EP3877818A1 - System, überprüfungsmodul, servicemodul und verfahren zur überprüfung der konfiguration mindestens einer produktionseinheit basierend auf blockchain-technologie - Google Patents
System, überprüfungsmodul, servicemodul und verfahren zur überprüfung der konfiguration mindestens einer produktionseinheit basierend auf blockchain-technologieInfo
- Publication number
- EP3877818A1 EP3877818A1 EP19801281.7A EP19801281A EP3877818A1 EP 3877818 A1 EP3877818 A1 EP 3877818A1 EP 19801281 A EP19801281 A EP 19801281A EP 3877818 A1 EP3877818 A1 EP 3877818A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- module
- information
- production units
- production
- service module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004519 manufacturing process Methods 0.000 title claims abstract description 269
- 238000000034 method Methods 0.000 title claims description 49
- 238000005516 engineering process Methods 0.000 title description 8
- 238000004590 computer program Methods 0.000 claims description 22
- 238000012795 verification Methods 0.000 claims description 19
- 238000004891 communication Methods 0.000 claims description 9
- 230000005540 biological transmission Effects 0.000 claims description 8
- 230000001419 dependent effect Effects 0.000 claims 1
- 238000012360 testing method Methods 0.000 description 13
- 238000012552 review Methods 0.000 description 12
- 238000012502 risk assessment Methods 0.000 description 5
- 238000003860 storage Methods 0.000 description 5
- 238000011960 computer-aided design Methods 0.000 description 2
- 238000011156 evaluation Methods 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000011511 automated evaluation Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000004080 punching Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/418—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/418—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
- G05B19/41845—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by system universality, reconfigurability, modularity
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/418—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
- G05B19/4183—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by data acquisition, e.g. workpiece identification
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/418—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
- G05B19/4185—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by the network communication
- G05B19/4186—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by the network communication by protocol, e.g. MAP, TOP
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B23/00—Testing or monitoring of control systems or parts thereof
- G05B23/02—Electric testing or monitoring
- G05B23/0205—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
- G05B23/0208—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterized by the configuration of the monitoring system
- G05B23/0213—Modular or universal configuration of the monitoring system, e.g. monitoring system having modules that may be combined to build monitoring program; monitoring system that can be applied to legacy systems; adaptable monitoring system; using different communication protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Definitions
- the application relates to remote certification and, in particular, a system, a verification module, a service module and a method for supporting a remote
- Certification services for an infrastructure of production units, e.g. of machines in a factory are becoming increasingly important.
- Production units are being reconfigured more and more often, driven by the requirements of Industry 4.0.
- the change or the reconfiguration of the technical process or the use of the production unit in a different context require a new check of the machine safety. This inspection is carried out today by experts. Due to the travel times of the experts, the process becomes costly and non-dynamic.
- a system according to claim 1, a method according to claim 18, a computer program according to claim 19, a checking module according to claim 20, a method according to claim 31, a computer program according to claim 32, a service module according to claim 33, a method according to claim 39 and a computer program according to claim 40 are provided.
- a system comprising at least two production units that work together in a production process and a verification module.
- Each production unit of the at least two production units includes a service module.
- the service module of each production unit of the at least two production units is designed to transmit first information about one or more features of the production unit to the checking module.
- the checking module is designed to transmit to the service module at least one of the at least two production units a second piece of information, which indicates whether the at least two production units have a permissible configuration or whether the at least two production units have no permissible configuration.
- a method is also provided, which comprises:
- the checking module transmits second information to the service module of at least one of the at least two production units, the second information designating whether the at least two production units have a permissible configuration or whether the at least two production units have no permissible configuration.
- a verification module is also provided.
- the checking module is designed to receive first information from a service module of each production unit of at least two production units, the first information that the checking module receives from the service module of each production unit of the at least two production units being information about one or more features of the production unit. Furthermore, the checking module is designed to transmit to the service module at least one of the at least two production units a second piece of information, which indicates whether the at least two production units have a permissible configuration or whether the at least two production units have no permissible configuration.
