Вы находитесь на странице: 1из 21

KUKA System Technology KUKA Roboter GmbH

KUKA.Encryption 1.1

For KUKA System Software 5.3, 5.4, 5.5, 5.6

Issued: 17.12.2009

Version: KST KUKA Encryption 1.1 V1 en


KUKA.Encryption 1.1

© Copyright 2009
KUKA Roboter GmbH
Zugspitzstraße 140
D-86165 Augsburg
Germany

This documentation or excerpts therefrom may not be reproduced or disclosed to third parties without
the express permission of the KUKA Roboter GmbH.
Other functions not described in this documentation may be operable in the controller. The user has
no claims to these functions, however, in the case of a replacement or service work.
We have checked the content of this documentation for conformity with the hardware and software
described. Nevertheless, discrepancies cannot be precluded, for which reason we are not able to
guarantee total conformity. The information in this documentation is checked on a regular basis, how-
ever, and necessary corrections will be incorporated in the subsequent edition.
Subject to technical alterations without an effect on the function.
Translation of the original documentation
KIM-PS5-DOC

Publication: Pub KST KUKA.Encryption 1.1 en


Book structure: KST KUKA Encryption 1.1 V1.4
Label: KST KUKA Encryption 1.1 V1

2 / 21 Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en


Contents

Contents
1 Introduction .................................................................................................. 5
1.1 Target group .............................................................................................................. 5
1.2 Representation of warnings and notes ...................................................................... 5
1.3 Trademarks ................................................................................................................ 5

2 Product description ..................................................................................... 7


2.1 Overview of KUKA.Encryption ................................................................................... 7

3 Installation ................................................................................................... 9
3.1 System requirements ................................................................................................. 9
3.2 Installing KUKA.Encryption ........................................................................................ 9
3.3 Uninstalling KUKA.Encryption .................................................................................... 9

4 Operation ...................................................................................................... 11
4.1 Buttons ....................................................................................................................... 11
4.2 Operator control of KUKA.Encryption ........................................................................ 11
4.2.1 Tool Option tab (default setting) ........................................................................... 12
4.3 Encryption of files (Encrypt) ....................................................................................... 13
4.4 Creating Setup files (Deliver) ..................................................................................... 14
4.5 Executing the Setup file ............................................................................................. 15
4.6 Selecting/deselecting a program ................................................................................ 15
4.7 Activating a certificate ................................................................................................ 15

Index ............................................................................................................. 19

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en 3 / 21


KUKA.Encryption 1.1

4 / 21 Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en


1. Introduction

1 Introduction

1.1 Target group

This documentation is aimed at users with the following knowledge and skills:
„ Advanced knowledge of the Windows operating system
For optimal use of our products, we recommend that our customers take part
in a course of training at KUKA College. Information about the training pro-
gram can be found at www.kuka.com or can be obtained directly from our
subsidiaries.

1.2 Representation of warnings and notes

Safety Warnings marked with this pictogram are relevant to safety and must be ob-
served.

Danger!
This warning means that death, severe physical injury or substantial material
damage will occur, if no precautions are taken.

Warning!
This warning means that death, severe physical injury or substantial material
damage may occur, if no precautions are taken.

Caution!
This warning means that minor physical injuries or minor material damage
may occur, if no precautions are taken.

Notes Notes marked with this pictogram contain tips to make your work easier or ref-
erences to further information.

Tips to make your work easier or references to further information.

1.3 Trademarks

Windows is a trademark of Microsoft Corporation.

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en 5 / 21


KUKA.Encryption 1.1

6 / 21 Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en


2. Product description

2 Product description

2.1 Overview of KUKA.Encryption

Overview The program KUKA.Encryption can be used to protect KRL program files of
types SRC, SUB and DAT against unauthorized access and modification by
encrypting them. The program also makes it possible to sign the files.

