WO2023099474A1 - Feldgerät, feldgerätenetzwerk und verfahren für einen nutzerzugang - Google Patents
Feldgerät, feldgerätenetzwerk und verfahren für einen nutzerzugang Download PDFInfo
- Publication number
- WO2023099474A1 WO2023099474A1 PCT/EP2022/083667 EP2022083667W WO2023099474A1 WO 2023099474 A1 WO2023099474 A1 WO 2023099474A1 EP 2022083667 W EP2022083667 W EP 2022083667W WO 2023099474 A1 WO2023099474 A1 WO 2023099474A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- field device
- user
- computer network
- data
- access
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 28
- 238000013475 authorization Methods 0.000 claims abstract description 62
- 230000000694 effects Effects 0.000 claims description 8
- 238000004590 computer program Methods 0.000 claims description 6
- 230000008569 process Effects 0.000 claims description 5
- 230000004044 response Effects 0.000 claims description 2
- 238000004519 manufacturing process Methods 0.000 description 5
- 238000004801 process automation Methods 0.000 description 5
- 230000009471 action Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 239000004568 cement Substances 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000011109 contamination Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 239000000123 paper Substances 0.000 description 1
- 239000003208 petroleum Substances 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
Definitions
- the invention relates to a field device, e.g. a sensor, for industrial automation, a field device network, use of a computer network device to grant access to a field device and a method for granting access to a field device in a field device network.
- a field device e.g. a sensor
- a field device network use of a computer network device to grant access to a field device and a method for granting access to a field device in a field device network.
- An object could be to provide a field device with improved user access.
- the described embodiments similarly relate to the field device of industrial automation, the field device network, the use of a computer network device to provide access to a field device, and the method of providing access to a field device in a field device network. Synergy effects may result from various combinations of embodiments, although they may not be described in detail.
- a field device for industrial automation having a user interface that is set up to communicate with a user, a computer network interface that is set up to connect the field device to a computer network service, and a controller.
- the control device is set up to receive user data via the user interface for local user access, to send the user data to the computer network service, to receive first authorization data from the computer network service via the computer network interface, and to grant access to the field device depending on the first authorization data.
- the field device is, for example, a sensor for automation or automation, such as factory or process automation in an industrial environment.
- Process automation in the industrial environment can be understood as a sub-area of technology that includes all measures for operating machines and systems without human intervention.
- One goal of process automation is to improve the interaction of individual components of a plant in the areas of chemistry, Automate food, pharmaceutical, petroleum, paper, cement, shipping or mining.
- a large number of sensors can be used for this purpose, which are particularly adapted to the specific requirements of the process industry, such as mechanical stability, insensitivity to contamination, extreme temperatures and extreme pressures. Measured values from these sensors are usually transmitted to a control room, in which process parameters such as fill level, limit level, flow rate, pressure or density can be monitored and settings for the entire plant can be changed manually or automatically.
- a sub-area of process automation in the industrial environment relates to logistics automation.
- processes within a building or within a single logistics facility are automated in the field of logistics automation.
- Typical applications are found, for example, in systems for logistics automation in the area of baggage and freight handling at airports, in the area of traffic monitoring (toll systems), in retail, in parcel distribution or in the area of building security (access control).
- presence detection in combination with precise measurement of the size and position of an object is required by the respective application.
- Sensors based on optical measuring methods using lasers, LEDs, 2D cameras or 3D cameras, which record distances according to the transit time principle (time of flight, ToF), can be used for this purpose.
- factory/manufacturing automation Another sub-area of process automation in the industrial environment relates to factory/manufacturing automation. Use cases for this can be found in a wide variety of industries such as automobile manufacturing, food production, the pharmaceutical industry or generally in the field of packaging.
- the aim of factory automation is to automate the production of goods using machines, production lines and/or robots, i. H. run without human intervention.
- the sensors used here and the specific requirements with regard to the measurement accuracy when detecting the position and size of an object are comparable to those in the previous example of logistics automation.
- User data is to be understood here as data from a user, ie not necessarily or not only data about a user.
- the user data contains a single bit or a switching signal. You can also digits, a contain a name and/or a password.
- the receipt of the user data also represents an access request.
- the computer network can, for example, be a so-called cloud, with a cloud as a model that, if required, usually - but not necessarily - via the Internet and device-independently, promptly and with little effort shared computer resources as a service, for example in the form of servers, data storage or applications, provides, can be viewed.
- the computer network or cloud may be public, private, hybrid public-private, or virtual private computer network, or any hybrid thereof. Resource management is centralized here.
- the term “cloud” is used here to represent such a computer network, without restricting the term “computer network” as a result.
