Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for operating a safety controller and automation network having such a safety controller

An automated network and security control technology, applied in the direction of program control, computer control, data exchange network, etc., can solve problems such as inadvertent downloading, large quantities, etc.

Active Publication Date: 2013-06-05
BECKHOFF AUTOMATION GMBH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Typically, the facility-specific security framework is stored on another user in the industrial area network as a backup, and service personnel are generally only able to upload all security profiles if they have a specific authorization. The security controls are downloaded from a backup memory to the security-relevant user, and the transfer of the facility-specific security framework can also be performed directly by connecting the backup memory to the security-relevant user instead of via the However, basically the security controls are set up in such a way that there is always the danger that one of the service personnel may inadvertently download the wrong architecture, and for this reason it will be necessary to spend A lot of organizational time and effort to ensure adequate security during setup of said security-related users
[0006] In order to replace calling an attendant and ensure that the security controls are reliably loaded into the security-related user in an automated manner, the facility-specific security-related framework stored in (for example, arranged in the security-related in the connection joint of the relevant user) a backup system in a static backup memory, then, as long as the static backup memory is intact and, for example, not damaged during the failure of the safety-related user, it is possible automatically upload the facility-specific security framework to the security-related users, however, in such an automatic backup system, since each of the security-related users requires an independent static backup memory, therefore, will involve a lot of hardware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for operating a safety controller and automation network having such a safety controller
  • Method for operating a safety controller and automation network having such a safety controller
  • Method for operating a safety controller and automation network having such a safety controller

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0033] Instance 1 ( Figure 3A ):

[0034] The safety control S-Projekt-SM1 is the latest input to the automation network, the facility-specific safety framework is stored in the standard master user M, and the safety master user SM1 and the safety Slave user S1 is not building. In step A1, the standard master user M will, through his security programming tool, include the security control S-Projekt-SM1 together with the identifier S-Projekt-ID-SM1 associated with the security control downloaded into the security master user SM1, then, in step A2, the security master user SM1 checks whether the transmitted identifier S-Projekt-ID-SM1 corresponds to the An identifier calculated in S-Projekt-SM1, if the safety master user SM1 therefore decides that there is a deviation between the identifiers, the automated system will principle to change to a safe state.

[0035] In addition, in the case of association, the security master user SM1 in step A4 will associate the identifier S...

example 2

[0036] Instance 2 ( Figure 3B ):

[0037] When the security master user SM1 has, for example, been swapped, or the security master user SM1 contains a different security control than expected because, for example, an update has not been installed, then in the security master No security controls will occur within the scope of user SM1. In step A6, the standard master user M checks immediately after the start of the automation network whether the identifier assigned to the safety control S-Projekt-SM1 is present in the safety master user SM1 , wherein, in the case of relevance, the standard master user M will change to normal operation in step A12.

[0038] If the standard master user M decides that the security master user SM1 does not have a valid framework, then later, in step A7, the standard master user M will set the security control S-Projekt- SM1 and the identifier S-Projekt-ID-SM1 assigned to the security control are loaded from its backup memory into the security ...

example 3

[0040] Instance 3 ( Figure 3C ):

[0041] During normal operation during the start of the automation network, the security master user SM1 will determine the identifier of the uploaded security control after the security control has been uploaded in step A15, and then, in step A15, In A16, the security master user SM1 will compare the calculated identifier with the identifier S-Projekt-ID-SM1 assigned to the security control, if the security master user SM1 determines that there is a discrepancy between the identifiers, and the automation network changes to a safe state in step A17 according to the fail-safe principle.

[0042]When the initial procedure of the security master user SM1 comes to a conclusion, in the case that the identifier is related, then in step A18, the security master user SM1 will start from the In the security slave user to be monitored within the framework of the security control, obtain the identifier stored therein, and then, in step A19, if the sec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In order to operate a safety control in an automation network having a master subscriber which implements the safety control, the safety control is assigned an identifier. When loading the safety control, the master subscriber checks whether the stored identifier in the safety master subscriber matches the identifier calculated form the safety control, and the automation network changes to a safe state if it is determined that the identifier differs.

Description

technical field [0001] The present invention relates to a method of operating a security control on an automation network comprising a master user implementing said security control and to an automation comprising a master user implementing a security control The internet. Background technique [0002] The idea of ​​today's concept of industrial automation (e.g. control and monitoring technology programs using software) is based on a central control comprising a decentralized sensor / actuator layer, so that users can communicate with each other via an industrial area network, As well as communicating with the higher-level system, in the following description, this is also called the automation network. The control functions described are based on two basic ideas, namely that the control functions are dispersed geographically and subdivided hierarchically, in which case the functional hierarchy makes it necessary to divide the automation tasks into a control layer and a The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G05B19/042
CPCG05B2219/25157G05B19/0425G05B2219/14114H04L12/40019H04L12/40013G05B2219/2231
Inventor 珍·莎奇霍格·布特纳德克·杰森奎多·贝克曼
Owner BECKHOFF AUTOMATION GMBH