Abstract:
In one embodiment, a non-transitory computer readable medium may include computer-executable instructions that, when executed by a processor, may receive a first set of data associated with a user, receive a second set of data associated with one or more lockout procedures performed by the user, receive a request to actuate a locking mechanism of an electronic lock configured to prevent a machine in an industrial automation application from being operational, and send a signal to the electronic lock to actuate the locking mechanism when the second set of data indicates that the lockout procedures have been performed by the user and the data corresponds to an authorized user.
Abstract:
A template for implementing a control system with security features provides a generic control program and device programs for distribution to industrial controller and associated control devices together with matching security programs for distribution to the control devices, the security program providing for the generation of security thumbprints indicating the state of the control devices. The template may also be associated with a security-monitoring program that can receive and process the security thumbprints.
Abstract:
A system may include an industrial automation device, a computing device configured to receive a first set of data associated with the industrial automation device, and a cloud-computing system. The cloud-computing system may receive the first set of data from the computing device, identify a second set of data associated with the industrial automation device based on the first set of data, and send the second set of data to the computing device when the second set of data is relevant to the first set of data.
Abstract:
A first computing device in an industrial automation system may include an image sensor that captures a visual representation of a portion of a facility including a first industrial automation equipment as image data and a communication component that communicatively couples the first computing device to a second computing device via a communication network, in which the first computing device receives relevant information related to the first industrial automation equipment from the second computing device. The first computing may include a display component that displays a plurality of real objects that visually represent physical features in the portion of the facility based at least in part on the image data, in which the plurality of real objects include a first real object that visual represents physical features of the first industrial automation equipment; and that displays a first virtual object superimposed on at least a portion of the plurality of real objects based at least in part on the relevant information.
Abstract:
An energy object extension to an industrial protocol having a comprehensive suite of attributes, messages and services utilized for the monitoring and control of energy consuming or producing resources by a manufacturing automation application is provided. The energy object includes an identifier associated with an energy resource that is associated with a manufacturing automation application and an energy type associated with the energy resource. This includes a measurement characteristic associated with the energy resource to facilitate energy management by the manufacturing automation application.
Abstract:
A system may include a processor that may receive a first set of energy data associated with a first asset in an automation system, wherein the first set energy data comprises a first confidence level associated with the first set energy data, receive an operational status associated with the first asset, wherein the operational status indicates operational characteristics of the first asset, and updating the first confidence level based on the operational status and a first energy profile associated with the first asset.
Abstract:
Industrial blockchain enabled automation control (e.g., using a computerized tool) is enabled. For example, a system can comprise: a memory that stores executable components, a processor, operatively coupled to the memory, that executes the executable components, the executable components comprising: an authorization component that determines, according to a defined authorization criterion, authorization of a request for a license for industrial automation software, and a license component that, in response to the determination by the authorization component that the request is authorized, mints a non-fungible token comprising the license for the industrial automation software.
Abstract:
Industrial blockchain enabled automation control (e.g., using a computerized tool) is enabled. For example, a system can comprise: a memory that stores executable components, a processor, operatively coupled to the memory, that executes the executable components, the executable components comprising: a minting component that, based on a manufacturing criterion associated with a product being determined to be satisfied, mints a non-fungible token associated with the product, wherein the non-fungible token comprises authenticity data representative of a birth certificate for the product, and a blockchain component that registers the non-fungible token with a blockchain.
Abstract:
Industrial security using blockchain or NFTs (e.g., using a computerized tool) is enabled. For example, an industrial system can comprise: a memory that stores executable components, and a processor, operatively coupled to the memory, that executes the executable components, the executable components comprising a minting component that mints a non-fungible token associated with a product generated using industrial automation equipment, wherein the non-fungible token comprises a first verification element, and a verification component that: verifies the product based on a comparison of a first aspect of the product to the first verification element, and generates an output representative of the comparison.
Abstract:
An industrial visualization system defines and enforces a virtual safety shield comprising a three-dimensional space surrounding a wearer of a client device. The dimensions of the virtual safety shield are defined by a specified safe distance surrounding the user that allows sufficient reaction time in response to notification that the wearer is at risk of interacting with a safety zone, hazardous machinery, or vehicles within the plant. If a boundary of a safety zone or hazardous equipment falls within the three-dimensional space defined by the virtual safety shield, the system sends a notification to the user's client device, or places the hazardous equipment in a safe operating mode.