Patent classifications
G05B19/05
Method and system of detecting device rearrangement in manufacturing field
Example implementations described herein involve a device rearrangement detection system and method. Example implementations maintain the structure of devices in manufacturing field stored in an information technology (IT) system to the latest version, even if the IT system is on a network that is isolated from the devices in the manufacturing field.
Method and system of detecting device rearrangement in manufacturing field
Example implementations described herein involve a device rearrangement detection system and method. Example implementations maintain the structure of devices in manufacturing field stored in an information technology (IT) system to the latest version, even if the IT system is on a network that is isolated from the devices in the manufacturing field.
METHOD AND INTRUSION DETECTION UNIT FOR VERIFYING MESSAGE BEHAVIOR
A method is provided for verifying a message behavior of a control unit for an automation system having a plurality of components, the control unit communicating with the components and the components communicating with each other via a communication network, with the steps being carried out on at least one component: receiving at least one message via the communication network, wherein the at least one message is provided by the controller analyzing the at least one received message according to a characteristic message description, and providing a verification message comprising a verification of the message behavior of the control unit as acceptable if the analyzed message matches the characteristic message description.
METHOD AND INTRUSION DETECTION UNIT FOR VERIFYING MESSAGE BEHAVIOR
A method is provided for verifying a message behavior of a control unit for an automation system having a plurality of components, the control unit communicating with the components and the components communicating with each other via a communication network, with the steps being carried out on at least one component: receiving at least one message via the communication network, wherein the at least one message is provided by the controller analyzing the at least one received message according to a characteristic message description, and providing a verification message comprising a verification of the message behavior of the control unit as acceptable if the analyzed message matches the characteristic message description.
PROGRAMMABLE LOGIC CONTROLLER AND ANALYZER
An object of the present invention is to efficiently identify an abnormal device by analyzing and classifying characteristics such as periodicity and continuity of data related to each device. A programmable logic controller collects data held by a device as a collection target out of the plurality of devices in accordance with a predetermined collection setting for each scan cycle of the user program, classifies each of the devices into one of a plurality of types on the basis of a characteristic of the collected time-series data of each of the devices, and determines a detection algorithm used in identification of the device as an abnormal device in accordance with the time-series data of the device collected by the collection section and the type of the device classified by the classification section for each of the devices.
Method for designing production line based on digital twin
A method for designing a production line based on digital twin (DT), includes: determining a layout strategy of a production line; customizing a DT model of production device based on a pre-built universal DT model; allowing the production device to interact with a virtual model in real time; simultaneously testing and debugging a configuration of the production line; analyzing a test and debug result to derive a defect of the production line; modifying a virtual dynamic model; repeating until an optimal result is generated through optimization and designing the product line according to the optimal result. Based on the realization of virtual and real linkage, the present disclosure performs joint debugging on a physical entity and a virtual model in the production line so as to comprehensively consider uncertainty factors of the device and better guide the modification of the simulation model according to the test result.
Remote monitoring systems and related methods
Systems and methods are disclosed herein relating to control of one or more components of an electric power system. A human machine interface (HMI) may be utilized to control and monitor a remote intelligent electronic device (IED) via a local intelligent electronic device (IED) connected to the HMI.
IMPEDING UNAUTHORIZED NETWORK INFILTRATION AT REMOTE CRITICAL INFRASTRUCTURE FACILITIES
A system for preventing unauthorized access to a network can include a secure container having an access portal for controlling access to contents of the secure container and a security checkpoint configured to determine a state of the access portal and to receive an authorization code for opening the access portal. The security checkpoint can also include a logical lock module that switches to a breach mode of operation in response to a signal from the security checkpoint indicating that the access portal has been opened without receipt of the authorization code within a predetermined amount of time. The system can also include a network switch disposed within the secure container. The network switch is configured to communicate on a network and disable outgoing network communications to the network in response to a breach signal indicating that the logical lock module has switched to the breach mode.
IMPEDING UNAUTHORIZED NETWORK INFILTRATION AT REMOTE CRITICAL INFRASTRUCTURE FACILITIES
A system for preventing unauthorized access to a network can include a secure container having an access portal for controlling access to contents of the secure container and a security checkpoint configured to determine a state of the access portal and to receive an authorization code for opening the access portal. The security checkpoint can also include a logical lock module that switches to a breach mode of operation in response to a signal from the security checkpoint indicating that the access portal has been opened without receipt of the authorization code within a predetermined amount of time. The system can also include a network switch disposed within the secure container. The network switch is configured to communicate on a network and disable outgoing network communications to the network in response to a breach signal indicating that the logical lock module has switched to the breach mode.
Modular software defined atomic clock systems and methods thereof
A modular programmable software defined atomic clock system includes an oscillator configured to output a periodic, oscillating electrical signal, an atomic clock physics package system, and a programmable logic controller. The atomic clock physics package system is configured to generate a reference signal based on detected electron spin transitions between two hyperfine energy levels in atoms stored in the atomic clock physics package system. The programmable logic controller is coupled to the oscillator and the atomic clock physics package system. The programmable logic controller is configured to: detect an error signal based on the generated reference signal and the periodic, oscillating electrical signal; adjust the periodic, oscillating electrical signal based on the detected error signal; and generate and output one or more output signals in one or more frequencies from the adjusted periodic, oscillating electrical signal.