SYSTEM AND METHOD FOR SECURE DOWNHOLE INTELLIGENT COMPLETIONS

Abstract
A flow control apparatus for controlling fluid flow in a petroleum reservoir. The flow control apparatus has a flow control mechanism, a controller operable to control the flow control mechanism to adjust fluid flow through the flow control mechanism, the controller comprising a processor operable to execute according to a control algorithm, and a non-volatile memory connected to the controller. The non-volatile memory includes instructions to cause the controller to execute an authentication mechanism operable to authenticate a control computer and to prevent operation of the controller until the authentication mechanism authenticates the control computer.
Description
TECHNICAL FIELD

The present invention relates generally to control of fluid flow in petroleum reservoirs and more particularly to establishing secure communication connection for intelligent completions equipment.


BACKGROUND OF THE INVENTION

In modern petroleum fields, fluid flow is controlled using downhole valves known as intelligent completions. An intelligent completion is a variable orifice valve. These valves may be adjusted at will. Typically, intelligent completions are deployed to control flow resistances at various zones in a well or system of wells, which is illustrated in FIG. 1. Generally, the aim is to deploy a combination of valves and sensors in the various production zones of a well to adjust flow distributions along the well-bore, either to achieve a desired fluid-front movement or to maintain a desired production or for conformance. The control strategy may be designed based on either pressure or flow-rate control. A detailed discussion of control strategies based on intelligent completions may be found in T. S. Ramakrishnan, “On reservoir Fluid-Flow with Smart Completions”, SPE84219, SPE Annual Technical Conference and Exhibition, 2003, which is entirely incorporated herein by reference.


Intelligent completion valves may be controlled from surface equipment or from controllers deployed in the downhole equipment. Other components are sensors for measuring pressure or flow-rate computer based controllers. Using a control algorithm in response to measured values, control the pressure or flow-rate by manipulating the valves to achieve a desired set point. The control algorithm, which is usually a feed-back controller, accepts a measured value as input and adjusts the valves in an effort to move the measured value towards the desired set point.


Usually control systems are designed for stability using a variety of methods, for example, those discussed in Process Dynamics, Modeling and Control by B. A. Ogunnake, W. H. Ray, 1994 and Process Systems Analysis and Control by Coughanowr, D. R., 1991. Downhole flow control is not amenable to standard linear theories. Therefore, the control system hardware used with a particular formation is designed based on simulations with the objectives of robustness and stability. After the control system has been deployed downhole to adjust flow within a formation, the control algorithm may be updated from the surface equipment or even remotely. The updates may include changing control parameters such as update time and sensitivity, for example, in response to measured production and injection data. A detailed discussion of intelligent completion systems may be found in Ramakrishnan, T. S., “On reservoir fluid-flow control with smart completions”, SPE Paper SPE84219, SPE Annual Technical Conference and Exhibition, 2003 (Society of Petroleum Engineers).


Any networked computer system is inherently vulnerable to security threats. In the oilfield, such threats are compounded by many factors, including their importance to national and international economies their high monetary value, and the expense associated with exploration, extraction and production equipment.


These factors also contribute to, at least, the following specific threats to intelligent completion systems:

    • Unauthorized operation of an intelligent completions installation
    • Use of unauthorized equipment with an intelligent completions control system
    • Theft of intelligent completions systems
    • Theft of proprietary parameter settings and algorithms used to control an intelligent completions system


From the foregoing, it will be apparent that there is a need for an improved method to secure intelligent completions systems thereby overcoming foresaid security risks.


SUMMARY OF THE INVENTION

A preferred embodiment of the invention utilizes a flow control apparatus having an authentication mechanism to authenticate a control computer to safeguard against security risks to which a flow control apparatus may be exposed.


An embodiment of the invention provides for a flow control apparatus for controlling fluid flow in a petroleum reservoir that has a flow control mechanism controlled by a controller operable to control the flow control mechanism to adjust fluid flow through the flow control mechanism. The controller has a processor operable to execute a control program according to a control algorithm and a non-volatile memory connected to the controller storing instructions to cause the controller to execute an authentication mechanism operable to authenticate a control computer and to prevent operation of the controller until the authentication mechanism authenticates the control computer.


The authentication mechanism may use a secret key to verify the authenticity of the control computer or may use a public key of a certificate authority to verify that a digital certificate was signed using the private key of the certificate authority. In the latter embodiment, the authentication mechanism has a logic to exchange digital certificates with the control computer and to verify that the digital certificate received.


In an embodiment of the invention, the control computer has a parameter storage and a logic to update parameter values. The control program prevents updates to the parameter values until the authentication mechanism has authenticated the control computer. The authentication mechanism may further operate to verify a completions operator and to prevent operation of the parameter update logic until the authentication mechanism has authenticated the completions operator.


In an embodiment, the authentication mechanism is preprogrammed with an identifier for an authorized control computer and the authentication mechanism verifies that the control computer corresponds to the authorized control computer.


In a further embodiment of the invention, the non-volatile memory stores a portion of a control program operable to cause the processor to execute according to the control algorithm. However, the complete control program also includes a second portion. The control apparatus cannot function without having the second portion loaded into the volatile memory. To accomplish that, the first portion of the control program contains a second-portion loading logic operable, in response to a condition of the second portion not being present in the volatile memory, to use a cryptographic engine to decrypt the second portion and to load the second portion from the control computer into the volatile memory. In one embodiment, the second portion cannot be loaded until the authentication mechanism has authenticated the control computer and/or the completions operator.


Other aspects and advantages of the present invention will become apparent from the following detailed description, taken in conjunction with the accompanying drawings, illustrating by way of example the principles of the invention.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a schematic illustration of a cross-section of a system of wells in which intelligent completions are used to control fluid flow.



FIG. 2 is a schematic illustration of a feedback loop for setting a particular valve.



FIG. 3 is a block diagram illustrating the architecture of one embodiment of an intelligent completions tool.



FIG. 4 is a schematic illustration showing one possible deployment of several completions tools in which security is enhanced by the establishment of a chain of trust.



FIG. 5 is a timing sequence diagram illustrating establishment of identities, including creation of relevant digital certificates in an intelligent completions system according to the invention.



FIG. 6 is a block diagram illustrating the storage of key pairs in the control computer, the intelligent completions tool, and the smart card introduced in FIG. 4.



FIG. 7 is a block diagram illustrating the storage of digital certificates in the various components in a secure intelligent completions system.



FIGS. 8A and 8B are timing sequence diagrams illustrating the message flow between the completions tool, the control computer, and the completions operator's smart card.



FIG. 9 is a block diagram illustrating the partitioning of the control program into two portions.



FIG. 10 is a block diagram illustrating the architecture for one embodiment in which the control program is partitioned into two portions.



FIG. 11 is a block diagram illustrating the loading of a second portion of the control algorithm into the RAM of the completions tool.





DETAILED DESCRIPTION OF THE INVENTION

In the following detailed description reference is made to the accompanying drawings that show, by way of illustration, specific embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention. It is to be understood that the various embodiments of the invention, although different, are not necessarily mutually exclusive. For example, a particular feature, structure, or characteristic described herein in connection with one embodiment may be implemented within other embodiments without departing from the spirit and scope of the invention. In addition, it is to be understood that the location or arrangement of individual elements within each disclosed embodiment may be modified without departing from the spirit and scope of the invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is defined only by the appended claims, appropriately interpreted, along with the full range of equivalents to which the claims are entitled. In the drawings, like numerals refer to the same or similar functionality throughout the several views.


A secure intelligent completions system according to the invention establishes a chain of trust between a completions operator, a control computer, and downhole intelligent completions equipment. By deploying such a secure intelligent completions system, oilfield operators may avoid security threats such as theft of equipment and/or proprietary algorithms, unauthorized control of intelligent completions systems, and use of unauthorized control equipment or unauthorized downhole equipment.



FIG. 1 is a schematic illustration of a cross-section of a system of wells in which intelligent completions are used to control fluid flow. Once a production strategy has been chosen, a reservoir may be put into production using a system of wells 100 consisting of two producer wells 100a and 100c and an injector well 100b. In FIG. 1, flow rate and pressure sensors 110 are deployed in the well, for example, in the casing. In an alternative embodiment the sensors are suspended into the wells or included with production logging tools run periodically in the wells. Furthermore, controllable pumps 130 are placed in the injector well 100b.


Fluid flow from the reservoir into the wells is controlled by control valves 120 deployed in the producer wells 100a and 100c. Using the control valves 120, the fluid flow from the reservoir into the well may be controlled on a zone-by-zone basis. Such fluid flow control may be used to implement a particular production strategy or in an effort to optimize production from a reservoir, often with the goal to adjust flow distributions along the well-bore to control fluid-front movement.


Typically, the control of the valves 120 is accomplished using a feedback loop algorithm of some type in which flow is measured by the sensors 110. The observed sensor value is compared to a set point and an appropriate adjustment of the control valve 120 is performed. The deployment may contain either fluid flow-rate sensors or pressure sensors, depending on the desired control value. In an alternative embodiment, a mix of fluid flow-rate sensors and pressure sensors may be encountered.



FIG. 2 is a schematic illustration of a feedback loop for setting a particular valve 120. During the production of fluid from a reservoir 201 a sensor 110, corresponding to the valve 120, measures either pressure, pw, or flow-rate, qw. A comparison 203 is made between the measured value and the desired set point, ps or qs, respectively, to determine an error (e.g., ps-pw) between the measured value and the set point value. This error is used as an input to a controller algorithm to determine a response 205. That controller response 205 is fed back into the valve 120 to adjust the valve 120.


A controllable valve is a valve that may be adjusted to a particular setting, typically the stem height h. Thus, the controller response 205 may be a change in that stem height, i.e., Δh. Adjustment may be according to a particular algorithm, e.g., an I-controller which (for electrical valves) may be of the form:












h



t






Δ





h


Δ





t


-


sgn


(


p
s

-

p
w


)




k
I







p
s

-

p
w




γ







(
1
)







where h is stem height (or height of the open interval), Δt is the update time (which may be arbitrarily larger than the integration time step), ps is the well pressure for the layer of interest, kI is the integral control constant, and γ is the sensitivity exponent. Other algorithms may be useful in establishing adjustments to a controllable valve 120.



