WO2021018489A1 - Transmission de données à un dispositif iot - Google Patents
Transmission de données à un dispositif iot Download PDFInfo
- Publication number
- WO2021018489A1 WO2021018489A1 PCT/EP2020/067936 EP2020067936W WO2021018489A1 WO 2021018489 A1 WO2021018489 A1 WO 2021018489A1 EP 2020067936 W EP2020067936 W EP 2020067936W WO 2021018489 A1 WO2021018489 A1 WO 2021018489A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- server
- data rate
- connection
- maximum
- firmware
- Prior art date
Links
- 230000005540 biological transmission Effects 0.000 title claims description 15
- 238000000034 method Methods 0.000 claims abstract description 31
- 238000004891 communication Methods 0.000 claims abstract description 18
- 238000004590 computer program Methods 0.000 claims abstract description 6
- 239000012634 fragment Substances 0.000 claims description 48
- 238000012546 transfer Methods 0.000 claims description 14
- 238000012545 processing Methods 0.000 claims description 7
- 230000036961 partial effect Effects 0.000 claims description 5
- 230000007613 environmental effect Effects 0.000 claims 1
- 230000008569 process Effects 0.000 description 7
- 230000007246 mechanism Effects 0.000 description 6
- 230000006399 behavior Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 4
- 238000013459 approach Methods 0.000 description 2
- 230000003542 behavioural effect Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 206010000210 abortion Diseases 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
- G06F8/654—Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
Definitions
- the invention relates to a method for communication between a device and a server, a system comprising at least one device and at least one server and a server, a device for use in the method and / or the system and a computer program product.
- the invention relates to devices that fall within the context of the Internet of Things. This refers to the connection and networking of electronic devices with wireless or wired network interfaces via the Internet. Such networked devices can send information directly to PCs,
- Networked devices are often mass-produced products with very limited hardware equipment. This can, for example, be the selection of the
- Micro controllers affect, but also the memory equipment.
- Unprotected communication between networked devices and a server can lead to significant security problems. Therefore secure communication connections are to be preferred.
- the consequences of installing malware on a networked device can be very serious.
- a prominent example of this is the “Mirai” malware, which was brought into circulation on October 21, 2016 [5] and which spreads particularly via unsecured and therefore highly vulnerable networked devices such as DVD players, TV decoders, or surveillance cameras, could spread very quickly. This has led to a massive outage of large parts of the Internet that has lasted for several hours.
- a networked device can, for example, consist of an electronic unit which is composed of sensors, actuators, a network interface and one (or more) microcontroller (s) and is built into a housing.
- Firmware is usually executed on the microcontroller (s), which integrates and controls all other elements, realizes the actual device function and enables the desired forms of information exchange and interactions via the Internet.
- the networked device can preferably be implemented as a “system-on-chip” (SoC) on which both a microcontroller and a network interface, preferably a WLAN interface, are integrated.
- SoC system-on-chip
- the resulting limitations can affect computing power, flash memory or RAM memory size, or a combination of these aspects.
- the networked device Due to the scarce hardware equipment, there are limits to the capability of the networked device with regard to the maximum data throughput that can still be processed, i.e., for example, can be received, decrypted and / or stored by the device. If the data throughput delivered to the device by a server is above the maximum data throughput that can be processed by the device, data can be lost. While with conventional, well-equipped devices with network interfaces, e.g. servers or personal computers, the achievable processing speed of received data is usually so high that data transmitted over the network at normal network data rates can be processed without further ado, this is The maximum achievable processing speed for the networked devices considered here is at least temporarily below the data rate available from the server.
- the firmware of networked devices can be updated by manual intervention by a technician directly on the device.
- this approach is highly unattractive and, at best, suitable as an emergency solution.
- Much more appropriate is to carry out these updates “over-the-air” (OTA), ie to obtain them via the Internet connection that the networked device already has (whereby the term “over-the-air” is also to be understood as that this includes a data transmission completely or at least partially via wired network connections).
- OTA over-the-air
- a secure OTA update functionality for the firmware of a networked device can be achieved by obtaining updates of the firmware running on a microcontroller of the device from a web server.
- a network interface integrated on the chip and a device for establishing the network connection to the server can be used, preferably via the Internet, for example in the form of an Internet router.
- the web server can, for example, provide the new versions of the firmware in the form of downloadable binary files.
- the device can, for example, connect to this web server as a client and download the appropriate new firmware version.
