KST KUKA Encryption 11 en

background image

Issued: 17.12.2009

Version: KST KUKA Encryption 1.1 V1 en

KUKA Roboter GmbH

KUKA System Technology

KUKA.Encryption 1.1

For KUKA System Software 5.3, 5.4, 5.5, 5.6

background image

© Copyright 2009

KUKA Roboter GmbH
Zugspitzstraße 140
D-86165 Augsburg
Germany

This documentation or excerpts therefrom may not be reproduced or disclosed to third parties without
the express permission of the KUKA Roboter GmbH.

Other functions not described in this documentation may be operable in the controller. The user has
no claims to these functions, however, in the case of a replacement or service work.

We have checked the content of this documentation for conformity with the hardware and software
described. Nevertheless, discrepancies cannot be precluded, for which reason we are not able to
guarantee total conformity. The information in this documentation is checked on a regular basis, how-
ever, and necessary corrections will be incorporated in the subsequent edition.

Subject to technical alterations without an effect on the function.

Translation of the original documentation

KIM-PS5-DOC

KUKA.Encryption 1.1

2 / 21

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en

Publication:

Pub KST KUKA.Encryption 1.1 en

Book structure: KST KUKA Encryption 1.1 V1.4
Label:

KST KUKA Encryption 1.1 V1

background image

3 / 21

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en

Contents

1

Introduction ..................................................................................................

5

1.1

Target group ..............................................................................................................

5

1.2

Representation of warnings and notes ......................................................................

5

1.3

Trademarks ................................................................................................................

5

2

Product description .....................................................................................

7

2.1

Overview of KUKA.Encryption ...................................................................................

7

3

Installation ...................................................................................................

9

3.1

System requirements .................................................................................................

9

3.2

Installing KUKA.Encryption ........................................................................................

9

3.3

Uninstalling KUKA.Encryption ....................................................................................

9

4

Operation ......................................................................................................

11

4.1

Buttons .......................................................................................................................

11

4.2

Operator control of KUKA.Encryption ........................................................................

11

4.2.1

Tool Option tab (default setting) ...........................................................................

12

4.3

Encryption of files (Encrypt) .......................................................................................

13

4.4

Creating Setup files (Deliver) .....................................................................................

14

4.5

Executing the Setup file .............................................................................................

15

4.6

Selecting/deselecting a program ................................................................................

15

4.7

Activating a certificate ................................................................................................

15

Index .............................................................................................................

19

Contents

background image

4 / 21

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en

KUKA.Encryption 1.1

background image

5 / 21

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en

1. Introduction

1

Introduction

1.1

Target group

This documentation is aimed at users with the following knowledge and skills:

„

Advanced knowledge of the Windows operating system

1.2

Representation of warnings and notes

Safety

Warnings marked with this pictogram are relevant to safety and must be ob-
served.

Notes

Notes marked with this pictogram contain tips to make your work easier or ref-
erences to further information.

1.3

Trademarks

Windows is a trademark of Microsoft Corporation.

For optimal use of our products, we recommend that our customers take part
in a course of training at KUKA College. Information about the training pro-
gram can be found at www.kuka.com or can be obtained directly from our
subsidiaries.

Danger!
This warning means that death, severe physical injury or substantial material
damage will occur, if no precautions are taken.

Warning!
This warning means that death, severe physical injury or substantial material
damage may occur, if no precautions are taken.

Caution!
This warning means that minor physical injuries or minor material damage
may occur, if no precautions are taken.

Tips to make your work easier or references to further information.

background image

6 / 21

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en

KUKA.Encryption 1.1

background image

7 / 21

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en

2. Product description

2

Product description

2.1

Overview of KUKA.Encryption

Overview

The program KUKA.Encryption can be used to protect KRL program files of
types SRC, SUB and DAT against unauthorized access and modification by
encrypting them. The program also makes it possible to sign the files.

Functions

KUKA.Encryption has four functions that can be combined with one another.
All encrypted and signed files can be selected and executed and the functions
can be integrated into other programs.

KUKA.Encryption contains the following selection parameters for the encryp-
tion type:

„

do nothing: contents are neither encrypted nor signed.

„

encrypt: contents are encrypted.
Encryption of KRL program files of types SRC, SUB and DAT protects the
data they contain against unauthorized access. Encrypted files cannot be
read by the operator; they are writable, and changes are saved during a
cold start.