Functions KUKA.Encryption has four functions that can be combined with one another.
All encrypted and signed files can be selected and executed and the functions
can be integrated into other programs.
KUKA.Encryption contains the following selection parameters for the encryp-
tion type:
„ do nothing: contents are neither encrypted nor signed.
„ encrypt: contents are encrypted.
Encryption of KRL program files of types SRC, SUB and DAT protects the
data they contain against unauthorized access. Encrypted files cannot be
read by the operator; they are writable, and changes are saved during a
cold start.
„ sign: contents are signed.
Signing of KRL program files protects them against unauthorized chang-
es. Signed files are write-protected, and can be read in the editor.
„ encrypt & sign: contents are encrypted and signed.
Files which are encrypted and signed are not readable by the operator,
and are write-protected.
Additional functions:
„ Simultaneously selected KRL program files are automatically grouped to-
gether as a Protected File Container.
„ Protected File Containers can be assigned and distributed on the robot
controllers.
KUKA.Encryption generates a setup program containing the encrypted files.
This setup program can be used to copy the encrypted files to the selected di-
rectories on the robot controller.

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en 7 / 21


KUKA.Encryption 1.1

8 / 21 Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en


3. Installation

3 Installation

3.1 System requirements

Hardware „ Standard PC / notebook

Software „ Windows XP

3.2 Installing KUKA.Encryption

Precondition „ Local administrator rights


„ All Windows applications are closed.
In order to ensure correct installation and functioning of the software, any
previous version of the program installed on the computer must be unin-
stalled beforehand.

Procedure 1. Start the Setup.exe program for KUKA.Encryption on the disk.


2. In the KUKA Encryption Tool Setup window, confirm with OK.
3. In the KUKA Encryption Tool window, confirm with Next. The following
window opens:

Fig. 3-1: KUKA Encryption Tool installation window

4. In the input box Folder, accept the suggested directory or select/create a


new directory using Browse.
5. Select the required check box:
„ Everyone (All users can use KUKA.Encryption)
„ Just me (Only the user who installed the program)
6. Confirm twice with Next. Enter the password in the input box and confirm
with OK.
7. Terminate installation with Close and OK.

The password is provided separately by KUKA Roboter GmbH. Observe up-


per/lower-case.

3.3 Uninstalling KUKA.Encryption

Precondition „ Local administrator rights


„ All Windows applications are closed.

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en 9 / 21


KUKA.Encryption 1.1

It is advisable to archive all relevant data before uninstalling a software pack-


age.

Uninstallation/ Procedure:
reinstallation 1. Select the menu sequence Start > Settings > Control Panel > Software.
2. Select KUKA Encryption Tool and complete the uninstallation with Re-
move > Finish > Close > OK.

10 / 21 Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en


4. Operation

4 Operation

4.1 Buttons

Button Description
The New button is used to create a new container list.

The Select button (file selection) opens the directory that is


entered under Target Root Path in the Tool Options tab.
Individual KRL files (.src, .sub, .dat) can be selected for
inclusion in the container list.
The Select button (folder selection) opens a search win-
dow in which the folder containing KRL files (.src, .sub,
.dat) is selected. All files in this folder can be added to the
container list.
The Encrypt button is used to encrypt all selected files in a
container list in accordance with the settings that have
been made.
The Deliver button is used to select or create a directory in
which a Setup.exe file is created, containing the container
with its directory structure. In a subdirectory, the container
is saved with the folder name defined under Target Path
(here: PROGRAM.pfc).
(>>> Fig. 4-2)
Once a file has been selected, the Option button switches
between the Tool Option and File Properties tabs.
The Exit button is used to terminate KUKA.Encryption.

4.2 Operator control of KUKA.Encryption

Precondition „ Local administrator rights

Procedure 1. Start KUKA Encryption Tool by means of the icon on the desktop. The
KUKA Encryption Tool window is displayed.
2. Select the required settings in the Tool Option tab and confirm with Next.
3. The Select, New and Options buttons are activated in the KUKA Encryp-
tion Tool window to encrypt the files and create the executable Setup file.

Fig. 4-1: KUKA Encryption Tool window

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en 11 / 21


KUKA.Encryption 1.1

Item Description
1 Menu bar
2 Toolbar
3 Tool Option tab (default settings):
(>>> 4.2.1 "Tool Option tab (default setting)" page 12)
4 Container list display with KRL files (no display when started for
the first time).

