摘要:
A surveillance system may comprise one or more computing devices and one or more robotic surveillance devices. The one or more computing devices may be configured to obtain video data captured by one or more cameras. The one or more computing devices may analyze the video data to determine whether there is any trigger event. In response to determining that there is a trigger event, the one or more computing device may determine an optimal robotic surveillance device among the one or more robotic surveillance devices based on the trigger event and provide an instruction to the optimal robotic surveillance device. The optimal robotic surveillance device may be configured to perform a responding action in response to receiving the instruction.
摘要:
A control device of an integrated industrial system which is established in a plant, the control device includes a defender configured to perform a countermeasure of restricting at least a part of functions of a self-device, based on a detection result of a detector which detects a cyber-attack from at least one of inside and outside to the integrated industrial system.
摘要:
Systems and methods are provided for monitoring operating machinery, acquiring data regarding characteristic behavior of the machinery being monitored, and processing of the data to determine and indicate when significant deviations from normal operating conditions are occurring that represent maintenance initiating or failure mode events. The method includes learning what normal operating conditions are for a machine of interest by acquiring data during observed normal operation, then calculating detection threshold values based on the acquired data. Finally, real-time monitoring of the machinery of interest during operation is employed, with alarms triggered upon occurrence of a previously-defined number of occurrences of behavior exceeding parameters associated with normal operation behavior.
摘要:
An intelligent lighting and sensor system is disclosed that includes a processor, a memory arranged to store program logic software, the program logic software executable by the processor, a light control module in communication with at least one light source in which the operation of the light control module is directed according to the program logic software that is executed by the processor, and a sensor interface in communication with a plurality of sensor devices in which the operation of the sensor interface is directed according to the program logic software that is executed by the processor.
摘要:
A method of detecting anomalies in an industrial control system includes analyzing data of correct operational parameters from at least one input device and storing the correct operational parameter or a correlation of at least two operational parameters as training data. The training data is used to train an anomaly detection system. Current operational parameters of the at least one input device are detected. The anomaly detection system then checks at least one of the detected operational parameter or a correlation of at least two detected operational parameters to detect a deviation from the training data. When the detected deviation is above or below a defined threshold, a communication function is performed. For example, the communication function is at least one of creating an alarm, communicating data to at least one of a control system and an operator, and recording the data or the alarm.
摘要:
Automation security in a networked-based industrial controller environment is implemented. Various components, systems and methodologies are provided to facilitate varying levels of automation security in accordance with security analysis tools, security validation tools and/or security learning systems. The security analysis tool receives abstract factory models or descriptions for input and generates an output that can include security guidelines, components, topologies, procedures, rules, policies, and the like for deployment in an automation security network. The validation tools are operative in the automation security network, wherein the tools perform security checking and/or auditing functions, for example, to determine if security components are in place and/or in suitable working order. The security learning system monitors/learns network traffic patterns during a learning phase, fires alarms or events based upon detected deviations from the learned patterns, and/or causes other automated actions to occur.
摘要:
An equipment information security device is provided. The equipment information security device is installed on an equipment with confidential information, wherein the equipment or the device has a security interface, the device comprises: a fitting which is worn by a staff and combined with an electronic tag with or without authority to the corresponding equipment; a tag reader, which detects the electronic tag within a detecting area corresponding to the security interface; and an authority processing unit, which links to the tag reader: wherein the authority processing unit sets the security interface to an operation state and enables the security interface when there are only the authorized electronic tags being detected in the detecting area, and the authority processing unit sets the security interface to a security state and disables the security interface when one or more unauthorized electronic tags are detected in the detecting area.
摘要:
A mobile robot is configured for operation in a commercial or industrial setting, such as an office building or retail store. The robot can patrol one or more routes within a building, and can detect violations of security policies by objects, building infrastructure and security systems, or individuals. In response to the detected violations, the robot can perform one or more security operations. The robot can include a removable fabric panel, enabling sensors within the robot body to capture signals that propagate through the fabric. In addition, the robot can scan RFID tags of objects within an area, for instance coupled to store inventory. Likewise, the robot can generate or update one or more semantic maps for use by the robot in navigating an area and for measuring compliance with security policies.
摘要:
A mobile robot is configured for operation in a commercial or industrial setting, such as an office building or retail store. The robot can patrol one or more routes within a building, and can detect violations of security policies by objects, building infrastructure and security systems, or individuals. In response to the detected violations, the robot can perform one or more security operations. The robot can include a removable fabric panel, enabling sensors within the robot body to capture signals that propagate through the fabric. In addition, the robot can scan RFID tags of objects within an area, for instance coupled to store inventory. Likewise, the robot can generate or update one or more semantic maps for use by the robot in navigating an area and for measuring compliance with security policies.
摘要:
Automation security in a networked-based industrial controller environment is implemented. Various components, systems and methodologies are provided to facilitate varying levels of automation security in accordance with security analysis tools, security validation tools and/or security learning systems. The security analysis tool receives abstract factory models or descriptions for input and generates an output that can include security guidelines, components, topologies, procedures, rules, policies, and the like for deployment in an automation security network. The validation tools are operative in the automation security network, wherein the tools perform security checking and/or auditing functions, for example, to determine if security components are in place and/or in suitable working order. The security learning system monitors/learns network traffic patterns during a learning phase, fires alarms or events based upon detected deviations from the learned patterns, and/or causes other automated actions to occur.