CN102340499B - The data transmission of the safety in automated network - Google Patents

The data transmission of the safety in automated network Download PDF

Info

Publication number
CN102340499B
CN102340499B CN201110191675.5A CN201110191675A CN102340499B CN 102340499 B CN102340499 B CN 102340499B CN 201110191675 A CN201110191675 A CN 201110191675A CN 102340499 B CN102340499 B CN 102340499B
Authority
CN
China
Prior art keywords
data
assembly
program example
user
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110191675.5A
Other languages
Chinese (zh)
Other versions
CN102340499A (en
Inventor
约阿希姆·科佩尔斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens AG
Original Assignee
Siemens AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from EP10007119.0A external-priority patent/EP2407843B1/en
Application filed by Siemens AG filed Critical Siemens AG
Publication of CN102340499A publication Critical patent/CN102340499A/en
Application granted granted Critical
Publication of CN102340499B publication Critical patent/CN102340499B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention relates to a kind of for the method carried out data transmission safely in automated network (100), wherein, the method comprises the following steps: verify (S1) user with the help of user data by program example authoring system, enables the user to use this program example;By program example, data (120) being encrypted (S2) and signature, wherein, these data include user data;By transmission medium (108;202) data are transmitted (S3) to assembly from program example;In assembly data are decrypted (S4);Relative to assembly, program example is verified (S5);And with the help of user data, verify (S6) user by assembly authoring system.

