-
公开(公告)号:US20220131741A1
公开(公告)日:2022-04-28
申请号:US16772771
申请日:2019-06-17
Applicant: ABB Schweiz AG
Inventor: David Kozhaya , Thanikesavan Sivanthi , Yvonne-Anne Pignolet
IPC: H04L41/0659 , H04L41/0677
Abstract: The invention relates to a method and system for detecting and mitigating cabling issues with devices connected in industrial redundant networks. An agent runs on each device and generates information about traffic received at the corresponding device. The agent running on a node generates indicators of traffic received at each port, and error rates for traffic at each port. The agent running on a switch generates information about switch misconfiguration by collecting device identifiers for each port of the switch. The agents send the information to a network manager, which determines switch misconfigurations and wrong cabling from the received information. The network manager also mitigates cabling issues by sending a signal to the affected device(s) or sending a communication to mitigate the issue.
-
公开(公告)号:US11551035B2
公开(公告)日:2023-01-10
申请号:US16055705
申请日:2018-08-06
Applicant: ABB Schweiz AG
Inventor: Johannes Schneider , Matus Harvan , Sebastian Obermeier , Thomas Locher , Yvonne-Anne Pignolet
Abstract: A method for evaluating data is based on a computational model, the computational model comprising model data, a training function and a prediction function. The method includes training the computational model by: receiving training data and training result data for training the computational model, and computing the model data from the training data and the training result data with the training function. The method includes predicting result data by: receiving field data for predicting result data; and computing the result data from the field data and the model data with the prediction function. The training data may be plaintext and the training result data may be encrypted with a homomorphic encryption algorithm, wherein the model data may be computed in encrypted form from the training data and the encrypted training result data with the training function. The field data may be plaintext, wherein the result data may be computed in encrypted form from the field data and the encrypted model data with the prediction function.
-
公开(公告)号:US10680799B2
公开(公告)日:2020-06-09
申请号:US16189126
申请日:2018-11-13
Applicant: ABB Schweiz AG
Inventor: Johannes Schneider , Matus Harvan , Sebastian Obermeier , Thomas Locher , Yvonne-Anne Pignolet
IPC: H04L9/00
Abstract: The application relates to a method for aggregation of a performance indicator of a device including: concatenating a respective first data item to a plurality of second data items in the device; encrypting the plurality of concatenated second data items relevant for computing the performance indicator using a first encryption key in the device, wherein the first encryption key is based on an additive homomorphic encryption scheme; sending the encrypted concatenated second data items to a computation cluster; computing the performance indicator on the computation cluster using the encrypted concatenated second data items and computing an aggregate value regarding the performance indicator by summing up the encrypted concatenated second data items; sending the aggregate value to a server of a service provider of the device; decrypting the aggregate value using a second encryption key on the server of the service provider; and verifying the decrypted result by checking whether the decrypted sum computed by summing up the encrypted concatenated second data items comprises a predetermined value. The present application also relates to a corresponding system and corresponding computer program product including one or more computer readable media having computer executable instructions for performing the steps of the method.
-
公开(公告)号:US20180349740A1
公开(公告)日:2018-12-06
申请号:US16055705
申请日:2018-08-06
Applicant: ABB Schweiz AG
Inventor: Johannes Schneider , Matus Harvan , Sebastian Obermeier , Thomas Locher , Yvonne-Anne Pignolet
CPC classification number: H04L9/008 , H04L2209/46 , H04L2209/76
Abstract: A method for evaluating data is based on a computational model, the computational model comprising model data, a training function and a prediction function. The method includes training the computational model by: receiving training data and training result data for training the computational model, and computing the model data from the training data and the training result data with the training function. The method includes predicting result data by: receiving field data for predicting result data; and computing the result data from the field data and the model data with the prediction function. The training data may be plaintext and the training result data may be encrypted with a homomorphic encryption algorithm, wherein the model data may be computed in encrypted form from the training data and the encrypted training result data with the training function. The field data may be plaintext, wherein the result data may be computed in encrypted form from the field data and the encrypted model data with the prediction function.
-
公开(公告)号:US20210097195A1
公开(公告)日:2021-04-01
申请号:US16760856
申请日:2018-10-30
Applicant: ABB Schweiz AG
Inventor: Carsten Franke , Theo Widmer , Thomas Locher , Yvonne-Anne Pignolet
Abstract: A method can be used to analyze a log of a device or a plurality of devices of a first entity. The method includes generating an encrypted log by encrypting the log at the first entity, generating an encrypted query by encrypting a query at the first entity, transferring the encrypted log and the encrypted query from the first entity to a second entity, analyzing the encrypted log on the second entity by using the encrypted query, generating an encrypted analysis result at the second entity, transferring the encrypted analysis result from the second entity to the first entity, decrypting the encrypted analysis result on the first entity, and verifying the decrypted analysis result at the first entity.
