Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD OF ONBOARDING A USER DEVICE
Document Type and Number:
WIPO Patent Application WO/2022/233857
Kind Code:
A1
Abstract:
The current disclosure describes a method of onboarding a user device onto an industrial network. The method comprises receiving a registration request from the user device. The user device is connected to a gateway device associated with a first wireless network and wherein the registration request includes one or more network access parameters associated with user device. At least one network access parameter from the network access parameters, is indicative of at least one of the gateway device and the first wireless network. The method further comprises authenticating the user device based on the received registration request, wherein authenticating comprises verifying validity of network access parameters of the registration request. Accordingly, the current disclosure allows for utilization of network access data to evaluate if the user device is indeed an actual user device or an unauthorized device. Accordingly, the overall security associated with the onboarding process is improved.

Inventors:
BAHR MICHAEL (DE)
FALK RAINER (DE)
FRIES STEFFEN (DE)
WALEWSKI JOACHIM (DE)
Application Number:
PCT/EP2022/061827
Publication Date:
November 10, 2022
Filing Date:
May 03, 2022
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
SIEMENS AG (DE)
International Classes:
H04L9/40; H04W12/30; H04W12/63; H04W12/71; H04W4/70; H04W12/069
Domestic Patent References:
WO2019156716A12019-08-15
WO2021061419A12021-04-01
Other References:
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on enhanced support of Non-Public Networks (NPN) (Release 17)", vol. SA WG2, no. V17.0.0, 31 March 2021 (2021-03-31), pages 1 - 248, XP052000256, Retrieved from the Internet [retrieved on 20210331]
Download PDF:
Claims:
Claims:

1)A method (200) of onboarding a user device (143) onto an industrial network (158), the method (200) comprising: a.receiving (210) a registration request from the user device (143), wherein the user device (143) is connected to a gateway device (136) associated with a first wireless network (130) and wherein the registration request includes one or more network access parameters associated with user device (143), wherein the at least one network access parameter is indicative of at least one of the gateway device (136) and the first wireless network (130); and b.authenticating (220) the user device (143) based on the received registration request, wherein authenticating the user device comprises verifying validity of one or more network access parameters of the registration request, wherein the one or more network access parameters includes one of an identifier associated with gateway device (136), an identifier associated with a transmission channel on which the registration request is transmitted, one or more identifiers associated with one or more network devices within a predetermined proximity.

2)The method (200) as claimed in claim 1, wherein the method (200) further comprises obtaining network information associated with the first wireless network (130) from a network management device of the first wireless network (130), wherein the network information is for verifying the validity of the one or more network access parameters of the registration request.

3) The method (200) as claimed in claim 1, wherein the method (200) further comprises generating provisioning data for the user device (143) based on the received registration request.

4) The method (200) as claimed in claim 3, wherein the provisioning data includes at least one configuration parameter and wherein validity of the at least one configuration parameter is determined based on the one or more network access parameters.

5) The method (200) as claimed in claim 3, wherein the provisioning data includes an identity certificate used by the user device (143) for communicating with at least one network device of the industrial network and wherein the identify certificate includes the one or more network access parameters of the registration request.

6) The method (200) as claimed in claim 3, wherein the provisioning data further comprises an onboarding profile associated with the user device (143), and wherein the onboarding profile comprises information associated with one or more services and applications associated with the user device and an identifier associated with at least one enrollment server, wherein the user device (143) is configured to communicate with the at least one enrollment server based on the identifier associated with the at least one enrollment server 7) The method (200) as claimed in claim 6, wherein the onboarding profile is generated based on a device identifier of the registration request.

8) The method (200) as claimed in claim 6, wherein the onboarding profile comprises a sequence of onboarding associated with the one or more services and applications.

9) The method (200) as claimed in claim 8, wherein the onboarding profile further comprises one or more credentials associated with the one or more services and applications, wherein the user device (143) is configured transmit the one or more credentials to the at least one enrollment server for authentication of the user device (143).

10) The method (200) as claimed in claim 9, wherein the onboarding profile further comprises certificate attributes and signing information, wherein the certificate attributes and signing information is used by the user device (143) to generate certificate to communicate with the at least one enrollment server.