Description

The data transmission of the safety in automated network
Technical field
The present invention relates to a kind of industrial automation network, a kind of in industrial automation network The data transmission of safety.
Background technology
Industrial automation network is generally made up of at least one controller and at least one assembly.Controller For assembly is programmed, and include program example (Programminstanz) for this.Assembly It can be such as the control system of machine of machine in production line.Automated network for voluntarily, And in the case of unmanned cooperation, make industrial machine or equipment operation.
The data of program example so must be transferred to assembly, thus controller can be entered assembly Row programming.These data are referred to as configuring data.If allowing configuration data be transferred to by program example Be not stolen during assembly and be protected from tampering, then generally use such as HTTPS or The such secure transfer protocol of person IPSEC.Certain peace it must is fulfilled for for these host-host protocols Full requirement, these safety requirements can not be met by the most each assembly of each automated network.
Summary of the invention
It is an object of the invention to, propose a kind of to carry out data transmission safely in automated network The method improved.It is further an object that, a kind of improvement in automated network is proposed Controller and the assembly of a kind of improvement, and improve in order to this assembly and this controller provide Storage medium.
The purpose of the present invention is utilized respectively and is achieved according to the feature described in independent claims.This Bright embodiment is given in the dependent claims.
According to the invention it is proposed that a kind of side carried out data transmission safely in automated network Method.Automated network includes at least one program example and at least one assembly.The safety of data transmission Property is not dependent on used transmission method and is guaranteed.
Automated network such as can be designed as industrial automation network.This industrial automation network example As can design, set and/or be provided for control and/or regulation industrial equipment (such as produce equipment, Transmission equipment etc.), machine and/or instrument.Especially, automated network industrial automation in other words Network can be in order at least (such as control between the assembly that take part in control task and/or regulation task Between unit processed and equipment to be controlled and/or machine) communicate and there is real-time communication protocol (such as Profinet (automatization's bus), Profibus (fieldbus), Real-Time-Ethernet (real-time ethernet)).Transmitted data safely to be achieved similarly by storage medium.
Additionally, in automated network in other words industrial automation network, except real-time communication protocol it Outward but also can also design at least another communication protocol (it such as need not real-time capacity), example As for one or more control units being monitored in automated network, set, reprogramming And/or Reparameterization.
Automated network such as can include wired communications component and/or wireless communications component.This Outward, automated network can include at least one automation equipment.
Automation equipment can be such as computer, PC and/or have control task and control energy in other words The controller of power.Especially, automation equipment can be such as industrial automation arrangement, and it such as may be used To design especially, set and/or to be provided for control and/or regulation industrial equipment.Especially, this Plant automation equipment industrial automation arrangement in other words and can have real-time capacity, say, that can be real-time Be controlled or regulate.To this end, automation equipment industrial automation arrangement in other words is the most permissible Including real time operating system, and/or the most additionally support the communication protocols having real-time capacity for communication View (such as Profinet, Profibus, Real-Time-Ethernet).
Automated network includes multiple sensor and executor.These executors and sensor are by least one Individual control device is controlled.Executor, sensor and at least one control device exchange number each other According to.A kind of automation protocol is used in order to exchange data.At least one controls device and so controls to perform Device, sensor and data exchange, i.e. machine-building process is gone on, in this process Such as produce a kind of product.
Industrial automation arrangement can be such as Programmable Logic Controller, the module of Programmable Logic Controller or A part, the Programmable Logic Controller being integrated in computer or PC and corresponding field apparatus, Sensor and/or executor, input equipment and/or outut device or be used for being connected to PLC technology Similar devices on device, or include these equipment.
Automation protocol in meaning of the present invention is interpreted as various types of according to this specification Arrange, be suitable for and/or set the agreement for communicating with automation equipment.These automation protocols Can be such as field bus protocol (such as deferring to IEC 61158/EN50170 standard), Profi-Bus-DP agreement, Profi-Bus-PA agreement, Profi-Net agreement, Profi-Net-IO agreement, root According to the agreement of AS-Interface bus system, according to the agreement of IO-Link, KNX agreement, according to many The agreement of some communication interface (MPI), for the agreement of point-to-point bridge joint (PtP), defers to S7 communication The agreement (it is such as arranged and communicating of setting the Programmable Logic Controller for Siemens Company) of rule, Or also industrial ethernet protocol or real time ethernet protocol or other for and automatization The particular protocol that equipment communicates.Automation protocol in the meaning of this specification can also be set It is set to the combination in any of aforementioned protocols.
Program example has program example authoring system, and assembly has assembly authoring system.This Method comprises the following steps.First have to the user of proving program example.This is by program example mandate system System is carried out with the help of user data.User data can be such as username and password, or also That have been known including other, for the method by program example authoring system checking user.
Program example authoring system is the authoring system of program example.This program example authoring system is the most just User can be verified on the one hand with the help of user data, and on the other hand to different use The right that family distribution is different.It should be noted that it is equally possible that, all user already authenticated are It is granted whole rights.
Assembly authoring system is the authoring system of assembly.This assembly authoring system is the most on the one hand With the help of user data, verify user, and distribute different to different users on the other hand Right.At this it is also noted that it is equally possible that, all user already authenticated are awarded Whole right.