- a method which comprises:
- the checking module transmits a second piece of information to the service module of at least one of the at least two production units, the second item of information indicating whether the at least two production units are one have permissible configuration or whether the at least two production units have no permissible configuration.
- a service module for a production unit of at least two production units is provided.
- the service module is designed to transmit first information about one or more features of the production unit of the service module to the checking module.
- the service module is designed to receive a second piece of information from a checking module, which indicates whether the at least two production units have a permissible configuration or whether the at least two production units have no permissible configuration.
- a method which comprises:
- the service module receives a second piece of information from the checking module, the second piece of information designating whether the at least two production units have a permissible configuration or whether the at least two production units have no permissible configuration.
- Embodiments of the invention implement a remote certification service, e.g. on blockchain, which enables the security check and release of a security-critical process via the Internet.
- the fulfillment / compliance with machine safety in the sense of the MRL (machine directive), as well as other applicable standards and laws, is automatically checked from a distance. This can e.g. in some embodiments, done remotely through a risk assessment.
- this manual procedure is automated (but at least partially automated) and the behavior is made dynamic. For example, the use of provided security-related information is started. Formation and analysis through a verification algorithm and certification of the change. This process is documented automatically in embodiments, for example, and reliable "for example, legally secure” via a suitable block chain technology and settled.
- FIG. 1 shows a system according to an embodiment.
- FIG. 2 shows a checking module according to an embodiment.
- FIG. 3 shows a service module according to an embodiment.
- Fig. 4 shows a production unit according to an embodiment "the a
- the system comprises at least two production units 111, 112, which cooperate in a production process, and a checking module 130.
- Each production unit of the at least two production units 11, 112 comprises a service module 121 » 122.
- the service module 121, 122 in each production unit of the at least two production units 11 1 "112 is adapted to transmit first information about one or more characteristics of the production unit to the testing module 130th
- the verification module 130 is formed, which designates to service module 121, 122 at least one of the at least two production units 111, 112 to transmit a second information "whether the at least two production units 111, 112, a have permissible configuration or whether the at least two production units 11 1, 112 have no permissible configuration.
- the review module 130 may e.g. identify a test algorithm that depends on the first information about the one or more
- two or more of the at least two production units 111, 112 e.g. are spaced from each other.
- the checking module 130 of at least one of the at least two production units 111, 112 e.g. be spaced.
- the review module 130 may be configured, e.g. to the service module 121, 122 of each of the at least two production units 111, 112 to transmit the second information which indicates whether the at least two production units 11, 112 have the permissible configuration or whether the at least two production units 11, 112 have no permissible configuration .
- the service module 121, 122 of each production unit of the at least two production units 111, 112 e.g. be configured to insert first data into a blockchain, which depend on the first information about the one or more features of the production unit that are transmitted to the checking module 130.
- the first data that the service module 121, 122 of each production unit of the at least two production units 11, 112 inserts into the blockchain e.g. be the first information about the one or more features of the production unit that the service module 121, 122 of the production unit transmits to the checking module 130.
- the service module 121, 122 of each production unit of the at least two production units 111, 112 can be designed to transmit the first information about one or more features of the production unit to the checking module 130, for example, by the service module 121, 122 of the production unit providing the first Inserts information into the blockchain.
- the first data that the service module 121, 122 of each production unit of the at least two production units 111, 112 inserts into the blockchain can be, for example, at least a first hash value that depends on the first information about the one or more features of the production unit, which the production unit service module 121, 122 transmits to the checking module 130.
- the service module 121, 122 of each production unit of the at least two production units 11 1, 112 can be designed, for example, to additionally transmit the first information about one or more features of the production unit to the checking module 130 without using the blockchain.
- the review module 130 may e.g. be configured to insert second data into a blockchain, which depends on the second information, which indicates whether the at least two production units 111, 112 have the permissible configuration or whether the at least two production units 111, 112 have no permissible configuration.
- the second data that the verification module 130 inserts into the blockchain e.g. be the second piece of information, which indicates whether the at least two production units 111, 112 have the permissible configuration or whether the at least two production units 11, 112 have no permissible configuration.
