CN102340499B - The data transmission of the safety in automated network - Google Patents
The data transmission of the safety in automated network Download PDFInfo
- Publication number
- CN102340499B CN102340499B CN201110191675.5A CN201110191675A CN102340499B CN 102340499 B CN102340499 B CN 102340499B CN 201110191675 A CN201110191675 A CN 201110191675A CN 102340499 B CN102340499 B CN 102340499B
- Authority
- CN
- China
- Prior art keywords
- data
- assembly
- program example
- user
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 46
- 238000003860 storage Methods 0.000 claims description 33
- 230000001702 transmitter Effects 0.000 claims description 5
- 238000004891 communication Methods 0.000 description 7
- 238000000034 method Methods 0.000 description 5
- 230000001276 controlling effect Effects 0.000 description 3
- 230000001419 dependent Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000000712 assembly Effects 0.000 description 1
- 230000000875 corresponding Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000002349 favourable Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical Effects 0.000 description 1
- 235000010384 tocopherol Nutrition 0.000 description 1
- 235000019731 tricalcium phosphate Nutrition 0.000 description 1
Abstract
The present invention relates to a kind of for the method carried out data transmission safely in automated network (100), wherein, the method comprises the following steps: verify (S1) user with the help of user data by program example authoring system, enables the user to use this program example;By program example, data (120) being encrypted (S2) and signature, wherein, these data include user data;By transmission medium (108;202) data are transmitted (S3) to assembly from program example;In assembly data are decrypted (S4);Relative to assembly, program example is verified (S5);And with the help of user data, verify (S6) user by assembly authoring system.
Description
Technical field
The present invention relates to a kind of industrial automation network, a kind of in industrial automation network
The data transmission of safety.
Background technology
Industrial automation network is generally made up of at least one controller and at least one assembly.Controller
For assembly is programmed, and include program example (Programminstanz) for this.Assembly
It can be such as the control system of machine of machine in production line.Automated network for voluntarily,
And in the case of unmanned cooperation, make industrial machine or equipment operation.
The data of program example so must be transferred to assembly, thus controller can be entered assembly
Row programming.These data are referred to as configuring data.If allowing configuration data be transferred to by program example
Be not stolen during assembly and be protected from tampering, then generally use such as HTTPS or
The such secure transfer protocol of person IPSEC.Certain peace it must is fulfilled for for these host-host protocols
Full requirement, these safety requirements can not be met by the most each assembly of each automated network.
Summary of the invention
It is an object of the invention to, propose a kind of to carry out data transmission safely in automated network
The method improved.It is further an object that, a kind of improvement in automated network is proposed
Controller and the assembly of a kind of improvement, and improve in order to this assembly and this controller provide
Storage medium.
The purpose of the present invention is utilized respectively and is achieved according to the feature described in independent claims.This
Bright embodiment is given in the dependent claims.
According to the invention it is proposed that a kind of side carried out data transmission safely in automated network
Method.Automated network includes at least one program example and at least one assembly.The safety of data transmission
Property is not dependent on used transmission method and is guaranteed.
Automated network such as can be designed as industrial automation network.This industrial automation network example
As can design, set and/or be provided for control and/or regulation industrial equipment (such as produce equipment,
Transmission equipment etc.), machine and/or instrument.Especially, automated network industrial automation in other words
Network can be in order at least (such as control between the assembly that take part in control task and/or regulation task
Between unit processed and equipment to be controlled and/or machine) communicate and there is real-time communication protocol
(such as Profinet (automatization's bus), Profibus (fieldbus), Real-Time-Ethernet
(real-time ethernet)).Transmitted data safely to be achieved similarly by storage medium.
Additionally, in automated network in other words industrial automation network, except real-time communication protocol it
Outward but also can also design at least another communication protocol (it such as need not real-time capacity), example
As for one or more control units being monitored in automated network, set, reprogramming
And/or Reparameterization.
Automated network such as can include wired communications component and/or wireless communications component.This
Outward, automated network can include at least one automation equipment.
