G05B2219/39251

Systems and methods for virtually tagging and securing industrial equipment

In one embodiment, a non-transitory computer readable medium may include computer-executable instructions that, when executed by a processor, may cause processor to receive a set of user data associated with a user that is attempting to access an electronic lock, receive a request to actuate a locking mechanism of the electronic lock configured to prevent the user from accessing a machine in an industrial automation system, actuate the locking mechanism in response to the request and the set of user data corresponding to an expected set of data, store a log of the request and the set of user data, and send the log to a cloud-based computing system.

MOTION-CONTROLLING METHOD OF ROBOT AND THE ROBOT THEREOF
20190054616 · 2019-02-21 ·

The present disclosure relates to a motion-controlling method of a robot and the robot thereof. A main control circuit continuously transmits a controlling instruction to a cache circuit. The controlling instruction may include the controlling information of a specific servo. A driving circuit is configured to obtain and analyze the controlling instruction from the cache circuit, so as to obtain the controlling information of the specific servo. The driving circuit transmits the controlling information to the specific servo to control the specific servo. As such, coherence of the robot may be improved.

Systems and methods for recommending components for an industrial system

In one embodiment, a tangible, non-transitory computer-readable medium includes computer instructions stored thereon. The computer instructions, when executed by a processor, may cause the processor to receive historical data associated with placing a machine in an industrial environment offline, to determine one or more recommendations for the machine, one or more parts of the machine, or both based on the historical data, to determine an authority level of one or more users requesting to place the machine offline, and to display the one or more recommendations based on the authority level of the one or more users.

Systems and methods for electronically tracking a status of industrial equipment

In one embodiment, a non-transitory computer readable medium may store computer instructions that, when executed by a processor, cause the processor to receive an input associated with placing a piece of industrial automation equipment offline, determine whether the input corresponds to one or more regulations associated with placing the piece of industrial automation equipment offline, display a first set of instructions regarding how to place the piece of industrial automation equipment offline when the input corresponds to the one or more regulations, and display a second set of instructions regarding how to place the piece of equipment offline when the input does not correspond to the one or more regulations.

SYSTEMS AND METHODS FOR VIRTUALLY TAGGING AND SECURING INDUSTRIAL EQUIPMENT
20180321661 · 2018-11-08 ·

In one embodiment, a non-transitory computer readable medium may include computer-executable instructions that, when executed by a processor, may cause processor to receive a set of user data associated with a user that is attempting to access an electronic lock, receive a request to actuate a locking mechanism of the electronic lock configured to prevent the user from accessing a machine in an industrial automation system, actuate the locking mechanism in response to the request and the set of user data corresponding to an expected set of data, store a log of the request and the set of user data, and send the log to a cloud-based computing system.

Systems and methods for virtually assessing an industrial automation system

An industrial automation system includes a first computing device that communicatively couples to a second computing device via a communication network. The first computing device receives image data capturing a visual representation of industrial automation equipment in operation via the communication network, in which the image data is acquired by the second computing device; determines an identity of the industrial automation equipment based at least in part on the image data; determines relevant information regarding the industrial automation equipment based at least in part on the identity of the industrial automation equipment; and instructs the industrial automation equipment, the second computing device, the first computing device, the industrial automation system, a user, or any combination thereof to perform one or more operations in the industrial automation system based at least in part on the relevant information.

Systems and methods for virtually tagging and securing industrial equipment

In one embodiment, a non-transitory computer readable medium may include computer-executable instructions that, when executed by a processor, may receive a first set of data associated with a user, receive a second set of data associated with one or more lockout procedures performed by the user, receive a request to actuate a locking mechanism of an electronic lock configured to prevent a machine in an industrial automation application from being operational, and send a signal to the electronic lock to actuate the locking mechanism when the second set of data indicates that the lockout procedures have been performed by the user and the data corresponds to an authorized user.

Systems and methods for assessing a quality of an industrial enterprise

In one embodiment, a system includes an industrial automation device and a computing device. The computing device includes a display configured to display a set of procedures. The computing device also includes a processor configured to receive an input after each step of the set of procedures is performed by a user, analyze the input in view of one or more scoring factors associated with performance of the at least one step, determine a first score for the user, the industrial automation device, or both based on the scoring factors, and store the first score in a cloud-based computing system. The cloud-based computing system is configured to provide access to the first score.

SYSTEMS AND METHODS FOR VIRTUALLY TAGGING AND SECURING INDUSTRIAL EQUIPMENT

In one embodiment, a non-transitory computer readable medium may include computer-executable instructions that, when executed by a processor, may receive a first set of data associated with a user, receive a second set of data associated with one or more lockout procedures performed by the user, receive a request to actuate a locking mechanism of an electronic lock configured to prevent a machine in an industrial automation application from being operational, and send a signal to the electronic lock to actuate the locking mechanism when the second set of data indicates that the lockout procedures have been performed by the user and the data corresponds to an authorized user.

Systems and methods for enhancing monitoring of an industrial automation system

In one embodiment, a tangible, non-transitory computer-readable medium includes computer instructions configured to receive image data from an apparatus, wherein the image data comprises a person within a proximity to an industrial automation device, determine whether the person is wearing a set of personal protection equipment (PPE) based on the image data, disable one or more operations of the industrial automation device when the person is not wearing the set of PPE, and track a usage of the set of PPE.