11) An onboarding device (300) for onboarding a user device (143) onto an industrial network (158), the onboarding device (300) comprising: a. a network interface (310) for communicating with the user device (143); b. one or more processors (320) connected to a memory module (330), the one or more processors (320) configured to i. receive a registration request from the user device (143), wherein the user device (143) is connected to a gateway device (136) associated with a first wireless network (130) and wherein the registration request includes one or more network access parameters associated with user device (143), wherein the at least one network access parameter is indicative of at least one of the gateway device (136) and the first wireless network (130); and ii. authenticate the user device (143) based on the received registration request, wherein authenticating the user device comprises verifying validity of one or more network access parameters of the registration request, wherein the one or more network access parameters includes one of an identifier associated with gateway device (136), an identifier associated with a transmission channel on which the registration request is transmitted, one or more identifiers associated with one or more network devices within a predetermined proximity.

12) A non-transitory storage module (330) for onboarding a user device (143) onto an industrial network (158), the non-transitory storage module (330) comprising a plurality of instructions which when executed on one or more processors (320), cause the one or more processors (320) to: a. receive a registration request from the user device (143), wherein the user device (143) is connected to a gateway device (136) associated with a first wireless network (130) and wherein the registration request includes one or more network access parameters associated with user device (143), wherein the at least one network access parameter is indicative of at least one of the gateway device (136) and the first wireless network (130); and b. authenticate the user device (143) based on the received registration request, wherein authenticating the user device comprises verifying validity of one or more network access parameters of the registration request, wherein the one or more network access parameters includes one of an identifier associated with gateway device (136), an identifier associated with a transmission channel on which the registration request is transmitted, one or more identifiers associated with one or more network devices within a predetermined proximity.

Description:
Method Of Onboarding A User Device Background

The current disclosure relates to onboarding of industrial devices and, more particularly, in relation to secure onboarding of wireless industrial devices onto industrial networks. With the adoption of 5G and other wireless technologies in industrial automation, many industrial devices utilize wireless technologies for communication and accordingly, upon installation of these devices in the industrial facility, the devices have to be onboarded to enable communication and proper functioning of these devices.

Description

With the adoption of 5G transmission technologies, industrial wireless communication is able to provide special features such as high data transfer rates, low latency, interference robustness, etc. This allows for greater application in industrial environments, e.g., factory networks. Accordingly, a multitude of wireless industrial devices are expected to be utilized in the industrial environments. Accordingly, during installation and commissioning of these wireless devices, network access authentication is required to ensure that only authorized subscribers have access. The same applies when subscribers need to access a cloud service (edge cloud, back end cloud) or a web service. Authentication is required to prevent an unauthorized device from being registered and provided access to the industrial network. Conventionally, authentication during onboarding is performed using special checks such as PINs or registration passwords, etc. However, the security of such simple authentication procedures to protect onboarding is limited. There is therefore a need to better protect onboarding.

The current disclosure describes methods accordingly to claim 1, an onboarding device according to claim 12 and a non- transitory storage module which address the above-mentioned aspects.

Accordingly, the current disclosure describes a method of onboarding a user device onto an industrial network. The method comprises receiving a registration request from the user device. The user device is connected to a gateway device associated with a first wireless network and wherein the registration request includes one or more network access parameters associated with the user device. At least one network access parameter from the one or more network access parameters is indicative of at least one of the gateway device and the first wireless network. The method further comprises authenticating the user device based on the received registration request, wherein authenticating the user device comprises verifying validity of one or more network access parameters of the registration request.

Accordingly, the current disclosure allows for utilization of network access data associated with the user device to evaluate if the user device is authorized to be registered on the industrial network or not. By utilizing network information, the overall security associated with the onboarding process is improved, thereby reducing the likelihood of misuse. Moreover, access decisions are enabled on more detailed and diverse network related parameters (e.g., access to a specific access point with specific frequency band from a specific location). Since network information is difficult to replicate as it is intrinsic to the transmission of the registration request, the security of the onboarding process can be increased.