Automation equipment can be such as computer, PC and/or have control task and control energy in other words
The controller of power.Especially, automation equipment can be such as industrial automation arrangement, and it such as may be used
To design especially, set and/or to be provided for control and/or regulation industrial equipment.Especially, this
Plant automation equipment industrial automation arrangement in other words and can have real-time capacity, say, that can be real-time
Be controlled or regulate.To this end, automation equipment industrial automation arrangement in other words is the most permissible
Including real time operating system, and/or the most additionally support the communication protocols having real-time capacity for communication
View (such as Profinet, Profibus, Real-Time-Ethernet).
Automated network includes multiple sensor and executor.These executors and sensor are by least one
Individual control device is controlled.Executor, sensor and at least one control device exchange number each other
According to.A kind of automation protocol is used in order to exchange data.At least one controls device and so controls to perform
Device, sensor and data exchange, i.e. machine-building process is gone on, in this process
Such as produce a kind of product.
Industrial automation arrangement can be such as Programmable Logic Controller, the module of Programmable Logic Controller or
A part, the Programmable Logic Controller being integrated in computer or PC and corresponding field apparatus,
Sensor and/or executor, input equipment and/or outut device or be used for being connected to PLC technology
Similar devices on device, or include these equipment.
Automation protocol in meaning of the present invention is interpreted as various types of according to this specification
Arrange, be suitable for and/or set the agreement for communicating with automation equipment.These automation protocols
Can be such as field bus protocol (such as deferring to IEC 61158/EN50170 standard),
Profi-Bus-DP agreement, Profi-Bus-PA agreement, Profi-Net agreement, Profi-Net-IO agreement, root
According to the agreement of AS-Interface bus system, according to the agreement of IO-Link, KNX agreement, according to many
The agreement of some communication interface (MPI), for the agreement of point-to-point bridge joint (PtP), defers to S7 communication
The agreement (it is such as arranged and communicating of setting the Programmable Logic Controller for Siemens Company) of rule,
Or also industrial ethernet protocol or real time ethernet protocol or other for and automatization
The particular protocol that equipment communicates.Automation protocol in the meaning of this specification can also be set
It is set to the combination in any of aforementioned protocols.
Program example has program example authoring system, and assembly has assembly authoring system.This
Method comprises the following steps.First have to the user of proving program example.This is by program example mandate system
System is carried out with the help of user data.User data can be such as username and password, or also
That have been known including other, for the method by program example authoring system checking user.
Program example authoring system is the authoring system of program example.This program example authoring system is the most just
User can be verified on the one hand with the help of user data, and on the other hand to different use
The right that family distribution is different.It should be noted that it is equally possible that, all user already authenticated are
It is granted whole rights.
Assembly authoring system is the authoring system of assembly.This assembly authoring system is the most on the one hand
With the help of user data, verify user, and distribute different to different users on the other hand
Right.At this it is also noted that it is equally possible that, all user already authenticated are awarded
Whole right.
Data to be transmitted are encrypted by this program example and sign.Such as, program example is this
Including dll file (dynamic link library file) or the executable file of signature of signature, they
Therefore it is protected from tampering.Preferably, the program example for being encrypted data and sign is joined
It is equipped with unsymmetrical key.These data include user data equally.User data is just together with to pass
Defeated configuration data encryption ground and be transferred to assembly with signing.
In assembly, these data are decrypted.And then, relative to assembly, program example is tested
Card.This such as can be carried out in the following manner, i.e. utilizes the asymmetric private key of program example
Data are signed, and this signature is tested by the public keys of program example in assembly
Card.Check the signature of data the most in assembly.Thereby confirm that and will not occur data are distorted,
And assembly only receives data from a program example there having the right to control this assembly.By profit
Sign with the private key of program example, it is not necessary to carry out data biography from assembly to program example
Defeated, these are different from the most so-called challenge-response-method.Described program example is verified, and not
Data will be transferred to program example from assembly.
