Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

1856 results about "Industrial control system" patented technology

Industrial control system (ICS) is a general term that encompasses several types of control systems and associated instrumentation used for industrial process control. Such systems can range from a few modular panel-mounted controllers to large interconnected and interactive distributed control systems with many thousands of field connections. All systems receive data received from remote sensors measuring process variables (PVs), compare these with desired set points (SPs) and derive command functions which are used to control a process through the final control elements (FCEs), such as control valves.

System and methodology providing open interface and distributed processing in an industrial controller environment

The present invention relates to a system and methodology providing virtual and remote component interactions in a networked industrial control environment. One or more components of an industrial control system are defined as a web service, wherein the components cooperate to support distributed controller functionality in all or portions of a virtual operating framework. For example, the components can include processing, logic, I / O and status components of an industrial control system. Standard and commonly available interfaces describe controller functionality in terms of the services, whereby controller applications are constructed via the components and associated interfaces. This can include discovery of other related services and employment of common web protocols to communicate between the services.
Owner:ROCKWELL AUTOMATION TECH

Industrial control and monitoring method and system

A technique is provided for integrating human machine interfaces with control and monitoring systems. Control and monitoring systems may be integrated into a human machine interface to enable access to various systems including networked and programmable electrical components, such as components of motor control centers, and databases that including component, system designation data, configuration information, settings, and so forth. The database and components are accessed by execution of a program embedded in the human machine interface to provide desired information in response to selection of a particular physical component of the system. The information serves as the basis for an operator display through the human machine interface.
Owner:ROCKWELL AUTOMATION TECH

Industrial control network security protection method and system

The invention discloses an industrial control network security protection method and an industrial control network security protection system. The method comprises the following steps that: aiming at an external network attack, a front host performs first layer data filter and access control on external network data; a security control host caches data through a common storage region, performs intrusion detection on the data, timely alarms illegal data and informs hosts on two sides; a rear host performs deep filter and access control on the data and causes the legal data to enter an internal network; aiming at an internal network attack, the rear host performs the first data filter and access control on internal network data; the security control host caches the data through the common storage region, performs the intrusion detection on the data, timely alarms the illegal data and informs the hosts on the two sides; and the front host performs the deep filter and access control on the data and causes the legal data to enter an external network. By the method and the system, the network security level of an industrial control system is increased, and the cost on investment, system transformation and management is reduced.
Owner:AUTOMATION RES & DESIGN INST OF METALLURGICAL IND

Controller redundancy and switching method

The invention discloses controller redundancy and a switching method. The method is used for the redundancy switching logic between an industrial controller main machine and a spare machine. Calculation and output synchronization between the main machine and the spare machine is guaranteed, and rapid undisturbed switching is achieved when the main machine fails. A switching circuit is composed of two pairs of GPIO control lines and a 100M Ethernet. Through recognition of low level states, pulse signal states and high level states of IOs, the normal state or the failure state of the opposite end controller main machine or the spare machine is obtained, and the normal state or the failure state of the main machine or the spare machine of an opposite end controller can be obtained in a communication mode when the hardware switching circuit fails, so that arbitration and switching of the main machine and the spare machine are achieved. The design method of state machines is adopted, the operation states of the controller are summarized to be five states that the main machine is normal, the main machine fails, the spare machine is normal, the spare machine fails, and opposite ends are powered off, and the arbitration treatment of the main machine and the spare machine is achieved through matrixes of the state machines. The hardware switching circuit and redundant communication serve as connecting signals between redundancy devices, reliability of redundancy switching control is greatly enhanced, and stable operation of an industrial control system can be effectively guaranteed.
Owner:BEIJING SIFANG JIBAO AUTOMATION +1

System and method for automatically matching programmable data of devices within an industrial control system

An industrial control system includes a central controller having a memory containing programmable data including operating programs for operating the controller, control program for controlling an industrial process, and configuration data configuring values used by the operating program and control program. The central controller is designed to control multiple devices also having memory holding programmable data including operating programs and configuration data. A program is executable by the central controller that causes the central controller to identify memories distributed through the industrial control system having programmable data and collect the programmable data from the memories. Accordingly, the collected programmable data may be used to substantially recreate operation of the industrial control system in a second industrial control system having another central controller substantially identical to the industrial controller and multiple devices connected to the central controller.
Owner:ROCKWELL AUTOMATION TECH

Bridge for an industrial control system using data manipulation techniques

A bridge usable in a highly reliable industrial control system provides an interface between a producer module transmitting redundant messages in accordance with a communication protocol and a consumer module receiving the messages in accordance with a different communication protocol. The bridge includes a first network interface receiving two messages from the producer, a microprocessor capable of converting the messages from the producer communication protocol to consumer communication protocol, and a second network interface transmitting the messages to the consumer. One of the messages is reversible altered with respect to the other message. The altered message is uninverted in the consumer module, and compared to the other message to ensure that no transmission errors have occurred.
Owner:ROCKWELL AUTOMATION TECH

Industrial control system based on field bus and control network

The invention discloses an industrial control system based on a field bus and a control network, comprising a master station, a slave station and a network communication protocol, wherein a master processor subsystem on the master station and a master communication protocol stack exchange data by double-port SRAM, and the master communication protocol stack and a slave communication protocol stack periodically and automatically communicate; the slave communication protocol stack of the slave station receives a control command sent by the master station, simultaneously can receive input terminal state information sent from other slave stations and can periodically send the input terminal state of an I/O controller to the network; the network communication protocol is coded by Manchester; in each communication period, the master communication protocol stack on the master station automatically sends an initial frame and successively sends a data frame to each slave station according to a set address sequence, and each slave station sends a response frame according to the same address sequence. The invention can effectively lower the performance requirement on the master station processor, has low cost and strengthens stability while hardware cost overhead is low.
Owner:无锡苏惠信息技术服务有限公司

Threat detection and defense device, system and method for industrial control system

The invention discloses a threat detection and defense device, system and method for an industrial control system. The threat detection and defense device, system and method is used for protecting safety of the industrial control system. The threat detection and defense device comprises a threat detection module and an exception handling module, wherein the threat detection module is used for intercepting and capturing a communication data message, identifying message field information in the communication data message, judging whether the communication data message is the malicious message according to the message field information, judging whether malicious act against a local upper computer or malicious act initiated by the local upper computer exists according to the message field information and message field information in a communication massage recorded in a local communication log database and detecting whether malicious operation against a control program in the local upper computer exists; the exception handling module is used for triggering and performing corresponding safety operation according to safety configuration files if one or more of the malicious message, the malicious act against the local upper computer, the malicious act initiated by the local upper computer and the malicious operation against the control program in the local upper computer exist.
Owner:ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products