- the device can program the new firmware version in a free area of its flash memory. After successfully completing these steps, the device can switch from the current to the new firmware version by restarting.
- data for example updates, can be downloaded from the server providing the information.
- the server can be a web server and communication can take place in accordance with the HTTPS (HyperText Transfer Protocol Secure) [6] protocol.
- HTTPS HyperText Transfer Protocol Secure
- HTTP HyperText Transfer Protocol
- HTTP HyperText Transfer Protocol
- TLS Secure Sockets Layer / Transport Layer Security
- Both are based on a TCP / IP (Transmission Control Protocol / Internet Protocol) [10] connection, which in turn runs over the WLAN networks, local networks (LAN) and wide area networks (WAN) that run between the networked device and the web server in question.
- TCP / IP Transmission Control Protocol / Internet Protocol
- the networked device should also advantageously have suitable logic, in particular suitable hardware and software components for controlling and performing the update process itself.
- functions and software libraries in particular can be used that, for example, use TCP / IP connections via a network interface, services to establish secure tunnels via existing TCP / IP connections Use of the encryption protocol SSL / TLS, and services for carrying out firmware OTA updates.
- the following software components or layers can be used: Operating system including support for establishing and using TCP / IP connections, an implementation of the SSL / TLS encryption protocol and an HTTP server software package including an implementation of the HTTP protocol.
- the respective original implementations on the networked devices and the web server would have to be replaced by these.
- a maximum data rate is specified for the connection and the server transmits data to the device at a data rate which does not exceed the specified maximum data rate.
- the device can preferably specify a maximum data rate for the server when establishing a connection.
- the computer program product according to the invention can preferably comprise a server component and a client component, the server-side software component being executed on the server and implementing the behavior described there, while the client-side software component is executed on the device in order to implement the behavior described
- the device can properly store, decrypt and / or process the data in the form in which they are received from the server, even with limited hardware equipment.
- the transmission will be split into fragments, with the fragments having a maximum fragment size.
- the maximum fragment size is also specified when the connection is established, in particular is specified by the device.
- a value suitable for the device can be selected for the fragment size.
- the data transmission can be set in a suitable way for each device.
- a secure OTA update functionality is implemented for the firmware of a networked water leak detector.
- the ESP8266 [3] from the Chinese chip manufacturer Espressif is used as the microcontroller.
- This is a very inexpensive “System-on-Chip” (SoC), on which both a 32-bit microcontroller and a WLAN interface are integrated.
- SoC System-on-Chip
- the OTA updates of the firmware running on this microcontroller should be obtained from a web server, for the connection with this the integrated on the chip should be integrated WLAN interface and a standard internet router are used.
- the web server provides the new versions of the firmware in the form of downloadable binary files.
- the device in question connects to this web server as a client, downloads the appropriate new firmware version and programs it in a free area of its flash memory. After successfully completing these steps, the device changes from the current to the new firmware version by restarting.
- IRAM Internal RAM memory
- Static RAM memory 80 KB, of which actually available for the application: ⁇ 45 KB
- ESP8266 NONOS SDK [11] an extensive software development package called ESP8266 NONOS SDK [11] can be used to facilitate application development. This includes the following services:
- An HTTP server software package including an implementation of the HTTP protocol - the market leaders include Apache HTTP Server [19] and Microsoft® Internet Information Services [20]
- the size of the binary files with new versions of the water leak detector firmware was approx. 350 KB.
- this size can vary greatly in other projects and depending on the type of networked device. It can almost be ruled out that the size of a firmware that support secure OTA updates is significantly less than 100 KB.
- the maximum data size that can be transmitted in one go via a connection secured with the SSL / TLS encryption protocol is only 16 KB [9]. This is by no means a limitation caused by the protocol implementations, but rather a parameter that was determined by the underlying protocol standard. Thus, all files or data blocks that exceed this maximum size are broken down in the course of the transfer into a series of data fragments, the size of which is equal to or smaller than the mentioned threshold value.
- the inventors have recognized that the maximum size of the data that can be transmitted in one train specified by the SSL / TLS protocol results in the problem that it is in no way in line with the severely limited hardware resources of most networked devices.
- the maximum data size that could be received on the ESP8266 microcontroller in one go was less than 4 KB due to its limited RAM memory size.
- a web server that is used to provide firmware updates and is based on a standard implementation of the SSL / TLS encryption protocol, however, has no way of finding out and taking into account such restrictions. He therefore systematically breaks down each new firmware version to be transmitted into a sequence of 16 kB fragments. As a result, the downloading process comes to an abrupt end as soon as the first data fragment arrives on the networked device, since its size far exceeds the free storage capacity available there.
- the inventors have recognized another problem that it should be ensured that the fragments of a new firmware version that arrive on the networked device are received and processed in a sufficiently short time. Otherwise there is a risk that the networked device will still be busy processing the previous firmware fragments when the subsequent firmware fragments arrive, and thereby one or the other Firmware fragment is lost in whole or in part.
- the processing that every received firmware fragment must be subjected to consists of two sub-steps: its decryption and programming in the flash memory of the microcontroller.
- the ESP8266 microcontroller In the case of the ESP8266 microcontroller, the latter have proven to be sufficient to reliably receive and process firmware fragments arriving at a transfer rate between 8 KB / s and 10 KB / s.
- a web server that is used to provide firmware updates and is based on a standard implementation of the SSL / TLS encryption protocol, however, has hardly any possibility of satisfying such restrictions. Instead, it transmits the firmware fragments at the maximum possible transmission rate, which results from its computing power and the operating conditions of the physical networks to be passed through.
- the resulting transfer rate is usually well above the 8 KB / s to 10 KB / s limit mentioned above.
- the networked device occasionally succeeds in receiving and processing the first firmware fragments as expected, but then quickly saturates and aborts the download process due to the receipt of incomplete or inconsistent firmware fragments.
- the open source library axTLS [13] was used as the starting point for a solution to the identified problems, which also serves as the basis for the services provided by the ESP8266 NONOS SDK for establishing and using secure SSL / TLS connections.
- the inventors have resorted to an extension mechanism called “Hello Extensions” [22], which was specifically provided for by the SSL / TLS standard. It offers clients (here the networked devices) the possibility of negotiating the use of certain functional extensions with the server to which they want to establish a secure connection (in this case the web server). These are optional behavior features of the SSL / TLS protocol that can be activated on request from the client when establishing new secure connections to a server.
- the SSL / TLS standard includes a list [23] in which the existing extensions of this type are named, as well as corresponding specifications [24] by which their respective goals and modes of operation are defined.
- the inventors have solved the problem of the size of the downloaded firmware fragments being too large by means of an extension called “Maximum Fragment Length” [25] already provided for in the SSL / TLS standard. It enables a client to request the server, to which it is establishing a secure connection, that the latter uses a smaller maximum size when dimensioning the data fragments to be transmitted to the former than the 16 KB normally provided for this.
- the chosen solution to the problem was therefore to complete the partial support of the "Maximum Fragment Length" extension, which is included in the axTLS Library was found.
- the axTLS library modified in this way, was used to replace the original version that is contained in the ESP8266 NONOS SDK.
- the application code has been expanded to inform the web server of the maximum size of the data fragments that should be used when downloading new firmware versions.
- the modified axTLS library was integrated into a simple HTTP server software implementation (which is included with the axTLS library as sample code). The result was a secure web server that has the ability to customize the size of the data fragments to be transmitted to the restrictions of the networked devices connected to it.
- the inventors designed and implemented the specifications of a “Maximum Data Rate”. It allows a client to request the server, to which it is establishing a secure connection, to limit the transmission rate that the latter uses to transmit the data fragments to the former to a specified value in KB / s and thus prevent the data fragments from being sent te arrive at the client in too fast a sequence. Regardless of the fact that this is a novel behavioral characteristic, the extension that enables it to be activated is based on the same extension mechanism "Hello Extensions" [22] that is also used for all existing extensions. It was only assigned its own unique identifier, which was selected from one of the areas with free identifiers that have not yet been assigned [23].
- the inventors added the partial functionality of the axTLS library, which is responsible for recognizing and evaluating the expansion requirements transmitted by the networked device, with the ability to extract the maximum data transfer rate to be used.
- the partial functionality that is responsible for sending the data from the server to the client has been modified in order to adapt the transmission rate of the outgoing data fragments accordingly. Instead of having the data fragments to be transmitted follow one another directly, a time delay is observed after each data fragment has been sent, the duration of which is determined dynamically. As a result, the data fragments are distributed over the time axis and the average data transfer rate remains below the value specified by the client.
- the result was a secure web server that is able to individually adapt the transmission rate of the data fragments to be transmitted to the restrictions of the networked devices connected to it.
- the peculiarity of the chosen approach to remedy the observed problems is that the found solution is neither limited to a specific networked device, nor to a specific microcontroller, nor to the firmware OTA update application.
- the use of the "Hello Extensions" mechanism defined by the SSL / TLS standard was advantageous. This is based on the principle of negotiation between client and server in order to decide when each new secure connection is established whether and which additional behavioral characteristics are to be used and which operating parameters should be used.
- the extensions implemented as part of this project allow every networked device to cause the server to which it connects to use individually adapted sizes and transmission rates when transmitting data fragments that are in accordance with the There are limitations on its hardware resources and the task to be performed.
- the same extended implementation of the SSL / TLS encryption protocol and also the same web server that uses it can be used, on the one hand, to operate different networked devices with different microcontrollers and, on the other hand, to cover a large number of applications that require secure communication between a networked device and require a server.
- the invention is of a relatively general nature and, apart from the Internet of Things, which is primarily considered here, can also be used in many other areas (e.g. Industry 4.0).
- SSL / TLS encryption protocol which is particularly suitable for making secure communication usable on networked devices that are equipped with extremely scarce hardware resources. This made it possible to successfully implement the secure OTA update functionality required in the illustrated embodiment for the firmware of a water leak detector based on the ESP8266 microcontroller.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Health & Medical Sciences (AREA)
- Information Transfer Between Computers (AREA)
Abstract
L'invention porte sur un procédé de communication entre un dispositif et un serveur, sur un système comprenant au moins un dispositif et au moins un serveur, sur un serveur, sur un dispositif destiné à être utilisé dans le procédé et/ou le système, et sur un produit programme d'ordinateur. Une connexion chiffrée est établie entre un dispositif, par exemple un dispositif réseauté dans le contexte de l'Internet des objets (IoT), et un serveur afin de réaliser une communication entre le dispositif et le serveur. Afin de permettre une communication fiable malgré un matériel limité, le débit de données maximal pour la connexion est déterminé, et le serveur transmet des données au dispositif à un débit de données qui ne dépasse pas le débit de données maximal déterminé.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102019120331.7A DE102019120331A1 (de) | 2019-07-26 | 2019-07-26 | Datenübertragung zu einem IOT-Gerät |
DEDE102019120331.7 | 2019-07-26 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021018489A1 true WO2021018489A1 (fr) | 2021-02-04 |
Family
ID=71579545
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2020/067936 WO2021018489A1 (fr) | 2019-07-26 | 2020-06-25 | Transmission de données à un dispositif iot |
Country Status (2)
Country | Link |
---|---|
DE (1) | DE102019120331A1 (fr) |
WO (1) | WO2021018489A1 (fr) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102021203940A1 (de) | 2021-04-21 | 2022-10-27 | Robert Bosch Gesellschaft mit beschränkter Haftung | Verfahren und Vorrichtung zum Verarbeiten von mit einem elektronischen Gerät für ein Fahrzeug assoziierten Daten |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005055502A2 (fr) * | 2003-12-01 | 2005-06-16 | Interdigital Technology Corporation | Protocole de lancement de session a base de transfert a la demande |
WO2017024100A1 (fr) * | 2015-08-04 | 2017-02-09 | Convida Wireless, Llc | Gestion de qualité de service de couche de service de bout en bout de l'internet des objets |
WO2017095701A1 (fr) * | 2015-12-04 | 2017-06-08 | T-Mobile USA, Inc | Concentrateur |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102010008816A1 (de) * | 2010-02-22 | 2011-08-25 | Continental Automotive GmbH, 30165 | Verfahren zur Online-Kommunikation |
US10298650B2 (en) * | 2016-04-20 | 2019-05-21 | Vasona Networks, Inc. | Maximum sustainable encoding bit rates for video downloads |
-
2019
- 2019-07-26 DE DE102019120331.7A patent/DE102019120331A1/de not_active Withdrawn
-
2020
- 2020-06-25 WO PCT/EP2020/067936 patent/WO2021018489A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005055502A2 (fr) * | 2003-12-01 | 2005-06-16 | Interdigital Technology Corporation | Protocole de lancement de session a base de transfert a la demande |
WO2017024100A1 (fr) * | 2015-08-04 | 2017-02-09 | Convida Wireless, Llc | Gestion de qualité de service de couche de service de bout en bout de l'internet des objets |
WO2017095701A1 (fr) * | 2015-12-04 | 2017-06-08 | T-Mobile USA, Inc | Concentrateur |
Non-Patent Citations (2)
Title |
---|
ANONYMOUS: "Zigbee - Wikipedia", 24 July 2019 (2019-07-24), XP055729069, Retrieved from the Internet <URL:https://en.wikipedia.org/w/index.php?title=Zigbee&oldid=907690797> [retrieved on 20200909] * |
IEEE: "IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications;IEEE Std 802.11-2012 (Revision of IEEE Std 802.1", 29 March 2012 (2012-03-29), pages 1, 44 - 91, 417, XP002713576, ISBN: 978-0-7381-7211-8, Retrieved from the Internet <URL:http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6178212> [retrieved on 20130925] * |
Also Published As
Publication number | Publication date |
---|---|
DE102019120331A1 (de) | 2021-01-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE60011147T2 (de) | Verfahren und system zur kontrolle des herunterladens von software- und firmwareobjekten uber ein kabelfernsehsystem | |
DE112012002362B4 (de) | Automatisierte Empfehlungen für Cloud-Computing-Optionen | |
EP3652656B1 (fr) | Dispositifs destinés à fournir une quantité d'enregistrements unitaires de transactions, protégés de manière cryptographique et filtrés ainsi que triés, d'un maillon d'une chaîne de blocs | |
DE102014012257A1 (de) | Aktualisierungsmanagement | |
DE102016201666B4 (de) | System und verfahren zur flexiblen gerätepaarung unter verwendung der adaptiven variablen schwellenwertbildung | |
DE602005004214T2 (de) | Kommunikationssystem and Verfahren zur Aktualisierung von Software in einem Endbenutzergerät | |
DE60211254T2 (de) | Fernereignis Behandlung in ein Paketnetzwerk | |
DE102015002541A1 (de) | Verfahren und system zum bereitstellen eines effizienten verwundbarkeitsverwaltungs- und verifikationsdienstes | |
EP2529529A1 (fr) | Procédé de téléchargement sécurisé de sources de téléchargement réparties | |
DE112016002340B4 (de) | Verwendung eines Netzwerks, um ein zweites Netzwerk in Betrieb zu nehmen | |
DE102016203598A1 (de) | Gemeinschaftliche sammlung von diagnosedaten von softwareprogrammen | |
WO2016092003A1 (fr) | Procédé de mise à jour de microprogramme d'appareils | |
WO2021018489A1 (fr) | Transmission de données à un dispositif iot | |
WO2021249920A1 (fr) | Dispositif de configuration, serveur de mise à jour et procédé de mise à jour d'un logiciel d'une installation technique | |
DE102013100139A1 (de) | Prozessdaten-Gateway in einem dezentralen Automatisierungssystem auf Basis der Webtechnologie | |
DE102021127358A1 (de) | Automatische Einrichtung von drahtlosen oder drahtgebundenen Netzen durch Bündelung von Gateways und Tunnelung des Datenverkehrs zu den Gateways | |
EP3529967A1 (fr) | Procédé de liaison d'appareils avec ledit nuage, programme d'ordinateur avec une mise en uvre du procédé et unité de traitement pour l'exécution du procédé | |
WO2016045736A1 (fr) | Production de valeurs de processus dans un système de processus | |
WO2001098899A2 (fr) | Surveillance de serveurs | |
EP3118768A1 (fr) | Procede de formation d'un environnement virtuel dans un systeme d'exploitation d'un ordinateur | |
EP3285162A1 (fr) | Procédé de projection d'un projet et système d'exécution du procédé | |
DE102010043718A1 (de) | Automatische Verbindungsanalyse für ein DICOM-Netzwerk | |
WO2016092006A1 (fr) | Système de gestion de microprogrammes ainsi que procédé de gestion de microprogrammes pour la mise à jour de microprogrammes d'appareils | |
EP3681099A1 (fr) | Procédé de fonctionnement d'un système informatique pour une installation d'automatisation et / ou installation de fabrication ainsi que système informatique | |
DE102020108230A1 (de) | Verfahren zur Fernbedienung eines Feldgeräts |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20739576 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: FESTSTELLUNG EINES RECHTSVERLUSTS NACH REGEL 112(1) EPUE (EPA FORM 1205A VOM 18/04/2023) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20739576 Country of ref document: EP Kind code of ref document: A1 |