a secure status of appliances |
US20040059920A1 (en) * | 2002-09-19 | 2004-03-25 | International Business Machines Corporation | Security health checking tool |
US20040075590A1 (en) * | 2002-09-25 | 2004-04-22 | Pearson Esther Mae | E-learning biometric identification information system |
US20040107345A1 (en) * | 2002-10-21 | 2004-06-03 | Brandt David D. | System and methodology providing automation security protocols and intrusion detection in an industrial controller environment |
US20040139353A1 (en) * | 2002-11-19 | 2004-07-15 | Forcade Jonathan Brett | Methodology and system for real time information system application intrusion detection |
US20040260954A1 (en) * | 2003-06-19 | 2004-12-23 | Schneider Automation Inc. | Biometrics PLC access and control system and method |
US20050021839A1 (en) * | 2003-06-23 | 2005-01-27 | Russell Thomas C. | Method and apparatus for providing a selectively isolated equipment area network for machine elements with data communication therebetween and with remote sites |
US20050091492A1 (en) * | 2003-10-27 | 2005-04-28 | Benson Glenn S. | Portable security transaction protocol |
US20050228998A1 (en) * | 2004-04-02 | 2005-10-13 | Microsoft Corporation | Public key infrastructure scalability certificate revocation status validation |
US20060095771A1 (en) * | 2004-11-02 | 2006-05-04 | Guido Appenzeller | Security device for cryptographic communications |
US20060206932A1 (en) * | 2005-03-14 | 2006-09-14 | Microsoft Corporation | Trusted third party authentication for web services |
Cited By (70)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100064345A1 (en) * | 2007-08-01 | 2010-03-11 | Avaya Inc. | Continual Peer Authentication |
US20090037985A1 (en) * | 2007-08-01 | 2009-02-05 | Avaya Technology Llc | Automated Peer Authentication |
US8950001B2 (en) | 2007-08-01 | 2015-02-03 | Avaya Inc. | Continual peer authentication |
US8646039B2 (en) * | 2007-08-01 | 2014-02-04 | Avaya Inc. | Automated peer authentication |
US20140019749A1 (en) * | 2008-09-10 | 2014-01-16 | Verizon Patent And Licensing Inc. | Securing information exchanged via a network |
US9258115B2 (en) * | 2008-09-10 | 2016-02-09 | Verizon Patent And Licensing Inc. | Securing information exchanged via a network |
US20100296552A1 (en) * | 2009-05-22 | 2010-11-25 | Honeywell International Inc. | Apparatus and method for hybrid diversity combining and adaptive beam forming in industrial control and automation systems |
US8374221B2 (en) * | 2009-05-22 | 2013-02-12 | Honeywell International Inc. | Apparatus and method for hybrid diversity combining and adaptive beam forming in industrial control and automation systems |
US20130191907A1 (en) * | 2010-09-30 | 2013-07-25 | Siemens Aktiengesellschaft | Method and System for Secure Data Transmission with a VPN Box |
US11171922B2 (en) * | 2010-09-30 | 2021-11-09 | Siemens Mobility GmbH | Method and system for secure data transmission with a VPN box |
US8732270B2 (en) * | 2011-04-19 | 2014-05-20 | International Business Machines Corporation | Controlling communication among multiple industrial control systems |
US20120331104A1 (en) * | 2011-04-19 | 2012-12-27 | International Business Machines Corporation | Controlling communication among multiple industrial control systems |
US11093427B2 (en) | 2011-12-30 | 2021-08-17 | Bedrock Automation Platforms Inc. | Switch fabric having a serial communications interface and a parallel communications interface |
US11144630B2 (en) | 2011-12-30 | 2021-10-12 | Bedrock Automation Platforms Inc. | Image capture devices for a secure industrial control system |
US10628361B2 (en) | 2011-12-30 | 2020-04-21 | Bedrock Automation Platforms Inc. | Switch fabric having a serial communications interface and a parallel communications interface |
US11055246B2 (en) | 2011-12-30 | 2021-07-06 | Bedrock Automation Platforms Inc. | Input-output module with multi-channel switching capability |
US10848012B2 (en) | 2011-12-30 | 2020-11-24 | Bedrock Automation Platforms Inc. | Electromagnetic connectors for an industrial control system |
US12061685B2 (en) | 2011-12-30 | 2024-08-13 | Analog Devices, Inc. | Image capture devices for a secure industrial control system |
US11658519B2 (en) | 2011-12-30 | 2023-05-23 | Bedrock Automation Platforms Inc. | Electromagnetic connector for an Industrial Control System |
US11966349B2 (en) | 2011-12-30 | 2024-04-23 | Analog Devices, Inc. | Electromagnetic connector for for an industrial control system |
US12019575B2 (en) | 2011-12-30 | 2024-06-25 | Analog Devices, Inc. | Switch fabric having a serial communications interface and a parallel communications interface |