In an example, the one or more network access parameters includes an identifier associated with gateway device, an identifier associated with a transmission channel on which the registration request is transmitted, one or more identifiers associated with one or more network devices within a predetermined proximity.

In an example, the method further comprises obtaining network information associated with the first wireless network from a network management device of the first wireless network, wherein the network information is for verifying the validity of the one or more network access parameters of the registration request. Accordingly, the current disclosure allows for fetching network information from the network management devices associated with the plurality of wireless networks in the industrial facility to verify the network access parameters. Accordingly, any change in the network configuration is also known to the onboarding device.

In an example, the method further comprises generating provisioning data for the user device based on the received registration request. Accordingly, based on the received registration request, the onboarding device is configured to generate provisioning data which is used by the user device or in relation to the user device. In an example, the provisioning data includes at least one configuration parameter and wherein validity of the at least one configuration parameter is determined based on the one or more network access parameters. Accordingly, this allows for varying privileges for user devices based on the network access parameters. This allows for customizing the security associated with the user device based on the network access parameters.

In an example, the provisioning data includes an identity certificate (also public key certificate) used by the user device for communicating with at least one network device of the industrial network and wherein the identity certificate includes the one or more network access parameters of the registration request. Accordingly, this allows for storing of the network access parameters within the provisioning data and accordingly, even after registration and onboarding, the network access parameters at the time of registration may be used to verify the user device.

In an example, the provisioning data further comprises an onboarding profile associated with the user device, the onboarding profile comprises information associated with one or more services and applications associated with the user device and an identifier associated with at least one enrollment server, wherein the user device is configured to communicate with the at least one enrollment server based on the identifier associated with the at least one enrollment server. Accordingly, this allows for faster and simpler configuration of the user device subsequent to the onboarding of the user device onto the industrial network. The user device is configured to utilize the onboarding profile to establish communication with the related services and applications. In an example, the onboarding profile is generated based on a device identifier of the registration request.

In another aspect, the current disclosure describes an onboarding device for onboarding a user device onto an industrial network. The onboarding device comprises one or more processors connected to a memory module comprising a plurality of instructions. The one or more processors are configured to receive a registration request from the user device and authenticate the user device based on the received registration request. The user device is connected to a gateway device associated with a first wireless network and wherein the registration request includes one or more network access parameters associated with user device. At least one network access parameter from the one or more network access parameters, is indicative of at least one of the gateway device and the first wireless network. Authenticating the user device comprises verifying validity of one or more network access parameters of the registration request. Advantages of the method apply to the device as well. These aspects are further described in relation figures 1-3.

The following detailed description references the drawings, wherein:

Figure 1 illustrates an example section of an industrial facility comprising an industrial network onto which user devices can be onboarded;

Figure 2 illustrates an example method for onboarding a user device onto an industrial network; and

Figure 3 illustrates an example onboarding device for onboarding a user device onto an industrial network.

Figure 1 illustrates a section 100 of an industrial facility. Industrial facility herein refers to any environment where one or more industrial processes such as manufacturing, refining, smelting, assembly of equipment may take place and includes process plants, oil refineries, automobile factories, substations, etc. The industrial facility includes a plurality of control devices (shown in figure 1 as programmable logic controller 152) such as process controllers, programmable logic controllers (also referred to as PLC), supervisory controllers, automated guidance vehicles, robots, operator devices, etc. One or more control devices are connected to a plurality of field devices (not shown in figure) such as actuators and sensor devices for monitoring and controlling industrial processes in the industrial facility. These field devices can include flowmeters, value actuators, temperature sensors, pressure sensors, etc. The control devices may be connected to each other via a control network (realized via wired and wireless networks) . Additionally, the industrial facility includes a plurality of mobile units including one or more robots for performing a plurality of operations such as welding, assembly of parts; one or more autonomous guidance vehicles for transportation and handling of material, one or more assets with RFID tags on conveyor belts, etc., in the industrial facility.

Communication in the industrial facility happens through an industrial network 158. The industrial network 158 comprises a plurality of wired and wireless networks. For example, as shown in the figure 1, the industrial network 158 includes a first wireless network 130 and a second wireless network 120. Additionally, the industrial network 158 is connected to an enterprise network 156. The enterprise network includes asset management systems, manufacturing execution systems, etc.

