Patent application number | Description | Published |
20090083204 | HISTORIANS EMBEDDED IN INDUSTRIAL UNITS - Systems and methods that provide a historian integrated as part of an industrial unit and/or product manufactured by the industrial process. A historian integrated as part of the industrial unit itself, can increase data resolution and supply immediate and real time data regarding the industrial unit's operation—while mitigating short comings of conventional PC historians. Moreover, a locator component can detect embedded historians that are distributed on the back plane of an industrial network, and integrated as part thereof. | 03-26-2009 |
20090083648 | DIRECT SUBSCRIPTION TO INELLIGENT I/O MODULE - Systems and methods that supply direct access (e.g., bypassing the controller) to embedded historian via a subscription and notification component. By modeling the notification related information (e.g., subscription queries, subscriber information, event information . . . ) as data and leveraging the power of database systems to perform set-oriented manipulations on this data efficiently, the subject innovation enables for a highly scalable and efficient subscription and notification system for direct access to the historians. | 03-26-2009 |
20090083649 | CONTEXTUALIZATION FOR HISTORIANS IN INDUSTRIAL SYSTEMS - Systems and methods that discover relations and correlates among disparate pieces of data, to infer possible relationships between the industrial process and historian data/events to improve industrial operations. A correlation component can employ heuristic models to capture process data/event data, and can further include an implicit correlation component and an explicit correlation component. Accordingly, relations among various parameters can be discovered (e.g., dynamically) and proper corrective adjustments supplied to the industrial process. | 03-26-2009 |
20090089231 | ADAPTIVE INDUSTRIAL SYSTEMS VIA EMBEDDED HISTORIAN DATA - Systems and methods that provide for adaptive processes in an industrial setting. Historian data, in conjunction with current collected data, can be converted into decision making information that is subsequently employed for modifying a process in real time. A process trend component, which is associated with a controller, can access historian data (e.g., trends collected via historians) to determine/predict an outcome of a current industrial process. Such enables a tight control and short reaction time to correcting process parameters. | 04-02-2009 |
20090089232 | MICROHISTORIANS AS PROXIES FOR DATA TRANSFER - Systems and methods that enable historians (e.g., micro-historians) to function as proxies, to supply plant level data, (e.g., history data) back to the controllers. Accordingly, typically such micro historians can function as clients/servers, to provide higher level data to the controllers (e.g., from third part databases). The historians can create a proxy that image an object on a server associated with controllers (e.g., programmable logic controller.) Such objects can contain data; pieces of code; attributes; operations or combinations thereof, for example. | 04-02-2009 |
20090089695 | PLATFORM INDEPENDENT HISTORIAN - Systems and methods that provide for historians communicating in a plurality of protocols/languages with various resources via employing an abstraction component that normalizes such communication. Accordingly, the historian can supply a common configuration for various data (e.g., events, command, event, alarm, scenarios, transactions, messages, and the like), and hence provide support for third party devices. The abstraction component can further facilitate: Filtering, Bridging, Routing, Propagation, Transformation and Monitoring of data exchange with third party devices. | 04-02-2009 |
20090192645 | AUTOMATIC CONTROLLER RELATIONSHIP RESOLUTION - In an industrial control system, a relatively large number of bindings can permeate between different controllers. As a modification is made in a primary binding, supplemental bindings can be impacted and can become erroneous. The supplemental bindings can be automatically resolved such that they are no longer erroneous. Resolution can take place through access of a distributed directory that holds information related to the different controllers. To lower a likelihood of control system error or failure, the primary binding and supplemental binding can be placed online in synchronization. | 07-30-2009 |
20090193029 | SELF-ORGANIZED DISTRIBUTED DIRECTORY - Various amounts of information can be beneficial to different controllers configured upon an industrial control system. Information can be retained in a distributed directory such that controllers quickly learn information concerning other controllers. The distributed directory can be automatically constructed and populated with information from different controllers. When a module enters an industrial control system, information can automatically advertise to other units through use of the distributed directory. | 07-30-2009 |
20090300021 | INDUSTRIAL CONTROL METADATA ENGINE - In an industrial control setting, different components can have information that can be valuable to various entities, such as other components, technicians, and the like. A decision can be made as to what information should be available to entities and a determination can be made if the information should be published in a directory or be discoverable. Security can be taken into account in determining if information should be published and decision making can employ adaptive learning, such that a publish and/or discovery decision criterion can be modified based on the learning. | 12-03-2009 |
