METHOD AND APPARATUS FOR THE COMPUTER-AIDED CREATION AND EXECUTION OF A CONTROL FUNCTION
20210349443 · 2021-11-11
Inventors
Cpc classification
G05B19/4155
PHYSICS
G06F21/64
PHYSICS
International classification
Abstract
Methods for the computer-supported creation and execution of a control function are provided. The control function can be implemented in particular for a specific technical system, for example an automation system, and can in particular be cryptographically protected by a blockchain. In particular, the methods are suitable for a specific technical system, for example an automation system.
Claims
1. A method for the computer-aided creation of a control function of an automation system comprising the following method steps: providing a first control action of the control function; storing the first control action in a first transaction data set; creating the first control function by generating a first link of a blockchain, wherein the first link includes the first transaction data set, an integrity of at least one of the first link and of preceding links of the first link of the blockchain is protected by means of a first checksum.
2. The method as claimed in claim 1, wherein a control action transaction is additionally stored in the first transaction data set.
3. The method as claimed in claim 2, wherein a safety-critical protection function for the control function and/or the first control action is predefined by the control action transaction.
4. The method as claimed in claim 2, wherein a path for the first transaction data set of the blockchain is predefined by the control action transaction.
5. The method as claimed claim 2, wherein a first number of preceding links of at least one of the first link and a second number of succeeding links of the first link are/is predefined by the control action transaction, and the control action transaction predefines confirmation of an integrity of the first number of preceding links and/or of the second number of succeeding links.
6. The method as claimed in claim 1, wherein at least one of a first sensor value and further sensor values for a state assertion transaction are/is additionally stored in the first transaction data set.
7. The method as claimed in claim 1, wherein the control action transaction predefines a third number of blockchain nodes, which at least on of successfully execute ands confirm at least one of their associated control action transaction and state assertion transaction.
8. A method for the computer-aided execution of a control function comprising the following method steps: providing, a first link of a blockchain, wherein the first link comprises a first transaction data set and a first checksum; checking an integrity of the first link and/or of preceding links of the first link of the blockchain by means of the first checksum, wherein if the integrity is successfully ascertained, the following method steps are additionally carried out: loading a first control action of the control function from the first transaction data set; executing the control function by executing the first control action, wherein the executing is carried out by an automation system.
9. The method as claimed in claim 8, wherein a control action transaction is additionally provided by the first transaction data set, the control action transaction is successfully executed and confirmed in order to allow the control function to be executed.
10. The method as claimed in claim 9, wherein a safety-critical protection function for at least one of the control function and the first control action is predefined by the control action transaction.
11. The method as claimed in claim 9, wherein a path for the first transaction data set of the blockchain is predefined by the control action transaction.
12. The method as claimed in claim 9, wherein a first number of preceding links of at least one of the first link and a second number of succeeding links of the first link are/is predefined by the control action transaction, and the control action transaction predefines confirmation of an integrity of the first number of preceding links and/or of the second number of succeeding links.
13. The method as claimed in claim 9, wherein a first sensor value and/or further sensor values for a state assertion transaction are/is additionally provided by the first transaction data set, the state assertion transaction is confirmed and/or successfully executed in order to allow the control function to be executed.
14. The method as claimed in claim 9, wherein the control action transaction predefines a third number of blockchain nodes, which at least one of successfully execute and confirm at least one of their associated control action transaction and state assertion transaction.
15. The method as claimed in claim 1, wherein a control signal is provided if at least one of: the integrity of the first link is not confirmed; and the control action transaction is at least one of not confirmed and is not carried out; the state assertion transaction is at least one of not confirmed and is not carried out.
16. A creating apparatus for the computer-aided creation of a control function of an automation system comprising: a first providing module for providing a first control action of the control function; a first storage module for storing the first control action in a first transaction data set; a first creating module for creating the first control function by generating a first link of a blockchain, wherein the first link comprises the first transaction data set, an integrity of the first link and/or of preceding links of the first link of the blockchain is protected by a first checksum.
17. A control device for an automation system comprising: a first receiving module for receiving a first link of a blockchain, wherein the first link includes a first transaction data set and a first checksum; a first checking module for checking an integrity of at least one of the first link and of preceding links of the first link of the blockchain by means of the first checksum; a first loading module for loading a first control action of the control function from the first transaction data set if the integrity is ascertained successfully; a first execution module, in particular a processor, for executing the control function by executing the first control action if the integrity is ascertained successfully.