- the computer network interface or cloud interface is an interface, e.g. an Internet interface, to the computer network or a cloud, i.e. a network with a large number of network nodes and services.
- the user interface can be an MMI interface and/or, for example, a wireless interface to a user device, for example a mobile phone, a laptop, a proprietary device, etc.
- User access is the authorization to operate the field device functionally and/or in particular to make changes to the device, such as configuring or parameterizing the field device or reading out stored data that is not regularly output during operation, or physical access.
- the user here the second user, needs access for maintenance purposes.
- the authorization data are data that are transmitted, for example, according to an authentication method and are necessary in order to grant the user access to the field device.
- the field device or the control device of the field device can receive authorization data from the computer network service and/or from the user, which can be different.
- First authorization data is herein authorization data from the computer network service via the computer network interface to the field device and second authorization data is authorization data from the second user via the user interface to the field device.
- “Local" means that the user is in the immediate vicinity of the field device and can operate it through physical contact, eg by pressing a button or touching a display.
- Access to a field device on site is often required for maintenance or service purposes, for example.
- the field device now has electronic access protection that requires authentication.
- the authentication is achieved by connecting the field device to a computer network service or computer network service.
- a computer network service can either work completely automatically, or it can be monitored or supported by a first user. In the latter case, the first user can release the authorization data, for example, or block access immediately if an irregularity is detected.
- the on-site user uses a user interface, e.g. a human-machine interface (MMI) of the field device to request access to the field device.
- MMI human-machine interface
- the field device then sends a message with the user data to the cloud computer network, i.e. to a responsible computer network service, which responds with initial authorization data.
- Switching access involves two “stages.”
- the first stage concerns the decision of granting in the computer network and the second stage the physical access to the field device that follows the decision.
- the respective level emerges unequivocally from the context.
- the controller sends and receives data.
- Expressions such as “data are sent to the field device” or “data are received from the field device” imply that the controller of the field device receives or sends the data.
- the first authorization data contains a password or a number sequence, e.g., a PIN or a random number sequence.
- the first authorization data that the field device receives from the computer network can consist of authorization data stored in the computer network and/or generated by the computer network service.
- the first authorization data can also be data generated by a first user who operates the computer network service.
- the authorization data can be a user-specific password, a stored number sequence, eg a PIN, or a random number sequence.
- the user interface is also set up to receive second authorization data
- the control device is set up to compare the first authorization data with the second authorization data and to grant access if they match.
- the computer network service thus sends the first authorization data to the field device and/or to a device of the second user, such as a smartphone.
- the authentication can be performed in different ways.
- the first authorization data and the second authorization data entered by the second user contain a user password that the control device compares.
- the second authorization data is therefore also a password or a random number sequence, for example, which the field device receives from the second user or a user device that this user uses, such as a mobile phone, a tablet, a laptop or a proprietary device, so that the Controller of the field device can perform the comparison with the first authorization data.
- This user device of the second user is referred to herein as the “second user device”.
- control device is also set up to output at least part of the first authorization data.
- the field device has a display and the first authorization data, for example the PIN or the random digits, are shown on the display.
- the user can therefore only access the field device if he is on site to read the display and enters the PIN, for example via the man-machine interface, for example a keyboard or a touch-sensitive display.
- the control device can send the first authorization data to the user device of the second user via a wireless connection as a user interface, for example via a short-distance wireless connection.
- the user device displays the data and the user can enter the data displayed on the field device.
- the user enters the data displayed on the field device on the user device, which sends this data to the field device via a wireless connection.
- the second user can send the second authorization data to the field device via the user interface or the man-machine interface, for example personal access data (“credentials”), i.e. name and password, and the controller of the field device forwards the second authorization data to the computer network service, which compares the second authorization data with the eg stored first authorization data, and sends a release to the field device, so that the field device is released for access.
- credentials personal access data
- the controller of the field device forwards the second authorization data to the computer network service, which compares the second authorization data with the eg stored first authorization data, and sends a release to the field device, so that the field device is released for access.
- control device is also set up to send a log of activities on the field device to the computer network service after access has been granted.
- the controller of the field device can record the actions of the second user. For example, it can store a log file containing the connection data including the times of the start and end of the connection, such as parameters and configurations that have been changed.
- the stored data can be sent to the computer network, e.g. to the cloud service or to the first user, at a suitable point in time.
- control device is also set up to send activities on the field device to the computer network service in real time via the computer network interface.
- control device is also set up, after receiving the first authorization data, to grant the second user device access via an encryption method.
- the request ie the user data
- an application can run on the second user device that communicates with the field device communicates.