- the review module 130 may e.g. be formed, the second information, which denotes whether the at least two production units 11 1, 1 12 have a permissible configuration or whether the at least two production units 11 1, 112 have no permissible configuration, to the service module 121, 122 of the at least one of the to transmit to at least two production units 111, 112 that the checking module 130 inserts this second information into the blockchain.
- the second data that the verification module 130 inserts into the blockchain can be, for example, at least a second hash value that depends on the second information that indicates whether the at least two production units 111, 112 have a permissible configuration or whether the at least one two production units 11, 112 have no permissible configuration.
- the checking module 130 can be designed, for example, to provide the second piece of information, which indicates whether the at least two production units 11 1, 112 have a permissible configuration or whether the at least two production units 111, 112 have no permissible configuration. sen, additionally to the service module 121, 122 of the at least one of the at least two production units 11, 112 without using the blockchain.
- the review module 130 may e.g. be trained to insert third data into the blockchain, which link the second data and the first data.
- the review module 130 may e.g. be trained to insert fourth data into the blockchain that are used for billing.
- the second information that the checking module 130 transmits which indicates whether the at least two production units 11 1, 112 have the permissible configuration or whether the at least two production units 111, 112 have no permissible configuration, in the event that the at least two production units 111, 112 have the permissible configuration, for example represent a digital certificate, e.g. indicates that the allowed configuration is certified.
- the service module 121, 122 of the at least one of the at least two production units 111, 112 and / or the checking module 130 have an interface which is implemented by means of an open platform communication unified architecture.
- FIG. 2 shows a verification module 130 according to an embodiment.
- the checking module 130 is designed to receive first information from a service module 121, 122 of each production unit from at least two production units 111, 112, the first information that the checking module 130 from the service module 121, 122 of each production unit of the at least two production units 111, 112 receives information about one or more characteristics of the production unit.
- the checking module 130 is designed to transmit to the service module 121, 122 at least one of the at least two production units 111, 112 a second item of information, which indicates whether the at least two production units 111, 112 have a permissible configuration or whether the at least two production units 111 , 1 12 have no permissible configuration.
- the checking module 130 can, for example, have a checking algorithm that determines, depending on the first information about the one or more features that are transmitted from the service module 121, 122 of the at least two production units 111, 112 to the checking module 130, whether the at least one two production units 111, 1 12 have the permissible configuration.
- the review module 130 may e.g. be spaced from at least one of the at least two production units 1 11, 1 12.
- the review module 130 may e.g. be configured to transmit to the service module 121, 122 of each of the at least two production units 111, 1 12 the second information which indicates whether the at least two production units 1 1 1, 112 have the permissible configuration or whether the at least two production units 1 11, 112 do not have a valid configuration.
- the review module 130 may e.g. be configured to insert second data into a blockchain, which depend on the second information, which indicates whether the at least two production units 1 1 1, 112 have the permissible configuration or whether the at least two production units 111, 112 have no permissible configuration.
- the second data that the verification module 130 inserts into the blockchain e.g. be the second piece of information, which indicates whether the at least two production units 111, 112 have the permissible configuration or whether the at least two production units 1 1 1, 112 have no permissible configuration.
- the review module 130 may e.g. be formed, the second information, which designates whether the at least two production units 11, 112 have a permissible configuration or whether the at least two production units 11, 112 have no permissible configuration, thereby to the service module 121, 122 of the at least one of the to transmit to at least two production units 111, 112 that the checking module 130 inserts this second information into the blockchain.
- the second data that the checking module 130 inserts into the blockchain can be, for example, at least a second hash value that depends on the second information that indicates whether the at least two production units 11 1, 1 12 have a permissible configuration or whether the at least two production units heal 1 1 1, 1 12 have no permissible configuration.
- the checking module 130 can be designed, for example, the second piece of information, which denotes whether the at least two production units 1 1 1, 1 12 have a permissible configuration or whether the at least two production units 1 1 1, 112 have no permissible configuration , additionally to the service module 121, 122 of the at least one of the at least two production units 111, 112 without using the Biockchain.
- the review module 130 may e.g. be trained to insert fourth data into the Biockchain that are used for billing.
