Method for granting authorization to access a computer-based object in an automation system, computer program, and automation system
A technology of automation systems and computer programs, applied in computer control, computer security devices, computing, etc., to achieve the effects of flexible use, safe configuration, system security and stability improvement
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0014] according to figure 1 The method for granting access to computer-based objects 272 as indicated in the figure 2 The engineering system 201 of the automation system determines a software identifier for the control program 282 (step 101 ). Furthermore, the software identifier is encrypted by means of a private digital key assigned to the engineering system 201 . The engineering system 201 is connected to a first computer unit 202 , a second computer unit 203 and a third computer unit 204 via a communication network 205 . First services within the service-oriented architecture are provided by first computer unit 202 on the basis of computer-based objects 272 , while second services are provided on the basis of control programs 282 . On the hard disks 223, 233 of the first and second computer units 202, 203 are respectively stored program codes 207, 208 for realizing the first or second service. The corresponding program code 207 , 208 comprises a computer-based object ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com