FIG. 3 is a block diagram illustrating the architecture of one embodiment of an intelligent completions tool 301. A communications module 303 is connected to a network (not shown) and may obtain sensor data from a sensor 110 (also not shown) and control parameters from a control computer (not shown). Input and output data communicated via the communications module 303 is processed by a microcontroller 305. The operations of the microcontroller 305 are controlled by a control program 307 typically stored in firmware storage 309, e.g., EEPROM. The control program 307 may implement a control algorithm as set out in Equation (1) or some other control algorithm.


The intelligent completions tool 301 may also contain a key storage circuit 315, which is discussed further below, and is a secure hardware circuit where a digital key pair of the intelligent completions tool 301 may be stored, thus providing electrical, logical and physical protection.


The intelligent completions tool 301 may require temporary storage of parameters or other data. The microcontroller 305 may store those parameters and other data in the random access memory (RAM) 311.


The main purpose of the intelligent completions tool 301 is to control fluid flow by controlling an adjustable valve 313. Using data received via the communications module, and applying a control algorithm stored in the form of the control program, the microcontroller 305 sends control signals to the valve 313. These control signals operate to either increase or decrease valve flow.


Many different types of valves may be used, e.g., electrical valves, bi-directional or reversible mechanical valves, and irreversible valves. The latter include cyclical valves of which there are at least two types, namely, valves which go to a full-open or full-closed position and then reverse and valves for which the step after the fully open position is fully closed. The control algorithm shown in Eq 1 may be applied to, for example, an electrical valve, which is infinitely adjustable.


Typically, the valves are characterized experimentally so that a control program 307 can implement a control algorithm designed to effect flow rate in a predictable manner. Further details of control algorithms may be found in Ramakrishnan, T. S., “On reservoir fluid-flow control with smart completions”, SPE Paper SPE84219, SPE Annual Technical Conference and Exhibition, 2003 (Society of Petroleum Engineers) which is incorporated herein by reference in its entirety.


To address the aforementioned security threats, the intelligent completions tool 301 is deployed in a system in which a chain of trust is established between the intelligent completions tool 301, a control computer and a completions operator. FIG. 4 is a schematic illustration showing one possible deployment of several completions tools 301a-301n in which security is enhanced by the establishment of such a chain of trust.


In the system illustrated in FIG. 4, secure communication is accomplished using a trust infrastructure. An actual deployment of an intelligent completions system typically includes simultaneous use of many intelligent completions tools 301 throughout an oil field. Furthermore, while the present invention is primarily described in the context of an intelligent completions system, the security scheme described herein may be extended to other sensitive components of the oilfield system, e.g., injector pumps.


The trust infrastructure of a preferred embodiment is based on authentication and encryption technologies, which in turn rely on a public or private key management base. In a preferred embodiment, the security system is based on the public key/private key (also called public key cryptography or asymmetric cryptography.) Alternative embodiments include secret key cryptography, also called symmetric cryptography.


A network 401 connects the intelligent completions tool 301 to a control computer 403. The control computer 403 may be a Web server that provides a user interface to a completions operator 405 who is connected to the network 401 via a personal computer 407. Alternatively a completions operator 405 operates the control computer 403 directly.


Through the user interface provided by the control computer 403, the completions operator 405 may control the intelligent completions tools 301. For example, the completions operator may set particular parameters that are used by the control program 307, e.g., control loop parameters. The completions operator 405 may further take direct control of the completions tools 301, e.g., overriding the control program 307 by shutting off or opening a valve.


The control computer contains storage for control programs which may be downloaded by the completions operator 405 to the intelligent completions tools 301.


In one embodiment, security of the intelligent completions tools 301 and the overall completions system is enhanced further through the use of a smart card 409 associated with each completions operator 405. As is discussed in greater detail below, all or several operations by a completions operator 405 require the use of the smart card 409. Such operations can include logging into the control system 403 and starting or turning off intelligent completions tools 301. Furthermore, cryptographic functions may be implemented on the smart card 409.


The network 401 further connects the control computer 403, the completions operator 405, the smart card 409, and the intelligent completions tools 301 to a certificate authority 411.


A preferred embodiment relies on public, also known as asymmetric key cryptography. Public key cryptography employs a pair of keys. Only one key, called the private key, needs to be kept secret and is for the exclusive use of the key-pair owner. The other, called the public key, is made available to others that need to engage in secure communications with the key-pair owner. The keys are related such that actions (e.g. digital signing and data encryption) which are done with one key can only be verified or undone by the other key of the key-pair. The Diffie-Hellman algorithm allows the use of such public and private keys for encryption and decryption, but is vulnerable to attack in transmission. This is overcome by the Diffie, van Oorschot and Wiener algorithm (Diffie and Hellman, “New Directions in Cryptography”, IEEE Transactions on Information Theory, 1976, and W. Diffie, P. C. van Oorschot and M. J. Wiener, “Authentication and Authenticated Key Exchanges”, Designs, Codes and Cryptography 2, 107-125, Kluwer Academic Publishers (1992). The Rivest-Shamir-Adleman (RSA) algorithm is an alternative public key encryption algorithm that deploys pairs of private and public keys (R. Rivest, A. Shamir, L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, Vol. 21 (2), pp. 120-126. 1978.). The RSA algorithm offers both encryption and signature, and is a widely practiced standard. A preferred embodiment employs the RSA algorithm as the basis here. However, any equivalent algorithm, e.g., Diffie-Hellman and elliptic curve cryptography (ECC), with public and private keys and authentication can be used.


