Arrangement and Method for Functionally Safe Connection Identification
20220158983 · 2022-05-19
Inventors
- Frank SCHMID (Berg bei Neumarkt i. d. Opf., DE)
- Herbert BARTHEL (Herzogenaurach, DE)
- Thomas Markus MEYER (Nürnberg, DE)
- Walter ü MAXIMILIAN (Nürnberg, DE)
Cpc classification
H04L63/062
ELECTRICITY
H04L63/04
ELECTRICITY
H04W4/70
ELECTRICITY
International classification
Abstract
Apparatus and method for functionally securely transfer data in a two-sided data exchange of safety-related data between two communication partners (A, B), wherein a mapping is defined, which assigns to a consumer ID a provider ID of the same end point in the case of each bidirectional connection, and the mapping is made known to the two end points a priori, where the mapping could consist of the one's complement or alternatively of the two's complement, and wherein the connection between the data provider and the data consumer is established as described, the data consumer receives the address identification of the data provider via an additional side channel, for example, and after the connection has been established, the identification of the data provider can be securely checked.
Claims
1.-13. (canceled)
14. A method for functionally safe connection identification for a bilateral data interchange of safety-oriented data between two communication subscribers in a communication system, safety-oriented data being interchanged via safety-oriented communication, address relationships comprising destination addresses and source addresses being planned for the safety-oriented communication, a first data consumer having a first address identifier and a first data provider being operated in a first communication subscriber, a second data provider having a third address identifier being operated, a second data consumer being additionally operated, in a second communication subscriber, a first unidirectional connection being set up between the first data consumer and the second data provider, and a second unidirectional connection being set up between the first data provider and the second data consumer, the method comprising: ascertaining, by the first communication subscriber, the third address identifier; producing an identifier in the first communication subscriber utilizing a computation rule which is applied to a unique value, said identifier being communicated to the first data consumer; transmitting, by the first data consumer, the unique value to the second data provider in a first request message; responding, by the second data provider, with a first response message containing first safety-oriented data and the third address identifier; performing a check in the first data consumer to determine whether the first response message contains the third address identifier, and, accepting the first safety-oriented data if a result of said check is positive, and otherwise rejecting the first safety-oriented data if the result of said check is negative; producing the identifier in the second communication subscriber utilizing the computation rule; and utilizing the identifier to functionally protect the second unidirectional connection between the first data provider and the second data consumer.
15. The method as claimed in claim 14, wherein the second data consumer transmits a second request message to the first data provider, the first data provider responds with a second response message containing second safety-oriented data and the identifier; and wherein a check is performed in the second data consumer to determine whether the second response message contains the identifier, and the second safety-oriented data are accepted if the result of this check is positive, the second safety-oriented data are accepted, and the second safety-oriented data are otherwise rejected if the result of this check is negative.
16. The method as claimed in claim 15, wherein the first data provider is operated with a second address identifier and said second address identifier is utilized as the unique value.
17. The method as claimed in claim 14, wherein the communication system utilized comprises one of (i) a system based on Open Platform Communication (OPC) Unified Architecture (UA) client/server mechanisms with Transmission Control Protocol/Internet Protocol (TCP/IP) communication and (ii) a system based on OPC UA Pub/Sub mechanisms with TCP/IP communication to which the mechanisms for a time-sensitive network (TSN) have been added.
18. The method as claimed in claim 15, wherein the communication system utilized comprises one of (i) a system based on Open Platform Communication (OPC) Unified Architecture (UA) client/server mechanisms with Transmission Control Protocol/Internet Protocol (TCP/IP) communication and (ii) a system based on OPC UA Pub/Sub mechanisms with TCP/IP communication to which the mechanisms for a time-sensitive network (TSN) have been added.
19. The method as claimed in claim 16, wherein the communication system utilized comprises one of (i) a system based on Open Platform Communication (OPC) Unified Architecture (UA) client/server mechanisms with Transmission Control Protocol/Internet Protocol (TCP/IP) communication and (ii) a system based on OPC UA Pub/Sub mechanisms with TCP/IP communication to which the mechanisms for a time-sensitive network (TSN) have been added.