- the second information that the checking module 130 transmits which indicates whether the at least two production units 111, 1 12 have the permissible configuration or whether the at least two production units 11 1, 1 12 have no permissible configuration, in the case that the at least two production units 11 1, 1 12 have the permissible configuration, for example represent a digital certificate, e.g. indicates that the allowed configuration is certified.
- the review module 130 may e.g. have an interface that is implemented using an Open Platform Communication Unified Architecture.
- the service module 121 is a service module for a production unit 111 of at least two production units 11, 112 provided.
- the service module 121 is designed to transmit first information about one or more features of the production unit 111 of the service module 121 to the checking module 130.
- the service module 121 is designed to receive a second piece of information from a checking module 130, which indicates whether the at least two production units 1 1 1, 1 12 have a permissible configuration or whether the at least two production units 111, 112 have no permissible configuration .
- the service module 121 can be designed, for example, to insert first data into a blockchain that depends on the first information about the one or more features of the production unit 111 that are transmitted to the checking module 130.
- the first data that the service module 121 inserts into the blockchain can be, for example, the first information about the one or more features of the production unit 11 1 of the service module 121 that the service module 121 transmits to the checking module 130.
- the service module 121 may e.g. be configured to transmit the first information about one or more features of the production unit 11 of the service module 121 to the checking module 130 by the service module 121 inserting the first information into the blockchain.
- the first data that the service module 121 inserts into the blockchain e.g. be at least a first hash value that depends on the first information about the one or more features of the production unit 111 of the service module 121 that the service module 121 transmits to the checking module 130.
- the service module 121 can e.g. be configured to additionally transmit the first information about one or more features of the production unit 11 of the service module 121 to the checking module 130 without using the blockchain.
- the service module 121 may e.g. have an interface that is implemented using an Open Platform Communication Unified Architecture.
- FIG. 4 shows a production unit 111, which comprises the service module 121 of FIG. 3.
- FIG. 5 shows a schematic overview of embodiments of the invention.
- the remote certification service can, for example, connect to every asset in the production system and call up security-relevant features for evaluation, e.g. via the Internet, M2M, blockchain, OPC UA.
- M2M Machine to Machine, German: machine to machine
- OPC UA Open Platform Communication Unified Architecture, German: open platform communication unified architecture).
- an expert can make the decision remotely based on the information available via the blockchain Internet meet machine safety requirements. It can be supported by a test algorithm.
- test algorithm itself be certified by an independent expert. From this point on, e.g. the test algorithm automatically checks compliance with machine safety.
- information required for the certification, decisions made by the algorithm or experts and the certificate itself can be documented in a legally secure manner, for example using blockchain technology.
- automatic billing is also carried out using legally compliant evidence of the service provided.
- Fig. 5 point ® shows a technical process that is constantly changing / optimized (or reconfigured) by Industry 4.0 technologies.
- point 5 shows an information model (e.g. BIM, CAD data, OPC UA) which adequately describes the machine.
- BIM Building Information Modeling, German: building data modeling
- CAD Computer-Aided Design, German: computer-aided design).
- FIG. 5 shows point ® that safety-relevant features are transferred to a safety certification interface which is compatible with the service provider and ensures the integrity of the information.
- 5 further shows point that the information in the safety certification interface is transmitted / transmitted / transmitted in a tamper-proof manner using blockchain technology.
- point 5 in FIG. 5 shows that all information relevant to the evaluation is collected by the service provider and evaluated by an expert. A remote certification is created. Furthermore, point 5 in FIG. 5 shows that a certified test algorithm can support an expert or can also carry out an automated evaluation. Each decision and its result is documented in the blockchain and linked to the data that was transmitted in a tamper-proof manner as described in point ⁇ .
- point 5 in FIG. 5 shows that the technical process can be released for operation via the safety certification interface. He receives a so-called "digital badge". The result of this process is the (partially) automated risk assessment of a machine and as such is legally documented via the blockchain.
- a production system in a factory can include 20 machines. One of the 20 machines is then exchanged for a different machine, for example.
- the above concepts are used to check whether the production system meets certification requirements, e.g. whether the previous 19 machines can be combined with the new twentieth machine in the production system.
- a production system is completely rebuilt, for example from 20 machines, and it is to be checked whether the 20 machines can be combined in the new production system.
- each of the 20 machines is replaced by an information mode specific to the respective machine !! (e.g. simplified) represents (see point ⁇ of FIG. 5).
- an information model can be based on OPC UA, BIM or also on CAD data.
- Each machine can be equipped with a corresponding module that can implement a full client (German: full client) or a thin client (German: thin / reduced client) of a blockchain.
- the machines send security-related features to an inspection module via an interface (see point ⁇ in FIG. 5), for example using blockchain technology, which, for example, provides the information to an expert. provides (see point ⁇ in Fig. 5) or a certified test algorithm (see point ⁇ in Fig. 5) in the verification module.
- the transmitted information is either completely stored in the block chain or a hash is formed on the transmitted information and the hash is stored in the block chain.
- the client has a private (cryptographic) key (English: private key) stored on each of the machines.
- a password combination of e.g. 8, 16 or 24 words can be saved to dynamically generate the private key whenever necessary.
- a blockchain is generally considered to be secure if there is a sufficiently large number of blockchain users who do not manipulate the blockchain and who provide (significantly) more than half of the computing capacity for the blockchain.
- An expert (see point ⁇ in Fig. 5) or a test algorithm (see point ⁇ in Fig. 5) then evaluate the information from the e.g. 20 machines, and assess whether the new production system from the 20 machines represents a permissible overall configuration.
- the result of the check can be that the current configuration of the overall system is permissible and is certified or is not permissible and is not certified.
- the result of the check can also be a suggestion for improvement, by means of which changes an impermissible configuration can be changed into an admissible configuration.
- the safety-critical features mentioned under point @ of FIG. 5 can be a maximum speed of a machine, a maximum operating temperature of a machine or a maximum number of punches per minute.
- the expert's suggestion for improvement or the test algorithm can then be used consist of the technically possible maximum speed of a machine, the maximum operating temperature of a machine or the technically possible maximum number of punches per minute of a punching machine to a lower speed, to a lower temperature limit or to a lower maximum number of punches per minute to fix.
- test algorithm can be set so that, for example, a number of compatibility rules and / or incompatibility rules are set.
- Each of the compatibility rules can, for example, define value ranges for a safety-relevant characteristic of two or more of the machines, within which the respective safety-relevant characteristic must be located if the two or more machines are used together (compatibility rule) (for example: maximum operating temperature Machine 1 between 5 ° Celsius and 60 ° Celsius, maximum speed machine 2 between 0 and 500 revolutions per minute). If one of the safety-relevant features has a value that is not in the permissible range, an impermissible overall configuration can be concluded. If, on the other hand, all the safety-relevant features of all rules are within their permissible range, it can be concluded that the overall configuration is permissible.
- each of the incompatibility rules can define value ranges for a safety-relevant characteristic of two or more of the machines, within which the respective safety-relevant characteristic must not be located if the two or more machines are used together (incompatibility rule) (for example: maximum Operating temperature of machine 3 is greater than 70 Celsius, maximum number of punches per minute of machine 4 is greater than 20 punches per minute). If one of the safety-relevant features of an incompatibility rule has a value that is in the impermissible range, an impermissible overall configuration can be concluded. If, on the other hand, there are no safety-relevant features of any rules in their inadmissible range, it can be concluded that the overall configuration is permissible.
- both compatibility rules and incompatibility rules exist and are checked.
- Further examples of safety-relevant features according to some embodiments can be, for example, the material that can be processed and / or the parts or products that can be processed.
- a security-relevant feature can e.g. a freedom of movement for a robot or manipulator, e.g. the permissible value range of the yaw angle and / or e.g. the permissible
- Range of values of the pitch angle and / or e.g. the permissible value range of the roll angle are possible.
- the technical process is released for operation via the safety certification interface (safety certification interface), as described in FIG. 5 point ⁇ .
- safety certification interface safety certification interface
- Each of the 20 machines can receive appropriate information from the checking module using the blockchain.
- This digital certification or a hash thereupon is then stored, for example, in the blockchain, this information being linked in the blockchain to the associated security-relevant features stored in the blockchain or to the associated hash values stored in the blockchain.
- the released processes / the released overall configuration is given a so-called "digital badge" that can be reliably used on the blockchain, e.g. legally secure, is documented.
- a remote certification service for machine safety in particular for functional safety, is provided.
- the remote certification service is protected against tampering and legally secure with blockchain.
- machine-processable information is used (for example using specific semantics).
- interfaces with security profiles are provided (for example OPC UA).
- concepts for billing the service via blockchain are provided.
- testing algorithms for example, certified
- risk assessment for example, test machine safety (risk assessment).
- a risk analysis of the machines can be carried out first and then, for example, a risk assessment.
- risk-reducing measures may then subsequently be proposed.
- a digital certificate issued for example by a testing service (for example the TÜV TÜV technical monitoring association), can then certify the safety of the machine / the safety of the machine configuration / the safety of the entirety of the machines.
- aspects have been described in connection with a device, it goes without saying that these aspects also represent a description of the corresponding method, so that a block or a component of a device is also to be understood as a corresponding method step or as a feature of a method step .
- aspects that have been described in connection with or as a method step also represent a description of a corresponding block or details or feature of a corresponding device.
- Some or all of the method steps can be carried out by a hardware apparatus (or using a hardware device). Apparatus), such as a microprocessor, a programmable computer or an electronic circuit. In some embodiments, some or more of the most important process steps can be carried out by such an apparatus.
- exemplary embodiments of the invention can be implemented in hardware or in software or at least partially in hardware or at least partially in software.
- the implementation can be carried out using a digital storage medium, for example a floppy disk, a DVD, a BluRay disc, a CD, a ROM, a PROM, an EPROM, an EEPROM or a FLASH memory, a hard disk or another magnetic or optical Memory are carried out on the electronically readable control signals are stored, which can interact with a programmable computer system or in such a way that the respective method is carried out.
- the digital storage medium can therefore be computer-readable.
- Some exemplary embodiments according to the invention thus comprise a data carrier which has electronically readable control signals which are able to interact with a programmable computer system in such a way that one of the methods described herein is carried out.
- exemplary embodiments of the present invention can be implemented as a computer program product with a program code, the program code being effective to carry out one of the methods when the computer program product runs on a computer.
- the program code can, for example, also be stored on a machine-readable carrier.
- exemplary embodiments include the computer program for performing one of the methods described herein, the computer program being stored on a machine-readable medium.
- an exemplary embodiment of the method according to the invention is thus a computer program which has a program code for performing one of the methods described here when the computer program runs on a computer.
- a further exemplary embodiment of the method according to the invention is thus a data carrier (or a digital storage medium or a computer-readable medium) on which the computer program for carrying out one of the methods described herein is recorded.
- the data carrier or the digital storage medium or the computer-readable medium are typically tangible and / or non-volatile.
- a further exemplary embodiment of the method according to the invention is thus a data stream or a sequence of signals which represents the computer program for performing one of the methods described herein.
- the data stream or the sequence of signals can, for example, be configured to be transferred via a data communication connection, for example via the Internet.
- Another exemplary embodiment comprises a processing device, for example a computer or a programmable logic component, which is configured or adapted to carry out one of the methods described herein.
- Another embodiment includes a computer on which the computer program for performing one of the methods described herein is installed.
- a further exemplary embodiment according to the invention comprises a device or a system which is designed to transmit a computer program for carrying out at least one of the methods described herein to a recipient.
- the transmission / transmission / transmission can take place, for example, electronically or optically.
- the receiver can be, for example, a computer, a mobile device, a storage device or a similar device.
- the device or the system can comprise, for example, a file server for transmitting the computer program to the recipient.
- a programmable logic device e.g., a field programmable gate array, an FPGA
- a field programmable gate array may cooperate with a microprocessor to perform one of the methods described herein.
- the methods are performed by any hardware device. This can be a universally usable hardware such as a computer processor (CPU) or hardware specific to the method, such as an ASIC.
Landscapes
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Quality & Reliability (AREA)
- General Engineering & Computer Science (AREA)
- Manufacturing & Machinery (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102018219188 | 2018-11-09 | ||
PCT/EP2019/080439 WO2020094739A1 (de) | 2018-11-09 | 2019-11-06 | System, überprüfungsmodul, servicemodul und verfahren zur überprüfung der konfiguration mindestens einer produktionseinheit basierend auf blockchain-technologie |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3877818A1 true EP3877818A1 (de) | 2021-09-15 |
Family
ID=68503115
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP19801281.7A Pending EP3877818A1 (de) | 2018-11-09 | 2019-11-06 | System, überprüfungsmodul, servicemodul und verfahren zur überprüfung der konfiguration mindestens einer produktionseinheit basierend auf blockchain-technologie |
Country Status (3)
Country | Link |
---|---|
US (1) | US12078980B2 (de) |
EP (1) | EP3877818A1 (de) |
WO (1) | WO2020094739A1 (de) |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ATE269615T1 (de) | 2000-09-01 | 2004-07-15 | 724 Solutions Inc | Vorrichtung und verfahren für infrastruktur mit öffentlichen schlüsseln |
GB0119629D0 (en) | 2001-08-10 | 2001-10-03 | Cryptomathic As | Data certification method and apparatus |
US8041444B2 (en) * | 2006-12-22 | 2011-10-18 | Harris Stratex Networks Operating Corporation | Intelligent production station and production method |
EP3455802A1 (de) * | 2016-05-13 | 2019-03-20 | De La Rue International Limited | Verfahren und systeme zur verarbeitung von vermögenswerten |
DE102016215914A1 (de) | 2016-08-24 | 2018-03-01 | Siemens Aktiengesellschaft | Absichern einer Gerätenutzungsinformation eines Gerätes |
DE102016215915A1 (de) | 2016-08-24 | 2018-03-01 | Siemens Aktiengesellschaft | Sicheres Konfigurieren eines Gerätes |
DE102016118613A1 (de) * | 2016-09-30 | 2018-04-05 | Endress+Hauser Process Solutions Ag | System und Verfahren zum Bestimmen oder Überwachen einer Prozessgröße in einer Anlage der Automatisierungstechnik |
EP3355230A1 (de) | 2017-01-25 | 2018-08-01 | Siemens Aktiengesellschaft | Verfahren und vorrichtung zum rechnergestützten erstellen und ausführen einer steuerfunktion |
CN108540507B (zh) * | 2017-03-02 | 2022-03-15 | 北京好扑信息科技有限公司 | 一种应用于基于区块链的数字化指挥控制信息传达及追溯系统的追溯方法 |
CN107508812B (zh) * | 2017-08-29 | 2020-10-23 | 广东工业大学 | 一种工控网络数据存储方法、调用方法及系统 |
US11528147B2 (en) * | 2017-09-13 | 2022-12-13 | Vijay Madisetti | Verifying integrity and secure operations of cloud-based software services |
CN107730277A (zh) | 2017-10-18 | 2018-02-23 | 上海唯链信息科技有限公司 | 一种基于区块链技术的产品溯源验证方法 |
CN107945021A (zh) | 2017-12-07 | 2018-04-20 | 杭州趣链科技有限公司 | 一种基于区块链智能合约的数字资产管理方法 |
US11669914B2 (en) * | 2018-05-06 | 2023-06-06 | Strong Force TX Portfolio 2018, LLC | Adaptive intelligence and shared infrastructure lending transaction enablement platform responsive to crowd sourced information |
US11140201B2 (en) * | 2019-02-19 | 2021-10-05 | International Business Machines Corporation | Security platform for multi-component system and services thereof |
US11038771B2 (en) * | 2019-04-26 | 2021-06-15 | Salesforce.Com, Inc. | Systems, methods, and apparatuses for implementing a metadata driven rules engine on blockchain using distributed ledger technology (DLT) |
US11469886B2 (en) * | 2019-05-22 | 2022-10-11 | Salesforce.Com, Inc. | System or method to implement record level access on metadata driven blockchain using shared secrets and consensus on read |
-
2019
- 2019-11-06 EP EP19801281.7A patent/EP3877818A1/de active Pending
- 2019-11-06 WO PCT/EP2019/080439 patent/WO2020094739A1/de unknown
-
2021
- 2021-05-05 US US17/308,411 patent/US12078980B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
WO2020094739A1 (de) | 2020-05-14 |
US20210255608A1 (en) | 2021-08-19 |
US12078980B2 (en) | 2024-09-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3488556B1 (de) | Sicheres konfigurieren eines gerätes | |
DE102004003605B4 (de) | Integriertes Diagnosesystem in einer Prozessanlage mit einem Prozesssteuerungssystem und einem Sicherheitssystem | |
EP3379447B1 (de) | Verfahren und vorrichtung zum manipulationssicheren speichern von informationen bezüglich objektbezogener massnahmen | |
EP3543940A1 (de) | Computerimplementiertes verfahren zum bereitstellen von daten, insbesondere für eine konformitätsverfolgung | |
EP3264208B1 (de) | Verfahren zum aktualisieren von prozessobjekten in einem engineerings-system | |
DE102010062908B4 (de) | Verfahren zum Parametrisieren eines Gerätes, parametrisierbares Gerät und Parametrisierungsvorrlchtung | |
DE102018215679B4 (de) | Anwendungssicherheitsmanagementsystem und Randserver | |
DE102017111928A1 (de) | Verfahren zur autorisierten Aktualisierung eines Feldgeräts der Automatisierungstechnik | |
EP3379351B1 (de) | Verfahren zum betreiben einer automatisierungseinrichtung sowie automatisierungseinrichtung | |
WO2010060985A2 (de) | Verfahren, system und simulations- bzw. analysemodell zur datenverarbeitung | |
DE102010061634A1 (de) | Verfahren und Vorrichtung zur Schaffung eines kontrollierten Zugangs zu einer Computersystem/Computereinrichtungs-Ressource zur Gerätefernüberwachung und -diagnose | |
EP3732608B1 (de) | Verfahren zur rechnergestützten parametrierung eines technischen systems | |
WO2020221523A1 (de) | Verfahren zur vergabe von zertifikaten, leitsystem, verwendung eines solchen, technische anlage, anlagenkomponente und verwendung eines identitätsproviders | |
WO2020094739A1 (de) | System, überprüfungsmodul, servicemodul und verfahren zur überprüfung der konfiguration mindestens einer produktionseinheit basierend auf blockchain-technologie | |
WO2023031009A1 (de) | Verfahren zur prüfung einer konformität eines technischen geräts oder gerätesystems, computerprogrammprodukt und prüfrechner | |
DE102021209493A1 (de) | Verfahren zur Prüfung einer Konformität eines technischen Geräts oder Gerätesystems, Computerprogrammprodukt und Prüfrechner | |
DE102008025489A1 (de) | Verfahren und System zum Überwachen eines sicherheitsbezogenen Systems | |
DE102014213503A1 (de) | Verfahren zum Überwachen einer Software in einem Straßenfahrzeug | |
EP3306514A1 (de) | Verfahren und vorrichtung zum zertifizieren einer sicherheitskritischen funktionskette | |
DE102017216965A1 (de) | Installation von Software auf einem Datenverarbeitungssystem eines Fahrzeugs | |
EP3306542A1 (de) | Sicherheitszertifikatsmanager | |
EP3893065A1 (de) | Verfahren zur bezahlbasierten ausführung einer durchzuführenden funktion eines feldgerätes, entsprechendes feldgerät und serviceeinheit | |
EP4068177A1 (de) | Verfahren zum verwalten eines datenzugriffs | |
EP4376354A1 (de) | Sicheres technisches modul | |
EP3306856A1 (de) | Verfahren zum bereitstellen einer gesicherten kommunikationsverbindung zwischen komponenten einer sicherheitskritischen funktionskette |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20210506 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: FRAUNHOFER-GESELLSCHAFT ZUR FOERDERUNG DER ANGEWANDTEN FORSCHUNG E.V. |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20230224 |