-
公开(公告)号:US10795990B2
公开(公告)日:2020-10-06
申请号:US16102045
申请日:2018-08-13
Applicant: ABB Schweiz AG
Inventor: Johannes Schneider , Matus Harvan , Sebastian Obermeier , Thomas Locher , Yvonne-Anne Pignolet
Abstract: A method of automatically generating secure code includes: receiving source code and security constraints for the source code, the security constraints encoding, to what extend a variable in the source code is considered secure; and generating secure code from the source code and the security constraints by replacing non-secure operations in the source code, which operate on the variables considered as secure, with secure operations; wherein a secure operation is an operation, which, when applied to at least one encrypted variable, generates an encrypted result, which, when decrypted, is the result of the non-secure operation applied to the not encrypted variable.
-
公开(公告)号:US20190005233A1
公开(公告)日:2019-01-03
申请号:US16102045
申请日:2018-08-13
Applicant: ABB Schweiz AG
Inventor: Johannes Schneider , Matus Harvan , Sebastian Obermeier , Thomas Locher , Yvonne-Anne Pignolet
CPC classification number: G06F21/54 , G06F8/30 , G06F21/125 , G06F21/14 , G06F21/602 , G06F2221/033 , G06F2221/0748 , H04L9/008
Abstract: A method of automatically generating secure code includes: receiving source code and security constraints for the source code, the security constraints encoding, to what extend a variable in the source code is considered secure; and generating secure code from the source code and the security constraints by replacing non-secure operations in the source code, which operate on the variables considered as secure, with secure operations; wherein a secure operation is an operation, which, when applied to at least one encrypted variable, generates an encrypted result, which, when decrypted, is the result of the non-secure operation applied to the not encrypted variable.
-
公开(公告)号:US20200228324A1
公开(公告)日:2020-07-16
申请号:US16743521
申请日:2020-01-15
Applicant: ABB Schweiz AG
Inventor: Thomas Locher , Carsten Franke , Sebastian Obermeier , Yvonne-Anne Pignolet
Abstract: A method for offering data with objects to be performed on the basis of the data, providing solutions to the problems and verifying the provided solutions. The method including the steps of providing a digital platform; uploading the data with the object as challenge to the platform; uploading a smart contract relating to the challenge to the platform; transferring the challenge from the platform to at least one solution provider; uploading a signed hash of the solution provider's solution of the challenge to the platform; uploading the solution provider's solution of the challenge to the platform; and evaluating at the platform the uploaded solution based on predefined conditions.
-
公开(公告)号:US20190089526A1
公开(公告)日:2019-03-21
申请号:US16189108
申请日:2018-11-13
Applicant: ABB Schweiz AG
Inventor: Thomas Locher , Johannes Schneider , Matus Harvan , Sebastian Obermeier , Yvonne-Anne Pignolet
Abstract: The application relates to a method for computing a probabilistic encryption scheme for encrypting a data item in an electronic device including: computing a plurality of random bit strings in a computation cluster; sending the computed plurality of random strings to the electronic device; generating a random string (rE) for using in the encryption scheme in the electronic device using a subset of the plurality of the random strings computed in the computation cluster and encrypting the data item using the random string computed in the electronic device. The present application also relates to a corresponding system and corresponding computer program product including one or more computer readable media having computer executable instructions for performing the steps of the method.
-
10.
公开(公告)号:US11411807B2
公开(公告)日:2022-08-09
申请号:US16772771
申请日:2019-06-17
Applicant: ABB Schweiz AG
Inventor: David Kozhaya , Thanikesavan Sivanthi , Yvonne-Anne Pignolet
IPC: H04L41/0659 , H04L41/0677
Abstract: The invention relates to a method and system for detecting and mitigating cabling issues with devices connected in industrial redundant networks. An agent runs on each device and generates information about traffic received at the corresponding device. The agent running on a node generates indicators of traffic received at each port, and error rates for traffic at each port. The agent running on a switch generates information about switch misconfiguration by collecting device identifiers for each port of the switch. The agents send the information to a network manager, which determines switch misconfigurations and wrong cabling from the received information. The network manager also mitigates cabling issues by sending a signal to the affected device(s) or sending a communication to mitigate the issue.
-
-
-
-
-
-
-
-
-