Data to be transmitted are encrypted by this program example and sign.Such as, program example is this Including dll file (dynamic link library file) or the executable file of signature of signature, they Therefore it is protected from tampering.Preferably, the program example for being encrypted data and sign is joined It is equipped with unsymmetrical key.These data include user data equally.User data is just together with to pass Defeated configuration data encryption ground and be transferred to assembly with signing.
In assembly, these data are decrypted.And then, relative to assembly, program example is tested Card.This such as can be carried out in the following manner, i.e. utilizes the asymmetric private key of program example Data are signed, and this signature is tested by the public keys of program example in assembly Card.Check the signature of data the most in assembly.Thereby confirm that and will not occur data are distorted, And assembly only receives data from a program example there having the right to control this assembly.By profit Sign with the private key of program example, it is not necessary to carry out data biography from assembly to program example Defeated, these are different from the most so-called challenge-response-method.Described program example is verified, and not Data will be transferred to program example from assembly.
The data of these deciphering include user data.User passes through group with the help of user data at this Part authoring system is verified.Additionally, user can be authorized to transfer data to assembly.The most just relate at this And a follow-up licensing process.If it find that this user haves no right to carry out data transmission, then data will It is dropped.Otherwise, data are used for controlling assembly.The step for ensure that on program example register User have the right to assembly transmit data.Also it is impossible to data are distorted, and in assembly Only those data being transferred to assembly by the user of the mandate of program example are processed.Delivering path It is wholly immaterial at this.It can also be i.e. a unsafe transmission channel.By data are carried out Encrypting, sign data and by user data transmission to assembly, these data are protected from Distort to any, and ensure that with being not dependent on delivering path these data can not be trapped or It is tampered.
The special safety carried out data transmission according to the embodiment of the present invention is, user data It is transferred to assembly together with configuration data by program example encryptedly, and in the assembly user is entered Row checking.Except in program example, user is verified and sign and cryptographically carry out data Outside transmission, also drawing the automated network that protection data are not tampered with, this automated network is not Depend on that the safety of transmission channel provides safe data to transmit.Embodiment party according to the present invention Formula, the encryption carrying out data is asymmetric encryption.
According to the embodiment of the present invention, program example and assembly are respectively provided with an asymmetric public journey Sequence instance key and an asymmetric common component key.It is real that program example also has a private program Example key, and assembly has a private component keys.Therefore not only for program example but also There is double secret key for assembly, it is used for signing and encrypting.One double secret key is respectively by public affairs Key and a private key composition altogether.
Data utilize common component key to be encrypted in program example, and utilize private program real Example key is signed.It should be noted that these data the most also include user data.Real by program Example be transferred to assembly, encrypt and the data signed utilize private component keys to solve in assembly Close.Common program instance key is utilized to realize being verified as program example the transmitter of data.By right Solve ciphertext data and be estimated realizing the checking of the user to program example.
According to the embodiment of the present invention, encrypted by program example and the data storage signed On medium.Before being decrypted, the data in assembly are first read from storage medium.Storage is situated between Matter can be such as optical storage medium, magnetic-based storage media and/or digital storage media.It equally may be used To be rotary storage medium.Storage medium can be the most such as USB flash disk, storage card or hard disk. Because data are encrypted and sign, and user data is stored the most together, so data are being deposited Store to have many safety on storage media the most unimportant.These data be adequately protected not by Distort or unauthorized do not read.
Although these data are transmitted not by automated network, this embodiment similarly provides one Plant the method for carrying out data transmission safely in automated network.Data transmission approach with from Dynamicization network is unrelated.
According to the embodiment of the present invention, encrypt and the data signed by program example and assembly it Between cable connect be transmitted.Can also be that unsafe cable connects at this, this is because these Data by user data is encrypted, signs and common transport and ensure that fully not by Distort or be read in the case of undelegated.
According to the embodiment of the present invention, by one of less than one agreement realize by cable connect into Row data are transmitted: MPI, Profibus, Ethernet, TCP/IP, Profinet, WLAN.
According to the embodiment of the present invention, these data include the key of symmetry, for cryptographically by number It is transferred to assembly according to from program example.Symmetrical key may be used for later data transmission.When this example In this way one deterministic wait time automated network time, use symmetric key can be favourable.? It is essential that accurately at certain time point determined by assembly logarithm in such a automated network According to processing.In this case, asymmetricly encrypting and decrypting data may continue the most long. In this case, then symmetric key together with ciphering user data ground and is transferred to assembly with signing, And may be used for the transmission of ensuing data.
According to the embodiment of the present invention, these data include another private component keys, are used for adding Thickly data are transferred to assembly by program example.Another private component keys instead of before private People's component keys, has thereby further ensured that the data transmission of safety.For security reasons, it should fixed Shi Genghuan private key.
On the other hand, the present invention relates to a kind of controller in automated network.This controller Including program example, and this program example has program example authoring system.This controller also includes: Device, for verifying user with the help of user data by program example authoring system, makes user This program example can be used;Device, for by program example data being encrypted and signing, Wherein, these data include user data;And device, for data being transmitted by transmission medium.