20. The method as claimed in claim 14, wherein the third address identifier is ascertained via a side channel which is independent of the communication system or based on a configuration database utilizing position data of the first communication subscriber.
21. The method as claimed in claim 14, wherein the first communication subscriber is operated by or in an autonomous robot unit and the second communication subscriber is operated by or in a machine; and wherein the communication is set up after the robot unit approaches the machine.
22. The method as claimed in claim 16, wherein if a maximum numerical value of the second address identifier exceeds a word length available in a protocol that is used, then the first data consumer splits the second address identifier into parts and transmits the parts to the second data provider utilizing partial request messages, and said second data provider assembles the parts and ascertains the second address identifier; and wherein after the second address identifier is definite, the second data consumer transmits a final request message and said final request message is in turn answered with the second response message containing the second safety-oriented data and the second address identifier.
23. An arrangement comprising: a first communication subscriber and a second communication subscriber which interchange data via a communication system, the first communication subscriber including a first data consumer having a first address identifier and a first data provider having a second address identifier, the second communication subscriber including a second data provider having a third address identifier and a second data consumer; means configured to set up a first unidirectional connection between the first data consumer and the second data provider and to set up a second unidirectional connection between the first data provider and the second data consumer; wherein the first communication subscriber is configured to ascertain the third address identifier; wherein the first communication subscriber includes a mapping unit configured to utilize a computation rule, which is applied to a unique value, to produce an identifier; wherein the mapping unit is configured to forward the identifier to the first data consumer; wherein the first data consumer is configured to transmit the unique value to the second data provider in a first request message; wherein the second data provider is configured to respond to the first request message with a first response message containing first safety-oriented data and the third address identifier, safety-oriented data being interchanged via safety-oriented communication and address relationships comprising destination addresses and source addresses are firmly planned for the safety-oriented communication; wherein the first data consumer additionally includes checking means configured to check whether the first response message contains the third address identifier, the checking means being configured to declare the first safety-oriented data to be valid if the result of this check is positive, and to otherwise to reject declare the first safety-oriented data if the result of this check is negative; wherein the second communication subscriber includes a reverse mapping unit configured to utilize the computation rule to recover the identifier from the unique value and to transfer said identifier to the second data consumer; and wherein the first data provider and the second data consumer are configured to utilize the identifier which is currently known to the first data provider and the second data consumer on both sides to functionally protect the second unidirectional connection between the first data provider and the second data consumer.
24. The arrangement as claimed in claim 23, wherein the second data consumer is configured to transmit a second request message to the first data provider; wherein the first data provider is configured to respond with a second response message containing second safety-oriented data and the identifier; and wherein the second data consumer includes cross-checking means configured to check whether the second response message contains the identifier, and configured to accept the second safety-oriented data if a result of the check is positive, and to otherwise reject the second safety-oriented data if the result of the check is negative.
25. The arrangement as claimed in claim 23, wherein the communication system comprises one of (i) a system configured as a controller-controller communication system based on Open Platform Communication (OPC) Unified Architecture (UA) client/server mechanisms with Transmission Control Protocol/Internet Protocol (TCP/IP) communication and (ii) a system based on OPC UA Pub/Sub mechanisms with TCP/IP communication to which the mechanisms for a time-sensitive network (TSN) have been added.
26. The arrangement as claimed in claim 24, wherein the communication system (KS) comprises one of (i) a system configured as a controller-controller communication system based on Open Platform Communication (OPC) Unified Architecture (UA) client/server mechanisms with Transmission Control Protocol/Internet Protocol (TCP/IP) communication and (ii) a system based on OPC UA Pub/Sub mechanisms with TCP/IP communication to which the mechanisms for a time-sensitive network (TSN) have been added.
27. The arrangement as claimed in claim 23, wherein the arrangement includes a side channel which is independent of the communication system and which is configured to provide the third address identifier for the first data consumer.
28. The arrangement as claimed in claim 24, wherein the arrangement includes a side channel which is independent of the communication system and which is configured to provide the third address identifier for the first data consumer.
29. The arrangement as claimed in claim 25, wherein the arrangement includes a side channel which is independent of the communication system and which is configured to provide the third address identifier for the first data consumer.
30. The arrangement as claimed in claim 25, further comprising: an ascertaining means configured to access a configuration database; wherein the first communication subscriber comprises the position ascertaining means configured to ascertain the position data of the first communication subscriber, the ascertaining means being configured to take the position data as a basis for utilizing the configuration database to ascertain the third address identifier.
31. The arrangement as claimed in claim 23, wherein an autonomous mobile robot unit includes the first communication subscriber and a machine includes the second communication subscriber; and wherein the robot unit is configured to approach the machine and to set up a communication.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0034] The drawing shows multiple exemplary embodiments of the invention, in which:
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
DETAILED DESCRIPTION OF THE EXEMPLARY EMBODIMENTS
[0041]
[0042] The third autonomous mobile robot AMR3 has the first communication subscriber A and the third machine M3 has the second communication subscriber B. The two communication subscribers A, B form an arrangement CCC, which is described in more detail with reference to
[0043] When the third autonomous mobile robot AMR3 approaches the machine M3, it sets up a connection to the second communication subscriber B via the first communication subscriber A, and it therefore makes a first unidirectional connection UV1 and a second unidirectional connection UV2. The third autonomous mobile robot AMR3 additionally has a position ascertaining means PE that it can use to ascertain its position data X, Y, Z. Additionally, the third autonomous mobile robot AMR3 has an ascertaining means EM configured to access a configuration database KD, the ascertaining means additionally being designed to take the position data X, Y, Z as a basis for using the configuration database KD to ascertain the third address identifier ID_PG.sub.B.
[0044]
[0045]
[0046] Additionally, means are present for setting up a first unidirectional functionally safe connection UV1 between the first data consumer CI.sub.A and the second data provider PG.sub.B and a second unidirectional functionally safe connection UV2 between the first data provider PI.sub.A and the second data consumer CG.sub.B.
[0047] The first communication subscriber A is configured to ascertain the third address identifier ID_PG.sub.B of the second data provider PG.sub.B. The first communication subscriber A has a mapping unit AE configured to use a computation rule f, which is applied to the second address identifier ID_PI.sub.A, to produce the first address identifier ID_CI.sub.A. Additionally, the mapping unit AE is configured to forward the second address identifier ID_PI.sub.A to the first data consumer CI.sub.A. The first data consumer CI.sub.A is configured to transmit the second address identifier ID_PI.sub.A to the second data provider PG.sub.B in a first request message RQ1. The second data provider PG.sub.B is configured to respond to the first request message RQ1 with a first response message Res1. The first response message Res1 contains first safety-oriented data F.sub.B-Data and the third address identifier ID_PG.sub.B. The first data consumer CI.sub.A has checking means PM.sub.A. These checking means PM.sub.A are configured to check whether the first response message Res1 contains the third address identifier ID_PG.sub.B. This check can be performed by the checking means PM.sub.A because the first communication subscriber A has retrieved the third address identifier ID_PG.sub.B via a side channel SK in an earlier step. Additionally, the checking means PM.sub.A is configured so as, if the result of this check is positive, to declare the first safety-oriented data FB-Data to be valid, and otherwise to reject them, as a result of which the first unidirectional connection UV1 is functionally protected.
[0048] The second communication subscriber B has a reverse mapping unit RAE configured to use the computation rule f to recover the second address identifier ID_PI.sub.A from the first address identifier ID_CI.sub.A and to transfer the second address identifier to the second data consumer CG.sub.B for a later request.
[0049] The first data provider PI.sub.A and the second data consumer CG.sub.B are now configured to use the second address identifier ID_PI.sub.A that is now known to them on both sides to functionally protect the second unidirectional connection UV2 between the first data provider PI.sub.A and the second data consumer CG.sub.B. To this end, the second data consumer CGB essentially has a cross-checking means PM.sub.B configured to check whether the second response message Rest contains the second address identifier ID_PI.sub.A and, if the result of this check is positive, then the second safety-oriented data F.sub.A-Data are accepted, and otherwise rejected.
