Abstract:
A setup control unit is configured to get activated via a first computer that is to become a node in the process control system and which activation is initiated by a setup tool being brought to the first computer. The setup control unit contacts a configuration control computer, supplies a setup tool identifier to the configuration control computer, accesses system information elements in the configuration control computer, presents system nodes to an operator using the system information elements, receives an operator selection of a system node, sends the node selection to the configuration control computer for registering, based on a setup tool identifier investigation, receives node parameter data associated with the selected system node from the configuration control computer and supplies the first computer with the node parameter data for making it into the selected system node.
Abstract:
Physical presence verification by an industrial control system controller is described herein. One industrial control system controller includes a mechanism configured to verify that a user of the industrial control system controller is physically present at a location of the controller, a memory, and a processor configured to execute executable instructions stored in the memory to permit the user to perform industrial control operations using the controller only if the user is physically present at the location of the controller.
Abstract:
The present invention relates to a system and a method for providing safe remote access to a plurality of robot controllers positioned at a local site for a person positioned on a remote site. The system includes a plurality of robot controllers, each capable of receiving credentials and including an authentication component for authentication of the credentials, and an authorization component for handling authorization for access to the robot controller based on the result of the authentication, a remote computer located at a remote site and capable of communicating with the robot controllers and having an interface capable of receiving credentials and configured to send the credentials to the robot controllers, a server component capable of communicating with the robot controllers, and an identifying component positioned at the local site configured to receive proof of local access.
Abstract:
Verification methods, systems, and computer program products verify the completion of assembly instructions used in light-manufacturing. Using position guides in a user interface, an in-use component is aligned and ready for verification through a first set of images of the in-use component. A visual highlight area on the user interface overlaying the in-use component indicates where to perform the assembly instructions. To create a traceable record, a second set of images are stored in an assembly record database when the assembler points a wand where the in-use component has been assembled. Another verification approach includes pointing an image capture device over the in-use component and receiving a first voice command authorizing image acquisition. A second voice command confirms accuracy of the image and proper assembly. Storing first and second voice commands and images of the in-use component being assembled in an assembly record database creates another traceable record useful for verification.
Abstract:
A remote control system comprises a machine tool controller and an operation terminal apparatus remotely located from the machine tool and connected via a network to the machine tool controller. The operation terminal apparatus comprises a registered name input section and an authorization level database that matches a registered name to an authorization level, and the operation terminal transmits the authorization level corresponding to the registered name to the machine tool controller. The machine tool controller comprises a restricted function database that matches an authorization level to operation-allowed or operation-forbidden function, and the machine tool controller specifies the operation-allowed or operation-forbidden function corresponding to the authorization level, and restricts function of the machine tool controller.
Abstract:
The invention provides, in some aspects, a process, environmental, manufacturing, industrial or other such control system (hereinafter, “control system”) with enhanced, real-time change tracking. The system includes one or more configurable elements (e.g., field devices), a change tracking system that records of changes to those configurable elements (e.g., for compliance reporting, etc.) and a change detection system that responds to detected changes in configuration of those element(s) by inferring an identity of a person and/or device responsible for a change, the time of the change, and/or the reason for the change. This is unlike prior art systems, in which that such information must be specified, e.g., in a data entry form filled-in by the field engineer, operator or other who is making the change.
Abstract:
Systems and methods are described for recovering a personal identification number. A method, includes: comprising recovering from a lost personal identification number situation and restoring programmability to a device, including: generating a SEED PIN using the device calculating a KEY PIN using an algorithm within a code of the device and storing the KEY PIN in the device, without displaying the KEY PIN, wherein the KEY PIN is a function at-least-in-part of both the SEED PIN and an identifier associated with the device; sending the SEED PIN and the identifier associated with the device to an authenticating source; recalculating the KEY PIN at the authenticating source using the algorithm within the code and the SEED PIN and the other identifying information; receiving the KEY PIN from the authenticating source; and entering the KEY PIN into the device to temporarily assign hierarchical access to a user.
Abstract:
At creation, a state machine of an industrial control configuration can be hard-coded with a number of states in a hierarchical manner. Once implemented into the configuration, it can be desirable for the states, interpretations of the states, and the like to be modified in accordance with particular desires and processes. Therefore, a user can select a change to a hierarchical rule set of the state machine while the state machine is part of the configuration and the change can be implemented.
Abstract:
A method for identifying operating authority of a worker comprising: electronically connecting an interrogator to a controller; providing a transponder in the possession of worker with data of operating authority stored in the transponder; the interrogator reading the data in the transponder and delivering the data to the controller. The controller determines a level of operating authority of the worker according to the data. The controller allowing access only to operating functions associated with the determined level of operating authority.
Abstract:
An industrial automation system comprises a security access device, an industrial automation device, a user interface, and a security interface. The user interface is configured to provide a user with access to data stored inside the industrial automation device. The security interface is configured to receive information from the access device and, based on the information received from the access device, to provide authorization for the user to access the data stored inside the industrial automation device using the user interface.