US11314854B2 (en) | 2011-12-30 | 2022-04-26 | Bedrock Automation Platforms Inc. | Image capture devices for a secure industrial control system |
US10896145B2 (en) | 2011-12-30 | 2021-01-19 | Bedrock Automation Platforms Inc. | Communications control system with a serial communications interface and a parallel communications interface |
US11967839B2 (en) | 2011-12-30 | 2024-04-23 | Analog Devices, Inc. | Electromagnetic connector for an industrial control system |
US11899604B2 (en) | 2011-12-30 | 2024-02-13 | Bedrock Automation Platforms Inc. | Input/output module with multi-channel switching capability |
US11688549B2 (en) | 2011-12-30 | 2023-06-27 | Bedrock Automation Platforms Inc. | Electromagnetic connector for an industrial control system |
US10832861B2 (en) | 2011-12-30 | 2020-11-10 | Bedrock Automation Platforms Inc. | Electromagnetic connector for an industrial control system |
US8818972B2 (en) | 2012-02-10 | 2014-08-26 | International Business Machines Corporation | Detecting and combating attack in protection system of an industrial control system |
US8812466B2 (en) | 2012-02-10 | 2014-08-19 | International Business Machines Corporation | Detecting and combating attack in protection system of an industrial control system |
WO2013119337A1 (en) * | 2012-02-10 | 2013-08-15 | International Business Machines Corporation | Detecting and combating attack in protection system of an industrial control system |
WO2013163273A1 (en) * | 2012-04-25 | 2013-10-31 | Andreadis Christopher L | Security method and apparatus having digital and analog components |
WO2013186436A1 (en) | 2012-06-15 | 2013-12-19 | Nokia Corporation | Mechanisms for certificate revocation status verification on constrained devices |
US9756036B2 (en) * | 2012-06-15 | 2017-09-05 | Nokia Technologies Oy | Mechanisms for certificate revocation status verification on constrained devices |
EP2873191A4 (en) * | 2012-06-15 | 2016-04-20 | Nokia Technologies Oy | Mechanisms for certificate revocation status verification on constrained devices |
CN104380655A (en) * | 2012-06-15 | 2015-02-25 | 诺基亚公司 | Mechanisms for certificate revocation status verification on constrained devices |
US20130340064A1 (en) * | 2012-06-15 | 2013-12-19 | Nokia Corporation | Mechanisms for Certificate Revocation Status Verification on Constrained Devices |
US9571274B2 (en) * | 2013-06-27 | 2017-02-14 | Infosec Global Inc. | Key agreement protocol |
US20150003615A1 (en) * | 2013-06-27 | 2015-01-01 | Infosec Global Inc. | Key agreement protocol |
US10834820B2 (en) | 2013-08-06 | 2020-11-10 | Bedrock Automation Platforms Inc. | Industrial control system cable |
US9985789B2 (en) * | 2013-08-06 | 2018-05-29 | Bedrock Automation Platforms Inc. | Authentication between industrial elements in an industrial control system |
US10834094B2 (en) | 2013-08-06 | 2020-11-10 | Bedrock Automation Platforms Inc. | Operator action authentication in an industrial control system |
US10833872B2 (en) | 2013-08-06 | 2020-11-10 | Bedrock Automation Platforms Inc. | Industrial control system redundant communication/control modules authentication |
US12212577B2 (en) | 2013-08-06 | 2025-01-28 | Analog Devices, Inc. | Operator action authentication in an industrial control system |
US12164621B2 (en) | 2013-08-06 | 2024-12-10 | Analog Devices, Inc. | Secure industrial control system |
US10824711B2 (en) | 2013-08-06 | 2020-11-03 | Bedrock Automation Platforms Inc. | Secure industrial control system |
US20150046701A1 (en) * | 2013-08-06 | 2015-02-12 | Bedrock Automation Platforms Inc. | Secure industrial control system |
US20210195742A1 (en) | 2013-08-06 | 2021-06-24 | Bedrock Automation Platforms Inc. | Industrial control system cable |
US10613567B2 (en) | 2013-08-06 | 2020-04-07 | Bedrock Automation Platforms Inc. | Secure power supply for an industrial control system |
US12032675B2 (en) | 2013-08-06 | 2024-07-09 | Analog Devices, Inc. | Secure industrial control system |
US9191203B2 (en) * | 2013-08-06 | 2015-11-17 | Bedrock Automation Platforms Inc. | Secure industrial control system |
US11429710B2 (en) | 2013-08-06 | 2022-08-30 | Bedrock Automation Platforms, Inc. | Secure industrial control system |
US11537157B2 (en) | 2013-08-06 | 2022-12-27 | Bedrock Automation Platforms, Inc. | Secure power supply for an industrial control system |
US9779229B2 (en) | 2013-08-06 | 2017-10-03 | Bedrock Automation Platforms Inc. | Secure industrial control system |
US20150046710A1 (en) * | 2013-08-06 | 2015-02-12 | Bedrock Automation Platforms Inc. | Industrial control system redundant communications/control modules authentication |