- the user does not need to enter a PIN in order to ultimately gain access.
- the second user device is verified via the telephone number and the communication for granting access can be a communication using an encryption method, eg based on public and private keys.
- the latter can operate a device, for example a terminal, which is connected to the computer network and to the computer network service.
- the terminal or the computer connected to the terminal can have a program, e.g. an application.
- the application can have an input mask via which the first user can control and configure access for the second user.
- the first user can enter the duration of access or a start and end time, or he can select a set of parameters that the second user can access, etc.
- the user device of the second user can also have an application.
- This application can, for example, display a button before the connection request with which the second user can request "remote release". When this button is pressed, the request is forwarded to the computer network and, if necessary, to the first user and processed there automatically or by the first user.
- the computer network interface is set up to set up a tunnel via the user interface to the computer network service.
- the processing and reply can also be transmitted via a different form of transmission, for example such as via an SMS.
- a computer network device having a processor that is set up to process a computer network service, the computer network service being set up to receive user data from a field device as an access request to the field device and, in response to the user data, to transmit first authorization data to the Send field device.
- the computer network eg a cloud device
- the processor of the cloud device runs software that provides the computer network service described herein.
- the computer network device can independently make decisions about granting access to the second user to the field device according to e.g. a configuration or programming and/or receive the decision from the first user via an interface to the first user.
- This interface can thus be a man-machine interface, in which, for example, a monitor and a keyboard are connected to the computer network device, or a wireless or wired interface to another computer in or outside the computer network.
- a field device network which has a field device described herein and a field device computer network device described herein.
- the field device network thus also has a first user device, which is set up to receive control commands from a first user, e.g. via a man-machine interface, and to generate the first authorization data as a function of the control commands and to send them to the computer network service.
- the computer network service then forwards the first authorization data to the field device.
- the field device network also has a second
- User device such as the second user device described above and in the figures, which is set up to provide user data of a second user and to send an access request to the field device.
- a method for granting access to a field device in a field device network which has the following steps, which are carried out by a controller of the field device: receiving user data as an access request via a user interface of the field device, sending the user data to a Computer network service, receiving first authorization data from the computer network service, and granting access to the field device depending on the first authorization data.
- the method may further include any or all of the actions and functionality described in relation to the field device and the field device network in this disclosure.
- a computer program element which, when executed on a processor of a field device described herein, instructs the field device to perform the method described herein.
- the computer program element can be part of a computer program, but it can also be an entire program in itself.
- the computer program element can be used to update an already existing computer program in order to arrive at the present invention.
- FIG. 1 shows a block diagram of a field device network with a field device according to a first example
- FIG. 2 shows a block diagram of a field device network with a field device according to a second example
- FIG. 3 shows a flow chart of the method for granting access to a field device in a field device network.
- FIG. 1 shows a block diagram of a field device network 100 with a field device 102, a second user or user device 104 and a network service in a network with a central computer, e.g. cloud service 105 in the cloud 122, and a first user 106 or terminal 106, the or which is connected to the cloud service 105 in the cloud 122.
- the field device 102 has a control device 120 as well as a user interface 114 and a cloud interface 116 .
- the user interface is shown in FIG. 1 as a connection 112 between the field device 102 and the second user device 104 as well as the part of the user interface 114 on the field device side.
- the cloud interface 116, 118 is shown as a connection 118 between the field device 102 and the cloud service 105 and the part 116 of the cloud interface on the field device side.
- a first user device 106 is connected to the cloud device 115 , which contains the cloud service 105 , via the connection 132 .
- the second user can gain access to the field device 102 .
- the second user can make his inputs directly via a human-machine interface on the field device 102 itself or, as shown in Fig. 1, with a user device 104 via a Bluetooth connection or other short-range wireless connection, depending on the equipment of the field device 102 and the user device 104.
- inputs are described as inputs from the second user, regardless of whether they make them directly on the field device 102 or on the user device 104.
- the user device 104 can also be considered as an extended input interface of the field device 102 in one of its functions.
- the second user presses a button, for example on the field device 102 or a touch-sensitive display or his user device 104.
- the control device 120 of the field device 102 which is connected to the cloud 100, forwards the request as user data to a cloud service 105 further.
- the cloud service 105 responds with a temporary random number or a PIN as the first authorization data that is displayed at the field device 102 .
- the second user records the PIN and enters it to confirm. This ensures that the user is on site. Numerous variants are possible here.
- the cloud service 105 can send a QR code that the second user device 104 scans and sends back a confirmation without the user having to make any input.
