Patent classifications
G05B2219/32136
Hybrid rule implementation for an automation system
According to at least one embodiment, a computer-implemented method to implement at least one automation rule is described. The at least one automation rule may be generated, wherein the at least one automation rule may control at least one aspect of an automation system. The execution origination point may be selected for the at least one automation rule based at least in part on the one or more implementation parameters. The one or more implementation parameters may comprise at least one of the speed of the automation rule execution, the scalability of the automation rule, the flexibility of the automation rule conditions, or the ease of automation rule modification.
System And Method For Creating, Executing And Managing Processes Using Nano Server Architecture
A system and method for creating, executing and managing processes of cross-enterprise businesses using nano server architecture, is disclosed herein. A process store tool (e.g., a graphical interface visual tool) at the end-user (such as, a business entity or an individual process developer) provides an open, flexible workflow engine for supporting the creation and enforcement of at least one business process with respect to the end user. A cluster having at least one nano server (also referred as ‘lean server’) configured within a data centre for storing, executing and managing processes with respect to the end user within the cloud environment. The nano servers of the cluster are the micro app servers with a small memory foot print consuming minimal resources. The nano servers are multi-threaded processes which houses the services that is consumed by the end user.
Method and Industrial Automation System with a System for Embedding a Web Application to be Embedded in a Surrounding Web Application
Industrial automation system with a system for embedding a web application to be embedded in a surrounding web application and method for embedding a web application into a surrounding web application, wherein the web application to be embedded is provided to run in a separate execution and display region of the surrounding web application, the web application to be embedded is provided by at least two web servers so as to increase redundancy, monitoring capability and operability and therefore fault tolerance, to reduce complexity, to reduce communication traffic and to obtain improved options for access restriction for personnel, particularly in large industrial automation systems, such as process control systems.
Sum stream for actual states and control signals of a distributed control system
Sensors of a control system transmit detected cyclical actual states of a technical industrial process to a common central unit via a first protected connection of a first open communication network once within a specified time window. The central unit transmits cyclical control signals commensurate with the actual states to multiple actuators via a second protected connection of a second open communication network once within the specified time window. Each sensor supplies the actual state detected by the sensor to the first open communication network within a respective transmitter-side sub-region within the time window. The central unit receives the transmitted actual states within a respective corresponding receiver-side sub-region within the time window. The transmitter-side sub-regions of the sensors are specified such that the receiver-side sub-regions are disjointed from one another.
Detection of second order vulnerabilities in web services
A method detecting a vulnerability in a Web service can include determining, using a processor, whether a Web service uses identity of a requester to select one of a plurality of different paths of a branch in program code of the Web service. The method further can include, responsive to determining that the Web service does select one of a plurality of different paths of a branch according to identity of the requester, indicating that the Web service has a potential vulnerability.
COMMUNICATION SYSTEM AND METHOD FOR ACCESSING AND DEPLOYING TEMPORARY MICROSERVICES ON A HETEROGENEOUS PLATFORM
The present invention relates to a communication system (1) comprising one or several execution node(s) (2) able to execute one or several microservice(s) (5), a computer device, called host server (3), including several routers (30) constituting an intermediate communication interface between each execution node (2) and the outside of the communication system (1), a heterogeneous computing platform (4), consisting of a set (40) of hardware and software or executable code for the access to and deployment of the microservices (5) on the system in a Java runtime environment (J) on the host server (3) and the execution nodes (2) allowing the execution of computer programs based on the Java language; the communication system (1) allows the creation of ephemeral microservices (5) by the use of a key/value system (6) stored in a distributed memory cache (8) at each creation by referencing each microservice (5) by filenames deposited in the system by a developer (10) and using an asynchronous TCP exchange protocol (T) exchanging notifications containing metadata (M) between the host server (3) and each execution node (2); and in that each node (2) stores execution files (50) of the microservice(s) (5) including the access to the system (1) by at least one of the two entry points, either at the host server (3) or at the execution node (2) and at least one classloader (7) ensuring the deployment of the services associated with the microservices (5) that are integrated into the execution node (2).
SUM STREAM FOR ACTUAL STATES AND CONTROL SIGNALS OF A DISTRIBUTED CONTROL SYSTEM
Sensors of a control system transmit detected cyclical actual states of a technical industrial process to a common central unit via a first protected connection of a first open communication network once within a specified time window. The central unit transmits cyclical control signals commensurate with the actual states to multiple actuators via a second protected connection of a second open communication network once within the specified time window. Each sensor supplies the actual state detected by the sensor to the first open communication network within a respective transmitter-side sub-region within the time window. The central unit receives the transmitted actual states within a respective corresponding receiver-side sub-region within the time window. The transmitter-side sub-regions of the sensors are specified such that the receiver-side sub-regions are disjointed from one another.
Hybrid rule implementation for an automation system
According to at least one embodiment, a computer-implemented method to implement at least one automation rule is described. The at least one automation rule may be generated, wherein the at least one automation rule may control at least one aspect of an automation system. The execution origination point may be selected for the at least one automation rule based at least in part on the one or more implementation parameters. The one or more implementation parameters may comprise at least one of the speed of the automation rule execution, the scalability of the automation rule, the flexibility of the automation rule conditions, or the ease of automation rule modification.
Detection of second order vulnerabilities in web services
A system for detecting a vulnerability in a Web service can include a processor configured to initiate executable operations including determining whether a Web service uses identity of a requester to select one of a plurality of different paths of a branch in program code of the Web service and, responsive to determining that the Web service does select one of a plurality of different paths of a branch according to identity of the requester, indicating that the Web service has a potential vulnerability.
DETECTION OF SECOND ORDER VULNERABILITIES IN WEB SERVICES
A method detecting a vulnerability in a Web service can include determining, using a processor, whether a Web service uses identity of a requester to select one of a plurality of different paths of a branch in program code of the Web service. The method further can include, responsive to determining that the Web service does select one of a plurality of different paths of a branch according to identity of the requester, indicating that the Web service has a potential vulnerability.