发明名称 SECONDARY SECURITY AUTHORITY
摘要 Techniques to facilitate protecting control programs used in an industrial automation environment are disclosed herein. In at least one implementation, control system content provided by a primary entity is received along with a primary security authority provided by the primary entity, wherein the primary security authority defines primary usage rights for the control system content granted to a secondary entity. A secondary security authority provided by the secondary entity is received, wherein the secondary security authority defines secondary usage rights for the control system content that further restrict the primary usage rights. A request is received from a user associated with the secondary entity to perform an action associated with the control system content, and the request is processed with the secondary security authority to determine if the user is authorized to perform the action associated with the control system content based on the secondary usage rights.
申请公布号 US2016350521(A1) 申请公布日期 2016.12.01
申请号 US201615160976 申请日期 2016.05.20
申请人 Rockwell Automation Technologies, Inc. 发明人 Brandt Robert A.;Case Clark L.;Wilkinson John C.
分类号 G06F21/31;G05B19/4155 主分类号 G06F21/31
代理机构 代理人
主权项 1. A method of operating a computing system to facilitate protecting control programs used in an industrial automation environment, the method comprising: receiving control system content provided by a primary entity, wherein the control system content comprises controller program code that directs an industrial controller to drive a machine system; receiving a primary security authority provided by the primary entity, wherein the primary security authority defines primary usage rights for the control system content granted to a secondary entity; receiving a secondary security authority provided by the secondary entity, wherein the secondary security authority defines secondary usage rights for the control system content that further restrict the primary usage rights granted to the secondary entity by the primary entity in the primary security authority; receiving a request from a user associated with the secondary entity to perform an action associated with the control system content; processing the request with the primary security authority to determine if the secondary entity is authorized to perform the action associated with the control system content based on the primary usage rights; if the secondary entity is not authorized by the primary security authority to perform the action associated with the control system content based on the primary usage rights, then denying the request to perform the action; if the secondary entity is authorized by the primary security authority to perform the action associated with the control system content based on the primary usage rights, then processing the request with the secondary security authority to determine if the user is authorized to perform the action associated with the control system content based on the secondary usage rights; if the user is authorized by the secondary security authority to perform the action associated with the control system content based on the secondary usage rights, then granting the request to perform the action; and if the user is not authorized by the secondary security authority to perform the action associated with the control system content based on the secondary usage rights, then denying the request to perform the action.
地址 Mayfield Heights OH US