Abstract:
An industrial automation system comprises a security access device, an industrial automation device, a user interface, and a security interface. The user interface is configured to provide a user with access to data stored inside the industrial automation device. The security interface is configured to receive information from the access device and, based on the information received from the access device, to provide authorization for the user to access the data stored inside the industrial automation device using the user interface.
Abstract:
Systems and methods are described for a usage monitoring HVAC control method. A method, includes: receiving a request for an additional period of heating ventilation and air conditioning system services from a requesting system user, the requesting system user composing a plurality of system users; maintaining a data structure in an on board memory of a programmable thermostat, the data structure including a list of time entries, each time entry associated with one of the plurality of system users; and updating the data structure by adding a duration in units of time to the time associated with the requesting system user.
Abstract:
A method and a device for securely switching between operating modes of an industrial controller for machine tools or production machines are described. Before the operating mode is switched, the operator is identified by identification means that transmit to an operator's console of the controller a redundant binary enable signal after a successful identification. The operator is allowed to switch between operating modes by using the keys of the operator's console implemented in safe technology as long as the enable signal is received and is error-free. With the method and the device, the operating modes of an industrial controller for machine tools or production machines can be easily, reliably and cost-effectively switched.
Abstract:
A method and an apparatus are presented for selectively locking controls from operators operating equipment. The invention actively detects when an operator accesses a control for which lockout is desired. After detection, the invention locks the control to prevent the operator from operating the control. Thus, operators are permitted selective access to controls. The active detection of when an operator is accessing a control is performed by first generating a signal, which is passed to a plate, where it is then coupled through the operator to a receiver. The signal is detected at a signal detector attached with a control so the control can react to the signal. In an automotive situation, the plate may be in a vehicle seat, with the signal coupling through a driver or passenger upon actuation of a control. Based on the signal received, the function of the control may be eliminated, altered, or reduced.
Abstract:
In one embodiment, a non-transitory computer readable medium may include computer-executable instructions that, when executed by a processor, may cause processor to receive a set of user data associated with a user that is attempting to access an electronic lock, receive a request to actuate a locking mechanism of the electronic lock configured to prevent the user from accessing a machine in an industrial automation system, actuate the locking mechanism in response to the request and the set of user data corresponding to an expected set of data, store a log of the request and the set of user data, and send the log to a cloud-based computing system.
Abstract:
A machine control system includes a display device to display operation information to operate a machine, an external storage device which stores personal information to identify an operator and a screen of the operation information displayed by the operator on the display device in association with each other, and an authentication unit to authenticate the operator based on the personal information stored in the external storage device. A controller reads out, from the external storage device, the operation information screen displayed on the display device by the operator authenticated by the authentication unit, and displays the same on the display device.
Abstract:
The invention relates to an operating unit (1) for a production plant (2). The operating unit (1) comprises an authorization receiving module (71) so as to receive authorization identifications (61, 62, 63, 64) which are sent out by operating modules (51, 52, 53, 54) of the operating unit (1), an authorization storage module (72) so as to store in an authorization data storage (8) authorization data including allocations of user identifications (31, 32, 33, 34, 41, 42) to the received authorization identifications (61, 62, 63, 64), and an authorization checking module (73) so as to receive at least one authorization identification (61, 62, 63, 64) from the operating modules (51, 52, 53, 54) and to determine at least one user identification (31, 32, 33, 34, 41, 42), and to unlock an operating module (51, 52, 53, 54) if in the authorization data storage (8) an allocation of the at least one user identification (31, 32, 33, 34, 41, 42) to the at least one authorization identification (61, 62, 63, 64) is stored.
Abstract:
Verification methods, systems, and computer program products verify the completion of assembly instructions used in light-manufacturing. Using position guides in a user interface, an in-use component is aligned and ready for verification through a first set of images of the in-use component. A visual highlight area on the user interface overlaying the in-use component indicates where to perform the assembly instructions. To create a traceable record, a second set of images are stored in an assembly record database when the assembler points a wand where the in-use component has been assembled. Another verification approach includes pointing an image capture device over the in-use component and receiving a first voice command authorizing image acquisition. A second voice command confirms accuracy of the image and proper assembly. Storing first and second voice commands and images of the in-use component being assembled in an assembly record database creates another traceable record useful for verification.
Abstract:
Example methods and apparatus to manage data uploading in a process control environment are disclosed. A disclosed example method includes receiving a request to upload a parameter value associated with a process control system and retrieving an upload rule profile associated with the process control system. The example method also includes identifying an upload action from the upload rule profile based on the parameter value and a personnel classification, and determining whether to upload the parameter value based on the upload action.
Abstract:
Physical presence verification by an industrial control system controller is described herein. One industrial control system controller includes a mechanism configured to verify that a user of the industrial control system controller is physically present at a location of the controller, a memory, and a processor configured to execute executable instructions stored in the memory to permit the user to perform industrial control operations using the controller only if the user is physically present at the location of the controller.