20100042586 | DIRECTORY CONTENT RESOLUTION - In a distributed directory configuration, different nodes can retain information pertinent an industrial control configuration. As information changes in one node, replicas of the information in other nodes can be updated. However, updating can take time and a query can be run upon the directory while nodes have conflicting information. Conflicting information can be identified and resolved such that a query obtains a correct answer. | 02-18-2010 |
20100076575 | AUTOMATICALLY ADJUSTABLE INDUSTRIAL CONTROL CONFIGURATION - An industrial control configuration can be a dynamic entity where different controllers are added, are subtracted, fail, etc. When dynamic functions occur, bindings of the configuration can benefit from a modification. Therefore, automatic adjustment of bindings can occur to facilitate improved operation. Automatic adjustment can be practiced when the industrial control configuration is a distributed control configuration without reliance upon a central database. | 03-25-2010 |
20100121664 | CONDITIONAL DOWNLOAD OF DATA FROM EMBEDDED HISTORIANS - Systems and methods that provide for event driven downloading, via defining storage thresholds in an embedded historian (e.g. micro historian). Upon reaching predetermined thresholds (e.g., low/high water marks), stored data in the embedded historians can automatically down load to a central plant historian. An automatic download engine is provided that down loads historian data based on satisfaction of such conditions defined for the download. The download engine can further include a detector component, which detects whether a predetermined condition (e.g., associated with the storage capacity of the micro-historians have been met. Moreover, a notification component can notify the embedded historians that the data have been permanently persisted in the central historian. | 05-13-2010 |
20100121799 | DIVERSE NETWORK RELATIVE ADDRESSING RESOLUTION - A requesting entity can submit a query to an industrial control configuration to determine a location for a module. A distributed directory can be employed to discover an absolute location of the module, which can be provided to the requesting entity. This discovery can occur in real-time such that an answer can be given with a relatively high degree of certainty. In addition to providing the absolute address in the answer, a path on how to reach the module can be provided. The path can be optimized in order to allow quicker response time and to manage system resources. | 05-13-2010 |
20100153771 | PEER-TO-PEER EXCHANGE OF DATA RESOURCES IN A CONTROL SYSTEM - System(s) and method(s) are provided for peer-to-peer exchange of data in a control system. Decentralized storage and multi-access paths provide complete sets of data without dependence on a specific or pre-defined data source or access paths. Data is characterized as data resources with disparate granularity. The control system includes a plurality of layers that act as logic units communicatively coupled through access network(s). Server(s) resides in a service layer, whereas client(s) associated with respective visualization terminal(s) are part of a visualization layer. Peer-to-peer distribution of data resource(s) can be based on available access network(s) resources and optimization of response time(s) in the control system. When client requests a data resource, all the locations of the data resource and the quickest source to retrieve it are automatically determined. The client stores copy of data resource. Peer-to-peer distribution of data resource(s) can be implemented within the service layer or the visualization layer. | 06-17-2010 |
20110196528 | HISTORIANS EMBEDDED IN INDUSTRIAL UNITS - Systems and methods that provide a historian integrated as part of an industrial unit and/or product manufactured by the industrial process. A historian integrated as part of the industrial unit itself, can increase data resolution and supply immediate and real time data regarding the industrial unit's operation—while mitigating short comings of conventional PC historians. Moreover, a locator component can detect embedded historians that are distributed on the back plane of an industrial network, and integrated as part thereof. | 08-11-2011 |
20120096272 | SECURITY MODEL FOR INDUSTRIAL DEVICES - Systems and/or methods are described relating to a security model that provides interoperability with foreign security domains while remaining scalable to small embedded devices. A security token service is provided, which is configured to issue, renew, and/or validate security tokens in response to a token request. A communication protocol, corresponding message structures, and the security tokens are defined in accordance with protocol buffer definitions. | 04-19-2012 |
20120323344 | AUTOMATICALLY ADJUSTABLE INDUSTRIAL CONTROL CONFIGURATION - An industrial control configuration can be a dynamic entity where different controllers are added, are subtracted, fail, etc. When dynamic functions occur, bindings of the configuration can benefit from a modification. Therefore, automatic adjustment of bindings can occur to facilitate improved operation. Automatic adjustment can be practiced when the industrial control configuration is a distributed control configuration without reliance upon a central database. | 12-20-2012 |