On the other hand, the present invention relates to a kind of assembly in automated network.This assembly has group Part authoring system.This assembly also has: device, is used for receiving data;Device, for entering data Row deciphering;Device, being used for controller verification is the transmitter of data;And device, for by group Part authoring system verifies user with the help of user data, to transfer data to assembly.
In yet another aspect, the present invention relates to a kind of storage medium calculating function reading, this storage is situated between Matter has instruction, and this instruction can perform in the controller in automated network.This controller includes journey Sequence example, and this program example has program example authoring system.Control in automated network When performing these instructions in device, these instructions make controller implement below scheme.First, journey is passed through Sequence example authoring system verifies user with the help of user data.Then, by this program example it is Data encryption is also signed, and wherein, these data include user data.These data are followed by biography Defeated medium transmits,
In yet another aspect, the invention still further relates to a kind of storage medium calculating function reading, storage is situated between Matter has instruction, and this instruction can perform in the assembly in automated network.This assembly has assembly and awards Power system.When performing instruction, these instructions make assembly implement below scheme.First, receive also Solve ciphertext data.And then, access control device, and pass through the assembly authoring system side at user data Help lower checking user.
Accompanying drawing explanation
Illustrate in greater detail embodiments of the present invention with reference to the accompanying drawings.Shown in figure:
Fig. 1 is the schematic representation of automated network, and automated network has program example, transmission is led to Road and assembly;
Fig. 2 is the schematic representation of automated network, and automated network has program example, assembly, Wherein, with the help of storage medium, data are transmitted;And
Fig. 3 is the flow chart of the method carried out data transmission safely in automated network.
The element consistent with each other of the following drawings identifies with identical reference number.
Detailed description of the invention
Fig. 1 is the explanatory view of automated network 100, and automated network has controller 102 With assembly 104.This controller 102 has program example 106.Controller 102 and assembly 104 lead to Cross any one transmission channel 108 to be connected." arbitrarily " here means that, this transmission channel 108 can also be unsafe transmission channel.According to the present invention for the data of safety are transmitted, Transmission channel is unimportant.Controller 102 includes interface 109, controller 102 by this interface with Transmission channel 108 is connected, and can transfer data to assembly by this transmission channel 108 104.Assembly 104 includes that interface 111, assembly 104 are connected with transmission channel 108 by this interface, And data can be received by this transmission channel 108 from controller 102.
Program example has a private program example key 110.Additionally, this program example 106 is also There is a common component key 112.Assembly 104 has a private component keys 116.Additionally, This assembly also has public program example key (being not shown here).Public key is then for this Two unit use.Additionally, each unit has respective private key.
Common component key in program example 106 is for being transferred to group by data from controller 102 Before part 104, data are encrypted.These data also utilize private program example key 110 to pass through Program example 106 is signed.Signature utilizes the common program example in assembly 104 after the transmission of the data Key verifies, and this program example 106 is verified as the transmitter of data.Deciphering to data Private component keys 116 is utilized to realize.
Before carrying out data transmission, user data 118 is input by a user on controller 102.? This, its log-on data such as can being made up of a user name and a password.These numbers of users It is transferred to program example 106 according to 118.Program example 106 by user data 118 together with to carry out The data of transmission are transferred to assembly 104.The data 120 of assembly 104 it are transferred to by program example 106 Then user data 118 and configuration data are included.Configuration data are used for passing through program example exactly 106 data controlling assembly 104.
Fig. 2 is the explanatory view of automated network 200, and automated network has controller 102 With assembly 104.This controller 102 also has program example 106.Program example 106 has individual Program example key 110.Additionally, this program example also has public component keys.Assembly 104 There is private component keys 116.Additionally, this assembly 104 also has common program instance key (not Illustrate).Assembly 104, this data are transmitted data to by controller 102 in automated network 200 Transmission is achieved by means of storage medium 202.It can be such as so-called multimedia storage card (MMC).First, data are written on multimedia storage card 202.This such as can be by controlling The processor 204 of device 102 is carried out, and this controller has the logical of this multimedia storage card 202 of entrance Road, and can store data on this multimedia storage card 202.This multimedia storage card 202 It is then inserted in the card reader (not shown) of this assembly 104, thus the processor 206 of assembly 104 There is the path entering this multimedia storage card 202, and these data can be read.It is similar at figure The method having been described above in 1 realizes the deciphering to data and verification.
Controller 102 also has the storage medium 208 calculating function reading, and this storage medium has finger Order, when these instructions are such as performed by processor 204, instruction enables in controller enforcement State process.
Assembly 104 has storage medium 210 equally, and this storage medium has when by processor 206 Assembly is made to implement the instruction of above-mentioned flow process during execution.
Fig. 3 is the flow chart of an embodiment of the invention.First, journey is passed through in step sl Sequence example authoring system verifies user with the help of user data.It is thus ensured that this user has the right to make Use program example.This such as utilizes the user name and password as user data to carry out.At second In step S2, data are encrypted by program example and sign.These data include user data.? In step S3, these data are transferred to assembly by transmission medium by program example, and in step S4 deciphers in assembly.Program example is verified as sending out of data relative to assembly in step s 5 Send device, and in step 6, with the help of user data, verify user by assembly authoring system.
Reference number table
100 automated networks
102 controllers
104 assemblies
106 program examples
108 transmission channels
109 interfaces
110 private program example keys
111 interfaces
112 common component keys
116 private component keys
118 user data
120 data
200 automated networks
202 storage mediums
204 processors
206 processors
208 storage mediums
210 storage mediums