Alternatively, a secret key mechanism may also suffice. However, such embodiments would include a key (or other authentication means) distribution mechanism and would create more complexities in the deployment of the system. A private key-based system includes a trusted distribution of the private keys. An example of such a mechanism is the Kerberos protocol (Roger Needham and Michael Schroeder. “Using encryption for authentication in large networks of computers”. Communications of the ACM, 21(12), December 1978.)


Further discussion of cryptography may be found in N. Koblitz, A Course in Number Theory and Cryptography, Springer Verlag, 1994.


Returning now to FIG. 4, the trust relationship among the completions operator 405, the control computer 403 and the intelligent completions tools 301 is managed through a Public Key Infrastructure (PKI) that integrates public key cryptography with a Certificate Authority (CA) 411. The CA 411 is trusted by all involved parties. Each entity—the completions operator 405, the control computer 403 and the intelligent completions tool 301—registers separately with the CA 411.


Generally speaking, each entity uses its private key to send a signed request, along with its public key, to the CA 411, requesting certified credentials it can subsequently use to identify itself to others. The CA 411 verifies that the signed request is authentic, i.e., truly generated by the entity that purportedly made the request, by using the public key of that entity. Upon verification, the CA 411 combines the public key of the entity with other information that uniquely identifies the entity, including the expiration date for the information. The CA 411 then signs this combined information using the private key of the CA 411. The resulting signed structure is called a public key certificate or a digital certificate and binds information identifying the owner of the certificate, e.g., one of the control computers 403, the completions operator 405, or the intelligent completions tools 301, to the public key of the CA 411. Any attempt to modify the content of a digital certificate invalidates the certificate via the information contained in the signature. The information contained in the certificate becomes suspect and therefore not trusted.


The CA 411 transmits the digital certificate to the requesting entity. The requesting entity can subsequently present the digital certificate to others as proof of the entity's identity. All involved parties also receive the public key certificate of the CA 411. With the public key certificate of the CA 411, an entity can verify the signature of the CA (which was performed with the private key of the CA 411) on each of the digital certificates.


In addition to registering the entities, generating and signing digital certificates, the CA 411 maintains a revocation list. These are revoked certificates, i.e., the certificates of entities no longer valid. Digital certificates are expected to be valid until expiration. However, digital certificates may be revoked at any time. Examples of reasons for revocation include dismissal or transfer of a completions operator, loss or compromise of an entity's private key, or shutdown of a completion system.



FIG. 5 is a timing sequence diagram illustrating establishment of identities, including creation of relevant digital certificates in an intelligent completions system according to the invention. Each of the completions tool 301, the control computer 403, and the completions operator 405 establishes a public key/private key pair, steps 501a-c, respectively. FIG. 6 is a block diagram illustrating the storage of key pairs in the control computer 403, the intelligent completions tool 301, and the smart card 409. The key pair of the control computer 403, consisting of a private key (PRC) 601 and a public key (PUC) 603, may be encrypted and stored in a secure memory 605 in a manner requiring a user to enter a suitably strong password in order to make use of the key. The key pair of the intelligent completions tool 301, consisting of a private key (PRT) 607 and a public key (PUT) 609, may be preprogrammed and stored in a secure hardware circuit 315 (see FIG. 3) that is designed to provide electrical, logical and physical protection. The key pair, consisting of a private key (PRO) 611 and a public key (PUO) 613, of the completions operator 405 may be stored on the smart card 409 in a non-volatile memory 615. The private keys are never exposed to the network or nodes on the network and remains under the control of the key owner.


Each of the completions tool 301, the control computer 403 and the completions operator 405 transmit a Certificate Request message 503a, 503b, and 503c, respectively, to the Certificate Authority 411. The Certificate Request messages 503 are signed by the entity's private key. For example, the Certificate Request message 503a of the intelligent completions tool 301 is signed by the intelligent completions tool 301 using the PRT.


For each Certificate Request, the CA 411 verifies the signature of the requesting entity, steps 505a, 505b, and 505c, respectively. If the signature is verified to correspond to the purported entity, the CA 411 creates the digital certificate for the entity from the entity ID (e.g., User ID, Control Computer ID, or Completion Tool ID) and the public key of the entity (PUO, PUC, PUT) and signs that result with the private key of the CA 411 (PUCA). The CA 411 transmits these certificates (completions operator digital certificate (DCO), control computer digital certificate (DCC), and completions tool digital certificate (DCT)) to the completions operator 405 (or the smart card 409), the control computer 403, and the completions tool 301, respectively, steps 507b, 507b, and 507a.


The CA 411 also transmits the public key of the certificate authority (PUCA) to each of the entities, steps 509a, 509b, and 509c.



FIG. 7 is a block diagram illustrating the storage of digital certificates DCC 701, DCO 705, and DCT 703 in the control computer 403, the smart card 409, and the intelligent completions tool 301, respectively, and the storage of the public key of the certificate authority (PUCA) 707 in each of the control computer 403, the intelligent completions tool 301 and the smart card 409, respectively.