Each wireless network comprises a plurality of network devices. The plurality of the network devices includes one or more gateway devices and one or more user devices. Gateway device herein refers to network devices, which are used for connecting other network devices to the network and includes base stations, access points, routers, switches, etc. The gateway devices are affixed to a plurality of locations in the industrial facility. The user devices in the industrial facility are connected to the gateway devices for connecting to the corresponding wireless network and for communicating information with the other devices and systems in the industrial facility. For example, the first wireless network 130 is a 5G wireless network 130 comprising gateway devices or base stations (132, 134, and 136) and user devices (143 and 146). Similarly, in an example the second wireless network 120 is a wireless local area network 120 that comprises gateway devices or access points (122, 124 and 126) and a user device 149. Additionally, each wireless network includes a network management device or function which is responsible for managing the corresponding wireless network (not shown). Additionally, the industrial network 158 includes an industrial edge server 110, which is responsible for onboarding of new devices onto the industrial network 158. The industrial edge server 110 is configured to check the validity of a new user device of either of the first or the second wireless network and onboard the new user device onto the industrial network 158. This is further explained in the description of figure 2.

Figure 2 illustrates a method 200 for onboarding a user device 143 onto the industrial network 158. In an example, the method 200 is implemented by the industrial edge server 110. At step 210, the industrial edge server 110 receives a registration request from the user device 143. The user device is a new device in the industrial facility and has not yet been onboarded onto the industrial network 158. Accordingly, the user device 143 does not have access to the devices, applications, and services on the industrial network 158. Additionally, the user device 143 is configured to connect to a base station 136 of the first wireless network 130 and accordingly, prior to the transmission of the registration request, connects to the base station 136 of the first wireless network 130. Subsequent to connecting to the base station 136, the user device 143 transmits the registration request to the industrial edge server via the base station 136 of the first wireless network 130. The registration request is transmitted from the user device 143 for requesting the industrial edge server 110 to onboard the user device 143 onto the industrial network 158.

The registration request from the user device 143 includes one or more network access parameters associated with user device 143. The at least one network access parameter is indicative of at least one of the gateway device 136 and the first wireless network 130. Network access parameter herein refers to network parameters associated with the user device 143 and the first wireless network 130, which is indicative of network access associated with the user device 143. Examples of network access parameters include identifier associated with the first base station 136, the logical transmission channel utilized to transmit the registration request, frequency band utilized for transmission of the registration request, radio channel on which the registration request is transmitted, modulation method used in relation to the registration request, signal strength associated with the signal related to the registration request, the direction of departure associated with the transmission of the registration request, identifiers of the neighboring devices within a predefined proximity of the user device 143, the network slice used, etc. Then at step 220, the industrial edge server 110 authenticates the user device 143 based on the received registration request. For authenticating the user device 143, the industrial edge server 110 verifies the validity of one or more network access parameters of the registration request. In an example, the industrial edge server 110 checks the information associated with the network access parameter against network configuration and network data associated with the first wireless network 130 to check if the information associated with the network access parameters is inline or matches with the network configuration and network data associated with the first wireless network 130. In an example, the registration request includes an identifier associated with the first base station 136, frequency band utilized for transmission of the registration request and an identifier of the neighboring user device 146. Based on the network information associated with the first wireless network 130, the industrial edge server 110 checks if the identifier associated the first base station 136 is present in a list of identifiers associated with the base stations (132, 134 and 136) of the first wireless network 130. Similarly, based on the network information of the first wireless network 130, the industrial edge server 110 checks if the identifier associated with the neighboring user device 146 is present in a list of identifiers associated with the network devices (132, 134, 136 and 146) of the first wireless network 130. Accordingly, if both the identifiers from the registration request match the identifiers from the network information with the first wireless network 130, the industrial edge server 110 determines that the user device 143 is an authentic network device. If either of the identifiers from the registration request does not match the identifiers from the network information with the first wireless network 130, the industrial edge server 110 determines that the user device 143 is not an authentic network device. In an example, the industrial edge server 110 includes a predefined admissibility policy (also referred to as acceptance criteria), which is used to determine to authenticate the user device 143 based on the one or more network access parameters in the registration request. The admissibility policy may include a set of rules defined by a user or by a security module.

Accordingly, the industrial edge server 110 is able to authenticate the user device 143 based on network access information as provided in the registration request and the network information associated with the wireless networks in the industrial facility. Since the network access information is more difficult to manipulate, the overall security of the onboarding process is improved.

In an example, the registration request further includes a device certificate or a device passcode which is further used by the industrial edger server 110 to authenticate the user device 143. In an example, the device certificate is provided to the user device 143 during the manufacture of the user device 143. In another example, the user device 143 is provided with the device certificate or the passcode by a configuration tool during the commissioning of the user device 143. In the example, in addition to the other network access parameters, the registration request from the user device 143 includes an identifier associated with the configuration tool. Accordingly, upon receiving the registration request, the industrial edge server 110 is able to authenticate the user device 143 based on the device certificate and the identifier associated with the configuration tool in addition to the other network access parameters included in the registration request. In an example, the method 200 further comprises obtaining network information associated with the first wireless network from a network management device of the first wireless network. The industrial edge server is configured to fetch or obtain network information of the first wireless network 130 from the network management device (not shown in figure) of the first wireless network 130. For example, for a 5G based wireless network, the industrial edge server is configured to fetch network information from the network exposure function (NEF) of the 5G core.

In an example, the method 200 further comprises generating provisioning data for the user device based on the received registration request. Subsequent to the authentication of the user device 143, the industrial edge server 110 is configured to generate provisioning data for the user device 143 based on the received registration request. The provisioning data is utilized for providing the user device 143 with access to the devices, applications, and services available on the industrial network 158. For example, the provisioning data includes network certificates, addresses of application servers, device certificates needed for communicating with the application servers, etc.

During the generation of the provisioning data, the industrial edge server 110 utilizes the network access parameters to determine one or more aspects of the provisioning data. In an example, the industrial edge server determined various aspects of the provisioning data such as validity period of a digital certificate, attributes contained in a certificate or provided as associated attribute certificate, granted permissions, allowed communication protocols, allowed QoS parameters, and allowed network slices for the user device 143 based on the one or more network access parameters of the registration request.

In an example, where the provisioning data includes at least one configuration parameter such as certificates, granted permissions, allowed network slices etc., the validity of the at least one configuration parameter is determined based on the one or more network access parameters. For example, based on the confidence and values associated with the network access parameters, the industrial edge server 110 determines a time period for which the at least one configuration parameter is valid. For example, the validity period of a device certificate (configuration parameter) required to connect and communicate with an application server containing sensitive information may be determined based on the identifier of the base station provided in the registration request. For example, for identifiers of base stations present around the periphery of the industrial facility, the validity period of the device certificate may be of a first predetermined value (for example 24 hours) and for identifiers of base stations not present in the periphery of the industrial facility, the validity period of the device certificate may be of a second predetermined value (for example 48 hours) where the first predetermined value is less than the second predetermined value.

In another example, the provisioning data includes an identity certificate used by the user device for communicating with at least one network device of the industrial network. The industrial edge server 110 generates the identity certificate based on the one or more network access parameters of the registration request. The identity certificate includes the one or more network access parameters. Accordingly, this allows for subsequent network devices (e.g. other base stations, application servers, PLCs, etc.) to determine the network access parameters evaluated by the industrial edge server 110 during the onboarding of the user device 143. Accordingly, subsequent network devices can utilize the identity certificate to authenticate the user device 143 and to evaluate if the user device 143 is to be trusted or not, based on the contained parameter.

In another example, the provisioning data further comprises an onboarding profile associated with the user device. The onboarding profile comprises information associated with one or more services and applications associated with the user device and an identifier associated with at least one enrollment server. The user device 143 is configured to communicate with the at least one enrollment server based on the identifier associated with the at least one enrollment server to subscribe to the services associated with the user device 143. Accordingly, this allows for faster onboarding as well.