Claims (10)

1. for the method carried out data transmission safely in automated network (100), wherein, Described automated network includes at least one program example (106) and at least one assembly (104), wherein, described program example has program example authoring system, and described group Part has assembly authoring system, and the method comprise the steps that
-verified (S1) with the help of user data by described program example authoring system User, enables the user to use described program example;
-by described program example, data (120) are encrypted (S2) and signature, Wherein, described data include user data;
-by transmission medium (108;202) data are transmitted (S3) from described program example To described assembly;
-in described assembly, data are decrypted (S4);
-relative to described assembly, described program example is verified (S5);And
-with the help of described user data, verify (S6) by described assembly authoring system Described user.
Method the most according to claim 1, wherein, described encryption is asymmetric encryption.
Method the most according to claim 2, wherein, described program example and described assembly are respectively There is an asymmetric common program instance key and an asymmetric common component key (112), and wherein said program example has a private program example key (110), And described assembly has a private component keys (116), and wherein, described method includes Following steps:
-to utilize described common component data key to carry out in described program example non-right Claim encryption, and utilize described private program example data key to sign;
-by described encryption and the data signed be transferred to described group from described program example Part;And
-utilize the data of encryption described in described private assembly double secret key to enter in described assembly Row deciphering, and utilize described common program instance key that described program example is verified as number According to transmitter.
4. according to method in any one of the preceding claims wherein, wherein, will be real by described program The data of example encryption and signature store storage medium (202) and above and enter in described assembly Read from described storage medium before row deciphering.
The most according to the method in any one of claims 1 to 3, wherein, described encryption signing Data connect (108) by cable between described program example and described assembly and carry out Transmission.
Method the most according to claim 5, wherein, realizes leading to by means of one of following agreement Cross the connection of described cable to carry out data transmission: MPI, PROFIBUS, Ethernet, TCP-IP, PROFINET。
Method the most according to claim 5, wherein, realizes leading to by means of one of following agreement Cross wireless connections to carry out data transmission: Ethernet, TCP-IP, PROFINET.
Method the most according to claim 1, wherein, data include the key of symmetry, are used for adding Thickly data are transferred to described assembly from described program example.
Method the most according to claim 3, wherein, data include another private component keys With another common program instance key, it is used for cryptographically data being passed from described program example It is passed to described assembly.
10. an automated network, including: controller (102) and assembly (104), wherein, described Controller is designed for, by transmission medium, from described controller, data are transferred to assembly, its In, described controller includes program example, and wherein, described program example has program Example authoring system, described controller has:
-device (208), is used for by described program example authoring system at user data Verify user under help, enable the user to use described program example;
-device (110;112;208), for data being entered by described program example Row encryption and signature, wherein, these data include described user data;With
-device (109), for being transmitted data by transmission medium;
Wherein, described assembly is designed for receiving the data of transmission, and wherein, described assembly has Assembly authoring system, described assembly is had to have:
-device (111), is used for receiving data;
-device (116;210), for data are decrypted;
-device (114;210), being used for controller verification is the transmitter of data;With
-device (210), for by described assembly authoring system in the help of user data Lower checking user,
Wherein, described automated network is designed to carry out appointing according in claim 1 to 9 One described method.
CN201110191675.5A 2010-07-09 2011-07-08 The data transmission of the safety in automated network Active CN102340499B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP10007119.0A EP2407843B1 (en) 2010-07-09 2010-07-09 Secure data transfer in an automation network
EP10007119 2010-07-09

Publications (2)

Publication Number Publication Date
CN102340499A CN102340499A (en) 2012-02-01
CN102340499B true CN102340499B (en) 2016-12-14

Family

ID=

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1403749A1 (en) * 2002-09-30 2004-03-31 Siemens Aktiengesellschaft Automation system and method for its operation
EP2159653A1 (en) * 2008-09-02 2010-03-03 Siemens Aktiengesellschaft Method for assigning access authorisation to a computer-based object in an automation system, computer program and automation system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1403749A1 (en) * 2002-09-30 2004-03-31 Siemens Aktiengesellschaft Automation system and method for its operation
EP2159653A1 (en) * 2008-09-02 2010-03-03 Siemens Aktiengesellschaft Method for assigning access authorisation to a computer-based object in an automation system, computer program and automation system

Similar Documents

Publication Publication Date Title
US11722495B2 (en) Operator action authentication in an industrial control system
US11055246B2 (en) Input-output module with multi-channel switching capability
JP7029220B2 (en) Input / output module with multi-channel switching capability
RU2690887C2 (en) Modular safety control device
US9510195B2 (en) Secured transactions in internet of things embedded systems networks
CN105278327B (en) Industrial control system redundant communication/control module authentication
CN1333310C (en) Process automation system and processing appliance for such process automation system
EP3823425B1 (en) Operator action authentication in an industrial control system
US20180375842A1 (en) Methods and security control apparatuses for transmitting and receiving cryptographically protected network packets
US8832446B2 (en) Secure data transfer in an automation network
CN103376800A (en) System and method for securing controllers
CN106888452A (en) The wireless encryption transceiver and method of data are transmitted wirelessly from computer at least one field apparatus
CN102792629A (en) Method and device for providing at least one secure cryptographic key
CN108989279B (en) Method for secure communication with a field measurement device and corresponding field measurement device
JP2022120015A (en) Image capture device for secure industrial control system
EP3577873B1 (en) Safety unit, in particular for an iot device and method for executing one or more applications for secure data exchange with one or more servers providing web services
CN105516210A (en) System and method for terminal security access authentication
CN103078874A (en) Remote-control intelligent gas meter embedded with information safety management module
CN108243186A (en) The system and method for remote operation programmable logic controller (PLC)
WO2020158247A1 (en) Safety system and maintenance method
CN102340499B (en) The data transmission of the safety in automated network
Walz et al. PROFINET security: A look on selected concepts for secure communication in the automation domain
CA2920133C (en) Input/output module with multi-channel switching capability
Tedeschi et al. IoT security hardware framework for remote maintenance of legacy machine tools
JP2020120367A (en) Safety system and maintenance method

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant