Method for identifying data corruption in a data transfer over an error-proof communication link
10979177 · 2021-04-13
Assignee
Inventors
- Johannes Hubert (Burgthann, DE)
- Marcus Lorentschk (Fürth, DE)
- Thomas Markus Meyer (Nuremberg, DE)
- Ales Gjerkes (Crensovci, SI)
- Nico Michaelis (Fürth, DE)
- Christoph Scherr (Heiligen Kreuz am Waasen, AT)
- Reinhard Watzenig (St. Stefan ob Stainz, AT)
Cpc classification
H03M13/09
ELECTRICITY
H04W16/14
ELECTRICITY
H04L5/0098
ELECTRICITY
H04W72/23
ELECTRICITY
H04W72/0453
ELECTRICITY
International classification
H04L1/00
ELECTRICITY
Abstract
System and method for identifying data corruption in a data transfer over an error-proof communication link, wherein additional structure checksums are formed to secure a data structure during transfer of the data structure, where representatives are associated with the data types, and the structure checksum is formed via the representatives to provide identification of data corruption in a data transfer over an error-proof communication link between a first automation component and a second automation component in industrial control engineering.
Claims
1. A method for identifying data corruption in a data transfer over an error-proof communication link between a first automation component and a second automation component in an automation system of industrial control engineering, a respective checksum regarding a telegram to be transferred being formed both at the first automation component and at the second automation component during transfer of a data structure to secure the data structure in the telegram to be transferred, and the data structure including different data types, the method comprising: associating a data-type-specific representative with the different data types contained in the data structure before the respective checksum at the first automation component for the telegram to be transferred is formed; forming a structure checksum via data-type-specific representatives; transferring the data structure with the structure checksum that is formed via the data-type-specific representatives; associating, in the second automation component, the data-type-specific representative with the data types in the received data structure; forming the structure checksum via the data-type-specific representatives; checking the transferred structure checksum and a newly calculated structure checksum at the second automation component; and indicating data corruption has been identified in an event of a discrepancy between the transferred structure checksums and the newly calculated structure checksum.
2. The method as claimed in claim 1, wherein, in the event of identification of data corruption, a data transfer error in the communication link is identified; wherein a secure condition is selected for the communication link; and wherein pre-projected substitute values are provided in the second automation component.
3. The method as claimed in claim 1, wherein, during data transfer, the structure checksum formed via the representatives is transferred in addition to the respective checksums formed for the telegram to be transferred.
4. The method as claimed in claim 2, wherein, during data transfer, the structure checksum formed via the representatives is transferred in addition to the respective checksums formed for the telegram to be transferred.
5. The method as claimed in claim 1, wherein one of (i) a numerical indicator, (ii) a textual indicator and (iii) the data type indicator is utilized as the representative.
6. The method as claimed in claim 2, wherein one of (i) a numerical indicator, (ii) a textual indicator and (iii) the data type indicator is utilized as the data-type-specific representative.
7. The method as claimed in claim 3, wherein one of (i) a numerical indicator, (ii) a textual indicator and (iii) the data type indicator is utilized as the data-type-specific representative.
8. The method as claimed in claim 1, wherein a security protocol is utilized to achieve data transfer.
9. An engineering system for at least one of setup, configuration and monitoring of an error-proof communication link between a first automation component and a second automation component in an automation system of industrial control engineering, a respective checksum regarding a telegram to be transferred being formed both at the first automation component and at the second automation component during transfer of a data structure to secure the data structure in the telegram to be transferred, data structures being transferable over the communication link, and the data structures including different data types, the engineering system comprising: an association device configured to associate with each of the data types of a data structure associated with a set-up error-proof communication link, a respective data-type-specific representative before the respective checksum at the first automation component for the telegram to be transferred is formed, and configured to transfer said association to the first and second automation components as an item of association information; wherein a structure checksum is formed via the data-type-specific representatives to identify data corruption in a data transfer over the error-proof communication link between the first and second automation components.
10. The engineering system as claimed in claim 9, wherein the system triggers an entry in a diagnostic buffer if data corruption is identified by the first and second automation components.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The drawing illustrates an exemplary embodiment of the invention. In the drawing:
(2)
(3)
(4)
(5)
(6)
(7)
DETAILED DESCRIPTION OF THE EXEMPLARY EMBODIMENTS
(8)
(9) For example, the data structure A is composed of four data types, in the order Bool, Int, Bool, Int, and accordingly there are associated with the Bool data types the representatives 17 and with the Int data types the representatives 89. If the order of the representatives 17, 89, 17, 89 is used to form the checksum, then a specific checksum 0X11223344 is obtained for the data structure of example A.
(10) The data structure B has data types in the order Int, Bool, Bool, Int, and accordingly has the representatives 89, 17, 17, 89; an exemplary checksum from the order of the representatives 89, 17, 17, 89 would give a checksum of 0X59425945.
(11) Likewise, the data structure C has four data types, in this case the data types Int, Word, Dint, DWord, and accordingly the representatives 89, 91, 47, 50 are associated therewith, and an exemplary checksum of 0X9A693BF8 is obtained.
(12)
(13)
(14) In accordance with the invention, in
(15) In
(16)
(17) Using an association step of “recording” connection parameters 32, information on how the representatives 30 are associated with the data types 21, 22, 23 is stored in the automation system 10 in the first and second automation components 11, 12.
(18)
(19) Next, a structure checksum CRC.sub.struct is formed via representatives 30, as indicated in step 620. The data structure 20 with the structure checksum CRC.sub.struct that is formed via the representatives 30 is now transferred, as indicated in step 630. Next, the data-type-specific representative 30 with the data types 21, 22, 23, 24, 25 in the received data structure 20 is associated in the second automation component 12, as indicated in step 640. Next, the structure checksum CRC.sub.struct is formed via the representatives 30, as indicated in step 650.
(20) Next, the transferred structure checksum CRC.sub.struct and a newly calculated structure checksum CRC.sub.struct are checked at the second automation component 12, as indicated in step 660. Next, data corruption that has been identified in an event of a discrepancy between the transferred structure checksums CRC.sub.struct and the newly calculated structure checksum CRC.sub.struct are now identified, as indicated in step 670.
(21) Thus, while there have been shown, described and pointed out fundamental novel features of the invention as applied to a preferred embodiment thereof, it will be understood that various omissions and substitutions and changes in the form and details of the devices illustrated, and in their operation, may be made by those skilled in the art without departing from the spirit of the invention. For example, it is expressly intended that all combinations of those elements and/or method steps which perform substantially the same function in substantially the same way to achieve the same results are within the scope of the invention. Moreover, it should be recognized that structures and/or elements shown and/or described in connection with any disclosed form or embodiment of the invention may be incorporated in any other disclosed or described or suggested form or embodiment as a general matter of design choice. It is the intention, therefore, to be limited only as indicated by the scope of the claims appended hereto.