Abstract:
To provide a substrate processing system which can cause different display portions to output different displays, and cause different operations to be carried out from different operation screens. A substrate processing system, on login information of a user being input from a main display device, refers to the login information, a user group parameter, with which is set a group to which the user belongs, and an authority parameter, which sets an authority of the group, and causes the main display device to display a main operation screen corresponding to the user, while it, on login information of a user being input from an external operating apparatus, causes an external display device to display an external parameter setting screen for setting an authority parameter of a group to which the user belongs, or to display an external operation screen corresponding to the group to which the user belongs.
Abstract:
An application management server includes: a terminal management table storage unit configured to store terminal device identification data for identifying a terminal device and information indicating whether or not transmission of notification data is necessary while correlating the terminal device identification data with the information; a registration request reception unit configured to receive from the terminal device, a registration request for registering transmission of notification data, and update the terminal management table storage unit based on the registration request; a release request reception unit configured to receive from the terminal device, a release request for releasing transmission of notification data, and update the terminal management table storage unit based on the release request; a via-broadcasting notification transmission unit configured to perform a process of including notification data in a broadcasting signal and transmitting the notification data; and a via-communication notification transmission unit configured to perform a process of referring to the terminal management table storage unit and transmitting the notification data to the terminal device.
Abstract:
To provide a substrate processing system which can cause different display portions to output different displays, and cause different operations to be carried out from different operation screens. A substrate processing system, on login information of a user being input from a main display device, refers to the login information, a user group parameter, with which is set a group to which the user belongs, and an authority parameter, which sets an authority of the group, and causes the main display device to display a main operation screen corresponding to the user, while it, on login information of a user being input from an external operating apparatus, causes an external display device to display an external parameter setting screen for setting an authority parameter of a group to which the user belongs, or to display an external operation screen corresponding to the group to which the user belongs.
Abstract:
In a method for the access control to an automation unit (01), access rights predetermined by the access control are dependant on the operating state of the automation unit (01), wherein at least during an emergency, expanded access rights in relation to normal operation are granted independently of the access rights during normal operation.
Abstract:
A process plant includes a safety system that is physically and logically integrated with a process control system such that the safety system and the process control system can use common security, communication and display hardware and software within the process plant while still providing functional isolation between the safety system controllers and the process control system controllers. This integrated process control and safety system uses a common data communication structure for both the safety system and the process control system so that applications can send data to and receive data from devices in either system in the same manner, e.g., using the same communication hardware and software. However, the common data communication structure is set up enable a security application to distinguish process control system devices from safety system devices using tags, addresses or other fields within the messages sent to or received from the devices, which enables data associated with the process control system to be distinguishable from data associated with the safety system, thereby enabling the security application within a user interface to automatically treat this data differently depending on the source (or destination) of the data.
Abstract:
A method of generating control commands to be executed by a motion control system under control of a plurality of system users to move an object in a desired manner. At least one restricted program element associated with the motion control system is identified. An application program used by the system users when controlling the motion control system is provided. The application program employs the at least one restricted program element. A plurality of access levels are determined. Each restricted program element is associated with one of the access levels. Each of the plurality of system users is associated with one of the access levels. Motion control commands are generated based on the application program, the access level of each system user, and the access level of each restricted program element.
Abstract:
In a process for ensuring the data integrity of software for influencing operation of a control unit of a motor vehicle, a pair of keys is provided for encrypting and decrypting electronic data. The first key is stored for access by a control unit in the motor vehicle, and software which is to be imported is signed by means of the second key. The signed software is imported into the memory of the control unit and the signature of the software is checked by means of the first key. The signature is accepted if the check has a positive result.
Abstract:
A comprehensive authentication and identity system and method are disclosed. A central profile is created for a user which includes user information that can be passed back or otherwise utilized by websites (e.g. for registrations, logins, etc.) The user information may include the user's username, password, contact information, personal information, marketing preferences, financial information, etc. For website registrations, the user may provide a mobile communication number that is utilized to perform a type of mobile communication device verification process. As part of a website login, the user may provide identifiable information (e.g. a username) that is looked up by the system or website to determine a mobile communication number for the user, which is used for a verification process. If the verification process is completed successfully, the user may be logged into the website. For accessing the system directly, a user may go through a mobile communication device verification process.
Abstract:
An equipment information security device is provided. The equipment information security device is installed on an equipment with confidential information, wherein the equipment or the device has a security interface, the device comprises: a fitting which is worn by a staff and combined with an electronic tag with or without authority to the corresponding equipment; a tag reader, which detects the electronic tag within a detecting area corresponding to the security interface; and an authority processing unit, which links to the tag reader: wherein the authority processing unit sets the security interface to an operation state and enables the security interface when there are only the authorized electronic tags being detected in the detecting area, and the authority processing unit sets the security interface to a security state and disables the security interface when one or more unauthorized electronic tags are detected in the detecting area.
Abstract:
An access authorization for a computer-based object in an automation system comprising a plurality of network nodes is granted using a control file which is structured in line with a scheme for a markup language for granting access authorizations and which maps a hierarchic tree structure. In this case, access authorizations are mapped in an object model which has a hierarchic tree structure. A relevant subtree from the object model is ascertained for a selected network node, at which services are provided using computer-based objects, or when access to a computer-based object is requested, by an access guideline service. The control file is produced from the ascertained relevant subtree. The control file produced is made available for the selected network node or for access to the computer-based object.