20130123944 | Data Resource Identity - An automation control and monitoring system includes an operating system and a data model. The operating system is configured to receive a request for instantiation of an object representing an attribute of the automation control and monitoring system. The operating system is also configured to generate an object identifier when the request for instantiation is received, wherein the object identifier is unique from any other object identifiers employed by the operating system. The data model is configured to store and associate the object with the generated object identifier such that any component of the automation control and monitoring system may access the object by referencing the object identifier. | 05-16-2013 |
20130124613 | Systems and Methods for Asynchronous Searching and Filtering of Data - An automation control and monitoring system includes a server configured to receive a subscription request from a client component. The subscription request provides one or more criteria to the server. The server is configured to provide a set of data, via a first notification, to the client component based upon the one or more criteria in the subscription request. The server is configured to provide, via additional notifications based on the subscription request, additional sets of data, modifications to the set of data, or both, when additional data or modifications corresponding to the one or more criteria are available. | 05-16-2013 |
20130238892 | METHOD FOR OBSCURING A CONTROL DEVICE'S NETWORK PRESENCE BY DYNAMICALLY CHANGING THE DEVICE'S NETWORK ADDRESSES USING A CRYPTOGRAPHY-BASED PATTERN - A network security system comprises a first component that generates an address for identifying a communicating device on a network. A second component receives the address generated by the first component and facilitates transitioning from an existent address to the generated address. Such transitioning is effectuated in order to protect the network against attack while providing seamless communications with respect to the communicating device. | 09-12-2013 |
20130298217 | SECURITY MODEL FOR INDUSTRIAL DEVICES - Systems and/or methods are described relating to a security model that provides interoperability with foreign security domains while remaining scalable to small embedded devices. A security token service is provided, which is configured to issue, renew, and/or validate security tokens in response to a token request. A communication protocol, corresponding message structures, and the security tokens are defined in accordance with protocol buffer definitions. | 11-07-2013 |
20140207868 | PEER-TO-PEER EXCHANGE OF DATA RESOURCES IN A CONTROL SYSTEM - System(s) and method(s) are provided for peer-to-peer exchange of data in a control system. Decentralized storage and multi-access paths provide complete sets of data without dependence on a specific or pre-defined data source or access paths. Data is characterized as data resources with disparate granularity. The control system includes a plurality of layers that act as logic units communicatively coupled through access network(s). Server(s) resides in a service layer, whereas client(s) associated with respective visualization terminal(s) are part of a visualization layer. Peer-to-peer distribution of data resource(s) can be based on available access network(s) resources and optimization of response time(s) in the control system. When client requests a data resource, all the locations of the data resource and the quickest source to retrieve it are automatically determined. The client stores copy of data resource. Peer-to-peer distribution of data resource(s) can be implemented within the service layer or the visualization layer. | 07-24-2014 |
20140336790 | AUTOMATICALLY ADJUSTABLE INDUSTRIAL CONTROL CONFIGURATION - An industrial control configuration can be a dynamic entity where different controllers are added, are subtracted, fail, etc. When dynamic functions occur, bindings of the configuration can benefit from a modification. Therefore, automatic adjustment of bindings can occur to facilitated improved operation. Automatic adjustment can be practiced when the industrial control configuration is a distributed control configuration without reliance upon a central database. | 11-13-2014 |
20150074749 | REMOTE ASSET MANAGEMENT SERVICES FOR INDUSTRIAL ASSETS - A remote asset server allows an industrial asset (e.g., a controller, motor drive, etc.) to be remotely and securely monitored and managed by an owner of the industrial asset as well as other relevant entities, such as original equipment manufacturers (OEMs). The remote asset server acts as a network infrastructure device that regulates access to the industrial asset by different entities in accordance with security policies defined by an end user. These defined security policies are implemented in a cloud platform as role-specific portals by a connectivity broker, the portals serving as secure connection pipelines to the industrial asset via the remote asset server. Using this architecture, an end user can define which aspects of an industrial asset are allowed to be remotely viewed, accessed, or modified by outside entities such as OEMs or system integrators. | 03-12-2015 |