In industrial operational networks, different credentials are typically required to log on to networks and/or applications. Conventionally, this is performed in a sequence and therefore the user device 143 needs to spend considerable time in establishing communication with multiple applications or services. However, by using the onboarding profile, information for the credentials (for application required later on) for the user device can be provided during onboarding of the user device onto the industrial network. If the credentials are distributed at the same time, since the functionality of the device is known in the backend, a faster commissioning of the user device is ensured. In an example, the onboarding profile is generated based on a device identifier of the registration request. In an example, the device identifier associated is provided in a manufacturer's certificate associated with the user device 143 and is provided in the registration request by the user device 143. In an example, in addition to the above information, the onboarding profile may further comprise specific parameters required when applying for credentials (for a certificate according to the certificate profile of the respective service/application). These can be certain identifiers or alternative names, or usage extensions (e.g. for role-based access control) to be included in the requested certificate. Additionally, the onboarding profile may also include an order or a sequence of onboarding for the various services especially when there are some dependencies between the services.

Accordingly, through the usage of the onboarding profile, the commissioning of services and applications in relation to the user device starts immediately after the network access and allows the user device to apply for the required credentials to the planned services without an elaborate discovery on the client side. This saves time during commissioning. In addition, the onboarding profile can also be simulated and verified by the provisioning server in advance, so that errors in the configuration can be identified even before the actual commissioning.

It is to be noted that while the above method 200 is explained in relation to industrial edge server 110110, the above method may be realized in another device or a plurality of devices. For example, the method 200 may be implemented in a central network management device or a provisioning server Accordingly, the present disclosure can take a form of a computer program product comprising program modules accessible from computer-usable or computer-readable medium storing program code for use by or in connection with one or more computers, processing units, or instruction execution system.

Accordingly, the current disclosure describes an onboarding device 300 as shown in figure 3. The onboarding device 300 is similar to the industrial edge sever 110 and is for onboarding a user device 143 onto an industrial network 158. The onboarding device comprises a network interface 310 for communicating with the user device 143, one or more processors 320 connected to a memory module 330 (also referred to as non-transitory memory module). The one or more processors 320 are configured to receive a registration request from the user device 143, wherein the user device 143 is connected to a gateway device 136 associated with a first wireless network 130 and wherein the registration request includes one or more network access parameters associated with user device 143, wherein the at least one network access parameter is indicative of at least one of the gateway device 136 and the first wireless network 130; and authenticate the user device 143 based on the received registration request, wherein authenticating the user device comprises verifying validity of one or more network access parameters of the registration request.

In another aspect, the current disclosure describes a non- transitory storage module 330 for onboarding a user device 143 onto an industrial network 158. The non-transitory storage module 330 comprises a plurality of instructions which when executed on one or more processors 320, cause the one or more processors 320 to receive a registration request from the user device 143, wherein the user device 143 is connected to a gateway device 136 associated with a first wireless network 130 and wherein the registration request includes one or more network access parameters associated with user device 143, wherein the at least one network access parameter is indicative of at least one of the gateway device 136 and the first wireless network 130; and authenticate the user device 143 based on the received registration request, wherein authenticating the user device comprises verifying validity of one or more network access parameters of the registration request.

For the purpose of this description, a computer-usable or computer-readable non-transitory storage medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The medium can be electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation mediums in and of themselves as signal carriers are not included in the definition of physical computer- readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, random access memory (RAM), a read only memory (ROM), a rigid magnetic disk and optical disk such as compact disk read-only memory (CD-ROM), compact disk read/write, and DVD. Both processing units and program code for implementing each aspect of the technology can be centralized or distributed (or a combination thereof) as known to those skilled in the art.

In view of the present disclosure, many modifications and variations would be present themselves, to those skilled in the art without departing from the scope of the various embodiments of the present disclosure, as described herein. The scope of the present disclosure is, therefore, indicated by the following claims rather than by the foregoing description. All changes, modifications, and variations coming within the meaning and range of equivalency of the claims are to be considered within their scope. All advantageous embodiments claimed in method claims may also be applied to device/non transitory storage medium claims.