会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • MEHTODS AND APPARATUS TO PROVIDE LAYERED SECURITY FOR INTERFACE ACCESS CONTROL
    • 提供界面访问控制的分层安全的设备和设备
    • US20100263025A1
    • 2010-10-14
    • US12637439
    • 2009-12-14
    • Lee Allen NeitzelDan Halver Ussing, JR.Robert Kent Huba
    • Lee Allen NeitzelDan Halver Ussing, JR.Robert Kent Huba
    • G06F15/16G06F21/00
    • H04L63/105Y02P90/18
    • Example methods and apparatus to provide layered security for interface access control are disclosed. A disclosed example method includes receiving a connect message in a first server from a client application to access at least one server endpoint, in response to receiving the connect message, opening a session between the at least one server endpoint and the client application if the session is authorized to be opened, receiving a request from the client application to open an endpoint that provides at least one of read access, write access, or subscribe access to at least one resource, opening the endpoint within the open session after determining that the client application is authorized to access the at least one resource via the endpoint, receiving a request from the client application to assign a selection of the at least one authorized resource to the endpoint, assigning the at least one selected resource to the endpoint, and granting the client application access to the at least one resource via the endpoint.
    • 公开了用于为接口访问控制提供分层安全性的示例性方法和装置。 所公开的示例性方法包括响应于接收到连接消息,从客户端应用接收第一服务器中的连接消息以访问至少一个服务器端点,如果会话中打开所述至少一个服务器端点与客户端应用之间的会话 被授权被打开,接收来自客户端应用程序的请求以打开提供对至少一个资源的读访问,写入访问或订阅访问中的至少一个的端点,在确定客户端之后打开该会话内的端点 授权应用程序经由端点访问至少一个资源,从客户端应用程序接收请求以将至少一个授权资源的选择分配给端点,将至少一个所选资源分配给端点,以及授予 客户端应用程序通过端点访问至少一个资源。
    • 2. 发明授权
    • Integrated unified threat management for a process control system
    • 为过程控制系统集成统一威胁管理
    • US09130980B2
    • 2015-09-08
    • US12889235
    • 2010-09-23
    • Gary Keith LawNate KubeRobert Kent HubaBrandon HiebDavid R. DenisonCheyenne Hernandez
    • Gary Keith LawNate KubeRobert Kent HubaBrandon HiebDavid R. DenisonCheyenne Hernandez
    • G06F21/00H04L29/06
    • H04L63/1416H04L63/0227
    • A Unified Threat Management System (UTMS) for securing network traffic in a process control system may comprise network devices configured to receive network traffic related to the process control system and including a ruleset received from an external source. The ruleset may include one or more rules defining a condition to accept or deny the network traffic received at the network device. The state of the network device may be integrated into the process control system as a process control object or variable, thus allowing the state and other UTMS and component network device parameters and variables to be displayed to an operator at a workstation within a graphical process control system environment. The network devices may also communicate with a perpetual service that proactively supplies the devices with rulesets to meet the latest security threats, threat patterns, and control system vulnerabilities found or predicted to exist within the network.
    • 用于保护过程控制系统中的网络流量的统一威胁管理系统(UTMS)可以包括被配置为接收与过程控制系统相关并且包括从外部源接收的规则集的网络业务的网络设备。 规则集可以包括定义接受或拒绝在网络设备处接收的网络业务的条件的一个或多个规则。 网络设备的状态可以作为过程控制对象或变量集成到过程控制系统中,从而允许将状态和其他UTMS和组件网络设备参数和变量显示在图形过程控制中的工作站上的操作员 系统环境。 网络设备还可以与主动向设备提供规则集的永久服务通信,以满足网络中发现或预测存在的最新安全威胁,威胁模式和控制系统漏洞。
    • 3. 发明授权
    • Methods and apparatus to provide layered security for interface access control
    • 为接口访问控制提供分层安全的方法和设备
    • US08887242B2
    • 2014-11-11
    • US12637439
    • 2009-12-14
    • Lee Allen NeitzelDan Halver Ussing, Jr.Robert Kent Huba
    • Lee Allen NeitzelDan Halver Ussing, Jr.Robert Kent Huba
    • H04L29/06
    • H04L63/105Y02P90/18
    • Example methods and apparatus to provide layered security for interface access control are disclosed. A disclosed example method includes receiving a connect message in a first server from a client application to access at least one server endpoint, in response to receiving the connect message, opening a session between the at least one server endpoint and the client application if the session is authorized to be opened, receiving a request from the client application to open an endpoint that provides at least one of read access, write access, or subscribe access to at least one resource, opening the endpoint within the open session after determining that the client application is authorized to access the at least one resource via the endpoint, receiving a request from the client application to assign a selection of the at least one authorized resource to the endpoint, assigning the at least one selected resource to the endpoint, and granting the client application access to the at least one resource via the endpoint.
    • 公开了用于为接口访问控制提供分层安全性的示例性方法和装置。 所公开的示例性方法包括响应于接收到连接消息,从客户端应用接收第一服务器中的连接消息以访问至少一个服务器端点,如果会话中打开所述至少一个服务器端点与客户端应用之间的会话 被授权被打开,接收来自客户端应用程序的请求以打开提供对至少一个资源的读取访问,写访问或订阅访问中的至少一个的端点,在确定客户端之后打开该会话内的端点 授权应用程序经由端点访问至少一个资源,从客户端应用程序接收请求以将至少一个授权资源的选择分配给端点,将至少一个所选资源分配给端点,以及授予 客户端应用程序通过端点访问至少一个资源。
    • 4. 发明申请
    • One Button Security Lockdown of a Process Control Network
    • 过程控制网络的一键安全锁定
    • US20100077471A1
    • 2010-03-25
    • US12475889
    • 2009-06-01
    • Trevor D. SchleissRobert Kent Huba
    • Trevor D. SchleissRobert Kent Huba
    • G06F21/20G05B9/02G06F1/26
    • H04L63/0227G05B19/0428H04L41/0213H04L41/12H04L63/20
    • Proper function and security of a complex network for communicating data within a process control system may be manually or automatically “locked-down” with a single command for an entire process control network or portions of the network. A user or application monitors network communication over multiple network devices. Once the network is configured and properly communicates data over the process control network, the application may lock down the network by deactivating or “locking out” access points on the network that are open and unused or have invalid connections. Locking down the network may essentially freeze it in a properly configured and functioning state and restrict future re-configuration of the network devices or harmful communication over an open or unused access point. When locked, is a currently connected device is unplugged and a different device is plugged into the access point, the network device may refuse the connection.
    • 用于在过程控制系统内传送数据的复杂网络的正常功能和安全性可以用整个过程控制网络或网络部分的单个命令手动或自动“锁定”。 用户或应用程序通过多个网络设备监视网络通信。 一旦网络被配置并且通过过程控制网络正确地传送数据,则应用可以通过停用或“锁定”网络上已经打开和未使用或具有无效连接的接入点来锁定网络。 锁定网络可能基本上将其冻结在正确配置和运行状态,并限制未来网络设备的重新配置或通过开放或未使用的接入点的有害通信。 当被锁定时,当前连接的设备被拔出并且不同的设备被插入接入点,网络设备可以拒绝连接。