The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Mar. 08, 2022

Filed:

Jun. 04, 2019
Applicant:

Schneider Electric Usa, Inc., Boston, MA (US);

Inventors:

Gregory Harrison, Holly Springs, NC (US);

Amy Gau, Apex, NC (US);

Matthew Furnari, Raleigh, NC (US);

John Charles Foust, Zebulon, NC (US);

Daniel Martin, Apex, NC (US);

Ronald Mazyck, Garner, NC (US);

Assignee:

Schneider Electric USA, Inc., Boston, MA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 21/60 (2013.01); H04L 9/32 (2006.01); H04L 9/08 (2006.01); G06F 21/57 (2013.01); G06F 11/30 (2006.01); H04L 45/02 (2022.01);
U.S. Cl.
CPC ...
G06F 21/602 (2013.01); G06F 11/3072 (2013.01); G06F 21/575 (2013.01); H04L 9/0866 (2013.01); H04L 9/3242 (2013.01); H04L 45/02 (2013.01);
Abstract

Embodiments of the disclosure provide for a fast device installation and replacement (DI&R) service in a network while simultaneously providing confidentiality and integrity protection for sensitive device data. In one embodiment, this protection is provided by using certain characterization data associated with each device in a network to generate a passphrase. This passphrase can be related to the topology of the devices. In one embodiment, the passphrase is a concatenation of certain device characterization data with respect to the topology. In embodiments, the concatenation includes arranging the characterization data based on an order of each device with respect to the topology. Cryptographic keys are derived based on the passphrase. The cryptographic keys are used to automatically encrypt and decrypt the sensitive device data without user intervention. In one embodiment, the cryptographic keys are used to automatically decrypt the sensitive device data to configure a replacement device for the network.


Find Patent Forward Citations

Loading…