US11700691B2 (en) | 2013-08-06 | 2023-07-11 | Bedrock Automation Platforms Inc. | Industrial control system cable |
US11722495B2 (en) | 2013-08-06 | 2023-08-08 | Bedrock Automation Platforms Inc. | Operator action authentication in an industrial control system |
US11977622B2 (en) | 2013-08-06 | 2024-05-07 | Analog Devices, Inc. | Authentication between industrial elements in an industrial control system |
US9467297B2 (en) * | 2013-08-06 | 2016-10-11 | Bedrock Automation Platforms Inc. | Industrial control system redundant communications/control modules authentication |
US11960312B2 (en) | 2013-08-06 | 2024-04-16 | Analog Devices, Inc. | Secure power supply for an industrial control system |
CN105531635A (en) * | 2013-08-06 | 2016-04-27 | 基岩自动化平台公司 | Secure industrial control system |
US20210320906A1 (en) * | 2014-06-23 | 2021-10-14 | Airwatch Llc | Cryptographic proxy service |
US12095747B2 (en) * | 2014-06-23 | 2024-09-17 | Omnissa, Llc | Cryptographic proxy service |
US12120819B2 (en) | 2014-07-07 | 2024-10-15 | Analog Devices, Inc. | Industrial control system cable |
WO2016187690A1 (en) * | 2015-05-26 | 2016-12-01 | Infosec Global Inc. | Key agreement protocol |
US11102226B2 (en) * | 2017-05-26 | 2021-08-24 | Shenyang Institute Of Automation, Chinese Academy Of Sciences | Dynamic security method and system based on multi-fusion linkage response |
US11146540B2 (en) * | 2018-05-09 | 2021-10-12 | Datalogic Ip Tech S.R.L. | Systems and methods for public key exchange employing a peer-to-peer protocol |
US20210288805A1 (en) * | 2020-03-15 | 2021-09-16 | Nec Corporation Of America | Authentication devices and methods for industrial control devices |
US11765596B2 (en) * | 2020-08-07 | 2023-09-19 | Nokia Technologies Oy | Security procedure |
US20220046426A1 (en) * | 2020-08-07 | 2022-02-10 | Nokia Technologies Oy | Security procedure |
EP4307141A4 (en) * | 2021-03-11 | 2025-02-19 | Omron Tateisi Electronics Co | CONTROL SYSTEM AND CONTROL METHODS THEREFOR |
Also Published As
Publication number | Publication date |
---|---|
EP1906586A1 (en) | 2008-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20080077976A1 (en) | Cryptographic authentication protocol | |
EP2020797B1 (en) | Client-server Opaque token passing apparatus and method | |
US8670563B2 (en) | System and method for designing secure client-server communication protocols based on certificateless public key infrastructure | |
EP3659082B1 (en) | Computer-implemented system and method enabling secure storage of a large blockchain over a plurality of storage nodes | |
CN1777096B (en) | Password protection method and device | |
US5418854A (en) | Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system | |
CN100546245C (en) | Network authentication and key distribution method across security domains | |
EP1391073B1 (en) | Method and system for increasing security of a secure connection | |
EP1359491B1 (en) | Methods for remotely changing a communications password | |
US20080240447A1 (en) | System and method for user authentication with exposed and hidden keys | |
WO2017053577A1 (en) | Remote authentication and passwordless password reset | |
Zhang et al. | BCAE: a blockchain-based cross domain authentication scheme for edge computing | |
CN115865320B (en) | A security service management method and system based on blockchain | |
Wang et al. | EBIAS: ECC-enabled blockchain-based identity authentication scheme for IoT device | |
Gajek et al. | A browser-based kerberos authentication scheme | |
Chatterjee et al. | A novel multi-server authentication scheme for e-commerce applications using smart card | |
Xia et al. | Design of secure FTP system | |
El-Ema et al. | A network authentication protocol based on Kerberos | |
Tbatou et al. | A Novel Architecture of a Strong and Mutual Authentication Protocol for Distributed Systems. | |
Rastogi et al. | Enhanced authentication scheme using password integrated challenge response protocol | |
Boonkrong | Authentication and key establishment protocols | |
Hussain et al. | Research Article An Improved Authentication Scheme for Digital Rights Management System | |
Kiran et al. | A Single Sign-On Model for Web Services Based on Password Scheme | |
Jacob et al. | Security Enhancement of Single Sign on Mechanism for Distributed Computer Networks | |
AU2002259074B2 (en) | Use and generation of a session key in a secure socket layer connection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ROCKWELL AUTOMATION TECHNOLOGIES, INC., OHIO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SCHULZ, GLENN B.;REEL/FRAME:018315/0662 Effective date: 20060926 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |