Abstract:
A security system for controlling access to motion control systems. The security system limits access to application programming interface (API) functions. The limitations on API functions can be implemented as a denial of access to certain restricted functions and/or as a limitation on certain controlled parameters employed by certain restricted functions. The security system may allow or disallow access based on users or accounts. The security system may also be programmed to prevent access to certain functions arbitrarily as determined by a system administrator or on criteria such as the status of the system.
Abstract:
An information processing system includes a terminal apparatus that sends the received machine-type identification information and state history information received from the monitoring target apparatus by near field communication, an information processing apparatus that receives the machine-type identification information and the state history information from the terminal apparatus, and a storage apparatus that accumulates machine-type identification information identifying a machine type of a monitoring target apparatus and normal-state history information in an associated manner. When the information processing apparatus receives the machine-type identification information and state history information about a certain monitoring target apparatus from the terminal apparatus, the information processing apparatus compares the normal-state history information accumulated in the storage apparatus in association with the machine-type identification information and the received state history information, judges whether an operation state of the monitoring target apparatus is normal, and sends a judgment result to the terminal apparatus.
Abstract:
A method and a system are provided for switching at least one electrical consumer in a building comprising an elevator system. The switched electrical consumer is, for example, a camera. The camera is activated if when using the elevator system the user does not actuate a building door within an ascertained route time, i.e. the user does not arrive at his/her destination. It is possible using an image recorded by the camera to establish whether the user is possibly in a dangerous situation.
Abstract:
Verification methods, systems, and computer program products verify the completion of assembly instructions used in light-manufacturing. Using position guides in a user interface, an in-use component is aligned and ready for verification through a first set of images of the in-use component. A visual highlight area on the user interface overlaying the in-use component indicates where to perform the assembly instructions. To create a traceable record, a second set of images are stored in an assembly record database when the assembler points a wand where the in-use component has been assembled. Another verification approach includes pointing an image capture device over the in-use component and receiving a first voice command authorizing image acquisition. A second voice command confirms accuracy of the image and proper assembly. Storing first and second voice commands and images of the in-use component being assembled in an assembly record database creates another traceable record useful for verification.
Abstract:
In one embodiment, a remote monitoring system includes a monitoring apparatus displaying a screen for monitoring a power plant, a remote monitoring apparatus displaying the screen transferred from the monitoring apparatus, and a management server managing information regarding the remote monitoring apparatus. The management server includes an activation management module to acquire apparatus identification information for identifying the remote monitoring apparatus, and to return activation permission to the remote monitoring apparatus if the apparatus identification information matches apparatus identification information registered previously. The remote monitoring apparatus includes a secret information storing region to store the apparatus identification information, and to limit software accessible to the secret information storing region to BIOS software of the remote monitoring apparatus, and an activation module to acquire the activation permission from the activation management module by providing the apparatus identification information in the secret information storing region to the activation management module.
Abstract:
An application management server includes: a terminal management table storage unit configured to store terminal device identification data for identifying a terminal device and information indicating whether or not transmission of notification data is necessary while correlating the terminal device identification data with the information; a registration request reception unit configured to receive from the terminal device, a registration request for registering transmission of notification data, and update the terminal management table storage unit based on the registration request; a release request reception unit configured to receive from the terminal device, a release request for releasing transmission of notification data, and update the terminal management table storage unit based on the release request; a via-broadcasting notification transmission unit configured to perform a process of including notification data in a broadcasting signal and transmitting the notification data; and a via-communication notification transmission unit configured to perform a process of referring to the terminal management table storage unit and transmitting the notification data to the terminal device.
Abstract:
An application management server includes: a terminal management table storage unit configured to store terminal device identification data for identifying a terminal device and information indicating whether or not transmission of notification data is necessary while correlating the terminal device identification data with the information; a registration request reception unit configured to receive from the terminal device, a registration request for registering transmission of notification data, and update the terminal management table storage unit based on the registration request; a release request reception unit configured to receive from the terminal device, a release request for releasing transmission of notification data, and update the terminal management table storage unit based on the release request; a via-broadcasting notification transmission unit configured to perform a process of including notification data in a broadcasting signal and transmitting the notification data; and a via-communication notification transmission unit configured to perform a process of referring to the terminal management table storage unit and transmitting the notification data to the terminal device.
Abstract:
Apparatus (10) for promoting safe handling of equipment (12) comprises a display (14) for displaying a safety check relating to a prospective user's competency to use the equipment (12). A user manipulatable arrangement (20) enables the prospective user to enter data in response to the check. A controller (16) connected to the arrangement (20) is configured to operate a switch (24) to inhibit switching on or starting of the equipment, should the response data entered not meet with a predetermined criterion.
Abstract:
A method of safeguarding the authorized access to field a device used in automation-technology, wherein the field device comprises an internet protocol capable interface as well as an interface for near field communication. The method comprises a unique factory installed access code for an authorized field device user is stored in the field device or clearly assigned to the field device; before delivery of the field device from a field device supplier to a field device user The unique factory installed access code for an authorized field device user is read from the field device through the near field communication interface means of a mobile service unit with the use of a Security App, made available by the field device supplier, or through an alternatively made available, and secure, channel of communication; access authorization for the field device is established by means of the Security App for at least one authorized field device user; and operation of the field device is accomplished by the authorized field device user with the established access authorization by means of the mobile service unit or the internet protocol capable interface.
Abstract:
Unauthorized access to modules, especially modules in automation systems, is prevented by controlling access between modules and a central processing unit. At least one first device transmits an identifier to at least one of the central processing unit and a second device which evaluate(s) the identifier by comparison with at least one comparative identifier stored in the at least one of the central processing unit and the second device. Operation of the first device on the system is denied by the at least one of the central processing unit and the second device if the received identifier does not correspond to the comparative identifier.