- the field device 102 sends the first authorization data to the user device 104, which automatically replies. Because connection 112 is a short-range connection, this is sufficient to determine that the second user is on site.
- Various tasks can be assigned to the cloud service 105: it can determine current rules, for example whether and for how long access is enabled, it can register that the second user has registered and can make recordings and create a log file, for example. Furthermore, it would be possible to monitor user activities on the field device 102 in real time and to block access if unauthorized actions on the field device 102 take place.
- the cloud service 105 can also have an interface 132 to a first user 106 who controls the cloud service activities mentioned.
- the user enters their ID.
- the control device 120 of the field device 102 forwards the ID as the first user data to the cloud service 105, which checks the ID.
- a code e.g. a PIN
- the field device 102 now requests the PIN from the second user and grants access if there is a match.
- the cloud service 105 accepts the release, under the condition that the PIN still has to be entered by the user and that the match is successfully checked in the field device. Users who are not registered in the Cloud 122 do not receive approval from the outset.
- the cloud service can send a temporary PIN to the field device.
- the second user enters their ID and a password as first user data.
- the cloud service 105 which is also subject to user administration, for example, can send the release to the field device 102 without any further user action being necessary.
- the methods mentioned in the first and second examples can also be used.
- the cloud service 105 can also (not shown in FIG. 1 ) send first authorization data directly to the user device instead of just to the field device for 2-factor authentication.
- the user device is a mobile phone
- the cloud service 105 sends an SMS with second authorization data, eg a temporary PIN, to the mobile phone, which the second user has to enter on the field device 102 .
- the field device 102 can now compare the first authorization data received from the cloud service with the entered second authorization data and grant access if they match.
- Fig. 2 shows a block diagram of a field device network 100 with a field device 102, a second user or second user device 104 and a cloud service 105 and a first user 106 or first user device 106, e.g.
- a terminal or computer which is connected to the cloud service 105 is connected.
- the connection of the field device 102 to the cloud service 105 is tunnelled via the user device 104 here.
- the cloud connection 118 eg an Internet connection such as an loT connection, uses the protocol of the short-range connection between the field device 102 and the second user device 104. All example scenarios described with reference to FIG. 1 can also be used using this tunnel.
- FIG. 3 shows a flowchart of the method for granting access to a field device 102 in a field device network 100, which has the following steps, which are carried out by a control device 120 of the field device 102:
- the first step includes receiving 302 user data as an access request via a user interface 114 of the field device 102.
- the second step includes sending 304 the user data to a cloud service 105, the third step includes receiving 306 first authorization data from the cloud service 105, and the fourth step that Granting 308 access to the field device 102 depending on the first authorization data.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP22822542.1A EP4441639A1 (de) | 2021-11-30 | 2022-11-29 | Feldgerät, feldgerätenetzwerk und verfahren für einen nutzerzugang |
CN202280077462.6A CN118284892A (zh) | 2021-11-30 | 2022-11-29 | 现场设备、现场设备网络以及用于用户访问的方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102021131410.0 | 2021-11-30 | ||
DE102021131410.0A DE102021131410A1 (de) | 2021-11-30 | 2021-11-30 | Feldgerät, Feldgerätenetzwerk und Verfahren für einen Nutzerzugang |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023099474A1 true WO2023099474A1 (de) | 2023-06-08 |
Family
ID=84488860
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2022/083667 WO2023099474A1 (de) | 2021-11-30 | 2022-11-29 | Feldgerät, feldgerätenetzwerk und verfahren für einen nutzerzugang |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP4441639A1 (de) |
CN (1) | CN118284892A (de) |
DE (1) | DE102021131410A1 (de) |
WO (1) | WO2023099474A1 (de) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102014108162A1 (de) * | 2014-06-11 | 2015-12-17 | Endress+Hauser Process Solutions Ag | Verfahren zur Bedienung eines Feldgerätes vermittels eines Bediengerätes |
