Method for granting authorization to access a computer-based object in an automation system, computer program, and automation system

A technology of automation systems and computer programs, applied in computer control, computer security devices, computing, etc., to achieve the effects of flexible use, safe configuration, system security and stability improvement

Inactive Publication Date: 2011-08-03
SIEMENS AG
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This has the disadvantage that corresponding authentication methods can be integrated permanently in software modules that either require access to the resources to be protected or provide these resources to be protected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for granting authorization to access a computer-based object in an automation system, computer program, and automation system
  • Method for granting authorization to access a computer-based object in an automation system, computer program, and automation system
  • Method for granting authorization to access a computer-based object in an automation system, computer program, and automation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] according to figure 1 The method for granting access to computer-based objects 272 as indicated in the figure 2 The engineering system 201 of the automation system determines a software identifier for the control program 282 (step 101 ). Furthermore, the software identifier is encrypted by means of a private digital key assigned to the engineering system 201 . The engineering system 201 is connected to a first computer unit 202 , a second computer unit 203 and a third computer unit 204 via a communication network 205 . First services within the service-oriented architecture are provided by first computer unit 202 on the basis of computer-based objects 272 , while second services are provided on the basis of control programs 282 . On the hard disks 223, 233 of the first and second computer units 202, 203 are respectively stored program codes 207, 208 for realizing the first or second service. The corresponding program code 207 , 208 comprises a computer-based object ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

In order to grant authorization to access a computer-based object in an automation system, an identifier is determined for a control program, and said identifier is encrypted using a private digital key that is associated with a control and monitoring unit of the automation system. A first service of the automation system is provided on the basis of the computer-based object, and a second service thereof is provided on the basis of the control program. The encrypted identifier is decrypted when being transmitted to an authentication service and is verified by the authentication service. If the verification process has been successful, the authentication service transmits an at least temporarily valid token to the second service. When the control program requests access to the computer-based object, the token is transmitted to the first service for checking purposes. The control program is granted access to the computer-based object if the result of the checking process is positive.

Description

technical field [0001] The invention relates to a method, a computer program and an automation system for granting access rights to computer-based objects in an automation system. Background technique [0002] Due to the increasing importance of information technology for automation systems, methods for securing networked system components such as monitoring, control and regulating devices, sensors and actuators against unauthorized access are gaining increasing importance. Compared with other fields of application of information technology, data integrity in automation technology is given a particularly high priority. Especially when detecting, analyzing and transferring measurement and control data, it is ensured that complete and unaltered data are present. Intentional, unintentional or technical failure-driven changes can be avoided. Furthermore, special requirements for safety-related methods in automation technology arise from message traffic with numerous, but relat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G05B19/406G05B19/418G06F21/00H04L29/06G06F21/33
CPCG05B2219/24167G05B2219/25205H04L63/101H04L63/0807G06F21/335G05B19/4185G05B19/406G06F2221/2107G05B2219/36542Y02P90/02
Inventor H.赫尔博特U.克雷格A.佐比哈德
Owner SIEMENS AG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products