4.2.1 Tool Option tab (default setting)

„ Parameter Default Container Parameter:


„ Container Extension: display of the file extension for the container
files.
„ Local Root Path: local drive with path for file selection.
„ Target Root Path: directory path for saving the container files. Only
use the following drive names: KRC:\..., C:\..., D:\...
„ Temporary Container Names: name of the container files with a nu-
meric variable. The variable {0} is incremented by the value 1 every
time a container with the same name is saved.
„ Temporary Root Path: directory path for all temporary directories.
„ Parameter Default Encryption Parameter:
„ Content: select the encryption type for the contents.
„ Header: select the encryption type for the header.
„ Private Data: select the encryption type for the comment.
„ Parameter Default Signature Certificate
„ Name: name of the customer certificate.
„ Input box Store: name of the folder in which the customer certificate is
saved.
„ Parameter Encryption Certificate (mandatory in use)
„ Name: name of the encryption certificate.
„ Store: name of the folder in which the encryption certificate is saved.
„ Parameter Misc Default Parameter
„ Author: entry of the user name
„ Comment: entry of a comment
„ Parameter Tool Options:
„ Delete Temporary Directory:
„ True: temporary directories with contents are deleted when a new
container file is created and when the program is terminated.
„ False: temporary directories with contents are retained.
„ Open File Pairs:
„ True: if files with the extensions .scr and .sub are selected for the
container list, a file with the same name and the extension .dat is
automatically created, and vice versa.
„ False: only the selected files are created in the container list.
„ Show Net Folders:
„ True: when a directory is selected, the network environment is also
displayed.
„ False: the network environment is not displayed.
„ Use Selection to Encrypt:

12 / 21 Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en


4. Operation

„ True: only the files selected in the container list are encrypted. If
no file is selected, all files in the container list are automatically en-
crypted.
„ False: all files present in the container list are encrypted.

4.3 Encryption of files (Encrypt)

Precondition „ Local administrator rights

Procedure 1. Start KUKA Encryption Tool by means of the icon on the desktop. The
KUKA Encryption Tool window is displayed.
2. Select the required setting in the Tool Option tab and confirm with Next.
3. The Select, New and Options Buttons are activated in the KUKA En-
cryption Tool window.
4. There are 2 ways of creating the container list:
„ Open the Select Source File window using the Select button (direc-
tory selection) and, in a directory, select the folder with the required
KRL files. Pressing Open adds the selected KRL files to the container
list.
„ Open the Browse for Folder window using the Select button (folder
selection) and, in a directory, select the folder with the required KRL
files. Pressing OK adds all the KRL files in the folder to the container
list.
5. In the container list, select the files that are to be encoded. The File Prop-
erties tab is displayed.
6. Select the required settings in the File Properties tab and encrypt the se-
lected files using the Encrypt button. The files are saved as *.pfc.

Fig. 4-2: Container list

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en 13 / 21


KUKA.Encryption 1.1

Item Description
1 Container list display window
„ Name: name of the KRL file
„ Target Path: path for saving the container (*.pfc)
„ Local Path: path for loading the KRL file(s)
„ Inserted: encryption status
„ Yes: the file has been inserted into the container.
„ No: error while inserting the file into the container. The
error is indicated.
2 File Properties tab (default settings):
„ Parameter Encryption Parameter
„ Content: select the encryption type for the contents.
„ Header: select the encryption type for the header.
„ Private Data: select the encryption type for the com-
ment.

„ Parameter File
„ Local Path: drive and path specification for saving the
file to an external PC/notebook.
„ Name: indication of the selected file name or ***multiple
selection*** in the case of a multiple selection.
„ Parameter KR C
„ Target Path: directory path for saving the container
(*.pfc) in the robot controller.
„ Parameter Misc
„ Author: entry of the user name
„ Comment: entry of a comment
„ Parameter Signature Certificate
„ Name: name entered for the customer certificate.
„ Store: name entered for the folder in which the certifi-
cate used for the signature is saved.

4.4 Creating Setup files (Deliver)

Precondition „ Local administrator rights

Procedure 1. Start KUKA Encryption Tool by means of the icon on the desktop. The
KUKA Encryption Tool window is displayed.
2. Select the required setting in the Tool Option tab and confirm with Next.
3. The Select, New and Options buttons are activated in the KUKA Encryp-
tion Tool window.
4. Encrypt the required KRL files.
(>>> 4.3 "Encryption of files (Encrypt)" page 13)
5. Open the Browse for Folder window using the Deliver button.
6. Select an installation folder or create a folder by means of Create New
Folder.
7. Confirm with OK. An executable Setup file is created in the selected folder
on the robot controller.

14 / 21 Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en


4. Operation

Fig. 4-3: Installation directory

8. Transfer the Setup file/directory to the robot controller and execute it.
(>>> 4.5 "Executing the Setup file" page 15)
In the subdirectory INTERNAT>KRCSETUP>KRC>R1 that is created at the
same time, the container (*.pcf) is also saved with the name of the folder de-
fined in Target Path.
In the subdirectory INTERNAT>KRCUPD>Certificates that is created at the
same time, the safety certificate (*.cer) is saved.

If an installation directory is selected in which a Setup.exe has already been


created, this file is overwritten without warning.

4.5 Executing the Setup file

Precondition „ Local administrator rights

Procedure 1. Start Setup.exe in the installation directory of the robot controller. The nec-
essary files are copied into the corresponding directories.
2. Confirm the reboot prompt with OK.
When the robot controller is rebooted, the container files (*.pfc) located in the
directory KRC:\ are detected, and the files contained in them are loaded into
the system.

4.6 Selecting/deselecting a program

Precondition „ User group “Expert”

Procedure 1. Open the folder KRC:>R1>*.pfc in the program window. The encryption
type is displayed under Attributes in the selection window.
2. Select the required program or deselect the program that is running.
Selected programs are labeled in the selection window. An encrypted program
can be executed, reset and deselected in the usual manner. Encrypted pro-
gram files are write-protected and cannot be read by the user.

4.7 Activating a certificate

Precondition „ Local administrator rights

Procedure 1. Start the program Certificates.msc from the CD by means of a double-


click. The Certificates window is opened.
2. Position the mouse pointer in the right-hand display window for certifi-
cates, right-click and select All Tasks>Import....

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en 15 / 21


KUKA.Encryption 1.1

Fig. 4-4: Importing a certificate

Item Description
1 Menu bar
2 Certificate display window
3 Console Root/Certificates (*.Computer) window

3. The certificate import wizard opens. Confirm with Next.


4. Select the file type Private information exchange (*.pfx;*.p12) and click
on Browse to select the directory containing the required certificate.

Fig. 4-5: Selecting a certificate

5. Select a certificate and confirm with Open.


6. Confirm with Next.
7. Enter the password in the input box of the wizard.
If the key is to be exported, activate the corresponding check box (not rec-
ommended for reasons of data protection).
Confirm with Next.

16 / 21 Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en


4. Operation

Fig. 4-6: Entering the password

8. Click on Browse to select the directory for saving the certificate and con-
firm with Next.
The settings are displayed. Complete activation of the certificate with Fin-
ish and OK.

To make the certificate easier to find, it is advisable for the operator not to let
Windows automatically select the directory in which it is saved.

Fig. 4-7: Saving the certificate

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en 17 / 21


KUKA.Encryption 1.1

18 / 21 Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en


Index

Index
C
Certificate, activating 15
Creating Setup files 14

D
Deliver 14

E
Encrypt 13
Encryption, files 13

F
Functions 7

H
Hardware 9

I
Installation 9
Installation, KUKA.Encryption 9
Introduction 5

K
KUKA.Encryption, operator control 11

O
Operation 11
Overview, KUKA.Encryption 7

P
Product description 7
Program, selecting/deselecting 15

S
Safety instructions 5
Setup file, executing 15
Setup files, creating 14
Software 9
System requirements 9

T
Tool Option tab 12
Trademarks 5
Training program 5

W
Warnings 5

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en 19 / 21


KUKA.Encryption 1.1

20 / 21 Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en


KUKA.Encryption 1.1

Issued: 17.12.2009 Version: KST KUKA Encryption 1.1 V1 en 21 / 21

Вам также может понравиться