[0050] As safety-oriented data, it would be possible, for example, for the data signal of an emergency off switch 100 to be passed on. An emergency stop command 101 is forwarded to the first communication subscriber A via the first unidirectional connection UV1 as a functionally safe datum FB-Data. Safety-oriented data could also be a ready signal 102 from a robot. These would then be forwarded from the first communication subscriber A to the second communication subscriber B via the second unidirectional connection UV2.
[0051]
[0052] In a fourth step 4, the computation rule f is used to likewise produce the second address identifier ID_PI.sub.A in the second communication subscriber B and to forward the second address identifier to the second data consumer CG.sub.B. The second data consumer now sends a second request message RQ2 to the first data provider PI.sub.A in a fifth step 5. The first data provider PI.sub.A responds with a second response message Res2 containing second safety-oriented data F.sub.A-Data and the second address identifier ID_PI.sub.A.
[0053] In a sixth step 6, a check is then performed to determine whether the second response message Res2 contains the second address identifier ID_PI.sub.A, and, if the result of this check is positive, then the second safety-oriented data F.sub.A-Data are accepted, and otherwise rejected.
[0054]
[0055] Accordingly, the address identifier ID_PG.sub.B is again ascertained via a side channel SK in a step 1. In an alternative first step 11, a first partial request message RQ11 is used to transmit the first part part1. In an alternative second step 12, this transmission is answered with a response message Res. In an alternative third step 13, a second partial request message RQ12 is used to transmit the second part part2. In an alternative fourth step 14, a third partial request message RQ13 is used to transmit the third part part3. In an alternative fourth intermediate step 14a, the address identifier is now assembled from the three parts part1, part2, part3, and the computation rule f is applied to the assembled parts part1, part2, part3. A final request message FRQ1 is now transmitted, which is answered with a final response message FRES. This final response message FRES contains the safety-oriented data F.sub.A-Data and the second address identifier ID_PI.sub.A. Although the second address identifier ID_PI.sub.A is now an address with a long word length, the special feature of the protocol employed is that there is provision for more space in the response messages than in the request messages.
[0056]
[0057] Next, an identifier is produced in the first communication subscriber A utilizing a computation rule f that is applied to a unique value, as indicated in step 620. Here, the identifier is communicated to the first data consumer CIA.
[0058] Next, the first data consumer CIA transmits the unique value to the second data provider PGB in a first request message RQ1, as indicated in step 630.
[0059] Next, the second data provider PGB responds with a first response message Res1) containing first safety-oriented data FB-Data and the third address identifier ID_PGB, as indicated in step 640.
[0060] Next, a check is performed in the first data consumer CIA to determine whether the first response message Res1 contains the third address identifier ID_PGB, and the first safety-oriented data FB-Data is accepted if a result of the check is positive, and otherwise rejecting the first safety-oriented data FB-Data if the result of the check is negative, as indicated in step 650.
[0061] Next, the identifier is produced in the second communication subscriber B utilizing the computation rule f, as indicated in step 660.
[0062] Next, the identifier is utilized to functionally protect the second unidirectional connection UV2 between the first data provider PIA and the second data consumer CGB, as indicated in step 670.
[0063] Thus, while there have been shown, described and pointed out fundamental novel features of the invention as applied to a preferred embodiment thereof, it will be understood that various omissions and substitutions and changes in the form and details of the methods described and the devices illustrated, and in their operation, may be made by those skilled in the art without departing from the spirit of the invention. For example, it is expressly intended that all combinations of those elements and/or method steps which perform substantially the same function in substantially the same way to achieve the same results are within the scope of the invention. Moreover, it should be recognized that structures and/or elements and/or method steps shown and/or described in connection with any disclosed form or embodiment of the invention may be incorporated in any other disclosed or described or suggested form or embodiment as a general matter of design choice. It is the intention, therefore, to be limited only as indicated by the scope of the claims appended hereto.