G05B2219/24168

SYSTEMS AND METHODS FOR DATA LIFECYCLE MANAGEMENT WITH CODE CONTENT OPTIMIZATION AND SERVICING

A non-transitory computer-readable medium includes instructions that, when executed, cause one or more processors to perform operations. The operations include receiving a first request to access a digital representation that is assigned to an asset of an industrial automation system and includes code specific to operating, maintaining, or diagnosing the asset. The operations also include verifying a security access for the first request, providing the computing device access to the digital representation, receiving an input to modify the code from the computing device and, performing one or more simulations based on the modified code by utilizing the digital representation. Additionally, the operations include sending one or more simulation results to the computing device, receiving, from the computing device, a second request for pushing the modified code to the asset, and in response to receiving the second request, causing the modified code to be sent to the asset.

COMMUNICATIONS AND OPEN-LOOP/CLOSED-LOOP CONTROL SYSTEM FOR A FILLING SYSTEM
20210292025 · 2021-09-23 ·

The present invention relates to a communication and open-loop/closed-loop control system for at least one filling system, said filling system comprising a machine with a software communication robot, in particular a chatbot, which is configured to recognize voice input and/or text input by an operator; and an open-loop/closed-loop control device which is connected to the software communication robot for data communication and is configured to control the machine of the filling system in an open-loop/closed-loop manner on the basis of the voice input and/or text input recognized by the software communication robot.

Method for operating an industrial control system and corresponding control system
10895860 · 2021-01-19 · ·

A method operates an industrial control system, which includes at least one stationary control device and at least one control-technology-based manual operator-control instrument, which can be carried by an operator-control person. In at least one of the manual operator-control instruments, at least one data-technology-based identifier is resident, which represents at least the respective hardware version and the respective software status of the respective manual operator-control instrument. The mode of response of the respective control device or of the entire control system in relation to reliability or non-reliability of the establishment of a control-technology-based interaction, in relation to functional response during an active control-technology-based interaction and in relation to functional response in connection with a termination of a control-technology-based interaction between the respective control device and the manual operator-control instrument is determined or influenced in dependence on this data-technology-based identifier. In addition, a correspondingly constructed control system is specified.

Wireless network session management

A method for limiting control of a cargo handling system may comprise receiving, by a controller of a wireless access point, a system control request from a PED. The controller may determine a number of devices currently controlling the cargo handling system. The controller may send a first control key to the PED if the number of devices controlling the cargo handling system is fewer than a threshold number of devices or the controller may send a request denied message if the number of devices controlling the cargo handling system is greater than or equal to the threshold number of devices.

Industrial safe input device
10591904 · 2020-03-17 · ·

A device for controlling a user input device to prevent inadvertent activation of the user input device includes a user input device for receiving user commands and an activation trigger associated with the input device. The activation trigger includes a mechanism that prevents incidental actuation. When the activation trigger is actuated, the input device is enabled to receive user commands for an amount of time dictated by a timer, and disabled when the timer has exhausted the amount of time.

SAFE GUARD DETECTION FOR UNEXPECTED OPERATIONS IN A MES SYSTEM

A method for performing a safe guard detection of unexpected operations launched by an operator for a manufacturing execution system (MED system) is based on a first database containing a set of operations, a set of operators, calendar information for a shift and calendar information for the equipment of the MES-system. The MES-systems further has a second database containing a login history of carried out logins of the operator. The detection of a malicious operation is carried out as to whether the operation complies with a set of rules defining allowed operations or with a learning module, in which specific roles of operators are contained and whether an operation complies with a specific role. In case of non-compliance, the operation is stored as an entry in an event trace file for generating alerts.

SYSTEMS AND METHODS FOR VIRTUALLY TAGGING AND SECURING INDUSTRIAL EQUIPMENT
20190219991 · 2019-07-18 ·

In one embodiment, a non-transitory computer readable medium may include computer-executable instructions that, when executed by a processor, may cause processor to receive a set of user data associated with a user that is attempting to access an electronic lock, receive a request to actuate a locking mechanism of the electronic lock configured to prevent the user from accessing a machine in an industrial automation system, actuate the locking mechanism in response to the request and the set of user data corresponding to an expected set of data, store a log of the request and the set of user data, and send the log to a cloud-based computing system.

METHOD FOR OPERATING AN INDUSTRIAL CONTROL SYSTEM AND CORRESPONDING CONTROL SYSTEM
20190187658 · 2019-06-20 · ·

A method operates an industrial control system, which includes at least one stationary control device and at least one control-technology-based manual operator-control instrument, which can be carried by an operator-control person. In at least one of the manual operator-control instruments, at least one data-technology-based identifier is resident, which represents at least the respective hardware version and the respective software status of the respective manual operator-control instrument. The mode of response of the respective control device or of the entire control system in relation to reliability or non-reliability of the establishment of a control-technology-based interaction, in relation to functional response during an active control-technology-based interaction and in relation to functional response in connection with a termination of a control-technology-based interaction between the respective control device and the manual operator-control instrument is determined or influenced in dependence on this data-technology-based identifier. In addition, a correspondingly constructed control system is specified.

CABLE PROCESSING MACHINE CONTROL SYSTEM, CABLE PROCESSING MACHINE SYSTEM AND METHOD FOR MONITORING AND CONTROLLING CABLE PROCESSING MACHINES
20190137970 · 2019-05-09 ·

A cable processing machine control system includes middleware for data exchange with data brokers of multiple cable processing machines, and a wearable communication device for data exchange with the middleware. When a user of the cable processing machine control system has logged into the wearable communication device, depending on a role of the user that is assigned by the middleware, different information is displayed for the user on the wearable communication device via the cable processing machines assigned to the assigned role of the user and/or different action possibilities for controlling the cable processing machines assigned to the assigned role of the user are provided for the user on the wearable communication device.

Systems and methods for virtually tagging and securing industrial equipment

In one embodiment, a non-transitory computer readable medium may include computer-executable instructions that, when executed by a processor, may cause processor to receive a set of user data associated with a user that is attempting to access an electronic lock, receive a request to actuate a locking mechanism of the electronic lock configured to prevent the user from accessing a machine in an industrial automation system, actuate the locking mechanism in response to the request and the set of user data corresponding to an expected set of data, store a log of the request and the set of user data, and send the log to a cloud-based computing system.