Overview
The AMRC Factory 2050 is the UK’s first fully reconfigurable assembly and component manufacturing facility for collaborative research. AMRC provides an environment in which real physical manufacturing and machines can be used to demonstrate operations and service models based on new technologies and methods. PTC leverages AMRC to build demonstrators to showcase industrial IoT applications, with a view to shorten sales cycles. Through partnership between Device Authority and PTC, a continuous collaborative effort is being made to integrate Device Authority’s KeyScaler platform into new and existing demonstrators.
The primary use case is to encrypt data sourced from a MAZAK Milling Machine Center located at the AMRC facility, in motion and at rest, to eliminate the risk of industrial espionage attacks for commercial and economic purposes. Authentication also plays an important role in this use case, to ensure only authenticated and authorized devices can encrypt and decrypt data.
The Problem
Sensitive data from the industrial Mazak milling machine in the AMRC Smart Factory needs to be protected. The MAZAK milling machine resides within the AMRC facility and will generate data, such as rotary speed, degrees, hydraulic pressure, linear axis values etc. This data will be transported from the MAZAK Machine to the ThingWorx platform, where it will be processed, monitored, and analyzed to enable operational efficiency.
Sensitive information flows all the way from the source to the destination. Protecting the data at rest, in motion and in use is a huge challenge. This causes uncertainty in data being transferred from a trusted source to a trusted destination, thus raising concerns on Data Privacy and Data Security.
Our Solution
Device Authority’s KeyScaler™ platform uses unique patented Dynamic Device Key Generation (DDKG) technology to address these problems. It provides a strong root of trust, securing the milling machine’s identity and offers an automated approach for registering and authenticating machine to KeyScaler. Data is encrypted from the machine, in transit and persists encrypted at rest, defined and controlled by customer policy.
All machine data is transmitted agnostic to any network architecture or communications used, maintaining the privacy of machine data as follows: