G05B2219/24168

Distributed automated synthesis of correct-by-construction controllers

A method includes: receiving a mathematical model of a control system, with state variables and control parameters; discretizing at least a part of a space to obtain a set of tuples; determining for each tuple at least one successor state; obtaining an initial winning set of tuples; determining an updated winning set of tuples, including comparing the at least one successor state with the initial winning set of tuples, where the comparison is distributed over available processing elements by choosing one processing element from the available processing elements for each tuple to perform the comparison and where the available processing elements are used simultaneously at least in part; repeating the determination of the updated winning set of tuples to obtain a new updated winning set of tuples if a convergence measure does not meet a criterion, and constructing a controller for the control system from the new updated winning set.

Systems and methods for virtually tagging and securing industrial equipment

In one embodiment, a non-transitory computer readable medium may include computer-executable instructions that, when executed by a processor, may cause processor to receive a set of user data associated with a user that is attempting to access an electronic lock, receive a request to actuate a locking mechanism of the electronic lock configured to prevent the user from accessing a machine in an industrial automation system, actuate the locking mechanism in response to the request and the set of user data corresponding to an expected set of data, store a log of the request and the set of user data, and send the log to a cloud-based computing system.

SYSTEMS AND METHODS FOR DATA LIFECYCLE MANAGEMENT WITH CODE CONTENT OPTIMIZATION AND SERVICING

A non-transitory computer-readable medium includes instructions that, when executed, cause one or more processors to perform operations. The operations include receiving a first request to access a digital representation that is assigned to an asset of an industrial automation system and includes code specific to operating, maintaining, or diagnosing the asset. The operations also include verifying a security access for the first request, providing the computing device access to the digital representation, receiving an input to modify the code from the computing device and, performing one or more simulations based on the modified code by utilizing the digital representation. Additionally, the operations include sending one or more simulation results to the computing device, receiving, from the computing device, a second request for pushing the modified code to the asset, and in response to receiving the second request, causing the modified code to be sent to the asset.

Cable processing machine control system, cable processing machine system and method for monitoring and controlling cable processing machines
11262726 · 2022-03-01 · ·

A cable processing machine control system includes middleware for data exchange with data brokers of multiple cable processing machines, and a wearable communication device for data exchange with the middleware. When a user of the cable processing machine control system has logged into the wearable communication device, depending on a role of the user that is assigned by the middleware, different information is displayed for the user on the wearable communication device via the cable processing machines assigned to the assigned role of the user and/or different action possibilities for controlling the cable processing machines assigned to the assigned role of the user are provided for the user on the wearable communication device.

INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING APPARATUS, TERMINAL APPARATUS, WATER SUPPLY APPARATUS, AND CONTROL METHOD FOR WATER SUPPLY APPARATUS
20170300027 · 2017-10-19 ·

An information processing system includes a terminal apparatus that sends the received machine-type identification information and state history information received from the monitoring target apparatus by near field communication, an information processing apparatus that receives the machine-type identification information and the state history information from the terminal apparatus, and a storage apparatus that accumulates machine-type identification information identifying a machine type of a monitoring target apparatus and normal-state history information in an associated manner. When the information processing apparatus receives the machine-type identification information and state history information about a certain monitoring target apparatus from the terminal apparatus, the information processing apparatus compares the normal-state history information accumulated in the storage apparatus in association with the machine-type identification information and the received state history information, judges whether an operation state of the monitoring target apparatus is normal, and sends a judgment result to the terminal apparatus.

Joining a computer to a process control system

A setup control unit is configured to get activated via a first computer that is to become a node in the process control system and which activation is initiated by a setup tool being brought to the first computer. The setup control unit contacts a configuration control computer, supplies a setup tool identifier to the configuration control computer, accesses system information elements in the configuration control computer, presents system nodes to an operator using the system information elements, receives an operator selection of a system node, sends the node selection to the configuration control computer for registering, based on a setup tool identifier investigation, receives node parameter data associated with the selected system node from the configuration control computer and supplies the first computer with the node parameter data for making it into the selected system node.

DISTRIBUTED AUTOMATED SYNTHESIS OF CORRECT-BY-CONSTRUCTION CONTROLLERS
20210389743 · 2021-12-16 ·

A method includes: receiving a mathematical model of a control system, with state variables and control parameters; discretizing at least a part of a space to obtain a set of tuples; determining for each tuple at least one successor state; obtaining an initial winning set of tuples; determining an updated winning set of tuples, including comparing the at least one successor state with the initial winning set of tuples, where the comparison is distributed over available processing elements by choosing one processing element from the available processing elements for each tuple to perform the comparison and where the available processing elements are used simultaneously at least in part; repeating the determination of the updated winning set of tuples to obtain a new updated winning set of tuples if a convergence measure does not meet a criterion, and constructing a controller for the control system from the new updated winning set.

Communications and open-loop/closed-loop control system for a filling system
11772836 · 2023-10-03 · ·

The present invention relates to a communication and open-loop/closed-loop control system for at least one filling system, said filling system comprising a machine with a software communication robot, in particular a chatbot, which is configured to recognize voice input and/or text input by an operator; and an open-loop/closed-loop control device which is connected to the software communication robot for data communication and is configured to control the machine of the filling system in an open-loop/and/or closed-loop manner on the basis of the voice input and/or text input recognized by the software communication robot.

Systems and methods for data lifecycle management with code content optimization and servicing

A non-transitory computer-readable medium includes instructions that, when executed, cause one or more processors to perform operations. The operations include receiving a first request to access a digital representation that is assigned to an asset of an industrial automation system and includes code specific to operating, maintaining, or diagnosing the asset. The operations also include verifying a security access for the first request, providing the computing device access to the digital representation, receiving an input to modify the code from the computing device and, performing one or more simulations based on the modified code by utilizing the digital representation. Additionally, the operations include sending one or more simulation results to the computing device, receiving, from the computing device, a second request for pushing the modified code to the asset, and in response to receiving the second request, causing the modified code to be sent to the asset.

Safe guard detection for unexpected operations in a MES system

A method for performing a safe guard detection of unexpected operations launched by an operator for a manufacturing execution system (MED system) is based on a first database containing a set of operations, a set of operators, calendar information for a shift and calendar information for the equipment of the MES-system. The MES-systems further has a second database containing a login history of carried out logins of the operator. The detection of a malicious operation is carried out as to whether the operation complies with a set of rules defining allowed operations or with a learning module, in which specific roles of operators are contained and whether an operation complies with a specific role. In case of non-compliance, the operation is stored as an entry in an event trace file for generating alerts.