18. A computer program product comprising program instructions for carrying out the methods as claimed in claim 1.
19. A computer program product comprising program instructions for a creating device which is configured by the program instructions to create the creating apparatus as claimed in claim 16.
20. A providing apparatus for the computer program product as claimed in claim 18, wherein the providing apparatus at least one of stores and provides the computer program product.
Description
BRIEF DESCRIPTION
[0078] Some of the embodiments will be described in detail, with references to the following Figures, wherein like designations denote like members, wherein:
[0079]
[0080]
[0081]
[0082]
[0083]
[0084]
[0085]
[0086]
[0087]
DETAILED DESCRIPTION
[0088] The following exemplary embodiments, unless indicated otherwise or already indicated, comprise at least one processor and/or a storage unit in order to implement or carry out the method.
[0089] Moreover, in particular a (relevant) person skilled in the art, with knowledge of the method claim/method claims, is of course aware of all routine possibilities for realizing products or possibilities for implementation in the prior art, and so there is no need in particular for independent disclosure in the description. In particular, these customary realization variants known to the person skilled in the art can be realized exclusively by hardware (components) or exclusively by software (components). Alternatively, and/or additionally, the person skilled in the art, within the scope of his/her expert ability, can choose to the greatest possible extent arbitrary combinations according to the invention of hardware (components) and software (components) in order to implement realization variants according to the invention.
[0090] A combination according to the invention of hardware (components) and software (components) can occur in particular if one portion of the effects according to the invention is brought about preferably exclusively by special hardware (e.g. a processor in the form of an ASIC or FPGA) and/or another portion by the (processor- and/or memory-aided) software.
[0091] In particular, in view of the high number of different realization possibilities, it is impossible and also not helpful or necessary for the understanding of the invention to name all these realization possibilities. In this respect, in particular all the exemplary embodiments below are intended to demonstrate merely by way of example a few ways in which in particular such realizations of the teaching according to the invention could be manifested.
[0092] Consequently, in particular the features of the individual exemplary embodiments are not restricted to the respective exemplary embodiment, but rather relate in particular to the invention in general. Accordingly, features of one exemplary embodiment can preferably also serve as features for another exemplary embodiment, in particular without this having to be explicitly stated in the respective exemplary embodiment.
[0093]
[0094] The method is preferably realized in a computer-aided manner.
[0095] In specific detail, a method for the computer-aided creation of a control function is realized in this exemplary embodiment. The method can be used for example for creating a control function for a specific technical system, such as an automation system, for example.
[0096] The method comprises a first method step 110 for providing a first control action of the control function. The control function can comprise for example further control actions in addition to the first control action. A control action can control for example a movement of an actuator of a robot of an automation system. A control action instructs an actuator for example to rotate the latter by a predefined angle about a predefined axis or to carry out a movement with a predefined distance along a predefined direction.
[0097] The method comprises a second method step 120 for storing the first control action in a first transaction data set. As a result, in particular, the control function and/or the first control action can be stored in the first transaction data set.
[0098] The method comprises a third method step 130 for creating the first control function by generating a first link of a blockchain, wherein the first link comprises the first transaction data set (in particular including the control function and/or the first control action), and an integrity of the first link (including the first transaction data set) and/or preceding links of the first link of the blockchain is protected by means of a first checksum. The first checksum can for example be appended to the first link and/or be inserted as checksum of the preceding block in a link succeeding the first link.
[0099] The first link is thus inserted into the blockchain, for example. Alternatively, or additionally, a second checksum is formed over the first transaction data set (e.g. the transactions) of the first link and/or the link directly preceding the first link and/or links preceding the first link (e.g. all or selected links). Alternatively, or additionally, a third checksum is formed over each transaction or each transaction of the first transaction data set. The second checksums and/or the third checksums can be for example checksums and/or leaves of a hash tree, for example a Merkle tree. A root checksum is calculated from these checksums and/or leaves of the hash tree, as known for the Merkle tree, wherein the root checksum can serve as first checksum.
[0100] In this way, as known e.g. from bitcoin, in particular instead of the first transaction data set/the transactions of a corresponding link, only the respective checksums (e.g. the first checksum and/or the second checksums and/or third checksums) can be stored in the links of the blockchain. In particular, a memory saving is achieved as a result.
[0101] The transactions themselves and/or the first transaction data set can in this case each additionally be protected by means of a fourth checksum. Said fourth checksum can be realized as a digital signature, for example, wherein a creator of the transaction has in particular a private key for creating the digital signature, said private key preferably being known exclusively to said creator, and provides a matching public key for checking the digital signature. Providing the public key can take place for example in the same transaction that was signed by the creator, or the public key is made accessible in some other way in order to check the digital signature or the transaction protected by the digital signature for its authenticity. This can be effected for example by means of a separate transaction/first transaction data set of a new link of the blockchain, comprising the public key.
[0102]
[0103] The method is preferably realized in a computer-aided manner.
[0104] In specific detail, a method for the computer-aided execution of a control function is realized in this exemplary embodiment. The method can be used for example for executing the control function for a specific technical system, such as an automation system, for example.
[0105] The method comprises a first method step 210 for providing a first link of a blockchain, wherein the first link comprises a first transaction data set and a first checksum. The providing can be effected for example by the first link of the blockchain being transmitted to the automation system via a network connection and being processed by a control device.
[0106] The method comprises a second method step 220 for checking an integrity of the first link and/or of preceding links of the first link of the blockchain by means of the first checksum. For this purpose, by way of example, the control device can form a fifth checksum over the first transaction data set of the first link. If the first checksum and the fifth checksum correspond, then an integrity of the first transaction data set can be confirmed. This can also be carried out in the same way for the preceding links in order to check the integrity of the first transaction data set.
[0107] If the integrity for the first transaction data set is successfully ascertained in an intermediate step 225 of the method, the following method steps are additionally carried out:
[0108] The method comprises a third method step 230 for loading a first control action of the control function from the first transaction data set if the integrity was successfully ascertained. For this purpose, the control device reads out for example the first transaction data set and loads the first control action into its main memory.
[0109] The method comprises a fourth method step 240 (if the integrity was successfully ascertained) for executing the control function by executing the first control action, wherein the executing is carried out in particular by an automation system. For this purpose, the control device drives for example an actuator of the automation system in accordance with the first control action.
[0110] If the integrity for the first transaction data set is not successfully ascertained in the intermediate step 225, then in a fifth method step 250, for example, a control signal can be provided in order to bring the control device to a safe state, for example.
[0111] In particular, arbitrary information can be encoded as a transaction/transaction data structure (e.g. first transaction data set). Such a transaction can be stored in particular in a blockchain. The information stored by the transaction, for example, cannot subsequently be manipulated, and it can preferably be evaluated and checked by third parties (e.g. nodes). In this case, in particular, no central infrastructure is required. Such a blockchain thus preferably constitutes a decentralized, manipulation-protected database.
[0112] In other words, a method according to the invention for creating and executing a control function is realized in
[0113] In this case, in particular, a control action is carried out in accordance with the links currently confirmed in the blockchain, and the transactions contained. This has the advantage, in particular, that the protection of a blockchain is used to realize the reliability of a safety-critical critical control function. In particular, a safety-critical protection function can be defined by a smart contract of a blockchain transaction. Such a transaction can also be referred to as a control action transaction, in particular, since the latter drives an action, for example of an actuator.
[0114] In one variant, the control action transaction can be carried out only if the transaction lies in a confirmed path (i.e. if a side path of the blockchain does not additionally exist).
[0115] In a further variant, the action defined by the control action transaction is executed only if there are a predefinable number of confirmed links of the blockchain following the link which comprises said control action transaction.
[0116] In a further variant, a control action transaction is deemed to be valid only if it is confirmed a number of times. In this case, a transaction must preferably have been checked by various blockchain nodes before it is accepted as valid and executed by an actuator. In other words, a link must be confirmed in particular by a plurality of nodes (e.g. with different puzzle solutions or proof-of-work verifications) in order to be recognized as valid.
[0117] A control device executes a control function in accordance with the control action transaction of the current confirmed link of the blockchain.
[0118] In a further variant, the node monitors that a current confirmed link is actually present in the blockchain. Otherwise, in particular a fail-safe mode is activated (e.g. by the control signal). In other words, this involves monitoring, in particular, whether the blockchain system is still active (liveliness monitoring).
[0119] In a further variant, a state of a physical system, for example of a specific technical system, e.g. an automation system, can be confirmed by sensors or field devices with connected sensors. The sensor values detected by the sensors, in a state assertion transaction, are inserted into the blockchain preferably by way of a trustworthy source and/or node. In this case, it is furthermore possible, in particular, for checked data derived from raw data of physical, actual sensors to be determined (e.g. by means of a smart contract). In this regard, a state value can be determined, for example, which is determined depending on the measurement values of a plurality of redundant sensors which each put a state assertion transaction into the blockchain. Specifically, this can be realized for example by a link with a transaction data set or a state assertion transaction being inserted into the blockchain. Checking can then be carried out by means of a smart contract, for example, which was likewise inserted into the blockchain or as a transaction into a link of the blockchain. This can be done for example by forming a derived, checked value (e.g. majority decision of two out of three). Manipulation-protected sensor data processing (data fusion) can thus be carried out in particular within the blockchain.
[0120] In particular, the following control functions can thus be realized.
[0121] By way of example, the following application scenarios can be realized with the method according to the invention in the case of signal boxes and/or train safety systems: transactions indicate in particular the current state of the railroad automation system (e.g. switch position, proceed signal, axle counter, track-free signaling, barrier signaling). In particular by means of blockchains or the smart contracts stored in the transactions/transaction data sets, it is ensured that only permissible transactions are confirmed by the blockchain. A state change, e.g. a change in the switch position or the signal aspect of a proceed signal, is confirmed as a control action transaction by the blockchain only if the smart contract is fulfilled. In this case, it is also possible, in particular, to check that the transaction is confirmed as permissible by a plurality of nodes, e.g. verification nodes, of the train safety system.
[0122] In a further variant, the signal box itself is realized as a blockchain.
[0123] In a further variant, only the operation of the signal box is monitored. For this purpose, e.g. the control communication can be coupled out from the control network without repercussions via a one-way gateway. Instead of a conventional black box recorder or juridical recorder, for example, which only records the data in order that they are available in the event of an accident, the data can simultaneously be checked for permissibility in the blockchain. It is thereby possible to realize an independent monitoring system for a signal box/train safety system.
[0124] By way of example, a protection circuit of an automation system can also be realized with the method according to the invention: in a manner similar to that described above (signal boxes and/or train safety systems), in the case of protection monitoring, e.g. of a robot by means of a light curtain, the robot can change to a fail-safe mode if there is no current confirmation by a control action transaction that an operationally safe state is present.
[0125] By way of example, the method according to the invention can be used to realize diagnosis functions, e.g. fault messages, as transactions. Moreover, it is possible to detect, in particular, required maintenance work (predictive maintenance) depending on transactions, and it is possible for a maintenance ticket to be generated automatically, if appropriate.
[0126] In a further variant, for the control function/first control action on the basis of project configuring data (components, automatic logic), corresponding smart contracts that realize the control logic are generated for a blockchain.
[0127]
[0128] The apparatus comprises a first providing module 310, a first storage module 320, a first creating module 330 and an optional first communication interface 304, which are communicatively connected to one another via a first bus 303.
[0129] The apparatus can for example additionally also comprise one further component or a plurality of further components, such as, for example, a processor, a storage unit, an input device, in particular a computer keyboard or a computer mouse, and a display device (e.g. a monitor). The processor can comprise for example a plurality of further processors, wherein for example the further processors in each case realize one or more of the modules. Alternatively, the processor realizes in particular all modules of the exemplary embodiment. The further component(s) can for example likewise be communicatively connected to one another via the first bus 303.
[0130] The processor can be for example an ASIC that was realized in an application-specific manner for the functions of a respective module or all modules of the exemplary embodiment (and/or of further exemplary embodiments), wherein the program component or the program instructions is/are realized in particular as integrated circuits. The processor can for example also be an FPGA that is configured in particular by means of the program instructions in such a way that the FPGA realizes the functions of a respective module or all modules of the exemplary embodiment (and/or of further exemplary embodiments).
[0131] The first providing module 310 is designed for providing a first control action of the control function.
[0132] The first providing module 310 can be implemented or realized for example by means of the processor, the storage unit and a first program component, wherein for example the processor is configured by execution of program instructions of the first program component or the processor is configured by the program instructions in such a way that the first control action of the control function is provided.
[0133] The first storage module 320 is designed for storing the first control action in a first transaction data set.
[0134] The first storage module 320 can be implemented or realized for example by means of the processor, the storage unit and a second program component, wherein for example the processor is configured by execution of program instructions of the second program component or the processor is configured by the program instructions in such a way that the first control action is stored.
[0135] The first creating module 330 is for creating the first control function by generating a first link of a blockchain, wherein the first link comprises the first transaction data set, and an integrity of the first link and/or of preceding links of the first link of the blockchain is protected by means of a first checksum.