„

sign: contents are signed.
Signing of KRL program files protects them against unauthorized chang-
es. Signed files are write-protected, and can be read in the editor.

„

encrypt & sign: contents are encrypted and signed.
Files which are encrypted and signed are not readable by the operator,
and are write-protected.

Additional functions:

„

Simultaneously selected KRL program files are automatically grouped to-
gether as a Protected File Container.

„

Protected File Containers can be assigned and distributed on the robot
controllers.

KUKA.Encryption generates a setup program containing the encrypted files.
This setup program can be used to copy the encrypted files to the selected di-
rectories on the robot controller.

background image

8 / 21

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en

KUKA.Encryption 1.1

background image

9 / 21

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en

3. Installation

3

Installation

3.1

System requirements

Hardware

„

Standard PC / notebook

Software

„

Windows XP

3.2

Installing KUKA.Encryption

Precondition

„

Local administrator rights

„

All Windows applications are closed.

Procedure

1. Start the Setup.exe program for KUKA.Encryption on the disk.
2. In the KUKA Encryption Tool Setup window, confirm with OK.
3. In the KUKA Encryption Tool window, confirm with Next. The following

window opens:

4. In the input box Folder, accept the suggested directory or select/create a

new directory using Browse.

5. Select the required check box:

„

Everyone (All users can use KUKA.Encryption)

„

Just me (Only the user who installed the program)

6. Confirm twice with Next. Enter the password in the input box and confirm

with OK.

7. Terminate installation with Close and OK.

3.3

Uninstalling KUKA.Encryption

Precondition

„

Local administrator rights

„

All Windows applications are closed.

In order to ensure correct installation and functioning of the software, any
previous version of the program installed on the computer must be unin-
stalled beforehand.

Fig. 3-1: KUKA Encryption Tool installation window

The password is provided separately by KUKA Roboter GmbH. Observe up-
per/lower-case.

background image

10 / 21

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en

KUKA.Encryption 1.1

Uninstallation/
reinstallation

Procedure:

1. Select the menu sequence Start > Settings > Control Panel > Software.
2. Select KUKA Encryption Tool and complete the uninstallation with Re-

move > Finish > Close > OK.

It is advisable to archive all relevant data before uninstalling a software pack-
age.

background image

11 / 21

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en

4. Operation

4

Operation

4.1

Buttons

4.2

Operator control of KUKA.Encryption

Precondition

„

Local administrator rights

Procedure

1. Start KUKA Encryption Tool by means of the icon on the desktop. The

KUKA Encryption Tool window is displayed.

2. Select the required settings in the Tool Option tab and confirm with Next.
3. The Select, New and Options buttons are activated in the KUKA Encryp-

tion Tool window to encrypt the files and create the executable Setup file.

Button

Description
The New button is used to create a new container list.

The Select button (file selection) opens the directory that is
entered under Target Root Path in the Tool Options tab.
Individual KRL files (.src, .sub, .dat) can be selected for
inclusion in the container list.
The Select button (folder selection) opens a search win-
dow in which the folder containing KRL files (.src, .sub,
.dat) is selected. All files in this folder can be added to the
container list.
The Encrypt button is used to encrypt all selected files in a
container list in accordance with the settings that have
been made.
The Deliver button is used to select or create a directory in
which a Setup.exe file is created, containing the container
with its directory structure. In a subdirectory, the container
is saved with the folder name defined under Target Path
(here: PROGRAM.pfc).

(

>>>

Fig. 4-2)

Once a file has been selected, the Option button switches
between the Tool Option and File Properties tabs.
The Exit button is used to terminate KUKA.Encryption.

Fig. 4-1: KUKA Encryption Tool window

background image

12 / 21

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en

KUKA.Encryption 1.1

4.2.1

Tool Option tab (default setting)

„

Parameter Default Container Parameter:

„

Container Extension: display of the file extension for the container
files.

„

Local Root Path: local drive with path for file selection.

„

Target Root Path: directory path for saving the container files. Only
use the following drive names: KRC:\..., C:\..., D:\...

„

Temporary Container Names: name of the container files with a nu-
meric variable. The variable {0} is incremented by the value 1 every
time a container with the same name is saved.

„

Temporary Root Path: directory path for all temporary directories.

„

Parameter Default Encryption Parameter:

„

Content: select the encryption type for the contents.

„

Header: select the encryption type for the header.

„

Private Data: select the encryption type for the comment.

„

Parameter Default Signature Certificate

„

Name: name of the customer certificate.

„

Input box Store: name of the folder in which the customer certificate is
saved.

„

Parameter Encryption Certificate (mandatory in use)

„

Name: name of the encryption certificate.

„

Store: name of the folder in which the encryption certificate is saved.

„

Parameter Misc Default Parameter

„

Author: entry of the user name

„

Comment: entry of a comment

„

Parameter Tool Options:

„

Delete Temporary Directory:

„

True: temporary directories with contents are deleted when a new
container file is created and when the program is terminated.

„

False: temporary directories with contents are retained.

„

Open File Pairs:

„

True: if files with the extensions .scr and .sub are selected for the
container list, a file with the same name and the extension .dat is
automatically created, and vice versa.

„

False: only the selected files are created in the container list.

„

Show Net Folders:

„

True: when a directory is selected, the network environment is also
displayed.

„

False: the network environment is not displayed.

„

Use Selection to Encrypt:

Item

Description

1

Menu bar

2

Toolbar

3

Tool Option tab (default settings):

(

>>>

4.2.1 "Tool Option tab (default setting)" page 12)

4

Container list display with KRL files (no display when started for
the first time).

background image

13 / 21

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en

4. Operation

„

True: only the files selected in the container list are encrypted. If
no file is selected, all files in the container list are automatically en-
crypted.

„

False: all files present in the container list are encrypted.

4.3

Encryption of files (Encrypt)

Precondition

„

Local administrator rights

Procedure

1. Start KUKA Encryption Tool by means of the icon on the desktop. The

KUKA Encryption Tool window is displayed.

2. Select the required setting in the Tool Option tab and confirm with Next.
3. The Select, New and Options Buttons are activated in the KUKA En-

cryption Tool window.

4. There are 2 ways of creating the container list:

„

Open the Select Source File window using the Select button (direc-
tory selection) and, in a directory, select the folder with the required
KRL files. Pressing Open adds the selected KRL files to the container
list.

„

Open the Browse for Folder window using the Select button (folder
selection) and, in a directory, select the folder with the required KRL
files. Pressing OK adds all the KRL files in the folder to the container
list.

5. In the container list, select the files that are to be encoded. The File Prop-

erties tab is displayed.

6. Select the required settings in the File Properties tab and encrypt the se-

lected files using the Encrypt button. The files are saved as *.pfc.

Fig. 4-2: Container list

background image

14 / 21

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en

KUKA.Encryption 1.1

4.4

Creating Setup files (Deliver)

Precondition

„

Local administrator rights

Procedure

1. Start KUKA Encryption Tool by means of the icon on the desktop. The

KUKA Encryption Tool window is displayed.

2. Select the required setting in the Tool Option tab and confirm with Next.
3. The Select, New and Options buttons are activated in the KUKA Encryp-

tion Tool window.

4. Encrypt the required KRL files.

(

>>>

4.3 "Encryption of files (Encrypt)" page 13)

5. Open the Browse for Folder window using the Deliver button.
6. Select an installation folder or create a folder by means of Create New

Folder.

7. Confirm with OK. An executable Setup file is created in the selected folder

on the robot controller.

Item

Description

1

Container list display window

„

Name: name of the KRL file

„

Target Path: path for saving the container (*.pfc)

„

Local Path: path for loading the KRL file(s)

„

Inserted: encryption status

„

Yes: the file has been inserted into the container.

„

No: error while inserting the file into the container. The
error is indicated.

2

File Properties tab (default settings):

„

Parameter Encryption Parameter

„

Content: select the encryption type for the contents.

„

Header: select the encryption type for the header.

„

Private Data: select the encryption type for the com-
ment.

„

Parameter File

„

Local Path: drive and path specification for saving the
file to an external PC/notebook.

„

Name: indication of the selected file name or ***multiple
selection*** in the case of a multiple selection.

„

Parameter KR C

„

Target Path: directory path for saving the container
(*.pfc) in the robot controller.

„

Parameter Misc

„

Author: entry of the user name

„

Comment: entry of a comment

„

Parameter Signature Certificate

„

Name: name entered for the customer certificate.