In operation, there is no need for constant or regular access to the CA 411 by the control computer 403, the smart card 409, and the intelligent completions tool 301. These entities store all the necessary information: private key, signed digital certificate and the public key of the CA 411. These entities mutually authenticate each other and establish a chain of trust among themselves without intervention by or communication with the CA. Access to the CA 411 revoked list is granted to these entities in order to allow them to check against the Certificate Revocation List (CRL) for revoked certificates. This Certificate Revocation List (CRL) allows the entities computer to prevent a chain of trust from being completed if any of the digital certificates involved are no longer valid. In addition, a predetermined message or signal can be programmed to notify the appropriate system administrator that an attempt to use an invalid digital certificate has been made, thus preventing further unauthorized attempted access.


Acquiring digital certificates for each of the completions operator 405, the control computer 403 and the intelligent completions tool 301 is only the first step in establishing secure communication between these entities. To complete the chain of trust, the control computer 403 mutually authenticates with both the completions tool 301 and the completions operator 405.



FIGS. 8A and 8B are timing sequence diagrams illustrating the message flow between the completions tool 301, the control computer 403, and the completions operator's smart card 409. As a preliminary step, communications are established between the completions tool 301 and the control computer 403. Over the established communications channel, the control computer 403 and completions tool 301 each transmit its digital certificate to the other, steps 801 and 803.


Next the control computer 403 checks the authenticity of the digital certificate 703 of the completions tool 301 by verifying that the digital certificate 703 has been signed by the CA 411 using its private key, step 805, and the completions tool 301 similarly verifies the authenticity of the digital certificate 701 of the control computer 403, step 807. That a digital certificate has been signed by a specific entity using that entity's private key may be verified using the entity's public key. Because the public key of the CA 411 is stored in each of the completions tool 301 and control computer 403, these entities can verify the authenticity of the digital certificates that they receive.


Next the control computer 403 and completions tool 301 verify the entities presenting the digital certificates are, in fact, the owners of the digital certificates, i.e., that the presented digital certificate allegedly from the completions tool 301 is the actual digital certificate of the completions tool 301, and similarly for the control computer 403. This verification task is termed a “handshake”.


To avert an attempt by an unauthorized user using an unauthorized control computer to tamper with the completions tool 301, the completions tool requires the control computer to decrypt a message encrypted with the public key of the control computer 403 (i.e., {Challenge} PUC) and to encrypt the same message with the public key of the completions tool 301 (i.e., {Challenge} PUT). If the challenge message returned from the control computer 403 matches the original challenge string, the handshake has succeeded and the communications channel between the completions tool 301 and control computer may be trusted.


Thus, to verify the identity of the control computer 403, the completions tool encrypts a challenge string using the public key of the control computer 403, step 809. The encrypted challenge string is transmitted to the control computer 403, step 811. The control computer 403 decrypts the challenge string using the private key (PRC) of the control computer 403, step 813. Next the control computer 403 produces a response to the completions tool 301 by encrypting the decrypted challenge using the public key (PUT) of the completions tool 301, step 815, and transmits this result to the completions tool 301, step 817.


Upon receiving the response, the completions tool 301 decrypts the response and compares the original challenge string to the response, step 819. If there is a match, a trusted and encrypted communications channel 821 has been established between the control computer 403 and completions tool 301 wherein both the control computer 403 and completions tool 301 have been authenticated to the other.


To allow a particular person to act as an authorized completions operator with the right to control the completions tool 301, a similar handshake process is carried out between the control computer 403 and the smart card 409 of the completions operator 405.


The control computer 403 and the smart card 409 exchange digital certificates, steps 823 and 825. The control computer 403 and the smart card 409, respectively, verify the authenticity of the received digital certificates against the public key of the CA 411, steps 827 and 829. Next the control computer 403 encrypts a challenge message for the completions operator 405 using the public key (PUO) of the completions operator 405 (i.e., {Challenge}PUO), step 833, and transmits this challenge message to the smart card 409, step 833.


The smart card 409 decrypts the challenge message using the completions operator's private key (PRO), step 835. Next the smart card 409 produces a response to the control computer 403 by encrypting the decrypted challenge using the public key (PUC) of the control computer 403, step 837, and transmits this result to the control computer 403, step 839.


Upon receiving the response, the control computer 403 decrypts the response and compares the original challenge string to the response, step 841. If there is a match, a trusted and encrypted communications channel 843 has been established between the control computer 403 and smart card 409 wherein both the control computer 403 and the smart card 409 (and consequently the completions operator 405) have been authenticated to the other.


With an established trusted and encrypted communications link between the smart card 409 and the control computer 403, and between the control computer 403 and the intelligent completions tool 301, the completions operator 405 can securely control the operation of the completions tool 301. Without establishing such a secure chain of trust, the control computer 403 and the completions tool 301 reject attempts by the completions operator 405 to control the completions tool 301.


While the use of a smart card 409, as discussed herein, enhances the security of the overall operation by adding two-factor authentication to the user and by providing additional protection to the private key (PRO) of the completions operator 405, the functions of the smart card 409 may be provided by another device, e.g., directly by the personal computer 407 of the completions operator 405.


Published patent application 20050108571 to Karen Lu, et al., entitled “Secure networking using a resource-constrained device”, filed May 19, 2004, describes a smart card that may act as a peer with other nodes on a computer network. In a preferred embodiment of the invention, the smart card 409 is configured to act as a network peer with the completions tool 301 and control computer 403 wherein secure communications are established end-to-end between the smart card 409 and the control computer 403, for example, in the manner described in published application 20050108571. End-to-end security between the smart card 409 and the control computer 403 avoids security risks associated with having intervening computers that could be vulnerable to attacks such as keyboard loggers or other software designed to illegitimately appropriate information transferred through it, e.g., proprietary software or control parameters.


In an alternative embodiment, the security of the completions tool 405 is further enhanced by partitioning the control program 307 into at least two portions. A first portion that is stored in the firmware of the completions tool 405 and a second portion that is uploaded to the completions tool 405 from either the smart card 409, the control computer 403 or another secure node on the network 401.



FIG. 9 is a block diagram illustrating the partitioning of the control program into two portions. A control program is compiled at process 903 from a collection of source program files 901. The output of the compilation process 903 is at least one executable file 905. A partitioning process 907 divides the executable file 905 into two separate pieces, a first portion 909 to be loaded onto the completions tool 301 and a second portion 911 to be loaded onto the smart card 409 (or another node). To become operational, the second portion 911 may require additional operational parameters 913 loaded onto the smart card 409, for example, control constants. These operational parameters 913 may be pre-stored on the smart card 409 or entered by the completions operator 405.



FIG. 10 is a block diagram illustrating the architecture for one embodiment in which the control program is partitioned into two portions. FIG. 11 is a block diagram illustrating the loading of a second portion of the control algorithm into the RAM 311 of the completions tool 301.


The completions tool 301 contains a firmware storage 309 in which the first portion of the control program (Part A) 909 is stored. An initial loading of the first portion 909 may be performed as part of the manufacturing process. Updating the first portion 909 may be performed by a completions operator 405 after successfully establishing the chain of trust as described herein above.


The second portion of the control program (Part B) is stored in a non-volatile memory (NVM) 1001 of the smart card 409.


The control program Part A 909 contains a Part B loader 1003. The Part B loader 1003 consists of logic to perform the merging of the Part A 909 with the second portion obtained by being downloaded from the smart card 409. The completions tool 301, for example, through the Part B loader 1003, establishes a secure connection with the smart card 409 (as described hereinabove) prior to downloading the second portion from the smart card 409. Prior to transmitting the section portion 911 to the completions tool 301 over the secure channel, the smart card 409 encrypts the second portion 911 using the public key (PUT) of the completions tool 301. The completions tool 301 then decrypts the second portion 911 using its private key (PRT) and performs any required operations to merge the first portion 909 with the second portion 911. The second portion loader 1003 stores the combined control program 307 into the RAM 311, which is a volatile memory. In the event the completions tool 301 is tampered with, or if the completions tool 301 or the electronic components of the completions tool 301 are removed, the contents of the RAM 311 are erased. This clearing operation of the RAM 311 renders the control program 307 inoperable because the second portion 911 would not be available. The security of the control program and acquired data, e.g., from theft or inadvertent unauthorized access, is further enhanced by storing control parameters of the control algorithm and any acquired data in the volatile memory RAM 311. When the chain of trust is re-established, the process to download the second portion 911 into the RAM 311 may be re-executed and the completions tool 301 can be reactivated.


In one embodiment, access control features of the completions tool 301, e.g., as part of operating system instructions stored in the firmware 309, control access to the combined control program 307. For example, access control protocols may be established to not allow completions operators read access to the combined control program 307. Such restrictions prevent the combined control program 307 from being impermissibly copied by unauthorized persons after the combined control program 307 has been created by merging the first portion 909 with the second portion 909. Thus, the protections that are achieved by not storing the entire control program in the firmware 309 of the completions tool 301 are maintained even after the combined control program 307 has been created through the merger.


From the foregoing, it will be appreciated that the security system provided by the invention provides an efficient mechanism to secure intelligent completions tools, including their hardware, control algorithm, control parameters and acquired data thus enhancing the overall security of an oilfield operation. Providing such security mechanisms further protects proprietary control algorithms from deliberate theft or inadvertent exposure.


Although specific embodiments of the invention have been described and illustrated, the invention is not to be limited to the specific forms or arrangements of parts so described and illustrated. The invention is limited only by the claims.

Claims
  • 1. A flow control apparatus for controlling fluid flow in a petroleum reservoir, comprising: a flow control mechanism;a controller operable to control the flow control mechanism to adjust fluid flow through the flow control mechanism, the controller comprising a processor operable to execute a control program according to a control algorithm;a non-volatile memory connected to the controller and storing instructions to cause the controller to execute: an authentication mechanism operable to authenticate a control computer and to prevent operation of the controller until the authentication mechanism authenticates the control computer.
  • 2. The flow control apparatus of claim 1 wherein the authentication mechanism further comprises logic operable to verify authenticity of the control computer using a secret key.
  • 3. The flow control apparatus of claim 1 wherein the control apparatus further comprises: a cryptographic engine operable to use a public key of a certificate authority to verify that a digital certificate was signed using the private key of the certificate authority; andwherein the authentication mechanism further comprising a certificate exchange logic operable to receive a digital certificate of the control computer andwherein to authenticate the control computer, the authentication mechanism is operable to invoke the cryptographic engine to verify the digital certificate of the control computer.
  • 4. The flow control apparatus of claim 1 wherein the control apparatus further comprises: a parameter storage connected to the control program;the control program further comprising a parameter update logic operable to receive parameter values from the control computer wherein the control program having logic to prevent updates until the authentication mechanism has authenticated the control computer.
  • 5. The flow control apparatus of claim 4 wherein the authentication mechanism is further operable to authenticate a completions operator operating the control computer and operable to prevent operation of the parameter update logic until the authentication mechanism has authenticated the completions operator.
  • 6. The flow control apparatus of claim 1 wherein the authentication mechanism is preprogrammed with an identifier for an authorized control computer and the authentication mechanism verifies that the control computer corresponds to the authorized control computer.
  • 7. The flow control apparatus of claim 1 wherein: the non-volatile memory further stores at least a first portion of a control program operable to cause the processor to execute according to the control algorithm; andthe control apparatus further comprises: a volatile memory; andwherein the control program further comprises: a second portion wherein the control apparatus cannot function without having the second portion loaded into the volatile memory;wherein the first portion of the control program contains a second-portion loading logic operable, in response to a condition of the second portion not being present in the volatile memory, to use a cryptographic engine to decrypt the second portion and to load the second portion from the control computer into the volatile memory.
  • 8. The flow control apparatus of claim 7 wherein the second-portion loading logic is not operable until the authentication mechanism has authenticated the control computer.
  • 9. The flow control apparatus of claim 7 further comprising an access control mechanism preventing access to the control program.
  • 10. The flow control apparatus of claim 8 wherein the control apparatus further comprises: a cryptographic engine operable to use a public key of a certificate authority to verify that a digital certificate was signed using the private key of the certificate authority; andwherein the authentication mechanism further comprising a certificate exchange logic operable to receive a digital certificate of the control computer andwherein to authenticate the control computer, the authentication mechanism is operable to invoke the cryptographic engine to verify the digital certificate of the control computer.
  • 11. The flow control apparatus of claim 8 wherein the authentication mechanism comprises: a certificate exchange logic operable to exchange digital certificates with the control computer.
  • 12. The flow control apparatus of claim 11 wherein the digital certificates includes a digital certificate from the control computer and a digital certificate from the completions operator.
  • 13. The flow control apparatus of claim 12 comprising: a flow control activation logic operable to cause the flow control apparatus to be inactive until the control computer and the completions operator have been authenticated.
  • 14. The flow control apparatus of claim 11 wherein the certificate exchange logic further comprises: a certificate verification logic operable to verify the digital certificates received from the control computer using a public key of a certificate authority.
  • 15. The flow control apparatus of claim 8 wherein the second-portion loading logic operates to load the second portion only if the second portion has been digitally signed by the control computer.
  • 16. The flow control apparatus of claim 7 wherein the second-portion loading logic operates to load the second portion only after the authentication has successfully authenticated the control computer and the completions operator.
  • 17. A system for controlling the flow of fluids in a reservoir comprising: a control computer having a user interface allowing a completions operator to interact with an intelligent completions apparatus installed in the reservoir;the intelligent completions apparatus connected over a communications link to the control computer, the intelligent completions apparatus comprising: a flow control mechanism;a microcontroller connected to the flow control mechanism and operable to control the flow through the flow control mechanism;a non-volatile memory connected to the microcontroller and storing at least a first portion of a control program for executing a control algorithm, the first portion containing instructions to cause the microcontroller: to perform an authentication of the control computer; andto prevent use of the flow control mechanism until the control computer has been validated as corresponding to an authorized control computer.
  • 18. The system of claim 17 wherein the authentication mechanism further comprises logic operable to verify authenticity of the control computer using the secret key.
  • 19. The system of claim 17 the first portion further comprises instructions: to cause the microcontroller to perform an authentication exchange including sending the control computer a request for a digital certificate of the control computer;to validate the control computer by validating that the digital certificate corresponds to an authorized control computer and that the digital certificate is authentic;to transmit the digital certificate of the intelligent completions apparatus to the control computer;andwherein the control computer comprises: a storage medium storing instructions to cause the control computer: to engage in a mutual authentication with to the intelligent completions apparatus;to receive the digital certificate of the intelligent completions apparatus; andto validate the digital certificate of the intelligent completions apparatus.
  • 20. The system of claim 19 wherein the verification of the digital certificate of the control computer comprises validating the digital certificate using a public key of an issuing certificate authority.
  • 21. The system of claim 17 wherein the storage medium of the control computer further comprises: a second portion of the control program for controlling the intelligent completions apparatus;a logic to control transmission of the second portion to the intelligent completions apparatus;wherein the logic to transmit the second portion is executed after verifying the authenticity of the intelligent completions apparatus.
  • 22. The system of claim 21 wherein the authenticity of the intelligent completions apparatus comprises receiving a digital certificate from the intelligent completions apparatus and verifying the authenticity of the digital certificate of the intelligent completions apparatus.
