METHOD FOR AUTOMATICALLY REGISTERING A USER ON A FIELD DEVICE, AND AUTOMATION SYSTEM

20210097156 · 2021-04-01

    Inventors

    Cpc classification

    International classification

    Abstract

    Provided is a method for automatically registering a user on a field device for the purpose of administering the field device, including a) providing user information on the basis of an identity of the user and an identity of the field device by a security device; b) transmitting the provided user information to a mobile device of the user; c) generating field-device-specific registration information on the basis of the transmitted user information by the mobile device; and d) registering the user on the field device by the generated registration information. This method has the particular advantage that a highly secure infrastructure can be used for administering access information for administering the field devices without problems arising during the registration process

    Claims

    1. A method for automatically registering a user on a field device for the purpose of administering the field device, comprising: a) providing user information on the basis of an identity of the user and an identity of the field device by a security device, b) transmitting the provided user information to a mobile device of the user, c) generating field-device-specific registration information on the basis of the transmitted user information by the mobile device, and d) registering the user on the field device by the generated registration information.

    2. The method as claimed in claim 1, wherein the security device is arranged locally to the field device.

    3. The method as claimed in claim 2, wherein the provided user information is transmitted between the mobile device and the security device by a local communication connection.

    4. The method as claimed in claim 1, wherein the security device is configured for cryptographically secure storage of access data for at least one user group from a plurality of user groups of the field device.

    5. The method as claimed in claim 1, wherein there is provision for a receiving apparatus, couplable to the field device, that registers on the field device as an interface device and that uses a communication connection to the mobile device to receive the registration information from the mobile device and registers the user on the field device.

    6. The method as claimed in claim 5, wherein the mobile device sends an administration input for administering the field device to the receiving apparatus in addition to the registration information and after the user has been registered on the field device.

    7. The method as claimed in claim 1, wherein the mobile device generates the registration information by a cryptographic method on the basis of the user information.

    8. The method as claimed in claim 1, wherein step a) comprises authentication of the user on at least one of the mobile device and/the security device.

    9. An automation system having a number of field devices and at least one security device, wherein each field device from the number of field devices is administrable by at least one user, wherein administering a respective instance of the field devices requires registration with the respective field device by field-device-specific registration information, wherein a mobile device of the at least one user is configured for retrieving user information from the security device on the basis of an identity of the at least one user and an identity of the respective field device, and wherein the mobile device is configured for generating the field-device-specific registration information on the basis of the retrieved user information and for outputting the generated registration information.

    10. The automation system as claimed in claim 9, wherein the number of field devices forms a local group, wherein the security device is arranged locally to the group.

    11. The automation system as claimed in claim 10, wherein the mobile device is configured for retrieving the user information by a local communication connection to the security device.

    12. The automation system as claimed in claim 9, wherein at least one of the field devices from the number of field devices has a coupled receiving apparatus that registers on the field device as an interface device, wherein the mobile device is configured for making a communication connection to the receiving apparatus, wherein the mobile device is configured for transmitting the registration information to the receiving apparatus via the communication connection and the receiving apparatus is configured for registering the at least one user on the field device.

    13. The automation system as claimed in claim 12, wherein the mobile device is configured for generating an administration input for administering the field device and for transmitting the administration input to the receiving apparatus after the at least one user has been registered on the field device.

    14. The automation system as claimed in claim 9, wherein the mobile device is configured for at least one of retrieving the user information and generating the registration information by a cryptographic method.

    15. The automation system as claimed in claim 9, wherein the communication connection for retrieving the user information and/or the communication connection for transmitting the registration information is a local communication connection.

    Description

    BRIEF DESCRIPTION

    [0083] Some of the embodiments will be described in detail, with references to the following Figures, wherein like designations denote like members, wherein:

    [0084] FIG. 1 shows a schematic block diagram of a first exemplary embodiment of an automation system;

    [0085] FIG. 2 shows a schematic block diagram of a second exemplary embodiment of an automation system;

    [0086] FIG. 3 shows a schematic block diagram of a third exemplary embodiment of an automation system; and

    [0087] FIG. 4 shows a schematic block diagram of an exemplary embodiment of a method for automatically registering a user on a field device.

    DETAILED DESCRIPTION

    [0088] FIG. 1 shows a schematic block diagram of a first exemplary embodiment of an automation system 300, which is an industrial production installation, for example. Without restricting the generality, the industrial production installation 300 in this instance has only one field device 100, which is a control computer of the industrial production installation 300, for example. The control computer 100 can be used to control the production by the industrial production installation 300, for example. If the industrial production installation 300 is extended by individual machines and/or altered, this needs to be configured accordingly on the control computer 100. This requires an appropriately trained user, for example a service engineer, to register on the control computer 100 in order to perform this configuration, this also being referred to as administration of the control computer 100.

    [0089] The user needs to have the appropriate rights in order to be permitted to make changes to the configuration. To this end, an administrator account is set up on the control computer 100, for example. The administrator account is in particular protected by a strong password, which is 250 characters long, for example, and contains a random mixture of uppercase and lowercase letters, numbers and special characters. Inputting such a password manually would be very time-consuming and error-prone. The user therefore carries a mobile device 150, which in this instance is in the form of a smartphone. As soon as the user is at the control computer 100, he uses a specific application in the smartphone 150, for example, to initiate the registration process. The smartphone 150 makes a communication connection K1 to a security device 200, which in this instance is in the form of a server. The server 200 has a cryptographic memory system that stores access data for a multiplicity of users and/or a multiplicity of field devices 100. At the request of the smartphone 150, the server 200 takes the identity of the user and of the field device on which he wishes to register as a basis for providing user information U1 and transmits the information to the smartphone 150.

    [0090] The smartphone 150 receives the user information U1 and generates registration information U2 therefrom, which in this instance comprises an access name for administrator access and the associated password, for example. In particular, the smartphone 150 accomplishes this by decrypting the received user information U1. There may also be provision for the smartphone 150 to forward the received user information U1 unchanged as the registration information U2.

    [0091] Using a transmission link K2, the smartphone 150 then transmits the registration information U2 to the field device 100 in order to log the user into the administrator account. The transmission link K2 is a wireless transmission connection, for example; it may in particular also be a signal transmission by an optical, acoustic and/or mechanical route. By way of example, the smartphone could display the registration information U2 as a barcode or a QR code on a screen, and a camera (not shown) arranged on the control computer 100 captures the screen content of the smartphone 150.

    [0092] The user can therefore easily register with the control computer 100, which is protected by a very strong password, as an administrator.

    [0093] The method described can be used if the field device 100 does not permit remote access, for example via the Internet.

    [0094] FIG. 2 shows a schematic block diagram of a second exemplary embodiment of an automation system 300. The second exemplary embodiment has the same features as the first exemplary embodiment, additional features being described below.

    [0095] By way of example, the field device 100 in this example is a measuring device that is obsolete and operated using obsolete and insecure control software. The measuring device 100 therefore has no Internet access and can be administered only in situ. Apart from relatively old interfaces, such as for example RS-232, PS/2 or USB 1.0, the measuring device 100 furthermore has no communication interfaces. In order to achieve automated registration of the user, the measuring device 100 has been equipped with a receiving apparatus 110, which in this instance is in the form of a USB dongle that registers with the measuring device 100 as a keyboard. The USB dongle 110 is in particular configured for making an NFC connection K2.

    [0096] In order to register with the measuring device 100, the user uses the mobile device 150, which is in the form of a smartphone, to retrieve user information U1 from a central security device 200 via a communication connection K1, which in this instance is in the form of a mobile radio connection (see FIG. 1). The smartphone 150 generates the registration information U2 from this user information U1 (see FIG. 1). The user then brings the smartphone 150 close to the USB dongle 110, the smartphone 150 setting up the NFC connection K2 to the USB dongle 110 and using this connection K2 to transmit the registration information U2.

    [0097] The USB dongle 110 receives the registration information U2 and outputs it to the measuring device 100, the measuring device 100 in this instance using the USB port to receive the same signal as if the user were to input the registration information U2 using a physical keyboard.

