Method for operating a safety controller and automation network having such a safety controller
An automated network and security control technology, applied in the direction of program control, computer control, data exchange network, etc., can solve problems such as inadvertent downloading, large quantities, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0033] Instance 1 ( Figure 3A ):
[0034] The safety control S-Projekt-SM1 is the latest input to the automation network, the facility-specific safety framework is stored in the standard master user M, and the safety master user SM1 and the safety Slave user S1 is not building. In step A1, the standard master user M will, through his security programming tool, include the security control S-Projekt-SM1 together with the identifier S-Projekt-ID-SM1 associated with the security control downloaded into the security master user SM1, then, in step A2, the security master user SM1 checks whether the transmitted identifier S-Projekt-ID-SM1 corresponds to the An identifier calculated in S-Projekt-SM1, if the safety master user SM1 therefore decides that there is a deviation between the identifiers, the automated system will principle to change to a safe state.
[0035] In addition, in the case of association, the security master user SM1 in step A4 will associate the identifier S...
example 2
[0036] Instance 2 ( Figure 3B ):
[0037] When the security master user SM1 has, for example, been swapped, or the security master user SM1 contains a different security control than expected because, for example, an update has not been installed, then in the security master No security controls will occur within the scope of user SM1. In step A6, the standard master user M checks immediately after the start of the automation network whether the identifier assigned to the safety control S-Projekt-SM1 is present in the safety master user SM1 , wherein, in the case of relevance, the standard master user M will change to normal operation in step A12.
[0038] If the standard master user M decides that the security master user SM1 does not have a valid framework, then later, in step A7, the standard master user M will set the security control S-Projekt- SM1 and the identifier S-Projekt-ID-SM1 assigned to the security control are loaded from its backup memory into the security ...
example 3
[0040] Instance 3 ( Figure 3C ):
[0041] During normal operation during the start of the automation network, the security master user SM1 will determine the identifier of the uploaded security control after the security control has been uploaded in step A15, and then, in step A15, In A16, the security master user SM1 will compare the calculated identifier with the identifier S-Projekt-ID-SM1 assigned to the security control, if the security master user SM1 determines that there is a discrepancy between the identifiers, and the automation network changes to a safe state in step A17 according to the fail-safe principle.
[0042]When the initial procedure of the security master user SM1 comes to a conclusion, in the case that the identifier is related, then in step A18, the security master user SM1 will start from the In the security slave user to be monitored within the framework of the security control, obtain the identifier stored therein, and then, in step A19, if the sec...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 