The data of these deciphering include user data.User passes through group with the help of user data at this
Part authoring system is verified.Additionally, user can be authorized to transfer data to assembly.The most just relate at this
And a follow-up licensing process.If it find that this user haves no right to carry out data transmission, then data will
It is dropped.Otherwise, data are used for controlling assembly.The step for ensure that on program example register
User have the right to assembly transmit data.Also it is impossible to data are distorted, and in assembly
Only those data being transferred to assembly by the user of the mandate of program example are processed.Delivering path
It is wholly immaterial at this.It can also be i.e. a unsafe transmission channel.By data are carried out
Encrypting, sign data and by user data transmission to assembly, these data are protected from
Distort to any, and ensure that with being not dependent on delivering path these data can not be trapped or
It is tampered.
The special safety carried out data transmission according to the embodiment of the present invention is, user data
It is transferred to assembly together with configuration data by program example encryptedly, and in the assembly user is entered
Row checking.Except in program example, user is verified and sign and cryptographically carry out data
Outside transmission, also drawing the automated network that protection data are not tampered with, this automated network is not
Depend on that the safety of transmission channel provides safe data to transmit.Embodiment party according to the present invention
Formula, the encryption carrying out data is asymmetric encryption.
According to the embodiment of the present invention, program example and assembly are respectively provided with an asymmetric public journey
Sequence instance key and an asymmetric common component key.It is real that program example also has a private program
Example key, and assembly has a private component keys.Therefore not only for program example but also
There is double secret key for assembly, it is used for signing and encrypting.One double secret key is respectively by public affairs
Key and a private key composition altogether.
Data utilize common component key to be encrypted in program example, and utilize private program real
Example key is signed.It should be noted that these data the most also include user data.Real by program
Example be transferred to assembly, encrypt and the data signed utilize private component keys to solve in assembly
Close.Common program instance key is utilized to realize being verified as program example the transmitter of data.By right
Solve ciphertext data and be estimated realizing the checking of the user to program example.
According to the embodiment of the present invention, encrypted by program example and the data storage signed
On medium.Before being decrypted, the data in assembly are first read from storage medium.Storage is situated between
Matter can be such as optical storage medium, magnetic-based storage media and/or digital storage media.It equally may be used
To be rotary storage medium.Storage medium can be the most such as USB flash disk, storage card or hard disk.
Because data are encrypted and sign, and user data is stored the most together, so data are being deposited
Store to have many safety on storage media the most unimportant.These data be adequately protected not by
Distort or unauthorized do not read.
Although these data are transmitted not by automated network, this embodiment similarly provides one
Plant the method for carrying out data transmission safely in automated network.Data transmission approach with from
Dynamicization network is unrelated.
According to the embodiment of the present invention, encrypt and the data signed by program example and assembly it
Between cable connect be transmitted.Can also be that unsafe cable connects at this, this is because these
Data by user data is encrypted, signs and common transport and ensure that fully not by
Distort or be read in the case of undelegated.
According to the embodiment of the present invention, by one of less than one agreement realize by cable connect into
Row data are transmitted: MPI, Profibus, Ethernet, TCP/IP, Profinet, WLAN.
According to the embodiment of the present invention, these data include the key of symmetry, for cryptographically by number
It is transferred to assembly according to from program example.Symmetrical key may be used for later data transmission.When this example
In this way one deterministic wait time automated network time, use symmetric key can be favourable.?
It is essential that accurately at certain time point determined by assembly logarithm in such a automated network
According to processing.In this case, asymmetricly encrypting and decrypting data may continue the most long.
In this case, then symmetric key together with ciphering user data ground and is transferred to assembly with signing,
And may be used for the transmission of ensuing data.
According to the embodiment of the present invention, these data include another private component keys, are used for adding
Thickly data are transferred to assembly by program example.Another private component keys instead of before private
People's component keys, has thereby further ensured that the data transmission of safety.For security reasons, it should fixed
Shi Genghuan private key.
On the other hand, the present invention relates to a kind of controller in automated network.This controller
Including program example, and this program example has program example authoring system.This controller also includes:
Device, for verifying user with the help of user data by program example authoring system, makes user
This program example can be used;Device, for by program example data being encrypted and signing,
Wherein, these data include user data;And device, for data being transmitted by transmission medium.
On the other hand, the present invention relates to a kind of assembly in automated network.This assembly has group
Part authoring system.This assembly also has: device, is used for receiving data;Device, for entering data
Row deciphering;Device, being used for controller verification is the transmitter of data;And device, for by group
Part authoring system verifies user with the help of user data, to transfer data to assembly.
In yet another aspect, the present invention relates to a kind of storage medium calculating function reading, this storage is situated between
Matter has instruction, and this instruction can perform in the controller in automated network.This controller includes journey
Sequence example, and this program example has program example authoring system.Control in automated network
When performing these instructions in device, these instructions make controller implement below scheme.First, journey is passed through
Sequence example authoring system verifies user with the help of user data.Then, by this program example it is
Data encryption is also signed, and wherein, these data include user data.These data are followed by biography
Defeated medium transmits,
In yet another aspect, the invention still further relates to a kind of storage medium calculating function reading, storage is situated between
Matter has instruction, and this instruction can perform in the assembly in automated network.This assembly has assembly and awards
Power system.When performing instruction, these instructions make assembly implement below scheme.First, receive also
Solve ciphertext data.And then, access control device, and pass through the assembly authoring system side at user data
Help lower checking user.
Accompanying drawing explanation
Illustrate in greater detail embodiments of the present invention with reference to the accompanying drawings.Shown in figure:
Fig. 1 is the schematic representation of automated network, and automated network has program example, transmission is led to
Road and assembly;
Fig. 2 is the schematic representation of automated network, and automated network has program example, assembly,
Wherein, with the help of storage medium, data are transmitted;And
Fig. 3 is the flow chart of the method carried out data transmission safely in automated network.
The element consistent with each other of the following drawings identifies with identical reference number.
Detailed description of the invention
Fig. 1 is the explanatory view of automated network 100, and automated network has controller 102
With assembly 104.This controller 102 has program example 106.Controller 102 and assembly 104 lead to
Cross any one transmission channel 108 to be connected." arbitrarily " here means that, this transmission channel
108 can also be unsafe transmission channel.According to the present invention for the data of safety are transmitted,
Transmission channel is unimportant.Controller 102 includes interface 109, controller 102 by this interface with
Transmission channel 108 is connected, and can transfer data to assembly by this transmission channel 108
104.Assembly 104 includes that interface 111, assembly 104 are connected with transmission channel 108 by this interface,
And data can be received by this transmission channel 108 from controller 102.
Program example has a private program example key 110.Additionally, this program example 106 is also
There is a common component key 112.Assembly 104 has a private component keys 116.Additionally,
This assembly also has public program example key (being not shown here).Public key is then for this
Two unit use.Additionally, each unit has respective private key.
Common component key in program example 106 is for being transferred to group by data from controller 102
Before part 104, data are encrypted.These data also utilize private program example key 110 to pass through
Program example 106 is signed.Signature utilizes the common program example in assembly 104 after the transmission of the data
Key verifies, and this program example 106 is verified as the transmitter of data.Deciphering to data
Private component keys 116 is utilized to realize.
Before carrying out data transmission, user data 118 is input by a user on controller 102.?
This, its log-on data such as can being made up of a user name and a password.These numbers of users
It is transferred to program example 106 according to 118.Program example 106 by user data 118 together with to carry out
The data of transmission are transferred to assembly 104.The data 120 of assembly 104 it are transferred to by program example 106
Then user data 118 and configuration data are included.Configuration data are used for passing through program example exactly
106 data controlling assembly 104.
