AU2013309013B2 - Network access management via a secondary communication channel - Google Patents

Network access management via a secondary communication channel Download PDF

Info

Publication number
AU2013309013B2
AU2013309013B2 AU2013309013A AU2013309013A AU2013309013B2 AU 2013309013 B2 AU2013309013 B2 AU 2013309013B2 AU 2013309013 A AU2013309013 A AU 2013309013A AU 2013309013 A AU2013309013 A AU 2013309013A AU 2013309013 B2 AU2013309013 B2 AU 2013309013B2
Authority
AU
Australia
Prior art keywords
communication channel
communication
network
ied
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2013309013A
Other languages
English (en)
Other versions
AU2013309013A1 (en
Inventor
Edmund O. Schweitzer
Rhett SMITH
Mark Weber
David E. Whitehead
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Schweitzer Engineering Laboratories Inc
Original Assignee
Schweitzer Engineering Laboratories Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Schweitzer Engineering Laboratories Inc filed Critical Schweitzer Engineering Laboratories Inc
Publication of AU2013309013A1 publication Critical patent/AU2013309013A1/en
Application granted granted Critical
Publication of AU2013309013B2 publication Critical patent/AU2013309013B2/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/61Time-dependent
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)
AU2013309013A 2012-08-30 2013-08-27 Network access management via a secondary communication channel Ceased AU2013309013B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US13/599,927 2012-08-30
US13/599,927 US8793767B2 (en) 2012-08-30 2012-08-30 Network access management via a secondary communication channel
PCT/US2013/056842 WO2014035992A1 (en) 2012-08-30 2013-08-27 Network access management via a secondary communication channel

Publications (2)

Publication Number Publication Date
AU2013309013A1 AU2013309013A1 (en) 2014-08-14
AU2013309013B2 true AU2013309013B2 (en) 2014-09-18

Family

ID=50184245

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2013309013A Ceased AU2013309013B2 (en) 2012-08-30 2013-08-27 Network access management via a secondary communication channel

Country Status (8)

Country Link
US (1) US8793767B2 (enExample)
AU (1) AU2013309013B2 (enExample)
BR (1) BR112014020214A8 (enExample)
CA (1) CA2868859C (enExample)
ES (1) ES2536026R1 (enExample)
MX (1) MX336304B (enExample)
WO (1) WO2014035992A1 (enExample)
ZA (1) ZA201405428B (enExample)

Families Citing this family (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9772784B2 (en) 2011-08-10 2017-09-26 Nutanix, Inc. Method and system for maintaining consistency for I/O operations on metadata distributed amongst nodes in a ring structure
US20140251478A1 (en) * 2013-03-08 2014-09-11 Schweitzer Engineering Laboratories, Inc. Automation of Water Flow in Networks
US9065763B2 (en) * 2013-03-15 2015-06-23 Schweitzer Engineering Laboratories, Inc. Transmission of data over a low-bandwidth communication channel
US9270109B2 (en) 2013-03-15 2016-02-23 Schweitzer Engineering Laboratories, Inc. Exchange of messages between devices in an electrical power system
US9620955B2 (en) 2013-03-15 2017-04-11 Schweitzer Engineering Laboratories, Inc. Systems and methods for communicating data state change information between devices in an electrical power system
JP6357778B2 (ja) * 2013-06-26 2018-07-18 株式会社リコー 通信装置、通信システム及びプログラム
US9958924B2 (en) * 2013-08-28 2018-05-01 Cisco Technology, Inc. Configuration of energy savings
US10465530B2 (en) 2013-12-20 2019-11-05 United Technologies Corporation Gas turbine engine component cooling cavity with vortex promoting features
EP2933696A1 (en) * 2014-04-16 2015-10-21 ABB Technology AG Mobile human machine interface for control devices
US9705305B2 (en) 2014-04-29 2017-07-11 Schweitzer Engineering Laboratories, Inc. Resilient communication for an electric power delivery system
WO2015172107A1 (en) * 2014-05-09 2015-11-12 Nutanix, Inc. Mechanism for providing external access to a secured networked virtualization environment
EP2977838B1 (en) * 2014-07-25 2023-09-27 General Electric Technology GmbH Process of monitoring intelligent electronic devices installed in an electrical power system
US10642507B2 (en) 2015-01-30 2020-05-05 Nutanix, Inc. Pulsed leader consensus management
US9811706B2 (en) 2015-04-23 2017-11-07 Vatche PAPAZIAN System for anonymous communication from a user to the publisher of a scannable label
US11218418B2 (en) 2016-05-20 2022-01-04 Nutanix, Inc. Scalable leadership election in a multi-processing computing environment
US10362092B1 (en) 2016-10-14 2019-07-23 Nutanix, Inc. Entity management in distributed systems
US10298343B2 (en) 2017-03-03 2019-05-21 Schweitzer Engineering Laboratories, Inc. Systems and methods for time-synchronized communication
US10826324B2 (en) 2017-05-18 2020-11-03 Schweitzer Engineering Laboratories, Inc. Mitigation of gratuitous conditions on electric power delivery systems
US11194680B2 (en) 2018-07-20 2021-12-07 Nutanix, Inc. Two node clusters recovery on a failure
CN108924955B (zh) * 2018-07-30 2021-12-14 山东大骋医疗科技有限公司 一种基于双链无线通信的ct数据传输与控制方法及装置
US10819727B2 (en) 2018-10-15 2020-10-27 Schweitzer Engineering Laboratories, Inc. Detecting and deterring network attacks
US11770447B2 (en) 2018-10-31 2023-09-26 Nutanix, Inc. Managing high-availability file servers
US11805104B2 (en) 2018-12-14 2023-10-31 Battelle Memorial Institute Computing system operational methods and apparatus
US11178176B2 (en) 2019-03-27 2021-11-16 Board Of Trustees Of The University Of Arkansas Methods and systems for detection of man-in-the-middle attacks for SCADA communication networks and applications of same
US11768809B2 (en) 2020-05-08 2023-09-26 Nutanix, Inc. Managing incremental snapshots for fast leader node bring-up
US11936642B2 (en) 2021-04-15 2024-03-19 Schweitzer Engineering Laboratories, Inc. Device level variable role-based access systems, methods, and apparatuses
US12463959B2 (en) * 2022-06-10 2025-11-04 HashiCorp Cloud-based secrets management credential store
WO2025036552A1 (en) * 2023-08-14 2025-02-20 Assa Abloy Ab Access control system with temporary ip connection

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070067625A1 (en) * 2005-08-29 2007-03-22 Schweitzer Engineering Laboratories, Inc. System and method for enabling secure access to a program of a headless server device
US20080150753A1 (en) * 2006-12-22 2008-06-26 Acterna Llc Secure Data Transfer In A Communication System Including Portable Meters
US20090070447A1 (en) * 2007-09-07 2009-03-12 Power Measurement Ltd. Energy monitoring system using network management protocols
US20110088096A1 (en) * 2009-10-14 2011-04-14 Andrew Hilton Systems and methods for license entitlement key distribution

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040257999A1 (en) * 2001-11-16 2004-12-23 Macisaac Gary Method and system for detecting and disabling sources of network packet flooding
US7251570B2 (en) * 2003-07-18 2007-07-31 Power Measurement Ltd. Data integrity in a mesh network
US20090069049A1 (en) * 2007-09-12 2009-03-12 Devicefidelity, Inc. Interfacing transaction cards with host devices
US8639922B2 (en) * 2009-06-01 2014-01-28 Dhananjay S. Phatak System, method, and apparata for secure communications using an electrical grid network
US8140733B2 (en) * 2010-08-12 2012-03-20 Emcon Emanation Control Ltd. Secure external computer hub

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070067625A1 (en) * 2005-08-29 2007-03-22 Schweitzer Engineering Laboratories, Inc. System and method for enabling secure access to a program of a headless server device
US20080150753A1 (en) * 2006-12-22 2008-06-26 Acterna Llc Secure Data Transfer In A Communication System Including Portable Meters
US20090070447A1 (en) * 2007-09-07 2009-03-12 Power Measurement Ltd. Energy monitoring system using network management protocols
US20110088096A1 (en) * 2009-10-14 2011-04-14 Andrew Hilton Systems and methods for license entitlement key distribution

Also Published As

Publication number Publication date
MX2014010490A (es) 2014-11-14
CA2868859C (en) 2015-04-28
ZA201405428B (en) 2015-12-23
ES2536026A2 (es) 2015-05-19
US20140068711A1 (en) 2014-03-06
AU2013309013A1 (en) 2014-08-14
US8793767B2 (en) 2014-07-29
CA2868859A1 (en) 2014-03-06
MX336304B (es) 2016-01-14
WO2014035992A1 (en) 2014-03-06
BR112014020214A2 (enExample) 2017-06-20
BR112014020214A8 (pt) 2017-07-11
ES2536026R1 (es) 2015-11-06

Similar Documents

Publication Publication Date Title
AU2013309013B2 (en) Network access management via a secondary communication channel
US8756411B2 (en) Application layer security proxy for automation and control system networks
US7721321B2 (en) Method and apparatus for reducing communication system downtime when configuring a cryptographic system of the communication system
US10863558B2 (en) Communication device for implementing trusted relationships in a software defined network
KR101206095B1 (ko) 보호계전기, 상기 보호계전기를 구비하는 네트워크 시스템 및 네트워크 보안방법
US11570179B2 (en) Secure transfer using media access control security (MACsec) key agreement (MKA)
WO2009031453A1 (ja) ネットワークセキュリティ監視装置ならびにネットワークセキュリティ監視システム
AU2017100661A4 (en) An information security method of distributed electric vehicle controllers
JP6968175B2 (ja) フィールドバスを介した安全な通信をサポートするためのセキュリティデバイスおよびフィールドバスシステム
CN103168458A (zh) 用于防操纵的密钥管理的方法
KR20090102469A (ko) Dnp 기반 scada 네트워크 데이터 보호 시스템 및그 방법
Dolezilek et al. Cybersecurity based on IEC 62351 and IEC 62443 for IEC 61850 systems
US11601278B2 (en) Authentication of intelligent electronic devices (IEDs) using secure association keys (SAKs)
Rosborough et al. All about eve: comparing DNP3 secure authentication with standard security technologies for SCADA communications
Tippenhauer et al. Vbump: Securing ethernet-based industrial control system networks with vlan-based traffic aggregation
CA2915664A1 (en) Point-to-multipoint polling in a monitoring system for an electric power distribution system
US20200183709A1 (en) System and method of utilizing security device plugin for external device monitoring and control in a secured environment
Hahn et al. Cybersecurity of SCADA within Substations
US11032250B2 (en) Protective apparatus and network cabling apparatus for the protected transmission of data
EP4622177A1 (en) Security protocol proxy for an operational technology system
Humayed Securing CAN-based cyber-physical systems
Czechowski Cyber-physical security for Low-Voltage Smart Grids HAN Security within Smart Grids
Kiuchi et al. Customizing control system intrusion detection at the application layer
Parker Guarding The Grid: Exploring Iot And Iiot Security Vulnerabilities In Smart Power Systems
Thanos et al. P&C engineering concepts applied to cyber security of the power grid

Legal Events

Date Code Title Description
FGA Letters patent sealed or granted (standard patent)
MK14 Patent ceased section 143(a) (annual fees not paid) or expired