G05B2219/36542

SPARE ROBOT CONTROLLER
20230191595 · 2023-06-22 ·

A spare robot controller for replacing any one of a plurality of initial robot controllers configured to control operation of respective industrial robots includes a key storage storing a plurality of shared keys and a secure storage. The spare robot controller is configured to decrypt, using one of the shared keys, an encrypted backup copy of the initial robot controller to be replaced, and to store resulting data in the secure storage. In embodiments, the is configured to extract data from the secure storage during operation and to encrypt the extracted data, using a selected one of the shared keys, for storage as a backup copy in a backup storage available to all of the initial robot controllers.

Forward market renewable energy credit prediction from human behavioral data

Systems and methods for predicting forward market pricing for renewable energy credit based on human behavioral data are disclosed. An example transaction-enabling system may include a forward market circuit to access a forward energy credit market and a market forecasting circuit to automatically generate a forecast for a forward market price of an energy credit in the forward energy credit market where the forecast is based at least in part on a human behavior information collected from at least one human behavioral data source. The example system may further include wherein the energy credit includes a renewable energy credit associated with a renewable energy system, and a smart contract circuit to perform at least one of selling the renewable energy credit or purchasing the renewable energy credit on the forward energy credit market in response to the forecasted forward market price of the energy credit.

MODULAR SECURITY CONTROL DEVICE

A modular security control device for controlling an apparatus or an installation includes a basic control apparatus which is configured such that an apparatus or an installation which is at least connectable to the basic control apparatus is at least controllable via a sequence of a control program in the basic control apparatus, and includes a security module which is configured to provide or perform a cryptographic functionality for the basic control apparatus, where the security module is connected to the basic control apparatus by a data connection via a data interface, the basic control apparatus is configured to interact with the security module to achieve a security function of the security control device, and where the basic control apparatus is configured to query an identity and/or authenticity of the security module.

SURGICAL NETWORK, INSTRUMENT, AND CLOUD RESPONSES BASED ON VALIDATION OF RECEIVED DATASET AND AUTHENTICATION OF ITS SOURCE AND INTEGRITY
20220374414 · 2022-11-24 ·

A system for validating data purportedly generated in a medical procedure is disclosed. The system includes a medical hub, at least one remote server communicatively coupled to the medical hub, and a medical instrument communicatively coupled to the medical hub. The system is configured to access the data, validate the data to determine if the data is validly generated by the medical procedure, determine that the data contains at least one flaw or error, and improve data integrity by preventing the at least one flaw or error from being integrated into a larger dataset associated with the at least one remote server.

Multi-User Computer-Numerically-Controlled Machine

A method for accessing a computer-numerically-controlled machine can include receiving a command to be executed by the computer-numerically-controlled machine. A hardware state of a component in the computer-numerically-controlled machine can be determined by receiving, from the component, data indicative of the hardware state. An origin of the command including a user identification of a user who sent the command and/or a machine identification of a device that sent the command can be determined. Whether the computer-numerically-controlled machine is allowed to execute the command can be determined by applying a set of rules and based on the hardware state and/or the origin of the command. In response to determining that the computer-numerically-controlled machine is allowed to execute the command, the command can be executed at the computer-numerically-controlled machine.

Secure 3D printing
11263296 · 2022-03-01 · ·

A computer-implemented method for controlling reproduction of an item represented by a digital asset stored in a trusted computing environment using a reproduction device in an untrusted computing environment, in which a succession of data seg¬ments is transmitted from the trusted computing environment to the untrusted computing environment, the succession of data segments comprising segments of reproduction data, each of which includes at least one instruction for controlling the reproduction device to reproduce a portion of the item, and at least one segment of obfuscation data which has a structure identical the reproduction data but is incapable of controlling the reproduction device to reproduce a portion of the item, the method comprising: a) determining whether the next segment of data in the succession should be a segment of reproduction data or a segment of obfuscation data; b) where the next segment of data should be a segment of reproduction data, selecting and extracting an unprocessed segment of data from the digital asset to form the next segment of data; c) where the next segment of data should be a segment of obfuscation data, providing a segment of obfuscation data to form the next segment of data; d) generating a unique encryption key and encrypting the next segment of data using the unique encryption key; e) transmitting the encrypted next segment of data from the trusted computing environment; f) decrypting the encrypted next segment of data received at the untrusted computing environment; g) attempting to control the reproduction device using the decrypted data segment such that where the next segment of data is reproduction data, the reproduction device reproduces the portion of the item at the untrusted computing environment in accordance with the instructions included with the data segment, and where the next segment of data is obfuscation data, the reproduction device is unresponsive; and h) iterating steps (a) to (g) until the entire digital asset, or a desired portion of it, has been processed.

Connection establishing system and method for mesh network

A connection establishing system and method for a mesh network is provided, the mesh network includes a first transceiver and a second transceiver, the method includes performing a secure connection procedure including: transmitting, by the second transceiver, a secure connection request signal including a identifier to the first transceiver. The first transceiver encrypts the authentication message by using a public key corresponding to the identifier to generate a secure connection response signal and transmit the same to the second transceiver, the second transceiver decrypts the secure connection response signal by a private key to generate a decryption message and transmits an association request signal including the decryption message to the first transceiver. The first transceiver receives the association request signal, and determines whether the decryption message matches with the authentication message; if so, the first transceiver is allowed to establish a secure connection with the second transceiver.

Transaction-enabled systems for providing provable access to a distributed ledger with a tokenized instruction set

Transaction-enabling systems including a controller are disclosed. The controller can access a distributed ledger including an instruction set, tokenize the instruction set, interpret an instruction set access request, and, in response to the instruction set access request, provide a provable access to the instruction set.

DEVICE SPECIFIC CRYPTOGRAPHIC CONTENT PROTECTION
20170302456 · 2017-10-19 ·

Techniques to facilitate protecting control data used in an industrial automation environment are disclosed herein. In at least one implementation, an encryption key pair is generated for an industrial controller, wherein the encryption key pair comprises a public key and a private key. The private key is stored within a secure storage system of the industrial controller. Controller program content is then encrypted using the public key to generate encrypted controller content. The encrypted controller content is then provided to the industrial controller, and the industrial controller is configured to decrypt the encrypted controller content using the private key and execute the controller program content.

MACHINING PROGRAM PROCESSING APPARATUS
20170337100 · 2017-11-23 · ·

To provide a machining program processing apparatus capable of preventing an increase in the program correction time or does not let the program correction time go to waste. A machining program processing apparatus includes: a grammar checking unit executing grammar check of a machining program; a transmission processing unit transmitting the machining program to an external device; and a deletion processing unit deleting the machining program, wherein, when a transmission request of the machining program including a grammar error is received, the transmission processing unit confirms whether the transmission is to be permitted or not.