Patent classifications
G05B2219/24167
MODULAR SECURITY CONTROL DEVICE
A modular security control device for controlling an apparatus or an installation includes a basic control apparatus which is configured such that an apparatus or an installation which is at least connectable to the basic control apparatus is at least controllable via a sequence of a control program in the basic control apparatus, and includes a security module which is configured to provide or perform a cryptographic functionality for the basic control apparatus, where the security module is connected to the basic control apparatus by a data connection via a data interface, the basic control apparatus is configured to interact with the security module to achieve a security function of the security control device, and where the basic control apparatus is configured to query an identity and/or authenticity of the security module.
Semiconductor manufacturing system, control device, and control method
A semiconductor manufacturing system includes: a local operation terminal that displays an apparatus screen of a semiconductor manufacturing apparatus; at least one remote operation terminals that are connected to the semiconductor manufacturing apparatus via a network, and display the apparatus screen; and a controller that controls the semiconductor manufacturing apparatus based on an operation received from a user by the local operation terminal and the remote operation terminal that display the apparatus screen. The control device includes: a login state managing unit; an apparatus screen display state managing unit; and a screen data creating unit that creates screen data of the apparatus screen based on the simultaneous login state and the apparatus screen display state.
METHOD OF ACCESSING FUNCTIONS OF AN EMBEDDED DEVICE
A method for accessing functions of an embedded device, for example a controller programmable from memory, wherein function blocks of the embedded device are assigned to at least two hierarchically superimposed levels, an access to a function block of the embedded device occurs from outside of the embedded device by a data interface, and for access an authentication must occur for the level to which the respective function block is assigned, and again for each individual level above the level to which the function block is assigned, to permit execution of a function of the function block, wherein the functions of the function blocks permit access to a firmware of the embedded device.
Securing devices to process control systems
Techniques for securing a device for use in or with a process plant include provisioning the device with a key generated at least in part from data indicative of necessary conditions and/or attributes that must be met before the device is allowed access to a network of the process plant. Upon initialization, the device determines, based on the key, whether or not the necessary conditions are met, and the device isolates itself or accesses the process control network accordingly. Keys and the necessary conditions/attributes indicated therein may be based on, for example, location, time, context, customer, supplier, particular plant, manufacturer, user, data type, device type, and/or other criteria. Additionally, sub-keys associated with a key may be generated from another set of necessary conditions/attributes. Sub-keys may be provided by a different entity than the key provider entity.
Control system for securely protecting a control program when editing, executing and transmitting the control program
A control system which protects a control program securely and improves a convenience for a particular user in reading and writing an execution-use control program from and into a PLC. The control system includes: a controller which controls a production apparatus; a development-use computer which converts a control program that describes control of the production apparatus, into the execution-use control program that can be executed by the controller, and encrypts the execution-use control program converted, thus generating an edit-use key for editing and an execution-use key for execution; and a management server which manages information on the user. The development-use computer registers the edit-use key in a user management table of the management server, and transmits the execution-use key and the execution-use control program to the controller.
Method for Managing a Production Process
Various embodiments include a method for managing a production process for fabricating a component comprising: storing fabrication data for fabricating the component in a first file container; storing reproduction data relating to the component in the first file container, wherein said reproduction data includes a permission relating to the fabrication of the component; storing production data indicating a state of a production machine during the production process in a second file container; storing character data indicating a property of the component in a third file container; receiving a request; and providing at least one datum in response to the request, the at least one datum selected from the group of data consisting of: the stored fabrication data, the reproduction data, the production data, and/or the character data.
Biometric Authentication Using Voice Accelerometer
Techniques for biometric authentication using a voice accelerometer and an acoustic transducer includes receiving a first signal representing an output by a voice accelerometer of a device and a second signal representing an output by an acoustic transducer of the device. Characteristics of each of the first signal and the second signal are compared with stored biometric characteristics for a user of the device. The user of the device is then authenticated based on the comparison.
Method for secure communication with a field measuring device of process measuring technology and corresponding field measuring device
A method for secure communication with a field measuring device of process measuring technology is described and shown. Upon contact by an external communication means with a web server via a communication interface, a first authenticity check of an external communication means is carried out by the field measuring device and a second authenticity check of the external communication means is carried out. After successful completion of the first authenticity check and the second authenticity check, further communication of the external communication means with the web server is authorized by the field measuring device.
CONTROL SYSTEM, SECURITY DEVICE, AND METHOD
The present invention prevents unauthorized duplication of a control-related program stored in a control device. Provided is a control system equipped with a control device for executing a program related to control of a control target, and a security device capable of communicating with the control device. The security device includes a key storage part for storing a key and a decryption part for using a key to decrypt an encrypted program, and when a program is executed, carries out decryption thereon and transmits the decrypted program to the control device. The control device is equipped with a volatile storage part for storing the decrypted program transmitted from the security device.
Method and apparatus for providing access information for an access to a field device for process industry
A method for providing access information for access to a field device for process automation is disclosed. The method includes the steps of determining, at a users operating device, at least one access information issued to the user for an access to at least one field device via the operating device, assigning, at the users operating device, a further user to the determined at least one access information, and sending an access permission comprising information relating to the determined at least one access information and to the further user assigned to the determined access information such that the determined at least one access information is provided to the further user based on the access permission.