    [0098] The user is therefore automatically registered on the measuring device 100, which is why a strong password can be used to protect access in this case too without registration being a problem.

    [0099] FIG. 3 shows a schematic block diagram of a third exemplary embodiment of an automation system 300. The depicted automation system 300 is for example a security-critical system, such as a power station. Only one field device 100 is depicted in this instance too without restricting the generality.

    [0100] For security reasons, it is undesirable, in the case of the power station 300, for access data such as user information U1 (see FIG. 1) or registration information U2 (see FIG. 1) to be stored outside the power station 300 and/or centrally. The security device 200 is therefore arranged locally to the field device 100. Furthermore, there is a communication connection to the outside neither from the security device 200 nor from the field device 100.

    [0101] The user therefore needs to be physically present in order to administer the field device 100. To this end, the user uses his mobile device 150 to make a local communication connection K1 to the security device 200, for example an NFC connection. The security device 200 comprises an access data memory 210 that stores access data for a plurality of users, for example. The user information U1 associated with the user is read from the access data memory 210 by the security device 200 and transmitted to the mobile device 150 via the communication connection K1. The user information U1 is in particular cryptographically protected by OTP (one time pad), so that the user or the mobile device first needs to generate an appropriate cryptographic key that can be used to decrypt the information. In this way, the registration information U2 is generated in a cryptographically secure manner.

    [0102] The registration information U2 is transmitted from the mobile device 150 to the field device 100 or to a receiving apparatus 110 via a local communication connection K2, for example Bluetooth (see FIG. 2). This automatically logs in the user on the field device 100.

    [0103] Subsequently, the user can use the local communication connection K2 to convey further administration inputs to the field device 100, so that administration of the field device 100 by the mobile device 150 is possible. In particular, the administration can also take place fully automatically after registration of the user, for example by virtue of predetermined scripts and/or command sequences being transmitted from the mobile device 150 to the field device 100.

    [0104] FIG. 4 shows a schematic block diagram of an exemplary embodiment of a method for automatically registering a user on a field device 100 (see FIGS. 1-3).

    [0105] In a first step S1, user information U1 (see FIG. 1) is provided on the basis of an identity of the user and an identity of the field device 100 by a security device 200 (see FIGS. 1-3). In particular, the user information U1 is read from a cryptographically protected memory, such as for example an access data memory 210 (see FIG. 3). There can be provision for authentication of the user and/or of the mobile device 150 (see FIGS. 1-3).

    [0106] In a second step S2, the provided user information U1 is transmitted to the mobile device 150 of the user. The transmission in this instance can take place via a wired or wireless communication connection K1 (see FIGS. 1-3). To increase security, the communication connection K1 can be a local connection that permits only a short distance between the mobile device 150 and the security device 200. The transmission takes place in cryptographically protected fashion, that is to say in particular in encrypted fashion.

    [0107] In a third step S3, the mobile device 150 generates field-device-specific registration information U2 (see FIG. 1) on the basis of the transmitted user information U1. By way of example, the mobile device 150 decrypts the user information U1 transmitted in encrypted fashion.

    [0108] In a fourth step S4, the user is registered on the field device 100 by the generated registration information U2. The registration takes place automatically, in particular, that is to say without the user needing to input the registration information U2 himself. To this end, there is in particular provision for a local communication connection K2 (see FIGS. 1-3) from the mobile device 150 to the field device 100 or to a receiving apparatus 110 coupled to the field device 100 (see FIG. 2). The transmission of the registration information U2 via the communication connection K2 takes place in encrypted fashion, in particular. The registration information can also be kept secret from the user himself, which increases security further.

    [0109] Although the present invention has been disclosed in the form of preferred embodiments and variations thereon, it will be understood that numerous additional modifications and variations could be made thereto without departing from the scope of the invention.

    [0110] For the sake of clarity, it is to be understood that the use of “a” or “an” throughout this application does not exclude a plurality, and “comprising” does not exclude other steps or elements.