Patent classifications
G05B2219/45103
Board production management device and board production management method to determine a countermeasure to a board production device error
A board production management device for managing a board production line including a solution memory section for linking and storing a problem event that may occur in a board production line and that requires a countermeasure operation, a solution to serve as the countermeasure operation, and a set authority level set for a worker who may implement the solution; an solution memory section for authenticating the authority level of a worker who implements the countermeasure operation; and a solution notification section for separately reporting, when a problem event occurs, an executable solution corresponding to a set authority level equal to or less than the authority level, and an unexecutable solution corresponding to a set authority level exceeding the authority level.
ANTI-MALWARE ADAPTOR FOR REMOVABLE STORAGE DEVICES
An adaptor includes non-volatile memory that stores a scan engine. A removable storage device is connected to the adaptor, which in turn is connected to a host computer. Files being copied between the removable storage device and the host computer through the adaptor are scanned for malware using the scan engine.
Multi-device robot control
Systems, methods, and related technologies are disclosed for multi-device robot control. In one implementation, input(s) are received and provided to a personal assistant or another application or service. In response, command(s) directed to an external device are received, e.g., from the personal assistant. Based on the command(s), a robot is maneuvered in relation to a location associated with the external device. Transmission of instruction(s) from the robot to the external device is initiated.
PROCESSING SYSTEM, PROCESSING METHOD, AND NON-TRANSITORY STORAGE MEDIUM
The present invention provides a processing system (10) including: an electromagnetic wave reception unit (11) that receives an electromagnetic wave from a target person passing through a predetermined region; a determination unit (12) that determines, based on a signal of the received electromagnetic wave, whether the target person carries a previously-specified object; a route decision unit (13) that decides, based on a result of the determination, an inspection route where the target person proceeds from among a plurality of the previously-determined inspection routes; and a guidance unit (14) that executes guidance processing of guiding the target person to the decided inspection route.
METHOD FOR CONTROLLING TRANSMISSION SECURITY OF INDUSTRIAL COMMUNICATIONS FLOW BASED ON SDN ARCHITECTURE
The present invention discloses a method for controlling transmission security of an industrial communication flow based on an SDN architecture. The method comprises: designing a flow security control module in a management controller, performing in-depth parsing on industrial communication flow data, matching the parsing result with each preset industrial rule policy, and executing a control processing operation of the industrial rule policy, to implement transmission control of an industrial communication flow. The management controller comprises an industrial rule policy database used for storing all industrial rule policies set by a user. An SDN switch maintains a structure of a flow table, and an industrial communication flow is forwarded according to the flow table. The flow table comprises a security control identifier used for indicating whether security transmission of this communication flow needs to be controlled. The present invention can detect the legality of an industrial communication data flow, to control access of industrial communication that does not conform to an industrial rule policy, so that the security and reliability of industrial control systems based on an SDN architecture are guaranteed.
Defense system and method against cyber-physical attacks
The present disclosure generally relates to a system and method for defending a utilities system against cyber-physical attacks associated with anomalies in a physical process operative in the utilities system. The defense system comprises: a set of sensors for collecting physical data associated with the physical process; a set of controller devices for monitoring process states of the physical process based on the physical data from the sensors; a set of verification devices for monitoring the physical process based on the physical data from the sensors, the physical data enabling the verification devices to detect the anomalies based on a set of invariants predefined for the physical process; and a set of actuators controllable by the controller devices or verification devices to remedy the anomalies and regulate the physical process, thereby defending the utilities system against the cyber-physical attacks.
Building-Integrated Mobile Robot
A mobile robot is configured for operation in a commercial or industrial setting, such as an office building or retail store. The robot can patrol one or more routes within a building, and can detect violations of security policies by objects, building infrastructure and security systems, or individuals. In response to the detected violations, the robot can perform one or more security operations. The robot can include a removable fabric panel, enabling sensors within the robot body to capture signals that propagate through the fabric. In addition, the robot can scan RFID tags of objects within an area, for instance coupled to store inventory. Likewise, the robot can generate or update one or more semantic maps for use by the robot in navigating an area and for measuring compliance with security policies.
Surveillance system with intelligent robotic surveillance device
A surveillance system may comprise one or more computing devices and one or more robotic surveillance devices. The one or more computing devices may be configured to obtain video data captured by one or more cameras. The one or more computing devices may analyze the video data to determine whether there is any trigger event. In response to determining that there is a trigger event, the one or more computing device may determine an optimal robotic surveillance device among the one or more robotic surveillance devices based on the trigger event and provide an instruction to the optimal robotic surveillance device. The optimal robotic surveillance device may be configured to perform a responding action in response to receiving the instruction.
MULTILEVEL CONSISTENCY CHECK FOR A CYBER ATTACK DETECTION IN AN AUTOMATION AND CONTROL SYSTEM
A system and a method provide multilevel consistency check for a cyber attack detection in an automation and control system wherein the multilevel consistency check of sensor measurements, commands and settings on different automation devices on a plant floor is able to provide end-to-end intrusion detection on exchanged data. The multilevel consistency check includes a measurement consistency check and a commands and settings consistency check to enable a cyber security solution for industrial control systems (ICS). An alarm is set when detecting a first value inconsistent from a second value. An anomaly is detected based on at least one of the measurement consistency or the commands and settings consistency and it is identified as an intrusion detection.
Mobile robot map generation
A mobile robot is configured for operation in a commercial or industrial setting, such as an office building or retail store. The robot can patrol one or more routes within a building, and can detect violations of security policies by objects, building infrastructure and security systems, or individuals. In response to the detected violations, the robot can perform one or more security operations. The robot can include a removable fabric panel, enabling sensors within the robot body to capture signals that propagate through the fabric. In addition, the robot can scan RFID tags of objects within an area, for instance coupled to store inventory. Likewise, the robot can generate or update one or more semantic maps for use by the robot in navigating an area and for measuring compliance with security policies.