[0136] The first creating module 330 can be implemented or realized for example by means of the processor, the storage unit and a third program component, wherein for example the processor is configured by execution of program instructions of the third program component or the processor is configured by the program instructions in such a way that the control function is created.
[0137] The execution of the program instructions of the respective modules can be carried out in this case for example by means of the processor itself and/or by means of an initialization component, for example a loader or a configuration component.
[0138]
[0139] The apparatus comprises a first receiving module 410, a first checking module 420, a first loading module 430, a first execution module 440 and an optional second communication interface 404, which are communicatively connected to one another via a second bus 403. Via the second communication interface, an industrial robot 460 is connected to the control device via a third bus 450.
[0140] The apparatus can for example additionally also comprise one further component or a plurality of further components, such as, for example, a processor, a storage unit, an input device, in particular a computer keyboard or a computer mouse, and a display device (e.g. a monitor). The processor can comprise for example a plurality of further processors, wherein for example the further processors in each case realize one or more of the modules. Alternatively, the processor realizes in particular all modules of the exemplary embodiment. The further component(s) can for example likewise be communicatively connected to one another via the first bus 403.
[0141] The processor can be for example an ASIC that was realized in an application-specific manner for the functions of a respective module or all modules of the exemplary embodiment (and/or of further exemplary embodiments), wherein the program component or the program instructions is/are realized in particular as integrated circuits. The processor can for example also be an FPGA that is configured in particular by means of the program instructions in such a way that the FPGA realizes the functions of a respective module or all modules of the exemplary embodiment (and/or of further exemplary embodiments).
[0142] The first receiving module 410 is designed for receiving a first link of a blockchain, wherein the first link comprises a first transaction data set and a first checksum.
[0143] The first receiving module 410 can be implemented or realized for example by means of the processor, the storage unit, the second communication interface 404 and a first program component, wherein for example the processor is configured by execution of program instructions of the first program component or the processor is configured by the program instructions in such a way that the first link can be received by the control device. The first link may have been communicated to the control device for example by a creating device such as is shown in
[0144] The first checking module 420 is designed for checking an integrity of the first link and/or of preceding links of the first link of the blockchain by means of the first checksum.
[0145] The first checking module 420 can be implemented or realized for example by means of the processor, the storage unit and a second program component, wherein for example the processor is configured by execution of program instructions of the second program component or the processor is configured by the program instructions in such a way that the integrity is checked.
[0146] The first loading module 430 is designed for loading a first control action of the control function from the first transaction data set if the integrity was successfully ascertained by the first checking module 420.
[0147] The first loading module 430 can be implemented or realized for example by means of the processor, the storage unit and a third program component, wherein for example the processor is configured by execution of program instructions of the third program component or the processor is configured by the program instructions in such a way that the first control action is loaded if the integrity was successfully ascertained by the first checking module 420.
[0148] The first execution module 440 is designed for executing the control function by executing the first control action if the integrity was successfully ascertained by the first checking module 420.
[0149] The first execution module 440 can be implemented or realized for example by means of the processor, the storage unit and a fourth program component, wherein for example the processor is configured by execution of program instructions of the fourth program component or the processor is configured by the program instructions in such a way that the first control action is executed if the integrity was successfully ascertained by the first checking module 420.
[0150] The execution of the program instructions of the respective modules can be carried out in this case for example by means of the processor itself and/or by means of an initialization component, for example a loader or a configuration component.
[0151]
[0152] In specific detail,
[0153] The field devices D1-D5 can comprise sensors S and/or actuators A or be connected thereto.
[0154] A public key or a public key hash can be assigned in particular to each blockchain node (e.g. a field device), sensor, actuator, the latter being able to be identified within the blockchain system by means of said public key or public key hash. It is thereby possible to digitally sign the respective transactions in a link of a blockchain for example by means of the public key. In this regard, by way of example, a sensor value can be assigned to a sensor, and a control command for a specific actuator can be allocated to said actuator in a targeted manner. In addition, blockchain nodes, sensors, actuators can respectively comprise a secret private key in order to digitally sign in particular transactions/the first transaction data set.
[0155] The field devices D1-D5 can each comprise a control device such as was elucidated in
[0156] A blockchain node BCC comprising a creating device can create for example a control function such as was elucidated in
[0157]
[0158] In specific detail,
[0159] The links 610 each comprise a plurality of transaction data sets T. One, a plurality or all of the transaction data sets can be for example a first transaction data set such as is created in
[0160] The links 610 respectively additionally also comprise a first checksum CRC1, CRC2, CRC3, which is formed depending on the predecessor link. Consequently, the first link 611 comprises a first checksum from its predecessor link, the second link 612 comprises a first checksum from the first link 611, and the third link 613 comprises a first checksum from the second link 612. The first checksum is preferably formed in each case over the entire data structure including the transaction data sets T. This can be realized, as already explained in the previous exemplary embodiments, by means of a hash tree. The checksums CRC1, CRC2, CRC3 can preferably be formed using a cryptographic hash function such as e.g. SHA-256 or SHA-3.
[0161] In order to form the hash tree, the links each comprise a third checksum with respect to their transactions/transaction data sets T (in general likewise a hash value formed depending on the transactions/transaction data sets). A hash tree, e.g. a Merkle tree or Patricia tree, is usually used, the root hash value/root checksum of which is preferably stored as first checksum in the respective link or provided for a succeeding link.
[0162] A link can furthermore have a time stamp, a digital signature, a proof-of-work verification.
[0163] The links can then be transmitted to a field device with a control device (e.g. the control device from
[0164]
[0165] In specific detail,
[0166] The state assertion transaction comprises a plurality of data fields, such as, for example, a subject/identifier for the transaction 720, an optional public device key 730 (e.g. 3A76E21876EFA03787FD629A65E9E990 . . . ), the used algorithm 740 of the public key 730 (e.g. ECC), a parameter indication 750 concerning the algorithm (e.g. Curve: brainpoolP160r1), and a smart contract 760 specifying how a sensor value 770 is intended to be evaluated and what conditions the sensor value 770 must meet in order that the transaction is valid or can be executed successfully. In addition, the state assertion transaction 710 comprises a time stamp 780 and a digital signature 790 for the state assertion transaction 710 or the first transaction data set.
[0167]
[0168] The public device key 730 can be used for example to ensure an authenticity of the sensor value; for example the fact that only a specific sensor has provided this sensor value.
[0169]
[0170] In specific detail,
[0171] The control action transaction 810 comprises a plurality of data fields, such as, for example, a subject/identifier for the transaction 720, an optional public key 830 (e.g. 3A76E21876EFA4711FD629A65E9E990 . . . ) for identifying the control function, the used algorithm 740 of the public key 730 (e.g. ECC), a parameter indication 750 concerning the algorithm (e.g. Curve: brainpoolP160r1), and a smart contract 860 specifying how a control action 870 (e.g. the first control action) is intended to be evaluated and what safety conditions must be met in order that the transaction is valid or can be executed successfully. In addition, the control action transaction 810 comprises an action target 875, which is intended to execute the control action 870, in particular, a time stamp 780 and a digital signature 790 for the control action transaction 810 or the first transaction data set.
[0172] In this way, in particular, a safety-protected control function can be realized by means of a link of a blockchain.
[0173]
[0174] In specific detail,
[0175] The combination transaction 910 comprises a plurality of data fields, such as, for example, a subject/identifier for the transaction 720, an optional public key 830 (e.g. 3A76E21876EFA4711FD629A65E9E990 . . . ) for identifying the control function, the used algorithm 740 of the public key 730 (e.g. ECC), a parameter indication 750 concerning the algorithm (e.g. Curve: brainpoolP160r1), and a smart contract 960 specifying how a control action 870 (e.g. the first control action) is intended to be evaluated and what safety conditions must be met in order that the transaction is valid or can be executed successfully. In addition, the combination transaction comprises a digital signature 790 for the control action transaction 810 or the first transaction data set.
[0176] The logic of the control application, for example a safety logic and/or a control algorithm and/or the control function and/or stipulations that can be made by a control action transaction, and/or safety-critical protection functions, is stored in this case as a smart contract, for example as program code, in the transaction.
[0177] In this case, e.g. a blockchain node, for example a blockchain node which comprises a creating device (such as is shown in
[0178] Although the invention has been illustrated and described in greater detail with reference to the preferred exemplary embodiment, the invention is not limited to the examples disclosed, and further variations can be inferred by a person skilled in the art, without departing from the scope of protection of the invention.
[0179] For the sake of clarity, it is to be understood that the use of “a” or “an” throughout this application does not exclude a plurality, and “comprising” does not exclude other steps or elements.