  • 23. The system of claim 17 wherein the control computer further comprises: a user interface allowing a completions operator to interact with the intelligent completions apparatus;a logic to authenticate a completions operator.
  • 24. The system of claim 23 wherein the logic to authenticate the completions operator requires that the completions operator present a digital certificate stored on a smart card.
  • 25. The system of claim 24 further comprising a logic to validate the digital certificate of the completions operator.
  • 26. The system of claim 25 further comprising: a completions operator secure device having a storage medium comprising:a second portion of the control program for controlling the intelligent completions apparatus, wherein the second portion contains at least one essential function of the control program;a logic to control transmission of the second portion to the intelligent completions apparatus;wherein the logic to transmit the second portion after verifying a digital certificate of the intelligent completions apparatus.
  • 27. A method of operating a flow control apparatus for controlling fluid flow in a petroleum reservoir, comprising: adjusting fluid flow through the flow control mechanism using a control program implementing a control algorithm;authenticating a control computer and preventing operation of the controller until the control computer has been authenticated.
  • 28. The method of operating a flow control apparatus of claim 27 wherein authenticating further comprises verifying authenticity of the control computer using a secret key.
  • 29. The method of operating a flow control apparatus of claim 27 further comprising: verifying that a digital certificate was signed using the private key of the certificate authority using a public key of a certificate authority; andreceiving a digital certificate of the control computer andwherein the step of authenticating the control computer further comprises verifying the digital certificate of the control computer.
  • 30. The method of operating a flow control apparatus of claim 27 further comprising: receiving parameter values from the control computer;preventing updates to a parameter storage until the control computer has been authenticated.
  • 31. The method of operating a flow control apparatus of claim 30 further comprising authenticating a completions operator operating the control computer and preventing parameter updates until the completions operator has been authenticated.
  • 32. The method of operating a flow control apparatus of claim 27 further comprising verifying that the control computer corresponds to the authorized control computer by verifying a preprogrammed id associated with the authorized control computer.
  • 33. The method of operating a flow control apparatus of claim 27 wherein: storing at least a first portion of a control program operable to cause the processor to execute according to the control algorithm in the non-volatile memory; andwherein the first portion of the control program contains a second-portion loading logic operable, in response to a condition of the second portion not being present in the volatile memory, to use a cryptographic engine to decrypt the second portion and to load the second portion from the control computer into the volatile memory;and operating the second-portion loading logic to load the second portion from the control computer.
  • 34. The method of operating a flow control apparatus of claim 33 further comprising activating the second-portion loading logic only after authenticating the control computer.
  • 35. The method of operating a flow control apparatus of claim 34 further comprising: verifying that a digital certificate was signed using the private key of the certificate using a public key of a certificate authority; andwherein the step of authenticating further comprises exchanging digital certificates by receiving a digital certificate of the control computer andauthenticating the control computer by verifing the digital certificate of the control computer.
  • 36. The method of operating a flow control apparatus of claim 34 wherein authenticating mechanism comprises: exchanging digital certificates with the control computer.
  • 37. The method of operating a flow control apparatus of claim 36 wherein the digital certificates includes a digital certificate from the control computer and a digital certificate from the completions operator.
  • 38. The method of operating a flow control apparatus of claim 37 comprising: keeping the flow control apparatus inactive until the control computer and the completions operator have been authenticated.
  • 39. The method of operating a flow control apparatus of claim 36 wherein the certificate exchange logic further comprises: verifing the digital certificates received from the control computer using a public key of a certificate authority.
  • 40. The method of operating a flow control apparatus of claim 34 further comprising activating the second-portion loading logic to load the second portion only if the second portion has been digitally signed by the control computer.
  • 41. The method of operating a flow control apparatus of claim 33 further comprising activating the second-portion loading logic to load the second portion only after the authentication has successfully authenticated the control computer and the completions operator.
  • 42. A method of operating an installation of intelligent completions in an oilfield, comprising: storing a first portion of a control algorithm in non-volatile memory of an intelligent completions apparatus;obtaining a digital certificate for the intelligent completions apparatus from a certificate authority;obtaining a digital certificate for a control computer from the certificate authority;obtaining a digital certificate for a completions operator from the certificate authority;obtaining a public key of the certificate authority;exchanging digital certificates between the completions operator, the control computer and the intelligent completions apparatus whereby the control computer has the digital certificate of the intelligent completions apparatus and the intelligent completions apparatus has the digital certificate of the control computer;receiving a second portion of a control algorithm from a control computer with the second portion of the control algorithm signed using the digital certificate of the control computer; andusing the digital certificate of the control computer verifying that the second portion originated from the control computer.
  • 43. The method of claim 27 further comprising: storing the private key of the completions operator in a smart card.
  • 44. A method of operating an intelligent completions system controlling fluid flow from a reservoir, comprising: obtaining private and public keys for each user, a control computer, and an intelligent completions apparatus;authenticating the user and control computer with the intelligent completions apparatus, using the public keys and digital certificates, as a prerequisite to allowing the user to control the intelligent completions apparatus.
  • 45. The method of claim 44 wherein authenticating the user and control computer comprises: causing the public key of the control computer to be signed by a certificate authority using a private key of the certificate authority thereby creating a digital certificate for the control computer;receiving the digital certificate of the control computer by the intelligent completions apparatus;determining authenticity of the digital certificate of the control computer using a public key of the certificate authority to verify that the certificate authority signed the digital certificate of the control computer;denying the control computer access to the intelligent completions apparatus if the digital certificate of the control computer fails to authenticate the control computer.
CROSS REFERENCE TO RELATED APPLICATIONS

This application claims the benefits of priority from Provisional Patent Application No. 60/882,667, entitled “SYSTEM AND METHOD FOR SECURE DOWNHOLE INTELLIGENT COMPLETIONS,” filed in the United States of America on Dec. 29, 2006, which is commonly assigned to assignee of the present invention and hereby incorporated by reference in its entirety.

Provisional Applications (1)
Number Date Country
60882667 Dec 2006 US