Fig. 2 is the explanatory view of automated network 200, and automated network has controller 102
With assembly 104.This controller 102 also has program example 106.Program example 106 has individual
Program example key 110.Additionally, this program example also has public component keys.Assembly 104
There is private component keys 116.Additionally, this assembly 104 also has common program instance key (not
Illustrate).Assembly 104, this data are transmitted data to by controller 102 in automated network 200
Transmission is achieved by means of storage medium 202.It can be such as so-called multimedia storage card
(MMC).First, data are written on multimedia storage card 202.This such as can be by controlling
The processor 204 of device 102 is carried out, and this controller has the logical of this multimedia storage card 202 of entrance
Road, and can store data on this multimedia storage card 202.This multimedia storage card 202
It is then inserted in the card reader (not shown) of this assembly 104, thus the processor 206 of assembly 104
There is the path entering this multimedia storage card 202, and these data can be read.It is similar at figure
The method having been described above in 1 realizes the deciphering to data and verification.
Controller 102 also has the storage medium 208 calculating function reading, and this storage medium has finger
Order, when these instructions are such as performed by processor 204, instruction enables in controller enforcement
State process.
Assembly 104 has storage medium 210 equally, and this storage medium has when by processor 206
Assembly is made to implement the instruction of above-mentioned flow process during execution.
Fig. 3 is the flow chart of an embodiment of the invention.First, journey is passed through in step sl
Sequence example authoring system verifies user with the help of user data.It is thus ensured that this user has the right to make
Use program example.This such as utilizes the user name and password as user data to carry out.At second
In step S2, data are encrypted by program example and sign.These data include user data.?
In step S3, these data are transferred to assembly by transmission medium by program example, and in step
S4 deciphers in assembly.Program example is verified as sending out of data relative to assembly in step s 5
Send device, and in step 6, with the help of user data, verify user by assembly authoring system.
Reference number table
100 automated networks
102 controllers
104 assemblies
106 program examples
108 transmission channels
109 interfaces
110 private program example keys
111 interfaces
112 common component keys
116 private component keys
118 user data
120 data
200 automated networks
202 storage mediums
204 processors
206 processors
208 storage mediums
210 storage mediums
Claims (10)
1. for the method carried out data transmission safely in automated network (100), wherein,
Described automated network includes at least one program example (106) and at least one assembly
(104), wherein, described program example has program example authoring system, and described group
Part has assembly authoring system, and the method comprise the steps that
-verified (S1) with the help of user data by described program example authoring system
User, enables the user to use described program example;
-by described program example, data (120) are encrypted (S2) and signature,
Wherein, described data include user data;
-by transmission medium (108;202) data are transmitted (S3) from described program example
To described assembly;
-in described assembly, data are decrypted (S4);
-relative to described assembly, described program example is verified (S5);And
-with the help of described user data, verify (S6) by described assembly authoring system
Described user.
Method the most according to claim 1, wherein, described encryption is asymmetric encryption.
Method the most according to claim 2, wherein, described program example and described assembly are respectively
There is an asymmetric common program instance key and an asymmetric common component key
(112), and wherein said program example has a private program example key (110),
And described assembly has a private component keys (116), and wherein, described method includes
Following steps:
-to utilize described common component data key to carry out in described program example non-right
Claim encryption, and utilize described private program example data key to sign;
-by described encryption and the data signed be transferred to described group from described program example
Part;And
-utilize the data of encryption described in described private assembly double secret key to enter in described assembly
Row deciphering, and utilize described common program instance key that described program example is verified as number
According to transmitter.
4. according to method in any one of the preceding claims wherein, wherein, will be real by described program
The data of example encryption and signature store storage medium (202) and above and enter in described assembly
Read from described storage medium before row deciphering.
The most according to the method in any one of claims 1 to 3, wherein, described encryption signing
Data connect (108) by cable between described program example and described assembly and carry out
Transmission.
Method the most according to claim 5, wherein, realizes leading to by means of one of following agreement
Cross the connection of described cable to carry out data transmission: MPI, PROFIBUS, Ethernet, TCP-IP,
PROFINET。
Method the most according to claim 5, wherein, realizes leading to by means of one of following agreement
Cross wireless connections to carry out data transmission: Ethernet, TCP-IP, PROFINET.
Method the most according to claim 1, wherein, data include the key of symmetry, are used for adding
Thickly data are transferred to described assembly from described program example.