EP3705955A1 (de) * | 2019-03-08 | 2020-09-09 | Krohne Messtechnik GmbH | Verfahren zur sicheren kommunikation zwischen einem feldgerät der automatisierungstechnik und einem endgerät sowie system zur sicheren kommunikation zwischen einem feldgerät und einem endgerät |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9825949B2 (en) | 2014-03-26 | 2017-11-21 | Rockwell Automation Technologies, Inc. | Device authentication to facilitate secure cloud management of industrial data |
-
2021
- 2021-11-30 DE DE102021131410.0A patent/DE102021131410A1/de active Pending
-
2022
- 2022-11-29 EP EP22822542.1A patent/EP4441639A1/de active Pending
- 2022-11-29 WO PCT/EP2022/083667 patent/WO2023099474A1/de active Application Filing
- 2022-11-29 CN CN202280077462.6A patent/CN118284892A/zh active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102014108162A1 (de) * | 2014-06-11 | 2015-12-17 | Endress+Hauser Process Solutions Ag | Verfahren zur Bedienung eines Feldgerätes vermittels eines Bediengerätes |
EP3705955A1 (de) * | 2019-03-08 | 2020-09-09 | Krohne Messtechnik GmbH | Verfahren zur sicheren kommunikation zwischen einem feldgerät der automatisierungstechnik und einem endgerät sowie system zur sicheren kommunikation zwischen einem feldgerät und einem endgerät |
Also Published As
Publication number | Publication date |
---|---|
CN118284892A (zh) | 2024-07-02 |
EP4441639A1 (de) | 2024-10-09 |
DE102021131410A1 (de) | 2023-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3705955B1 (de) | Verfahren zur sicheren kommunikation zwischen einem feldgerät der automatisierungstechnik und einem endgerät sowie system zur sicheren kommunikation zwischen einem feldgerät und einem endgerät | |
DE102017116161A1 (de) | Zwei-Faktor-Authentifizierung für Benutzerschnittstelleneinrichtungen in einer Prozessanlage | |
DE102017207970B4 (de) | Spritzgussmaschinen-Verwaltungssystem | |
DE112013007104B4 (de) | Überwachungssystem, Gebäudemanagementgerät, Überwachungsverfahren und Programm | |
DE102017116311A1 (de) | Authentifizierung und autorisierung zum kontrollieren des zugriffs auf prozesskontrolleinrichtungen in einer prozessanlage | |
DE102015113054A1 (de) | Sichern von Vorrichtungen bei Prozesssteuerungssystemen | |
EP3582033B1 (de) | Verfahren zur gesicherten bedienung eines feldgeräts | |
EP3783581B1 (de) | Verfahren zur zuordnung eines zu registrierenden rauchmelders und ein entsprechendes rauchmelderverwaltungssystem | |
DE102018214744B4 (de) | Edge-Server und Verwaltungsserver | |
EP3314868B1 (de) | Datenaustausch mit einem laser oder einer werkzeugmaschine | |
DE102014105076A1 (de) | Verfahren zum gesicherten Zugriff auf ein Feldgerät | |
DE102018207658B4 (de) | Verfahren zum Verarbeiten von Sensordaten, Anordnung zur Verarbeitung von Sensordaten, Anordnung zum Verarbeiten einer Anfrage eines Ego-Fahrzeugs für ein weiteres Fahrzeug, Rechner zum Verarbeiten von Sensordaten sowie Rechner zum Verarbeiten einer Anfrage eines Ego-Fahrzeugs für ein weiteres Fahrzeug | |
EP3282329A1 (de) | Verfahren und system zum ferngesteuerten bedienen eines feldgeräts der prozessautomatisierung | |
DE102018129595A1 (de) | Verfahren zum Identifizieren eines Feldgeräts | |
EP3647887B1 (de) | Verfahren und vorrichtung zur weitergabe einer zugriffsinformation für einen zugriff auf ein feldgerät der prozessindustrie | |
WO2023099474A1 (de) | Feldgerät, feldgerätenetzwerk und verfahren für einen nutzerzugang | |
DE112021001023T5 (de) | Datenerfassungssystem, informationsverarbeitungsvorrichtung, informationsverarbeitungsverfahren, programm | |
DE102016119744A1 (de) | Verfahren und System zum Verhindern eines unerwünschten Zugriffs auf ein Feldgerät | |
DE102010040054A1 (de) | Verfahren zur Sicherstellung der korrekten Funktionsweise einer Automatisierungsanlage | |
WO2018114102A1 (de) | Verfahren zum überprüfen einer mandantenzuordnung, computerprogrammprodukt und vorrichtung | |
DE102021114559A1 (de) | Zugriffsicheres Feldgerät | |
WO2018114101A1 (de) | Verfahren zum überprüfen einer mandantenzuordnung, computerprogrammprodukt und automatisierungssystem mit feldgeräten | |
DE102019216406B4 (de) | Kommunikationssystem zum Überwachen von Prozesseinheiten | |
DE102019120199B4 (de) | Verfahren zum Betreiben eines Feldgerätes der Prozessautomatisierungstechnik | |
DE102021213519A1 (de) | Feldgerät, Feldgerätenetzwerk und Verfahren zum Gewähren eines Feldgerätedatenerhalts |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22822542 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202280077462.6 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 18714651 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2022822542 Country of ref document: EP Effective date: 20240701 |