„

Store: name entered for the folder in which the certifi-
cate used for the signature is saved.

background image

15 / 21

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en

4. Operation

8. Transfer the Setup file/directory to the robot controller and execute it.

(

>>>

4.5 "Executing the Setup file" page 15)

In the subdirectory INTERNAT>KRCSETUP>KRC>R1 that is created at the
same time, the container (*.pcf) is also saved with the name of the folder de-
fined in Target Path.

In the subdirectory INTERNAT>KRCUPD>Certificates that is created at the
same time, the safety certificate (*.cer) is saved.

4.5

Executing the Setup file

Precondition

„

Local administrator rights

Procedure

1. Start Setup.exe in the installation directory of the robot controller. The nec-

essary files are copied into the corresponding directories.

2. Confirm the reboot prompt with OK.

When the robot controller is rebooted, the container files (*.pfc) located in the
directory KRC:\ are detected, and the files contained in them are loaded into
the system.

4.6

Selecting/deselecting a program

Precondition

„

User group “Expert”

Procedure

1. Open the folder KRC:>R1>*.pfc in the program window. The encryption

type is displayed under Attributes in the selection window.

2. Select the required program or deselect the program that is running.

Selected programs are labeled in the selection window. An encrypted program
can be executed, reset and deselected in the usual manner. Encrypted pro-
gram files are write-protected and cannot be read by the user.

4.7

Activating a certificate

Precondition

„

Local administrator rights

Procedure

1. Start the program Certificates.msc from the CD by means of a double-

click. The Certificates window is opened.

2. Position the mouse pointer in the right-hand display window for certifi-

cates, right-click and select All Tasks>Import....

Fig. 4-3: Installation directory

If an installation directory is selected in which a Setup.exe has already been
created, this file is overwritten without warning.

background image

16 / 21

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en

KUKA.Encryption 1.1

3. The certificate import wizard opens. Confirm with Next.
4. Select the file type Private information exchange (*.pfx;*.p12) and click

on Browse to select the directory containing the required certificate.

5. Select a certificate and confirm with Open.
6. Confirm with Next.
7. Enter the password in the input box of the wizard.

If the key is to be exported, activate the corresponding check box (not rec-
ommended for reasons of data protection).
Confirm with Next.

Fig. 4-4: Importing a certificate

Item

Description

1

Menu bar

2

Certificate display window

3

Console Root/Certificates (*.Computer) window

Fig. 4-5: Selecting a certificate

background image

17 / 21

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en

4. Operation

8. Click on Browse to select the directory for saving the certificate and con-

firm with Next.
The settings are displayed. Complete activation of the certificate with Fin-
ish
and OK.

Fig. 4-6: Entering the password

To make the certificate easier to find, it is advisable for the operator not to let
Windows automatically select the directory in which it is saved.

Fig. 4-7: Saving the certificate

background image

18 / 21

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en

KUKA.Encryption 1.1

background image

19 / 21

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en

Index

Index

C
Certificate, activating 15
Creating Setup files 14

D
Deliver 14

E
Encrypt 13
Encryption, files 13

F
Functions 7

H
Hardware 9

I
Installation 9
Installation, KUKA.Encryption 9
Introduction 5

K
KUKA.Encryption, operator control 11

O
Operation 11
Overview, KUKA.Encryption 7

P
Product description 7
Program, selecting/deselecting 15

S
Safety instructions 5
Setup file, executing 15
Setup files, creating 14
Software 9
System requirements 9

T
Tool Option tab 12
Trademarks 5
Training program 5

W
Warnings 5

background image

20 / 21

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en

KUKA.Encryption 1.1

background image

21 / 21

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en

KUKA.Encryption 1.1


Document Outline


Wyszukiwarka

Podobne podstrony:
KST KUKA Encryption 12 en
01 OZE 2013 10 11 en
KST AD Gripperspottech 23 en
kuka sim V1 1 en
KUKA Load 50 en
stronica 11 EN 197, Studia budownictwo pierwszy rok, Chemia budowlana, sprawozdania
KUKA LOAD 32 en
KRC Upgrade No Admin 11 en
KST PLC ProConOS 40 en
1452929 2200SRM0679 (11 2003) UK EN
1466205 2100SRM0735 (11 2004) UK EN
1474823 2200SRM0781 (11 2001) US EN
Lista 11, rozdzial 26 EN
897493 1600SRM0512 (11 1995) UK EN
1554636 8000SRM1080 (11 2004) UK EN
03 OZE 2013 11 08 en

więcej podobnych podstron