Method the most according to claim 3, wherein, data include another private component keys
With another common program instance key, it is used for cryptographically data being passed from described program example
It is passed to described assembly.
10. an automated network, including: controller (102) and assembly (104), wherein, described
Controller is designed for, by transmission medium, from described controller, data are transferred to assembly, its
In, described controller includes program example, and wherein, described program example has program
Example authoring system, described controller has:
-device (208), is used for by described program example authoring system at user data
Verify user under help, enable the user to use described program example;
-device (110;112;208), for data being entered by described program example
Row encryption and signature, wherein, these data include described user data;With
-device (109), for being transmitted data by transmission medium;
Wherein, described assembly is designed for receiving the data of transmission, and wherein, described assembly has
Assembly authoring system, described assembly is had to have:
-device (111), is used for receiving data;
-device (116;210), for data are decrypted;
-device (114;210), being used for controller verification is the transmitter of data;With
-device (210), for by described assembly authoring system in the help of user data
Lower checking user,
Wherein, described automated network is designed to carry out appointing according in claim 1 to 9
One described method.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP10007119.0A EP2407843B1 (en) | 2010-07-09 | 2010-07-09 | Secure data transfer in an automation network |
EP10007119 | 2010-07-09 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102340499A CN102340499A (en) | 2012-02-01 |
CN102340499B true CN102340499B (en) | 2016-12-14 |
Family
ID=
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1403749A1 (en) * | 2002-09-30 | 2004-03-31 | Siemens Aktiengesellschaft | Automation system and method for its operation |
EP2159653A1 (en) * | 2008-09-02 | 2010-03-03 | Siemens Aktiengesellschaft | Method for assigning access authorisation to a computer-based object in an automation system, computer program and automation system |
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1403749A1 (en) * | 2002-09-30 | 2004-03-31 | Siemens Aktiengesellschaft | Automation system and method for its operation |
EP2159653A1 (en) * | 2008-09-02 | 2010-03-03 | Siemens Aktiengesellschaft | Method for assigning access authorisation to a computer-based object in an automation system, computer program and automation system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11722495B2 (en) | Operator action authentication in an industrial control system | |
US11055246B2 (en) | Input-output module with multi-channel switching capability | |
JP7029220B2 (en) | Input / output module with multi-channel switching capability | |
RU2690887C2 (en) | Modular safety control device | |
US9510195B2 (en) | Secured transactions in internet of things embedded systems networks | |
CN105278327B (en) | Industrial control system redundant communication/control module authentication | |
CN1333310C (en) | Process automation system and processing appliance for such process automation system | |
EP3823425B1 (en) | Operator action authentication in an industrial control system | |
US20180375842A1 (en) | Methods and security control apparatuses for transmitting and receiving cryptographically protected network packets | |
US8832446B2 (en) | Secure data transfer in an automation network | |
CN103376800A (en) | System and method for securing controllers | |
CN106888452A (en) | The wireless encryption transceiver and method of data are transmitted wirelessly from computer at least one field apparatus | |
CN102792629A (en) | Method and device for providing at least one secure cryptographic key | |
CN108989279B (en) | Method for secure communication with a field measurement device and corresponding field measurement device | |
JP2022120015A (en) | Image capture device for secure industrial control system | |
EP3577873B1 (en) | Safety unit, in particular for an iot device and method for executing one or more applications for secure data exchange with one or more servers providing web services | |
CN105516210A (en) | System and method for terminal security access authentication | |
CN103078874A (en) | Remote-control intelligent gas meter embedded with information safety management module | |
CN108243186A (en) | The system and method for remote operation programmable logic controller (PLC) | |
WO2020158247A1 (en) | Safety system and maintenance method | |
CN102340499B (en) | The data transmission of the safety in automated network | |
Walz et al. | PROFINET security: A look on selected concepts for secure communication in the automation domain | |
CA2920133C (en) | Input/output module with multi-channel switching capability | |
Tedeschi et al. | IoT security hardware framework for remote maintenance of legacy machine tools | |
JP2020120367A (en) | Safety system and maintenance method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |