US20190340269A1 - Blockchain-enabled industrial devices - Google Patents
Blockchain-enabled industrial devices Download PDFInfo
- Publication number
- US20190340269A1 US20190340269A1 US16/110,046 US201816110046A US2019340269A1 US 20190340269 A1 US20190340269 A1 US 20190340269A1 US 201816110046 A US201816110046 A US 201816110046A US 2019340269 A1 US2019340269 A1 US 2019340269A1
- Authority
- US
- United States
- Prior art keywords
- industrial
- blockchain
- product
- subset
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000004519 manufacturing process Methods 0.000 claims abstract description 291
- 238000000034 method Methods 0.000 claims description 88
- 230000015654 memory Effects 0.000 claims description 36
- 238000012423 maintenance Methods 0.000 claims description 27
- 230000004044 response Effects 0.000 claims description 26
- 239000000463 material Substances 0.000 claims description 22
- 230000003287 optical effect Effects 0.000 claims description 10
- 238000009877 rendering Methods 0.000 claims description 7
- 230000003993 interaction Effects 0.000 claims description 6
- 230000006870 function Effects 0.000 abstract description 31
- 239000000047 product Substances 0.000 description 165
- 238000010586 diagram Methods 0.000 description 44
- 230000008569 process Effects 0.000 description 32
- 238000007726 management method Methods 0.000 description 27
- 238000012545 processing Methods 0.000 description 24
- 238000003860 storage Methods 0.000 description 22
- 230000009471 action Effects 0.000 description 20
- 238000010200 validation analysis Methods 0.000 description 20
- 238000009826 distribution Methods 0.000 description 18
- 238000004891 communication Methods 0.000 description 16
- 238000012544 monitoring process Methods 0.000 description 15
- 239000002131 composite material Substances 0.000 description 13
- 238000005516 engineering process Methods 0.000 description 12
- 238000000429 assembly Methods 0.000 description 10
- 230000000875 corresponding effect Effects 0.000 description 9
- 230000001360 synchronised effect Effects 0.000 description 8
- 238000013461 design Methods 0.000 description 7
- CURLTUGMZLYLDI-UHFFFAOYSA-N Carbon dioxide Chemical compound O=C=O CURLTUGMZLYLDI-UHFFFAOYSA-N 0.000 description 6
- 239000012467 final product Substances 0.000 description 6
- 230000008439 repair process Effects 0.000 description 6
- 238000012360 testing method Methods 0.000 description 6
- 238000004458 analytical method Methods 0.000 description 5
- 239000000203 mixture Substances 0.000 description 5
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 5
- RTZKZFJDLAIYFH-UHFFFAOYSA-N Diethyl ether Chemical compound CCOCC RTZKZFJDLAIYFH-UHFFFAOYSA-N 0.000 description 4
- 230000008901 benefit Effects 0.000 description 4
- 238000013499 data model Methods 0.000 description 4
- 230000007547 defect Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 230000002093 peripheral effect Effects 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 230000004931 aggregating effect Effects 0.000 description 3
- 238000013459 approach Methods 0.000 description 3
- 238000013475 authorization Methods 0.000 description 3
- 229910002092 carbon dioxide Inorganic materials 0.000 description 3
- 239000001569 carbon dioxide Substances 0.000 description 3
- 238000006243 chemical reaction Methods 0.000 description 3
- 230000002596 correlated effect Effects 0.000 description 3
- 238000012217 deletion Methods 0.000 description 3
- 230000037430 deletion Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 239000003814 drug Substances 0.000 description 3
- 238000005265 energy consumption Methods 0.000 description 3
- 238000011989 factory acceptance test Methods 0.000 description 3
- 239000004615 ingredient Substances 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000006855 networking Effects 0.000 description 3
- 230000000737 periodic effect Effects 0.000 description 3
- 230000001105 regulatory effect Effects 0.000 description 3
- 238000011144 upstream manufacturing Methods 0.000 description 3
- 235000013361 beverage Nutrition 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000001276 controlling effect Effects 0.000 description 2
- 229940079593 drug Drugs 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000002085 persistent effect Effects 0.000 description 2
- 238000005204 segregation Methods 0.000 description 2
- 239000013589 supplement Substances 0.000 description 2
- 230000002123 temporal effect Effects 0.000 description 2
- 230000001052 transient effect Effects 0.000 description 2
- 238000012800 visualization Methods 0.000 description 2
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 description 1
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 238000012356 Product development Methods 0.000 description 1
- XUIMIQQOPSSXEZ-UHFFFAOYSA-N Silicon Chemical compound [Si] XUIMIQQOPSSXEZ-UHFFFAOYSA-N 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 230000002547 anomalous effect Effects 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 238000010923 batch production Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 235000012206 bottled water Nutrition 0.000 description 1
- 229910052799 carbon Inorganic materials 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000011217 control strategy Methods 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 230000002950 deficient Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 239000000945 filler Substances 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 238000002513 implantation Methods 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000003754 machining Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000002483 medication Methods 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 238000012806 monitoring device Methods 0.000 description 1
- 238000010606 normalization Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000013439 planning Methods 0.000 description 1
- 239000002243 precursor Substances 0.000 description 1
- 238000013442 quality metrics Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- -1 sub-assemblies Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
- 238000013024 troubleshooting Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/18—Numerical control [NC], i.e. automatically operating machines, in particular machine tools, e.g. in a manufacturing environment, so as to execute positioning, movement or co-ordinated operations by means of programme data in numerical form
- G05B19/4093—Numerical control [NC], i.e. automatically operating machines, in particular machine tools, e.g. in a manufacturing environment, so as to execute positioning, movement or co-ordinated operations by means of programme data in numerical form characterised by part programming, e.g. entry of geometrical information as taken from a technical drawing, combining this with machining and material information to obtain control information, named part programme, for the NC machine
-
- G06F17/30283—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/418—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
- G05B19/41865—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by job scheduling, process planning, material flow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/248—Presentation of query results
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G06F17/30554—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/418—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
- G05B19/4183—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by data acquisition, e.g. workpiece identification
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/30—Nc systems
- G05B2219/31—From computer integrated manufacturing till monitoring
- G05B2219/31324—Distributed real time knowledge, database
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/30—Nc systems
- G05B2219/31—From computer integrated manufacturing till monitoring
- G05B2219/31397—Instrument information management, subset of process management
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/30—Nc systems
- G05B2219/31—From computer integrated manufacturing till monitoring
- G05B2219/31449—Monitor workflow, to optimize business, industrial processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Definitions
- the subject matter disclosed herein relates generally to industrial automation systems, and, more particularly, to storage, management, and distribution of manufacturing and supply chain data
- a system comprising a blockchain search and management component configured to search industrial blockchains that encode manufacturing data associated with a product, wherein the industrial blockchains comprise a first subset of the industrial blockchains that record first data defined to be viewable by first parties and a second subset of the industrial blockchains that record second data defined to be viewable by second parties; and an interface component configured to receive a user identifier and a request for a subset of the manufacturing data encoded in the industrial blockchains, wherein the blockchain search and management component is further configured to, in response to a determination that the user identifier has permission to access the subset of the manufacturing data, retrieve the subset of the manufacturing data from one of the first subset of the industrial blockchains or the second subset of the industrial blockchains selected based on a defined hierarchy of access privileges, and the interface component is further configured to render the subset of the manufacturing data on a client device associated with the user identifier.
- one or more embodiments provide a method, comprising receiving, by a system comprising a processor, request data specifying a user identifier and a request for subset of supply chain information relating to a product; in response to determining that the user identifier is permitted access to the subset of the supply chain information, retrieving, by the system, the subset of the supply chain information from a first subset of industrial blockchains or a second subset of the industrial blockchains selected based on a defined hierarchy of access privileges, wherein the industrial blockchains encode the supply chain information associated with the product, the first subset of the industrial blockchains comprise first information, of the supply chain information, defined to be viewable by first parties, and the second subset of the industrial blockchains comprise second information, of the supply chain information, defined to be viewable by second parties; and rendering, by the system, the subset of the supply chain information on a client device associated with the user identifier.
- a non-transitory computer-readable medium having stored thereon instructions that, in response to execution, cause a system comprising a processor to perform operations, the operations comprising, receiving request data specifying a user identifier and a request for a subset of manufacturing information relating to a product; in response to determining that the user identifier is permitted access to the subset of the manufacturing information, retrieving, by the system, the subset of the manufacturing information from a first subset of industrial blockchains or a second subset of the industrial blockchains selected based on a defined hierarchy of access privileges; wherein the industrial blockchains encode the manufacturing information associated with the product, the first subset of the industrial blockchains comprise first information, of the manufacturing information, defined to be viewable by a first party, and the second subset of the industrial blockchains comprise second information, of the manufacturing information, defined to be viewable by a second party; and rendering the subset of the manufacturing information on a client device associated with the user identifier.
- FIG. 1 is a block diagram of an example industrial control environment.
- FIG. 2 is a generalized high-level diagram illustrating the relationship between blockchain technology and applications that can leverage blockchains.
- FIG. 3 is a graphic illustrating a centralized model for accessing and modifying data.
- FIG. 4 is a graphic illustrating a decentralized model for accessing and modifying data.
- FIG. 5 is a graphic illustrating an example blockchain architecture.
- FIG. 6 is a diagram illustrating a general architecture of a blockchain.
- FIG. 7 is a diagram illustrating a generalized architecture of an example blockchain platform.
- FIG. 8 is a generalized diagram illustrating creation of blocks and validation of blocks via consensus-based validation.
- FIG. 9 is a generalized diagram illustrating implementation of smart contracts within a blockchain-driven system.
- FIG. 10 is a high-level overview of entities and enterprises within an industrial supply and distribution chain within which industrial-specific blockchains can be utilized.
- FIG. 11 is a block diagram of an example blockchain-enabled industrial device.
- FIG. 12 is a diagram illustrating configuration of an example blockchain-enabled industrial controller.
- FIG. 13 is a diagram illustrating operation of an example blockchain-enabled industrial controller during runtime.
- FIG. 14 is a diagram illustrating example inputs to the industrial blockchain engine and example outputs generated by the blockchain engine.
- FIG. 15 is a diagram of example blockchain-enabled industrial controller in which hardware and processing resources for carrying out industrial blockchain functions are segregated from processing resources that carry out the controller's primary control functionality.
- FIG. 16 is a diagram of an example ledger entry that can be added to an industrial device's ledger by a proof engine component.
- FIG. 17 is a diagram of an example industrial blockchain network architecture.
- FIG. 18 is a diagram of an example blockchain-enabled industrial controller illustrating generation of public and private blockchains.
- FIG. 19 is a diagram illustrating segregation of private and public blockchain information in an example industrial blockchain ecosystem.
- FIG. 20 is a diagram illustrating generation of blockchain data within a plant intranet.
- FIG. 21 is a diagram illustrating an example, high-level architecture for accessing blockchain information for a manufactured product using a mobile user interface application installed on a mobile device.
- FIG. 22 is a flowchart of an example methodology for aggregating industrial blockchains in connection with manufacture of a composite product.
- FIG. 23 is a flowchart of an example methodology for generating industrial blockchains having multiple levels of access permission.
- FIG. 24 is an example computing environment.
- FIG. 25 is an example networking environment.
- the terms “component,” “system,” “platform,” “layer,” “controller,” “terminal,” “station,” “node,” “interface” are intended to refer to a computer-related entity or an entity related to, or that is part of, an operational apparatus with one or more specific functionalities, wherein such entities can be either hardware, a combination of hardware and software, software, or software in execution.
- a component can be, but is not limited to being, a process running on a processor, a processor, a hard disk drive, multiple storage drives (of optical or magnetic storage medium) including affixed (e.g., screwed or bolted) or removable affixed solid-state storage drives; an object; an executable; a thread of execution; a computer-executable program, and/or a computer.
- affixed e.g., screwed or bolted
- the components may communicate via local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems via the signal).
- a component can be an apparatus with specific functionality provided by mechanical parts operated by electric or electronic circuitry which is operated by a software or a firmware application executed by a processor, wherein the processor can be internal or external to the apparatus and executes at least a part of the software or firmware application.
- a component can be an apparatus that provides specific functionality through electronic components without mechanical parts, the electronic components can include a processor therein to execute software or firmware that provides at least in part the functionality of the electronic components.
- interface(s) can include input/output (I/O) components as well as associated processor, application, or Application Programming Interface (API) components. While the foregoing examples are directed to aspects of a component, the exemplified aspects or features also apply to a system, platform, interface, layer, controller, terminal, and the like.
- I/O input/output
- API Application Programming Interface
- the terms “to infer” and “inference” refer generally to the process of reasoning about or inferring states of the system, environment, and/or user from a set of observations as captured via events and/or data. Inference can be employed to identify a specific context or action, or can generate a probability distribution over states, for example.
- the inference can be probabilistic—that is, the computation of a probability distribution over states of interest based on a consideration of data and events.
- Inference can also refer to techniques employed for composing higher-level events from a set of events and/or data. Such inference results in the construction of new events or actions from a set of observed events and/or stored event data, whether or not the events are correlated in close temporal proximity, and whether the events and data come from one or several event and data sources.
- the term “or” is intended to mean an inclusive “or” rather than an exclusive “or.” That is, unless specified otherwise, or clear from the context, the phrase “X employs A or B” is intended to mean any of the natural inclusive permutations. That is, the phrase “X employs A or B” is satisfied by any of the following instances: X employs A; X employs B; or X employs both A and B.
- the articles “a” and “an” as used in this application and the appended claims should generally be construed to mean “one or more” unless specified otherwise or clear from the context to be directed to a singular form.
- a “set” in the subject disclosure includes one or more elements or entities.
- a set of controllers includes one or more controllers; a set of data resources includes one or more data resources; etc.
- group refers to a collection of one or more entities; e.g., a group of nodes refers to one or more nodes.
- Industrial controllers and their associated I/O devices are central to the operation of modern automation systems. These controllers interact with field devices on the plant floor to control automated processes relating to such objectives as product manufacture, material handling, batch processing, supervisory control, and other such applications. Industrial controllers store and execute user-defined control programs to effect decision-making in connection with the controlled process. Such programs can include, but are not limited to, ladder logic, sequential function charts, function block diagrams, structured text, or other such platforms.
- FIG. 1 is a block diagram of an example industrial control environment 100 .
- a number of industrial controllers 118 are deployed throughout an industrial plant environment to monitor and control respective industrial systems or processes relating to product manufacture, machining, motion control, batch processing, material handling, or other such industrial functions.
- Industrial controllers 118 typically execute respective control programs to facilitate monitoring and control of industrial devices 120 making up the controlled industrial assets or systems (e.g., industrial machines).
- One or more industrial controllers 118 may also comprise a soft controller executed on a personal computer or other hardware platform, or on a cloud platform.
- Some hybrid devices may also combine controller functionality with other functions (e.g., visualization).
- the control programs executed by industrial controllers 118 can comprise any conceivable type of code used to process input signals read from the industrial devices 120 and to control output signals generated by the industrial controllers, including but not limited to ladder logic, sequential function charts, function block diagrams, or structured text. These programs can be developed and downloaded to the controllers 118 using a suitable client device 124 executing a controller configuration application.
- Industrial devices 120 may include both input devices that generate data relating to the controlled industrial systems to the industrial controllers 118 , and output devices that respond to control signals generated by the industrial controllers 118 to control aspects of the industrial systems.
- Example input devices can include, but are not limited to, telemetry devices (e.g., temperature sensors, flow meters, level sensors, pressure sensors, etc.), manual operator control devices (e.g., push buttons, selector switches, etc.), safety monitoring devices (e.g., safety mats, safety pull cords, light curtains, etc.), and other such devices.
- Output devices may include motor drives, pneumatic actuators, signaling devices, robot control inputs, valves, and the like.
- Industrial controllers 118 may communicatively interface with industrial devices 120 over hardwired or networked connections.
- industrial controllers 118 can be equipped with native hardwired inputs and outputs that communicate with the industrial devices 120 to effect control of the devices.
- the native controller I/O can include digital I/O that transmits and receives discrete voltage signals to and from the field devices, or analog I/O that transmits and receives analog voltage or current signals to and from the devices.
- the controller I/O can communicate with a controller's processor over a backplane such that the digital and analog signals can be read into and controlled by the control programs.
- Industrial controllers 118 can also communicate with industrial devices 120 over a network using, for example, a communication module or an integrated networking port.
- Exemplary networks can include the Internet, intranets, Ethernet, DeviceNet, ControlNet, Data Highway and Data Highway Plus (DH/DH+), Remote I/O, Fieldbus, Modbus, Profibus, wireless networks, serial protocols, and the like.
- the industrial controllers 118 can also store persisted data values that can be referenced by the control program and used for control decisions, including but not limited to measured or calculated values representing operational states of a controlled machine or process (e.g., tank levels, positions, alarms, etc.) or captured time series data that is collected during operation of the automation system (e.g., status information for multiple points in time, diagnostic occurrences, etc.).
- some intelligent devices including but not limited to motor drives, instruments, or condition monitoring modules—may store data values that are used for control and/or to visualize states of operation. Such devices may also capture time-series data or events on a log for later retrieval and viewing.
- HMIs human-machine interfaces
- Industrial automation systems often include one or more human-machine interfaces (HMIs) 114 that allow plant personnel to view telemetry and status data associated with the automation systems, and to control some aspects of system operation.
- HMIs 114 may communicate with one or more of the industrial controllers 118 over a plant network 116 , and exchange data with the industrial controllers to facilitate visualization of information relating to the controlled industrial processes on one or more pre-developed operator interface screens.
- HMIs 114 can also be configured to allow operators to submit data to specified data tags or memory addresses of the industrial controllers 118 , thereby providing a means for operators to issue commands to the controlled systems (e.g., cycle start commands, device actuation commands, etc.), to modify setpoint values, etc.
- commands e.g., cycle start commands, device actuation commands, etc.
- HMIs 114 can generate one or more display screens through which the operator interacts with the industrial controllers 118 , and thereby with the controlled processes and/or systems.
- Example display screens can visualize present states of industrial systems or their associated devices using graphical representations of the processes that display metered or calculated values, employ color or position animations based on state, render alarm notifications, or employ other such techniques for presenting relevant data to the operator. Data presented in this manner is read from industrial controllers 118 by HMIs 114 and presented on one or more of the display screens according to display formats chosen by the HMI developer.
- HMIs may comprise fixed location or mobile devices with either user-installed or pre-installed operating systems, and either user-installed or pre-installed graphical application software.
- Some industrial environments may also include other systems or devices relating to specific aspects of the controlled industrial systems. These may include, for example, a data historian 110 that aggregates and stores production information collected from the industrial controllers 118 or other data sources, enterprise resource planning (ERP) and/or manufacturing execution (MES) systems 104 , work order management systems 106 , or electronic device documentation stores containing electronic documentation for the various industrial devices making up the controlled industrial systems, repositories for machine or process drawings and documentation, vendor product documentation storage, vendor knowledgebases, internal knowledgebases, work scheduling applications, or other such systems, some or all of which may reside on an office network 108 of the industrial environment.
- ERP enterprise resource planning
- MES manufacturing execution
- electronic device documentation stores containing electronic documentation for the various industrial devices making up the controlled industrial systems, repositories for machine or process drawings and documentation, vendor product documentation storage, vendor knowledgebases, internal knowledgebases, work scheduling applications, or other such systems, some or all of which may reside on an office network 108 of the industrial environment.
- the industrial assets that make up a given facility can generate large amounts of data during plant operation. Much of this information is tracked and recorded by various means in order to document the various manufacturing processes carried out by the assets. For example, data historians, data warehouses, or MES systems are often used to collect and archive manufacturing data generated by the industrial assets. This archived data can be leveraged to track production statistics, equipment health statistics, asset lifecycle management, inventory, key performance indicators (KPIs), power consumption, or other such factors.
- KPIs key performance indicators
- the supply, manufacturing, and distribution chain for a manufactured product extends well beyond the boundaries of a single industrial facility, and crosses boundaries between several interconnected but substantially independent entities.
- an industrial enterprise which may comprise one or more manufacturing and warehouse facilities under a common ownership
- the enterprise may receive materials or component parts from one or more supplier entities that produce the materials or parts.
- the enterprise may also purchase industrial assets (e.g., custom-built machines, motor control cabinets, etc.) from one or more original equipment manufacturers (OEMs).
- OEMs original equipment manufacturers
- Manufactured products are sold and distributed via retail outlets that may be owned and operated by entities who are independent from the industrial enterprise. While these independent entities may collect and track data generated within their own boundaries, as participants in a common supply chain these various entities may benefit from selective sharing of their collected data.
- Reliable and trusted sharing of data can be particularly crucial if business contracts between the entities are in place, since this shared information can ensure that the terms of the contracts are being satisfied.
- each entity's data is typically collected and stored locally (or on protected remote storage, such as a proprietary cloud-based storage platform), shared data owned by one of the entities may not be easily and readily accessible by third parties, and trustworthiness of the shared data may be a concern.
- information may be collected and tracked using separate (and possibly disparate) systems, and under different data formats, for different production areas or departments. Aggregating this segregated data into a common presentation that yields greater insight into manufacturing or business operations can be difficult, requiring normalization of the disparate information, time synchronization between the items of data, etc.
- one or more embodiments described herein relate to the use of blockchain platforms within an industrial facility as well as throughout a supply, manufacturing, and distribution chain.
- industrial devices such as industrial controllers (e.g., PLCs or other types of automation controllers), motor drives, HMI terminals, telemetry devices, and other such devices are configured to support a number of industrial blockchain functions. Collections of these blockchain-enabled industrial devices can be networked to form an industrial blockchain system in which the collection of devices capture manufacturing events as transactions, which are verified using consensus-based techniques and added to an industrial blockchain associated with the product being manufactured. This creates a tamper-proof record of relevant manufacturing statistics for the product.
- Blockchain-enabled industrial devices can create multiple versions of such industrial blockchains associated with respective different levels of access permissions, including public blockchains that allow all participants within an industrial blockchain ecosystem to view information relating to the product as well as private or semi-public blockchains that can only be shared with selected members of the industrial blockchain ecosystem. This can allow information regarding a manufactured product to be reliably recorded in a distributed, decentralized, tamper-proof ledger that maintains both private information for exclusive use within a plant facility as well as public or semi-public information regarding the product's path through the larger supply chain.
- industrial blockchains and associated smart contracts can be used to track machine usage and operating statistics in connection with subscription-based machine operation or maintenance management. Other example systems that leverage industrial blockchains will also be described herein.
- FIG. 2 is a generalized high-level diagram illustrating the relationship between blockchain technology and applications 202 that can leverage blockchains.
- blockchain is a foundational technology upon which applications can be built to leverage the technology.
- Digital currency such as Bitcoin is an example application that uses a public blockchain to act as a distributed ledger in a peer-to-peer network.
- Blockchain technology is also used to implement smart contracts, which allow a set of contractual rules to be programmed and enforced by a network of peer-to-peer devices without requiring a third-party mediator or broker.
- one or more embodiments of the present disclosure can include industrial devices and applications that leverage blockchain technology to perform supply chain tracking, verify product compliance, perform identity management, monitor and record information relating to local manufacturing operations within a single facility (e.g., within the bounds of the plant's intranet), or other such industrial functions.
- FIG. 3 is a graphic illustrating a centralized model for accessing and modifying data.
- this centralized model there is a single “golden copy” 302 of the data being viewed and acted upon by one or more entities 304 (e.g., systems running applications that leverage the data represented by the golden copy 302 , client devices operated by respective users, etc.). Any of the entities 304 can copy data maintained on the golden copy 302 as a whole or in part.
- This golden copy 302 of the data model is updated by commanding state changes to the model (an example technique for communicating state changes of objects between components is described in U.S. Pat. No.
- Actions 306 Copies and views of the golden copy 302 remain synchronized by observing changes to the golden copy 302 of the model. These observed changes are referred to herein as “reactions” 308 .
- Table 314 represents a set of actions performed on the data and corresponding observed reactions accumulated as a result of the actions.
- the collection of actions 306 and reactions 308 can be viewed as a set of changes or deltas 310 ordered by time, as represented by table 312 . This set of deltas 310 can be “played back” by any number of entities to obtain the same consistent data model, with the golden copy 302 being the model that is trusted by everyone.
- FIG. 4 is a graphic illustrating a decentralized model.
- all entities 406 that interact with the data have a copy of the data, and all entities work to keep the data model's transactions ordered and consistent.
- Blocks 404 of changes to the data are recorded as a transaction.
- a distributed ledger 402 of all these changes is maintained by all entities 406 (or nodes) that participate in the platform. If all entities 406 apply the changes to their own copy of the data then the copies remain consistent across the entities 406 without the need for a single golden copy.
- Each entity maintains a copy of the ledger 402 , which represents a continuous chain of transaction blocks 404 , hence the term “blockchain.”
- blockchain represents a continuous chain of transaction blocks 404 , hence the term “blockchain.”
- a blockchain consists of a data structure that orders blocks and links the blocks cryptographically, thereby acting as an immutable, verifiable, distributed ledger.
- Blockchains require no central authority; instead, trust is established and enforced cryptographically, with participating nodes (e.g., devices associated with entities 406 ) acting as a consortium and voting on the validity of a block using a consensus mechanism to manage the distributed ledger.
- FIG. 5 is a graphic illustrating a blockchain architecture.
- Blockchains are a linked hierarchical list 502 of transaction blocks 404 , where chains of related, linked transaction blocks 404 within the hierarchy (e.g., chain 504 ) stem from an initial genesis block 506 .
- Each block 404 has a cryptographic identity, which is calculated by the header data 508 in the block.
- Each block 404 contains the hash of the previous block in the chain.
- FIG. 6 is a diagram illustrating a general architecture of an example blockchain.
- Data 610 associated with the block's transactions is hashed, and the collection of transaction data 610 and their associated hashes 608 create a Merkle tree 606 of hashes 608 (only two items of data 610 are shown in FIG. 6 for clarity; however, a block 404 may be associated with more than two transactions).
- each data item 610 a and 610 b is hashed to yield two corresponding hash values 608 a and 608 b.
- These two hashes 608 a and 608 b are combined into another hash value 602 at the next higher level in the Merkle tree hierarchy.
- Hash values at a given level of the Merkle tree may be combined with other hash values on that level to yield hash values at the next higher level until the top of the Merkle tree hierarchy is reached.
- the Merkle tree 606 is stored separately from the block 404 , and only the root fingerprint 612 (the top hash) is stored in the block 404 .
- Each block 404 also contains a hash 604 of the content of the immediately preceding block in the chain.
- the Merkle tree of hashes 608 and the hash 604 of the previous block in the chain are used to create the hash 602 for the block.
- the data 610 is stored in the Merkle tree 606 separately from the block 404 , with the root fingerprint 612 being the only part of the Merkle tree 606 stored in the block 404 . This nesting of cryptographic hash values yields a digital fingerprint that renders unauthorized tampering difficult.
- FIG. 7 is a diagram illustrating a generalized architecture of a blockchain platform.
- the core blockchain functionality 702 (the blockchain creation and management features described above) is implemented on a network 704 of participating devices or nodes (e.g., entities 406 ).
- the core blockchain ledger is distributed throughout the network, and is independently validated by network members.
- the network 704 is purely peer-to-peer with no central trust authority. Instead of a central trust authority, network peers are responsible for validation and decentralized consensus for acceptance of new transactions (that is, new blocks 404 representing new transactions) into the blockchain.
- Public blockchains are secured by the amount of work required to create a new block 404 . This proof-of-work model can prevent network peers from improperly hijacking or tampering with the blockchain.
- Private blockchain models including blockchain applications used within an industrial facility as will be described herein—can employ a central authority to manage the ledger, user identities, and creation of new blocks.
- Applications 706 that employ blockchains are constructed on top of the network layer, which exposes the core blockchain functions. Participants in the network 704 (the peer devices) are uniquely identified with digital signatures granted by the network. Participant identities may be anonymous depending on the type of blockchain network model (e.g., public or private). In all cases, transactions are published, visible, and verifiable on the blockchain.
- FIG. 8 is a generalized diagram illustrating creation of blocks and validation of blocks via consensus-based validation.
- Single transactions 804 performed by entities 406 are gathered into blocks 806 by programmatic components executing on the entities 406 referred to as “miners” 802 .
- Miners 802 possess the entire Merkle tree for the gathered transactions and compete to build a valid block out of the Merkle tree.
- the first miner 802 to create a block is rewarded.
- the block is then validated by the other entities 406 based on the hashes. If valid, the block is added to the blockchain 808 .
- FIG. 9 is a generalized diagram illustrating implementation of smart contracts within a blockchain-driven system.
- smart contracts are sets of logic 902 that execute on the blockchain and generate new types of transactions in accordance with rules defined by the logic.
- the smart contract logic 902 is executed by the participants of the blockchain.
- a smart contract transaction 904 When a smart contract transaction 904 is generated, the logic 902 executes on the transaction 904 and may create several new transactions 906 designed to satisfy the contract.
- units of processing “fees” must be provided by an initiator of a smart contract transaction in order to execute the transaction.
- Ether On the Ethereum platform, these fees are referred to as Ether or “gas.”
- the amount of gas required to execute a transaction is generally proportional to the amount of work required to execute the transaction. The more complex the transaction, the more gas must be spent to execute the transaction.
- processing “fees” can be used to prioritize transactions based on relative values of the transactions, and can also protect against Denial of Service attacks (e.g., attacks that place the contract's logic in an infinite loop). Work on selected transactions can be prioritized by assigning extra gas to the transactions.
- FIG. 10 is a high-level overview of entities and enterprises within an industrial supply and distribution chain within which industrial-specific blockchains can be utilized.
- blockchain-enabled industrial devices can utilize blockchain technology in connection with such tasks as asset and product lifecycle management within a factory 1002 ; device, machine, line, or factory configuration integrity tracking; regulatory compliance verification; auditing of lock out/tag out safety procedures within the factory 1002 ; customer/partner entitlements management, management and tracking of supply chains 1004 across enterprise boundaries; inventory management across a supply chain; contracts management; tracking of manufactured products across enterprises of a supply chain or within a factory 1002 ; or other applications to be discussed herein.
- a device vendor 1010 can manufacture and provide blockchain-enabled industrial devices that are used within industrial factories 1002 , OEM facilities 1006 , and other enterprises to facilitate blockchain-driven industrial applications.
- the device vendor 1010 can also act as a trust authority for blockchain-driven systems that are implemented by the blockchain-enabled industrial devices. Robust identity management for organizations, people, and products that participate in an industrial blockchain system can ensure the trustworthiness of the participants and the blockchain data.
- Both public and private blockchain models can be implemented depending on the needs of the industrial application using the platform.
- FIG. 11 is a block diagram of an example blockchain-enabled industrial device 1102 according to one or more embodiments of this disclosure.
- Aspects of the systems, apparatuses, or processes explained in this disclosure can constitute machine-executable components embodied within machine(s), e.g., embodied in one or more computer-readable mediums (or media) associated with one or more machines.
- Such components when executed by one or more machines, e.g., computer(s), computing device(s), automation device(s), virtual machine(s), etc., can cause the machine(s) to perform the operations described.
- one or more of the machine-executable components can also be embodied on silicon chips or other microprocessing platforms.
- Blockchain-enabled industrial device 1102 can comprise substantially any type of data-generating industrial device, including but not limited to an industrial controller, a motor drive, an HMI terminal, a vision system, an industrial optical scanner, a meter, a telemetry device, an industrial safety device, a safety relay, a barcode stamper, an ERP server, an MES server, an industrial Internet of Things (IIoT) device, or other such device or system.
- Industrial device 1102 can include a proof engine component 1104 , a cryptographic component 1106 , a hashing component 1108 , an instruction execution component 1110 , a user interface component 1112 , one or more processors 1116 , and memory 1118 .
- one or more of the proof engine component 1104 , a cryptographic component 1106 , a hashing component 1108 , an instruction execution component 1110 , a user interface component 1112 , the one or more processors 1116 , and memory 1118 can be electrically and/or communicatively coupled to one another to perform one or more of the functions of the blockchain-enabled industrial device 1102 .
- components 1104 , 1106 , 1110 , and 1112 can comprise software instructions stored on memory 1118 and executed by processor(s) 1116 .
- Blockchain-enabled industrial device 1102 may also interact with other hardware and/or software components not depicted in FIG. 11 .
- processor(s) 1116 may interact with one or more external user interface devices, such as a keyboard, a mouse, a display monitor, a touchscreen, or other such interface devices.
- Proof engine component 1104 can be configured to validate industrial or supply chain transactions for inclusion in a new block of an industrial blockchain in accordance with a blockchain instruction.
- Cryptographic component 1106 can be configured to encrypt and decrypt transaction data, recipe data, or other information exchanged with other blockchain-enabled industrial devices within a blockchain system or ecosystem. In some embodiments, cryptographic component 1106 can leverage private keys 1122 and public keys 1124 in connection with encryption and decryption of blockchain information.
- Hashing component 1108 can be configured to hash transaction data and generate Merkle trees in accordance with a blockchain instruction.
- Instruction execution component 1110 can be configured to execute industrial blockchain instructions that create blocks representing transactions received or executed by the blockchain-enabled industrial device 1102 , add the blocks to industrial blockchains maintained on the device 1102 , and update the device's blockchain ledger 1126 .
- User interface component 1112 can be configured to receive user input and to render output to the user in any suitable format (e.g., visual, audio, tactile, etc.).
- user interface component 1112 can be configured to communicatively interface with a development application that executes on a client device (e.g., a laptop computer, tablet computer, smart phone, etc.) that is communicatively connected to the blockchain-enabled industrial device 1102 (e.g., via a hardwired or wireless connection). The user interface component 1112 can then receive user input data and render output data via the development application.
- user interface component 1112 can be configured to generate and serve suitable graphical interface screens to a client device, and exchange data via these graphical interface screens.
- Input data that can be received via user interface component 1112 can include, but is not limited to, user-defined control programs or routines that include industrial blockchain instructions, blockchain configuration parameters (which may be provided as configuration parameters of the blockchain instructions), or other such data.
- the one or more processors 1116 can perform one or more of the functions described herein with reference to the systems and/or methods disclosed.
- Memory 1118 can be a computer-readable storage medium storing computer-executable instructions and/or information for performing the functions described herein with reference to the systems and/or methods disclosed.
- processor(s) 1116 and memory 1118 may be segregated from the primary memory that performs the device's real-time control functions.
- components 1104 - 1112 described above (or a subset thereof) can be viewed as a blockchain engine 1128 that supplements an industrial device's native functionality with blockchain-related functionality, as will be described in more detail below.
- FIG. 12 is a diagram illustrating configuration of a blockchain-enabled industrial controller 1210 , which may be a hardware controller, a soft controller, a cloud-based controller or other type of industrial controller. Although the example illustrated in FIG. 12 depicts an industrial controller 1210 as the blockchain-enabled device, it is to be appreciated that industrial blockchain functionality is not limited to implementation on industrial controllers.
- Blockchain-enabled industrial controller 1210 can be configured using a suitable device configuration application 1208 (e.g., a ladder logic development application) that executes on a client device 1206 (e.g., a laptop computer, a desktop computer, a tablet computer, a human-machine interface terminal, etc.).
- a client device 1206 e.g., a laptop computer, a desktop computer, a tablet computer, a human-machine interface terminal, etc.
- a user can develop and download a control program 1204 (e.g., a ladder logic program, a sequential function chart program, function block diagrams, structured text, etc.) to the controller 1210 , as well as configure the controller's I/O modules and individual I/O parameters, networking parameters, and other such configurable features.
- a control program 1204 e.g., a ladder logic program, a sequential function chart program, function block diagrams, structured text, etc.
- Device configuration application 1208 also supports inclusion of configurable blockchain instructions 1202 within the control program 1204 for execution by the industrial controller 1210 .
- Each blockchain instruction 1202 added to the control program 1204 can have an associated set of instruction parameters 1212 that can be configured by the user via the device configuration application 1208 .
- Example instruction parameters 1212 for an industrial blockchain instruction 1202 can include, but are not limited to, production parameters of a manufactured product for which a blockchain is to be created, prior blockchain information that is expected to be received from other entities that participate in the blockchain (e.g., other controllers or industrial devices within the plant, outside entities that participate in a supply or manufacturing chain such as OEMs or part suppliers, etc.), supplier entities that provide materials or components for the manufactured product (if the supplier does not provide its own blockchain from which this information can be derived), an expiration time or expiration event for the blockchain defining a time that the blockchain can be deleted (in scenarios in which the blockchain only has utility for a limited time during production and can therefore be transient rather than persistent), or other such configuration aspects.
- entities that participate in the blockchain e.g., other controllers or industrial devices within the plant, outside entities that participate in a supply or manufacturing chain such as OEMs or part suppliers, etc.
- supplier entities that provide materials or components for the manufactured product (if the supplier does not provide its own blockchain from which this information can be derived
- blockchain instruction 1202 when executed by the controller's instruction execution component 1110 (which may be part of the controller's program execution component 1306 in some embodiments; see FIG. 13 ), can create a block representing a number of transactions received or executed by the controller 1210 , and add the block to an existing internal blockchain maintained on the controller 1210 or send the block to another node device in the production line or supply chain.
- device configuration application 1208 can include a library of code specific to blockchain creation and management by industrial devices.
- libraries can include sets of blockchain instructions that are specific to defined industries, verticals, or industrial applications.
- a Brew software library may include blockchain instructions specific to brewery systems.
- These industry- or application-specific blockchain instructions can set the root of the blockchain based on the selected industry or vertical and auto-generate code for configuring the blockchain in accordance with common standards used within the selected industry.
- Other user-configurable instruction parameters of these industry-specific blockchain instructions may allow the developer to specify parameters of their specific application (e.g., the number of brewing vats being used) that may vary across different implementations.
- device configuration application 1208 can allow users to configure blockchains to be generated by a blockchain-enabled device 1102 (e.g., controller 1210 or another type of industrial device) using unified modeling language (UML) diagrams or other interfaces for creating linkages and defining hierarchies.
- UML unified modeling language
- a blockchain editor of device configuration application 1208 can allow the user to define dependency diagrams that include automation objects maintained in the blockchain-enabled industrial device 1102 .
- Each automation object defines the data and behavior of its associated device or data object, and can be set to be either public or private via the blockchain editor.
- the editor can display all available automation objects supported by the industrial device 1102 and let the user check the objects to be included in the blockchain.
- the blockchain editor can also allow dependency diagrams to be drawn to define reliance between objects. Inheritance rules can be leveraged for automation objects to automatically determine parents.
- the editor can also allow users to define whether an automation object is to be traced or untraced, where setting an object to be traced makes the object the root of the blockchain, and multiple traced automation objects yield a hierarchy of dependencies. In this way, industrial automation blockchains can be defined without requiring complicated programming Device configuration application 1208 can also include a template editor that can be used to define smart contracts to be enforced by the blockchain.
- a blockchain tester or simulator can also be used to verify operation of the industrial blockchain before deployment.
- an OEM may simulate a blockchain associated with their machine before shipping the machine to a customer (e.g., a manufacturing entity).
- the blockchain can be run on the OEM's local network to confirm that the blocks are generated correctly.
- FIG. 13 is a diagram illustrating operation of the blockchain-enabled industrial controller 1210 during runtime.
- one or more blockchain-enabling components of controller 1210 can implement a blockchain engine 1128 on the controller 1210 that supplements the controller's native functionality (e.g., execution of industrial control programs and associated I/O control in the case of industrial controllers) with blockchain-related functionality.
- blockchain engine 1128 can be implemented as a special-purpose chip, a firmware module embedded in the blockchain-enabled industrial controller 1210 , a component built into the hardware design, a software module executing in an open operating system, or another implementation.
- Blockchain-enabled industrial controller 1210 includes a program execution component 1306 that executes a control program 1204 , which was developed and installed on the controller 1210 as described above in connection with FIG. 12 .
- control program 1204 can include one or more blockchain instructions 1202 that facilitate creation of transaction blocks and management of industrial blockchains that include these blocks.
- Control outputs 1314 can also be initiated in response to or based on operator commands 1302 received via an HMI 114 or other type of user interface or faceplate (e.g., the user controls of a motor drive). These operator commands 1302 can, for example, modify setpoint values or other parameters of the control sequence, initiate or halt control actions, select operating modes for the control sequence, or perform other types of manually initiated actions.
- HMI 114 or other type of user interface or faceplate
- These operator commands 1302 can, for example, modify setpoint values or other parameters of the control sequence, initiate or halt control actions, select operating modes for the control sequence, or perform other types of manually initiated actions.
- blockchain-enabled industrial controller 1210 is capable of carrying out basic real-time monitoring and control functionality typically associated with industrial controllers.
- blockchain engine 1128 is capable of executing blockchain instructions 1202 included in the control program 1204 and previously configured by the controller programmer
- blockchain instruction 1202 can be configured to recognize specific user-defined events as transactions to be added to a block 1322 .
- Such transactions can include, for example, detected events or measured metrics observed on the controlled machine, system, or process 1320 based on input signals 1312 (e.g., temperature, pressure, or flow metrics; quality check results such as bolt torque or leak test values; etc.), operator actions identified based on the operator commands 1302 or operator interactions with control panel devices or safety devices (e.g., pushbuttons, switches, light curtains, safety mats, safety pull cords, etc.), programmatic events generated internally by the controller 1210 based on execution of control program 1204 (e.g., alarm events, controller diagnostic events, etc.), deviations of measured telemetry values from a defined range, detected states of industrial sensors, changes of states of industrial safety devices (e.g., light curtains, emergency stop push buttons, pull cords, safety mats, etc.
- blockchain engine 1128 can assign one or more industrial transactions to a block 1322 having a format similar to those described above (see, e.g., FIGS. 5 and 6 ) and assign the block 1322 to a blockchain 1304 .
- the determination as to whether a single transaction is to be added to a block 1322 or, alternatively, if multiple transactions are to be aggregated into a block can depend in part on the workflow of the manufacturing process or user-defined preferences.
- blockchain 1304 can be one or both of a public blockchain or a private blockchain.
- the instruction parameters 1212 of the controller's blockchain instructions 1202 can allow a user to configure whether a block 1322 is to be added for each individual transaction or whether multiple transactions are to be bundled into a single block 1322 .
- the parameters 1212 can also allow the user to define the conditions for bundling transactions into a single block.
- a blockchain instruction 1202 can be configured that bundles a selected set of data items or events into a block 1322 upon completion of a defined production cycle corresponding to a single manufactured part or batch. In this way, each block 1322 can be associated with a set of transactions and data corresponding to a single part or production cycle.
- blockchain instruction 1202 can be configured to capture one or more controller values or control event information on a periodic basis, to capture the controller values or control event information in response to a defined condition of the control event (e.g., when a measured performance parameter falls outside a defined range, in response to completion of a production cycle, etc.), to capture the controller values or control event information in response to a manual request to capture control event information received from an HMI or another device, etc.
- Blockchain engine 1128 can validate industrial transactions as well as add data to the blockchain 1304 .
- FIG. 14 is a diagram illustrating example inputs 1414 to the industrial blockchain engine 1128 and example outputs 1416 generated by the blockchain engine 1128 .
- blockchain engine 1128 allows industrial devices and applications (e.g., industrial controller 1210 or other types of blockchain-enabled industrial devices 1102 such as HMI terminals, motor drives, sensor and telemetry devices, IIoT devices, ERP and MES systems, industrial gateway devices, industrial data historians, or other such devices) to participate in a blockchain network comprising other blockchain-enabled industrial devices as well as non-industrial blockchain entities.
- industrial devices and applications e.g., industrial controller 1210 or other types of blockchain-enabled industrial devices 1102 such as HMI terminals, motor drives, sensor and telemetry devices, IIoT devices, ERP and MES systems, industrial gateway devices, industrial data historians, or other such devices
- the industrial blockchain network can reside entirely within the confines of a manufacturing facility on the plant's local intranet, such that the distributed database represented by the industrial blockchain is accessed exclusively by authorized plant personnel (e.g., a private blockchain).
- the blockchain network can comprise multiple entities within a manufacturing, supply, and retail chain, and access permissions to the blockchain information can be layered such that the degree of access is a function of user identity and/or role.
- the blockchain can comprise both public and private data, permitting selective access to information maintained in the distributed, de-centralized database.
- blockchain-enabled industrial devices 1102 can be configured to support different types of blockchain instructions that execute different blockchain functions.
- a transaction instruction 1402 can be used to configure the blockchain engine 1128 to generate hashes for transaction data in connection with generating a new block 1322 , as well as to perform block validation.
- the blockchain engine's hashing component 1108 can be configured to hash transaction data and generate Merkle trees in accordance with the transaction instruction 1402 . Since new blocks leverage the hash of the previous block in the chain to generate the hash for the new block, blockchain engine 1128 can also receive the previous hash 1406 of the previous block in the chain.
- the previous hash 1406 may have been generated by the blockchain engine 1128 itself when the previous block was generated.
- the previous block of transactions may have been generated by another blockchain-enabled industrial device 1102 (e.g., another blockchain-enabled controller 1210 or another type of blockchain-enabled industrial device 1102 ) or by a third-party entity.
- the previous hash 1406 may be received by the industrial controller 1210 from another device or system in the blockchain peer network. This previous hash 1406 together with the data for a set of transactions to be included in a new block are used to generate the next hash 1412 for the block.
- the proof engine component 1104 can be configured to validate transactions for inclusion in the new block in accordance with the transaction instruction 1402 .
- the proof engine component 1104 can cooperate with a consortium of other devices on the blockchain system to determine the validity of the transactions using consensus-based techniques. Similar to the techniques described above in connection with FIG. 8 , proof engine component 1104 can leverage miners—programmatic entities that build blocks based on Merkle tree information for gathered transactions—in connection with consortium-based validation of blocks of transactions.
- a block instruction 1404 (e.g., blockchain instruction 1202 in the case of industrial controllers) can configure the blockchain engine 1128 to perform updates to the controller's ledger 1126 to add one or more transactions of a new block after the block's transactions have been validated by proof engine component 1104 .
- the proof engine component 1104 can also validate transactions generated by other node devices on the industrial blockchain network in accordance with a consensus-based validation technique, and broadcast its validation findings regarding the validity of the transactions to other node devices on the blockchain network (e.g., other blockchain-enabled industrial devices 1102 ).
- proof engine component 1104 can send information regarding a control event originating on its associated blockchain-enabled industrial device 1102 to one or more other devices on the industrial blockchain network for validation.
- the proof engine component 1104 of the originating device can independently validate the authenticity of the control event using a suitable consensus-based validation technique (e.g., proof-of-work, proof-of-state, practical byzantine fault tolerance, etc.).
- the blockchain engines 1128 share their independently derived conclusions with one another, and will only update their respective blockchain ledgers 1126 if at least a minimum number of the devices report that the control event is authentic.
- blockchain engine 1128 can broadcast validated transactions as verified ledger deltas 1408 that can be used by other devices on the blockchain network to update their own ledgers 1126 .
- Proof engine component 1104 can also update the device's own copy of ledger 1126 based on verified ledger deltas received from other devices on the blockchain network to ensure that validated transactions originating elsewhere on the network are recorded in the device's own ledger 1126 .
- Blockchain engine 1128 can also generate and send information regarding errors 1410 discovered in a block of transactions (either a self-generated block or a block received from another device on the blockchain network).
- blockchain-enabled industrial devices 1102 may be configured such that only nodes (blockchain-enabled industrial devices) affected by a transaction will verify the transaction in order to reduce CPU usage relative to verifying the entire blockchain.
- the proof engine component 1104 of an industrial device 1102 may be configured to select whether to perform validation analysis on a given block of transactions based on a determination of whether the transactions of the block are relevant to the device's own monitoring and control operations.
- the blockchain engine 1128 can allow a user to specify transaction criteria that the industrial device 1102 will use as a basis for determining the types of transactions on which the device will perform validation analysis.
- Example transaction criteria can include, but are not limited to, identities a subset of other devices in the blockchain system whose transactions will be validated by the device 1102 , identities of machines or industrial processes whose transactions will be validated by the device 1102 , or other such criteria. Based on this configuration information, the proof engine component 1104 will perform its validation analysis only on transactions that satisfy the defined criteria. This selective merit-based verification of blocks can conserve processing resources on the industrial device 1102 relative to verifying all blocks of a blockchain, while ensuring that all transactions are reliably verified by at least a subset of industrial devices 1102 to which the transactions are most relevant.
- blockchain engine 1128 can also include a private key 1122 and a public key 1124 that can be used by the controller 1210 or other industrial device 1102 to securely share information with other entities on the blockchain network. As will be discussed in more detail herein, this can include secure sharing of recipe data for execution on a selected industrial controller or at a selected industrial facility.
- Each blockchain-enabled industrial device 1102 can include a secure storage area (e.g., memory 1118 ) that is separate from the storage used for real-time monitoring and control.
- processing resources used by the blockchain-enabled industrial devices 1102 can be segregated from the primary processing resources that perform real-time monitoring and control (e.g., the processing resources used to execute control program 1204 and update the device's I/O). In this way, execution of blockchain functionality on the industrial device 1102 does not impact performance of the device's primary monitoring and control functions. In some embodiments, this can be achieved using multi-core processing to partition blockchain transactions from real-time control.
- control components 1514 can include a memory 1504 on which is stored the control program 1204 executed by the controller 1210 and the data table 1508 that stores real-time values of the controller's digital and analog inputs and outputs, setpoint values, calculated values, or other data tag values.
- Control components 1514 also include one or more I/O modules 1512 , which interface the controller 1210 with input and output devices (not shown) that make up a controlled industrial system or process.
- I/O modules 1512 are communicatively connected to the controller's backplane 1516 or communication bus, and exchange data with the data table 1508 via the backplane 1516 .
- I/O modules 1512 can include input modules that measure aspects of the controlled system as digital and/or analog signals (e.g., 4-20 mA signals, 0-10 VDC signals, switched input voltages, etc.) and write these values to designated data tags or memory addresses of data table 1508 .
- I/O modules 1512 can also include output modules that read digital or analog values from designated data tags or memory addresses of data table 1508 and translate these values into output signals (e.g., switched outputs, 4-20 mA output signals, 0-10 VDC output signals, etc.) directed to output devices of the controlled system.
- One or more controller processors 1502 or execution engines execute the control program 1204 and control updating of data values in the data table 1508 in accordance with measured data from the I/O modules 1512 and execution of the control program 1204 .
- blockchain engine 1128 is embodied as a sub-system of controller 1210 , and is implemented using separate memory and processing resources from control components 1514 .
- blockchain engine 1128 can utilize its own processor 1116 and memory 1118 , which are separate from controller processor(s) 1502 and memory 1504 .
- blockchain functions e.g., transaction processing and validation, block generation, smart contract processing and enforcement, etc.
- blockchain engine 1128 is segregated from control-related analytics, and is not necessarily implemented using the primary control language of the controller 1210 .
- While components of the blockchain engine 1128 can read data from and write data to the controller's data table 1508 (e.g., via a data bus 1518 ) in connection with performing blockchain creation and management functions, the processing resources used to carry out these blockchain functions are physically separated from those used to carry out control. In this way, blockchain functions carried out by the blockchain engine 1128 do not impact performance of the controller's basic control functionality.
- FIG. 15 depicts the embedded blockchain engine 1128 as being a sub-system of an industrial controller, blockchain engine 1128 can also be embedded on other types of industrial devices, including but not limited to motor drives, industrial sensors, vision systems, safety relays, barcode stampers, or other such devices.
- FIG. 16 is a diagram of an example ledger entry 1602 that can be added to the industrial device's ledger 1126 by proof engine component 1104 according to one or more embodiments.
- Ledger entry 1602 can represent a single block of the blockchain, and can be stored as part of ledger 1126 in secure memory 1118 .
- the ledger 1126 can be one of multiple copies of the ledger distributed among multiple devices or entities that participate in the industrial blockchain network (e.g., multiple blockchain-enabled industrial devices 1102 or other types of participating devices), with each device or entity maintaining its copy of the ledger 1126 based on validated transaction deltas generated by the device itself or received from other devices on the blockchain network.
- Blockchain infrastructure data 1604 can include, but is not limited to, the hash of the previous block in the blockchain (e.g., previous hash 604 in FIG. 6 ), an identifier for the block represented by the ledger entry 1602 (e.g., index 614 in FIG. 6 ), timestamps for the transactions included in the block (e.g., timestamp 616 in FIG. 6 ), repudiation-related data, the Merkle tree root (e.g., root fingerprint 612 ), or other data relating to the blockchain infrastructure.
- the payload 1606 of the ledger entry can include transaction data 1608 as well as associated metadata 1618 , which may be specific to the industrial applications that are leveraging the blockchain.
- Ledger entry 1602 can also include a public key 1610 of the associated blockchain-enabled industrial device 1102 and one or more private keys 1612 . These keys can be used to encrypt and decrypt information shared with other devices or entities on the blockchain network.
- an entity on the blockchain network can provide encrypted recipe data to a blockchain-enabled controller (e.g., controller 1210 ).
- the recipe data may be proprietary information defining parameters and/or executable instructions for manufacturing a particular product or batch.
- the recipe data can be encrypted by the sending entity's private key 1612 and decrypted by the receiving controller using the public key 1610 and the controller's own private key. Once decrypted, the receiving controller can execute the recipe to facilitate manufacture of the product.
- the receiving controller can leverage the blockchain information to verify that the recipe is from a trusted source before executing, and to verify that the controller itself has been authorized to execute the recipe. Distribution and use of the recipe data can be subject to a smart contract implemented by the blockchain network, as will be described in more detail herein.
- FIG. 17 is a diagram of an example industrial blockchain network architecture.
- an industrial blockchain ecosystem 1702 can comprise multiple participating blockchain systems 1704 .
- One or more of the participating blockchain systems 1704 can be industrial systems comprising multiple blockchain-enabled industrial devices 1102 (e.g., blockchain-enabled controllers 1210 , HMI terminals, gateway devices, MES systems, motor drives, meters or other telemetry devices, sensors, ERP systems, data historians IIoT devices, etc.).
- the industrial blockchain ecosystem 1702 can span multiple geographic, organizational, and business boundaries.
- the blockchain systems 1704 can be owned by, or may represent, entities representing different disciplines within the manufacturing, supply, distribution, and/or retail chain, including but not limited to engineering and product development, product manufacturing, product testing, shipping, technical support, business and accounting, etc.
- Systems 1704 may be associated with producers and manufacturers, suppliers, sub-system suppliers (e.g., OEMs), designers and engineers, retailers, shippers, customers, end consumers, or other such entities.
- blockchain-enabled industrial devices 1102 can be added to this infrastructure in a substantially plug-and-play manner
- a blockchain-enabled industrial device 1102 can broadcast its identity as a blockchain-enabled device to other devices on the blockchain network, and can also detect other blockchain-enabled devices.
- Devices across all layers of a plant can share their identities, born-on certificates, firmware versions, and other such information with other peer devices on the blockchain system 1704 (and by extension the larger blockchain ecosystem 1702 ).
- These devices can be preconfigured to cooperate with other blockchain-enabled industrial devices as a consortium within the blockchain system 1704 to authenticate transactions using consensus mechanisms (e.g., practical byzantine fault tolerance, proof-of-work, proof-of-state, etc.).
- gateway devices can also be deployed. These gateway devices can allow legacy devices without integrated blockchain capability to proxy into the blockchain infrastructure.
- the gateway devices can create and link blocks of a blockchain based on data generated by the legacy devices and monitored by the gateway device via the network.
- blocks can be created in an industrial controller while the blockchains that record transactions on the controller can reside within the gateway device.
- an MES system can perform the blockchain creation and management functions for multiple monitored devices and systems within the plant. These proxy systems can synchronize blockchains from different sources, certify which chains are trusted, and perform other such blockchain management functions.
- each entity may wish to regulate access to the information shared with other entities within the chain.
- a supplier entity that manufactures and provides parts used by another manufacturing entity for manufacture of its own products may wish to provide only a limited subset of its available blockchain data relating to manufacture of the part (e.g., results of quality tests, manufacturing time stamps, a source of materials used to manufacture the part, etc.), while withholding other proprietary manufacturing statistics generated during production of the part and recorded in a blockchain.
- blockchain-enabled industrial devices 1102 can be configured to generate multiple versions of a blockchain with different degrees of access permissions. FIG.
- FIG. 18 is a diagram of an example blockchain-enabled industrial controller 1210 illustrating generation of public and private blockchains.
- blockchain-enabled industrial controller 1210 (or other blockchain-enabled industrial devices 1102 ) can be configured to create multiple versions of a blockchain to facilitate layered access to manufacturing data generated by the blockchain system within which the controller 1210 operates. This can include creating a public blockchain 1304 a and a private blockchain 1304 b, each of which comprises data that respective different sets of users or systems within the blockchain ecosystem 1702 are allowed to access.
- the public blockchain 1304 a may include publicly accessible part count or material source information that may be accessed by all blockchain systems 1704 within the ecosystem 1702
- the private blockchain 1304 b may include proprietary recipe information that is to be kept private from the other systems 1704 within the ecosystem.
- users can identify which data items are to be included in each version of the blockchain 1304 , as well as the scope of access to be assigned to each version of the blockchain 1304 , via a device configuration interface (e.g., device configuration application 1208 ).
- device configuration application 1208 may allow the user to define two or more blockchains to which transactions are to be added by the blockchain-enabled industrial controller 1210 , as well as the scope of access to be to be assigned to each blockchain.
- the scope of access may be defined, for example, by identifying the devices, entities, or blockchain systems 1704 that are to be permitted access to the data recorded by each version of the blockchain.
- the blockchain instructions 1202 can include instruction parameters 1212 that allow the user to select data items or control events (e.g., timed events, change-of-state events, alarm events etc.) that are to be considered transactions to be included in a blockchain, as well as a parameter that allows the user to select which of the defined versions of the blockchain 1304 the transaction is to be associated with.
- a tag dialog can be invoked on the device configuration application 1208 that allows the user to select which data tags are to be made public so that other devices on the blockchain network can see the path.
- FIG. 19 is a diagram illustrating segregation of private and public blockchain information in an example industrial blockchain ecosystem.
- the example ecosystem depicted in FIG. 19 comprises a number of blockchain systems associated with respective entities that participate in a manufacturing and distribution chain, including supplier entities 1902 , a manufacturing entity 1904 , a warehouse entity 1906 , and retail entities 1908 .
- Supplier entities 1902 may be manufacturing entities that provide parts or materials to manufacturing entity 1904 that manufactures a product using the provided parts or materials.
- One or more supplier entities 1902 may be OEMs that provide custom-built machines to the manufacturing entity 1904 .
- Manufacturing entity 1904 may provide finished products to a warehouse 1906 , which may be owned by the same industrial enterprise that owns the manufacturing entity 1904 .
- Warehouse 1906 may distribute product to retail entities 1908 .
- FIG. 19 is only intended to be exemplary, and that an industrial blockchain ecosystem can comprise any collection of entities of various roles.
- One or more of the blockchain systems that make up the ecosystem can maintain both private blockchains 1304 b for internal use as well as public blockchains 1304 a accessible to other participating entities in the blockchain ecosystem.
- Public and private industrial blockchains can be used within a blockchain ecosystem comprising several business entities of a supply chain for a variety of applications, including but not limited to tracking of machine performance and usage, tracking of products across a manufacturing facility or within a single industrial enterprise, tracking of products across the larger supply and distribution chain, distribution of proprietary recipe information, and product auditing. These example industrial blockchain applications are discussed in more detail below.
- Blockchain-enabled industrial devices that support generation of public and private industrial blockchains can be used to track performance and usage of machines sold by OEMs to their customer manufacturing entities.
- multiple machines built by different OEMs e.g., one or more supplier entities 1902
- manufacturing entity 1904 may be a beverage factory that runs a bottling line comprising fillers, sealers, conveyors, cartoners, and other machines. Some of the machines that make up the bottling line may be built and provided by one or more OEMs.
- blockchain-enabled industrial devices 1102 at the OEMs can generate private blockchains 1304 b that record transactions and associated data associated with the machine building process that are to be accessible only by authorized devices and personnel associated with the OEM.
- the OEM's blockchain-enabled industrial devices 1102 can also be configured to generate public blockchains 1304 a that record publicly shared transaction data that can be accessed and viewed by other devices that participate in the blockchain ecosystem, including devices associated with the customer manufacturing entity 1904 .
- This publicly accessible information can include, for example, results of factory acceptance tests (FATs) performed on the machine prior to shipping to the customer.
- FATs factory acceptance tests
- Blockchain-enabled industrial devices that make up the machine, as well as blockchain-enabled test equipment used by the OEM can capture these FAT results as transactions and record the results as validated blocks in the machine's public blockchain, which is shared with blockchain node devices at the manufacturing facility.
- industrial blockchains can be used to track each machine's performance. For example, during bottling and filling operations at the manufacturing entity 1904 , blockchain-enabled industrial devices 1102 at the facility can generate and update both private blockchains 1304 b that record production data intended for internal use only, as well as public blockchains 1304 a comprising transaction data that can be accessed and viewed by devices associated with the relevant OEM.
- the manufacturing entity's private blockchain data may comprise, for example, proprietary information relating to the product being manufactured within the manufacturing facility (e.g., recipe data, product order information, product quality check results, etc.), while the public blockchain data accessible by the OEM may include only performance statistics associated with the particular machine that was built and provided by the OEM (e.g., machine downtime statistics, alarm histories, etc.). This allows the OEMs to track performance of their own custom-built machines without being privy to the manufacturing entity's proprietary manufacturing data or information regarding other OEMs' machines.
- the blockchain-enabled industrial devices 1102 that make up the various machines of a production line or facility can be configured to maintain separate private blockchains for each OEM, so that performance of machines provided by different OEMs can be compared by the plant owner.
- This selective sharing of blockchain data can also be used to generate a reliable tamper-proof ledger of machine usage statistics, which can be used in connection with subscription-based models of machine usage.
- the manufacturing entity 1904 may establish a subscription-based contract with the OEM to use the machine at the manufacturing facility and to pay the OEM based on usage (e.g., based on an amount of monthly run-time, product count, power cycles, energy consumption, etc.).
- terms of this machine subscription service can be enforced by a smart contract defined for the blockchain ecosystem comprising the manufacturing entity 1904 and the OEM (supplier entity 1902 ).
- blockchain-enabled industrial devices 1102 which can include both devices of the machine itself (e.g., industrial controllers, telemetry devices, power meters, drives, etc.) as well as other industrial devices or systems owned by the plant (e.g., power meters, ERP systems, etc.)—can track and record usage statistics for the machine as a tamper-proof blockchain that is shared with blockchain node devices at the OEM, eliminating the possibility of disputes between the manufacturer and OEM regarding actual machine usage.
- Usage and/or status data recorded in the blockchain can also be monitored to determine when components of the machine should be replaced.
- the smart contract can include provisions for the OEM to replace certain machine components or devices after a defined number of production cycles (or based on another time-based or event-based criterion, such as total energy consumption, part count, downtime or alarm frequency, a KPI setpoint, etc.).
- a transaction indicating that the part replacement event has occurred, one or more systems within the blockchain ecosystem (e.g. system 2106 described below in connection with FIG.
- some embodiments of blockchain-enabled industrial devices 1102 may require submission of processing “fees” (e.g., Ether or “gas”) in exchange for execution of smart contract logic on relevant transactions.
- processing “fees” e.g., Ether or “gas”
- an OEM may build a custom machine for a manufacturing entity.
- the machine will comprise the controlled mechanical system as well as the electrical and control system that distributes power to the machine components and facilitates automated control of the machine.
- the control system is generally housed in a control cabinet and can include a number of industrial control devices, including but not limited to one or more industrial controllers, motor drives (e.g., variable frequency drives), or other such industrial devices.
- the industrial control devices are blockchain-enabled devices.
- verifiable, unique identities of the machine components used in the machine assembly are recorded in the ledger of a public blockchain (similar to public blockhains 1304 a illustrated in FIG. 19 ) stored on one or more of the industrial control devices to be shipped with the machine.
- a unique, verifiable identity for the machine itself is also recorded in the public blockchain ledger.
- the industrial controller will typically execute a custom control program or application developed by the OEM, the public ledger will also include a verifiable record of this control application. This record of the control application may be signed by the OEM's private key.
- records of certain vendor-specific components used in the machine can be recorded in the public ledger. For example, the firmware version currently installed on the industrial controller or another industrial device in the machine's control cabinet may be recorded in the public ledger and signed by the vendor's private key.
- the OEM agrees to replace one or more specified component parts of the machine after completion of a defined number of machine operating cycles.
- the number of operating cycles that is to trigger a part replacement is defined on at least one of the machine's control devices (e.g., the industrial controller in the present example).
- the blockchain-enabled industrial controller tracks a number of production statistics, including an accumulated number of operating cycles performed by the machine, an accumulated amount of time that the machine has run, a number of parts produced by the machine, etc.
- the industrial devices of the machine's control cabinet record this production data in the public blockchain ledger, signing the production data using the manufacturing entity's private key.
- the control devices also record modifications made to the machine or its associated industrial devices by the manufacturing entity. For example, changes made to the firmware of the industrial controller or other control devices as a result of reimaging or patching are recorded in the public blockchain ledger, as are modifications made to the OEM-developed control program or application executed on the industrial controller.
- the block chain engine in the industrial controller signs, on behalf of the owner, a verifiable and contractually binding component replacement order as a transaction in the public blockchain.
- a criterion e.g., a criterion defined in a smart contract
- the block chain engine in the industrial controller signs, on behalf of the owner, a verifiable and contractually binding component replacement order as a transaction in the public blockchain.
- the OEM Since the OEM has access to data stored in the public blockchain, the OEM receives and verifies the component replacement order, and in response ships the necessary machine component to the manufacturing entity.
- the manufacturing entity installs the replacement component and records a signed conformation of the replacement in the public blockchain ledger.
- the OEM can use this verified transaction to initiate payment processing.
- the replacement component, the vendor-specific device firmware, and the OEM-specific application are all verifiably tracked in the public blockchain ledger.
- the current state reflected in the public blockchain reflects the authorized production cycle count, which is viewable by both the OEM and the end user.
- the OEM can authorize the production cycle count in the public blockchain ledger based on payment and agreement.
- the end-user can also set the criteria for the machine to automatically renew additional production authorization at defined thresholds.
- the machine's control devices also maintain a private blockchain ledger (e.g., private blockchains 1304 b in FIG. 19 ) comprising data that can be accessed only by the manufacturing entity.
- a private blockchain ledger e.g., private blockchains 1304 b in FIG. 19
- This can include smart contracts for the authorization of machine downtime, approval of new firmware versions, and approval of new versions of the control application.
- These authorizations can be performed by the blockchain engines of the industrial devices without relying on a human entity to tell the machine to do so.
- the private blockchain for the machine can also include records of maintenance operations performed on the machine that do not affect the OEM contract (e.g., maintenance operations that do not involve modifying the OEM's control application, replacing components that the OEM is obliged to replace, etc.). These maintenance records can also include records of which personnel performed the maintenance operation and when the maintenance operations were performed.
- the private blockchain can also include machine operation statistics that do not affect the OEM contract.
- Such production information can include, for example, identifications of plant employees who operated the machine during each shift, stoppage times during each shift, total machine runtime for each shift, etc.
- Other information that can be stored on in the private blockchain can include, but is not limited to, internal manufacturing information such as part identities (e.g., chip serial numbers used on an assembled printed circuit board), part defect statistics, improper machine operations, etc.
- Other types of entities involved in purchase or leasing of a machine from an OEM can also be included as participants in the industrial blockchain ecosystem. For example, as part of the process of installing a new production line, plant owners may obtain financing from a bank or purchase design services from an engineering firm. Like the OEM, these other entities may be paid by the manufacturing entity 1904 in increments; e.g., based on project milestones or on a periodic basis.
- Public industrial blockchains generated by devices 1102 can allow all parties to see the progression of the machine build project as the machine moves toward operation, with states of the project being tracked and recorded in the blockchain. Access to the data recorded by the blockchain can be regulated based on the role of the entity.
- the OEM may be interested primarily in production numbers for billing purposes in a subscription-based contract, while designers may be afforded access to more granular device-level performance data.
- the diverse entities involved in the machine's lifecycle e.g., designer, OEM, manufacturer, financial institution, etc.
- can each be afforded layered levels of access to blockchain data generated for the machine at all stages of its lifecycle e.g., design, commission, operation, and maintenance.
- the public and private industrial blockchains can also be used to improve technical support services offered by the OEM or by other support entities. For example, if a machine downtime event or other performance issue is reported by the manufacturing entity 1904 , the blockchain transactions can be examined by the OEM or other technical support entity to determine the state of the customer's machine at the time of the reported event. Information encoded in the blockchain that may be leveraged by the technical support entity can include, but is not limited to, device identifiers, device configuration data, machine states, etc.
- the customer's shared blockchain can also log unscheduled maintenance events, skipped lock out/tag out events, or other operator actions that may be useful to technical support entities when tracking a root cause of a reported performance issue.
- blockchain-enabled industrial devices 1102 can maintain public blockchains that record transaction data accessible to outside technical support entities, while separately maintaining a private blockchain that records proprietary information that is inaccessible to the technical support entity.
- the public blockchain can be made accessible to all repair entities that are trusted members of the industrial blockchain ecosystem.
- blockchains generated for the machine can be leveraged to perform machine warranty and maintenance tracking.
- the machine's blockchain can record usage and repair information on the manufacturing entity's plant intranet. This information can include, for example, dates and times at which a maintenance operation was performed, identities of any components or devices that were replaced or reprogrammed, dates and times of lock out/tag out procedures that were followed in connection with a maintenance action, identities of the personnel who performed the maintenance action, etc.
- the blockchain that records this maintenance information can be maintained on distributed devices within the manufacturing entity's plant intranet, such that any single device on the plant's blockchain network can query the blockchain to obtain maintenance log information for the machine. This creates a tamper-proof record of maintenance operations that can be accessed without the need to log into a data historian. Some of this maintenance and operational information can be maintained on a private blockchain that is only accessible by devices on the plant's own intranet. Additionally, blockchain-enabled devices 1102 within the plant can generate a public version of the machine's blockchain that includes warranty-related information that is accessible by outside support entities (e.g., OEMs or other technical support entities) who have a business interest in the information.
- outside support entities e.g., OEMs or other technical support entities
- Information in this public version of the blockchain can include, for example, operating hours, power cycles, identities of devices added to the machine (which may be unauthorized devices), etc.
- This public version of the machine's blockchain can be viewed by outside support entities to validate claims made by the machine owner regarding internal maintenance actions performed on the machine or the machine's operational history.
- the techniques described above regarding the use of industrial blockchains to track an OEM-provided machine across its lifecycle can also be applied to parts, sub-assemblies, or materials provided by supplier entities 1902 to a manufacturing entity 1904 .
- the blockchain systems that make up an example industrial blockchain ecosystem may be geographically distributed across multiple businesses that together form an integrated supply chain for a product.
- sub-assemblies for a car produced by an automotive facility may be manufactured by respective sub-assembly suppliers (supplier entities 1902 ).
- blockchain-enabled industrial devices 1102 at the supplier entities 1902 can generate public blockchains 1304 a that record information regarding manufacture of the sub-assemblies permitted to be shared with the manufacturing entity 1904 .
- These public blockchains 1304 are accessible by devices at the manufacturing entity 1904 , and only comprise a subset of available sub-assembly manufacturing information that the supplier is contractually obligated to provide to the manufacturer. This public blockchain information can be incorporated into the manufacturer's own information tracking for the fully assembled and sold vehicles.
- public blockchains 1304 a that record transactions at the manufacturing entity 1904 can be used to share a selected subset of performance or test data for these sub-assemblies with their associated supplier entities 1902 , allowing the sub-assembly suppliers to track the performance of their own sub-assemblies after the sub-assemblies have been sent to the manufacturer.
- Blockchain-enabled industrial devices 1102 can also be configured to support the use of blockchains in connection with distribution of proprietary recipes between supply chain entities and execution of those recipes on industrial controllers.
- a recipe may comprise a set of executable instructions and/or parameter values for manufacturing a specific type of product or material. When installed and executed on an industrial controller, the recipe instructs the controller how to produce the specified product or material. While many recipes are designed by engineers within the plant facility that produces the product, in some cases the recipe may be a proprietary set of instructions and/or parameters designed and distributed by an outside entity. In an example scenario, an OEM may design and distribute recipes to manufacturing customers that have purchased or leased the OEM's proprietary equipment, so that the OEM's recipe can be executed on the equipment in connection with manufacturing a particular type of product.
- a manufacturing entity may provide a recipe to a supplier entity to ensure that component parts or materials manufactured by the supplier for the manufacturing entity meet specification requirements.
- the provider of the recipe may wish to keep the details of the recipe hidden from the receiving entities that utilize the recipe to produce a batch of product. From the opposite perspective, the entity that receives and installs the recipe on their equipment requires verification that the recipe being installed is from a trustworthy source.
- industrial blockchains can be used to ensure to the manufacturing entity that a recipe is from a trusted source and to track execution of the recipe on the end manufacturing entity's equipment.
- the blockchain can also track changes made to the recipe itself.
- a recipe holder such as a supplier entity that develops and provides recipes for execution at partner facilities—can deliver a signed, verifiable recipe to the recipe user (the manufacturing entity that will execute the recipe on one or more industrial controllers to yield a product or material in accordance with specifications encoded in the recipe).
- the recipe may be contractually bound to produce a specified number of units or batches, or may have an associated timed expiration beyond which production rights afforded to the recipe user expire.
- the recipe to be distributed to the supplier entity can be embedded in a blockchain, and a public key infrastructure (PM) system (implemented by the cryptographic components 1106 of the blockchain-enabled industrial devices 1102 and using private keys 1122 and public keys 1124 ) can be used to ensure that the recipe is executed only on a specified target device (e.g., a specified industrial controller 1210 ).
- a sending device can wrap the recipe with a private key to yield an encrypted recipe
- the cryptographic component 1106 of the receiving controller (e.g., controller 1210 ) on which the recipe is to be executed can unwrap the encrypted recipe with its own private key 1122 using the public key.
- Blockchain-enabled industrial controllers 1210 at the recipe user's facility can be configured to leverage the blockchain information to verify that the recipe is from a trusted source (the recipe holder) before executing, and to verify that the controller itself has been authorized to execute the recipe. Controllers 1210 can also execute the recipe without permitting the recipe holder to view the specifics of the recipe. In this regard, the blockchain-enabled system may place intentionally obfuscated ingredient orders through the recipe maker's supply chain.
- a licensed contract to use the recipe can also be embedded (e.g., as a smart contract enforced by industrial devices 1102 that make up the industrial blockchain ecosystem) to prevent execution of the recipe on the recipient's controller after an agreed number of parts have been produced using the recipe (or based on another termination criterion, such as a specified expiratory date, consumption of a specified amount of power by the controlled system, etc.).
- Geotagging can also be used to verify that the recipe is being executed at an agreed location (e.g., at a specified plant facility).
- the recipe can be made aware of its location based on geotagging functionality of the industrial device 1102 on which the recipe is executed, and will only allow execution by the industrial device 1102 if the geotagged location corresponds to the agreed location.
- the public ledger of the industrial blockchain which can be accessed by both the recipe owner and the recipe maker—may include the signed and verified recipe, the authorized number of production units or batches and/or the authorized period of production.
- the public ledger can also record the elapsed number of units produced and/or the elapsed runtime for the recipe.
- blockchain-enabled industrial devices are configured to validate the recipe, to interpret the obfuscated recipe, to take the production order, and to determine the quantities and ingredients needed to execute the recipe.
- the blockchain-enabled devices can also control the production process by placing ingredient orders through the supply chain to the recipe maker.
- the blockchain-enabled device 1102 can also maintain a private blockchain ledger that is visible only to the recipe maker, and includes proprietary recipe operations information, including but not limited to batches of different recipes for different recipe owners, private end user production statistics not covered by the recipe contract, private machine operational information (e.g., identities of plant personnel who operated the machine, runtime statistics for the machine, downtime statistics for the machine, etc.), internal manufacturing information, defect tracking statistics, and other such proprietary information.
- proprietary recipe operations information including but not limited to batches of different recipes for different recipe owners, private end user production statistics not covered by the recipe contract, private machine operational information (e.g., identities of plant personnel who operated the machine, runtime statistics for the machine, downtime statistics for the machine, etc.), internal manufacturing information, defect tracking statistics, and other such proprietary information.
- Blockchain-enabled industrial devices 1102 can also support semi-public industrial blockchains that allow transaction data to be shared only with a specified subset of all entities within the industrial blockchain ecosystem (e.g., as in the OEM and sub-assembly supplier examples described above, in which the public blockchains are only made accessible to the relevant OEM or supplier).
- private blockchains 1304 b that only share transaction data among devices within a given industrial facility or industrial enterprise (e.g., among devices on a plant's intranet) may be accessed according to a layered access permission model. For example, some private industrial blockchains may be shared among all participating devices on a plant's intranet, while other private industrial blockchains may be shared only by a subset of devices that are associated with a given production area or production line.
- FIG. 20 is a diagram illustrating generation of blockchain data within a plant intranet.
- the manufacturing facility depicted in FIG. 20 may correspond, for example, to manufacturing entity 1904 or one of the supplier entities 1902 depicted in the supply chain ecosystem of FIG. 19 .
- blockchain-enabled industrial devices 1102 that operate within Production Areas 1 and 2 (the supplier production areas) bundle transactions generated within their respective production areas in connection with production of the component parts or materials, generate and validate blocks of these transactions (e.g., collaboratively with other blockchain-enabled industrial devices 1102 within the respective production areas using consensus-based validation techniques such as practical byzantine fault tolerance, proof-of-work, or proof-of-state), and add the validated blocks to a private blockchain 1304 b that is only accessible to participating devices on the plant's intranet (and not to other entities of the larger blockchain ecosystem).
- consensus-based validation techniques such as practical byzantine fault tolerance, proof-of-work, or proof-of-state
- Component parts or materials produced by Production Areas 1 and 2 are conveyed to Production Area 3 for assembly into either a finalized product or a sub-assembly of the final product.
- the blockchain-enabled industrial controller 1210 (or another blockchain-enabled industrial device 1102 ) that controls the industrial assets in Production Area 3 can link the blockchains generated by Production Areas 1 and 2, which are associated with the respective component parts generated in those production areas.
- the plant may be a bottling facility, and three upstream production areas (including Production Areas 1 and 2) may respectively produce a bottle, a cap, and a label which are then assembled at Production Area 3.
- the blockchain-enabled industrial controller 1210 that monitors and controls the Production Area 3 automation system can synchronize and link the blockchains associated with each of the components that were generated at the respective upstream production areas, yielding a composite blockchain for the assembled product (a capped and labeled bottle).
- the devices of Production Area 3 can also expand this composite blockchain by adding records of its own operations performed on the assembled product.
- a ledger design tool e.g., a tool of device configuration application 1208
- each assembled product can be represented by a new block in the industrial blockchain, with each block's transaction data comprising production statistics for the product.
- Example statistics that can be archived in the blockchain can include, but are not limited to, a part identifier (e.g. a VIN number of an assembled vehicle, a serial number of a capped and labeled bottle, etc.), a timestamp indicating a time of assembly or manufacture, measured quality metrics (e.g., leak test results, cap or bolt torque data, etc.), machine states or telemetric data at the time the product was assembled (e.g., oven temperatures, moisture levels, water or air pressures, etc.), or other such information that can be married to a unit or batch of product.
- each operation performed on the unit of product during its progress through the production process can be represented as a transaction within the industrial blockchain.
- This technique for linking industrial blockchains associated with component parts of a final assembled product can be extended to include parts, sub-assemblies, or materials received from outside supplier entities, and more generally to traversal of products across the entire supply chain (e.g., the supply chain depicted in FIG. 19 ).
- supplier-provided components e.g., batches of material, sub-assemblies, component parts, etc.
- blockchains that record transactions associated with production of the components at the supplier sites.
- One or more blockchain-enabled industrial devices 1102 at the manufacturing facility can link these blockchains into a composite blockchain, adding its own transactions to the blockchain as new blocks as the received components are further assembled and/or processed.
- any new transactions performed on the product at the next entity are added to the existing blockchain data associated with the product (including synchronized blockchain data associated with any of the product's sub-assemblies or component parts), either by adding new blocks to the existing blockchain or by synchronizing and linking the existing blockchain for the product with a new blockchain generated at the next entity to capture new transactions carried out on the product.
- the composite industrial blockchain associated with the unit of product can also record product handling and location tracking information (e.g., warehouse shipping information) as well as business-related information (e.g., order information, purchase information, etc.). All of these diverse transactions are validated by a consortium of devices within the industrial blockchain system or ecosystem using suitable consensus-based validation techniques.
- an industrial blockchain generated for a component part to be assembled with other parts into a final product can include, in addition to production statistics for the component part, provenance information that defines, as immutable and verified blockchain data, an origin or source of the component part.
- This provenance information can comprise, for example, one or more of an identity of a vendor or supplier of the component part, a part identifier, identifies of other entities within the supply chain through which the part has traversed, a date of the part's manufacture, a cost of the part, or other such information.
- the part's blockchain can also include part characteristic information about the part, including but not limited to a type of the part, a color of the part, a composition of the part, a size of the part, or other such information.
- One or both of the provenance information or the part characteristic information stored in the component part's blockchain can be leveraged by industrial devices at the manufacturing site to verify, prior to assembly of the part into the final product, that the correct part is being incorporated into the final product.
- industrial devices at Production Area 3 when component parts are received at Production Area 3 for assembly into either a sub-assembly or a final product, one or more industrial devices at Production Area 3 can be configured to incorporate a component part into a product assembly or sub-assembly only if the provenance and/or part characteristic information stored in the component part's blockchain satisfies one or more defined criteria.
- These criteria can define, for example, authorized sources or dates of manufacture of the component part (which can be verified based on reference to the provenance information); correct part types, sizes, and/or colors (which can be verified based on reference to the part characteristic information), or other such criteria.
- the one or more industrial devices will reference the provenance and/or part characteristic data recorded in the parts' respective blockchains, determine whether the recorded information satisfies the defined assembly criteria, and proceed to incorporate each component part into the assembly only if the provenance and/or part characteristic information for the part satisfies the criteria.
- the industrial devices can merge the provenance information for the component parts that were used in the assembly to yield composite as-built provenance information for the assembly as a whole, and record this as-built provenance information in a blockchain associated with the assembly.
- industrial devices that process a given component part can obtain some or all of the provenance information or part characteristic information for the part from a radio-frequency identifier (RFID) tag attached to or otherwise associated with the part.
- RFID radio-frequency identifier
- items of provenance and/or part characteristic data can be written to the RFID tag associated with the part at certain points during traversal of the part through the supply chain. This information can subsequently be read from the part's RFID tag by one or more RFID readers and added to the part's blockchain as a transaction.
- Systems that support aggregation of component part blockchains into aggregate blockchains associated with a sub-assembly or final assembled product, as described above, can also leverage these aggregate assembly blockchains in connection with warranty returns.
- a manufacturing entity that produces and ships a sub-assembly or assembled product can store, as immutable composite blockchains, assembly information identifying the various component parts that were used in the assembled product.
- This assembly information can include some or all of the provenance and/or part characteristic data described above.
- This composite assembly information can subsequently be checked to determine whether an assembled product that has been returned for repairs or replacement under warranty has been altered or tampered with by the customer.
- this determination can be made by reading RFID data from the component parts that make up the returned product to determine the as-returned composition of the product, and comparing this as-returned composition with the as-built composition recorded in the assembled product's blockchain.
- An RFID tag reader interfaced to one or more sources of the plant's blockchain data can be configured to make this comparison and to output information identifying anomalous parts or part replacements present in the as-returned composition.
- the manufacturing entity may choose to either deny or proceed with the repair or replacement.
- the warranty may dictate replacement of one or more specified component parts by the end user is permitted and does not violate the terms of the warranty. If the system determines that only such component parts have been replaced, the replacement or repair may be permitted. Alternatively, if the system determines that a component part replaced by the end user violates the terms of the warranty, the replacement or repair may be denied.
- some embodiments of blockchain-enabled industrial devices 1102 can allow users to configure selected blockchains for a product to be transient rather than persistent, such that the blockchains will be deleted after an expiration time or on an event basis.
- a blockchain generated for a particular item or batch of product may be configured to delete itself from all devices across which the blockchain is distributed after a defined criterion has been satisfied.
- the industrial blockchain associated with an item of perishable product can be configured to delete itself after an elapse of a time duration after which it can be assumed that the product was consumed (e.g., three months after the product is sold, as determined based on credit card transaction data).
- the blockchain associated with a product may be configured to delete itself after the product leaves the manufacturing facility if the blockchain's data only has utility internally during the manufacturing process. Automatic deletion of an industrial blockchain will extend back to the blockchain's root to ensure that blockchain's data can still be validated.
- the blocks of the blockchain can be maintained while the associated transaction data is deleted, or a new root can be set such that a later portion of the blockchain remains while an earlier portion is deleted.
- the portion of the blockchain that is deleted can be dependent on the blockchain's hierarchy.
- a blockchain's expiration definition can specify that only a selected subset of participating devices—those not requiring the blockchain's data—may delete the blockchain in response to the deletion event, while other devices may maintain the blockchain.
- a blockchain-enabled industrial controller may not need a product's blockchain after the product leaves the production area and deletes the blockchain accordingly (e.g., in response to recorded shipping information that indicates the product has left the facility), while an MES system may save the blockchain for archival purposes.
- some embodiments of blockchain-enabled industrial devices 1102 can include contingency features for managing gaps within the product's blockchain. These gaps can occur, for example, when the product leaves one facility and is transported to another location in the chain via a truck with no communication capabilities. In some embodiments, artificial intelligence or other types of inference can be used to infer the missing information. When the product reaches another verified entity within the supply chain, historical information can be leveraged to interpolate and confirm that the product is back under control of an authenticated entity.
- the blockchain-enabled industrial devices 1102 at the manufacturing facility can also generate public blockchains 1304 a that record, as transactions, manufacturing statistics for each unit of product that is to be shared with other devices on the larger industrial blockchain ecosystem.
- These public industrial blockchains 1304 a can be distributed across devices at the industrial facility and devices associated with other entities in the ecosystem (e.g., a supply chain), which are connected via a public or semi-public network 2002 such as the internet or a public or private cloud platform.
- Public industrial blockchains 1304 a can include blockchains that are to be accessible by all participants in the blockchain ecosystem (i.e., fully public blockchains) as well as semi-public blockchains that are to be accessible only by selected entities and/or devices in the ecosystem.
- blockchain-enabled industrial devices 1102 can be configured to generate as many different tiers of blockchains as desired, with each blockchain defined and configured to permit access by a selected set of entities.
- the manufacturing facility may manufacture products for multiple different customers (e.g., a plant that produces custom computer chips for different computer manufacturers).
- blockchain-enabled industrial devices 1102 used to manufacture the products may be configured to create a proprietary customer-specific blockchain for each customer, which each customer-specific blockchain comprises transaction data associated with that customer's product.
- the blockchain-enabled devices 1102 can create a new blockchain for each customer-specific manufacturing run. That is, after a production line switches operation from production of a batch of product for a first customer to a new batch for a second customer, the blockchain-enabled devices will cease updating the previous blockchain associated with the first customer's product and begin a new blockchain for the second customer to record transactions associated with the new product run. In this way, industrial devices participating in the blockchain system can segregate industrial blockchains according to customer.
- some embodiments of blockchain-enabled industrial devices 1102 can be configured to manage selective access to a given single blockchain.
- an industrial blockchain can be generated that allows the blockchain's hash information to be made public to all entities within the ecosystem while keeping the blockchain's transaction data private. This can allow a manufacturing entity to reassure outside parties that the plant's data is authentic without providing visibility into the data itself (which may be proprietary).
- an OEM may vouch for a state of a machine or program, which can be confirmed by checking the publicly accessible hash values of the machine's blockchain. This hash information can be made available without allowing private information about the machine state itself to be viewed by entities outside of the OEM.
- a trusted entity can certify device vendors that produce blockchain-enabled industrial devices 1102 and that participate in the supply chain, creating a supply chain with signed participation.
- blockchain-enabled industrial devices 1102 are configured to authenticate transactions (e.g., using digital fingerprinting or by other authentication means) within the global supply chain workflow, including transactions that occur within the manufacturing facility in which the transactions occur (e.g., transaction in which the industrial devices 1102 are directly involved) as well as transactions that originate elsewhere in the supply chain (the industrial blockchain ecosystem) as part of a consortium comprising multiple industrial devices 1102 .
- a rule can be defined stating that at least 20 devices on the blockchain network must agree that a transaction is valid before adding the transaction to a block.
- the use of blockchains throughout the supply chain can also allow a consortium of entities to authenticate standards for a product from many levels.
- different entities within an industrial blockchain ecosystem can certify that a product meets a defined standard in terms of safety, labor practices, equipment used to manufacture the product, certified plants at which the product was manufactured, etc.
- the devices making up the consortium can act as a mesh network, where different sub-entities can confirm that the defined standards are being met across multiple supply chain jurisdictions (e.g., that a product is organic, that a material used in the product is authentic, etc.).
- the blockchain-enabled industrial devices that were involved in producing the product can record, as a transaction in the product's blockchain, validated identities of the blockchain-enabled industrial devices themselves.
- this recorded device identity information can include both identity information for the device itself (e.g., model number, unique serial number, etc.) as well as an identity of the plant entity that owns the equipment. Recording this information as a blockchain transaction creates a tamper-proof, verifiable authentication that the product was produced by approved or certified equipment. In this way, the use of industrial blockchains can simplify the process of tracking compliance paperwork through multiple jurisdictions and ensure the authenticity of such claims.
- Industrial blockchains can also be used to authenticate carbon credits by tracking how much carbon dioxide was used to manufacture a product.
- all carbon dioxide consumption can be aggregated by the blockchain-enabled devices 1102 and added as a validated element of the blockchain. This trusted and validated consumption data can be submitted to appropriate regulatory agencies for carbon dioxide credits.
- multiple blockchains may be generated and aggregated during manufacture of a product or during traversal of the product through the supply and distribution chain.
- Some industrial blockchain systems can leverage these aggregated blockchains to correlate events within the facility or supply chain or to identify a chain of events.
- blockchain-enabled industrial devices 1102 or associated analytic systems can identify temporal relations between transactions among different blockchains. This can involve real-time synchronization of industrial blockchains for historian analysis. Analysis of synchronized industrial blockchains can assist with the process of identifying root causes of machine failures, product defects, or other issues.
- an associated industrial blockchain analytic system can analyze a slice of time across multiple synchronized blockchains and identify chains with commonality in connection with identifying a root cause of a supply chain or manufacturing event of interest.
- blockchains generated by industrial devices 1102 can be configured to capture transactions relating to operation and statuses of machines or production lines themselves. These machine history blockchains may be separate from those that capture transactions relating to manufacture of a product per se, and may capture, from the industrial devices and assets making up a manufacturing facility or supply chain, such information as diagnostic data, operating mode information, machine downtime durations and times, alarm information, telemetric data, or other such information. These blockchains can also capture records of maintenance actions, including but not limited to lock out/tag out actions, records of device or component replacements, operator actions gleaned from interactions with a control panel or HMI, or other such information.
- industrial blockchains can create a tamper-proof ledger of information indicative of an exact state of a plant at any point in time. This information can be used in connection with troubleshooting issues within a facility or supply chain.
- machine history or equipment history blockchains can also be correlated with the product-specific blockchains described above in order to determine a state of a machine or set of industrial assets corresponding to one or more manufactured products of interest. For example, if the blockchain transaction data for an item of manufactured product indicates a quality concern, this product-specific blockchain can be correlated in time with the machine-history blockchain for the production line responsible for manufacturing the product in order to determine if a state of the equipment that produced the product is relevant to the quality concern.
- a set of blockchain-enabled industrial devices 1102 that make up an industrial blockchain system can be configured to generate a plant model blockchain that models the production lines, machines, hardware components, and/or software components (e.g., firmware versions, application versions, etc.) that make up a manufacturing facility (or a production area within the facility).
- Devices 1102 can assemble these blockchains as the production lines and machines are powered up and the associated sets of equipment report their identity and status information.
- the devices 1102 can record this identity and status information for all devices within the plant model blockchain, yielding a Merkle tree of hashes in which each element of the tree represents an item of equipment.
- This plant model blockchain can record, for each device, such information as model numbers, software or firmware revision numbers, configuration settings (e.g., controller or variable frequency drive settings), operating mode information, maintenance log information, safety device statuses, total accumulated runtime data, operating modes, or other such device or asset information.
- configuration settings e.g., controller or variable frequency drive settings
- operating mode information e.g., maintenance log information
- safety device statuses e.g., total accumulated runtime data, operating modes, or other such device or asset information.
- the plant model blockchain can record changes to the states of the devices and/or machines within the plant, treating each change of a device's state as a transaction to be recorded in the plant model blockchain.
- the plant model blockchain can record changes to machine operating modes, changes to a device's firmware or software, changes in states of industrial safety devices, abnormal conditions, diagnostic data, lock out/tag out actions, states of safety lock switches, states of operator panel control devices (e.g., pushbuttons, switches, etc.), sensor states (e.g., part presence indications), or other such information.
- the plant model blockchain creates a verified history of the of the plant's overall state, as defined by the aggregated states of the devices and machines that make up the plant.
- the plant model blockchain may comprise multiple synchronized blockchains corresponding to different production areas or machines within the plant.
- Analysis tools can be used to analyze these plant model blockchains to identify a chain of cause-and-effect events, or to determine a root cause of an event (e.g., a machine failure, detection of a product defect, etc.).
- a root cause of an event e.g., a machine failure, detection of a product defect, etc.
- such analysis tools can identify and analyze a slice of time corresponding to an event of interest across the multiple synchronized plant model blockchains, and identify chains with commonality in connection with identifying the root cause of the event.
- plant model blockchains can also be referenced in connection with device replacements within the plant.
- this information can be accessed to determine the correct firmware and/or application that should be installed on a new device that is to replace an existing device. Tracking this information using industrial blockchains can ensure that this replacement device configuration information is reliable, preventing misconfiguration of replacement devices prior to deployment
- blockchain capabilities can be implemented on motor drives (e.g., variable frequency drives or other types of motor drives) that are mounted within a motor control cabinet (MCC). This can allow the states of the MCC to be tracked, recorded, and analyzed.
- motor drives e.g., variable frequency drives or other types of motor drives
- blockchain-enabled industrial devices 1102 can incorporate information in this distributed ledger 1126 into the device's control strategy.
- the blockchain-enabled industrial controller 1210 depicted in FIG. 18 executes a control program 1204 (e.g., a ladder logic program or other type of control program) in connection with monitoring and controlling an industrial machine, system, or process 1320 via I/O 1308 .
- a control program 1204 e.g., a ladder logic program or other type of control program
- the controller 1210 maintains one or more blockchain ledgers 1126 corresponding to public and/or private industrial blockchains 1304 that record transactions (e.g., industrial events, manufacturing and supply chain activities, etc.) within the blockchain system and/or ecosystem within which the controller 1210 participates.
- Each ledger 1126 records not only transactions that originate on the controller 1210 or its associated controlled process 1320 , but also validated transactions (received as transaction data 1324 or ledger deltas) that originate at other devices or systems that participate in the blockchain system or ecosystem (e.g., other blockchain-enabled industrial devices associated with other production areas or machines within the plant, or devices associated with other entities of the supply chain outside the plant). As described above, these transactions are only added to the ledger 1126 after the transactions have been validated by the blockchain system using consensus-based validation techniques.
- program execution component 1306 can be configured to leverage selected items of this ledger data in connection with controlling the system or process 1320 .
- control program 1204 can be written to reference one or more items of transaction data stored in the ledger 1126 , such that these items of transaction data serve as parameters or inputs into the control program 1204 that at least partially control the states of one or more control outputs 1314 .
- the blockchain-enabled industrial controller 1210 can control a system or process 1320 based not only on monitored local inputs from the system (input signals 1312 ), but also on events that occur at other production areas or machines within the plant.
- This ledger-based control is not limited to the use of plant-level events to effect control of control outputs 1314 .
- the ledger 1126 records business-level transactions (e.g., work order information, inventory information, etc.)
- program execution component 1306 can leverage this information as parameters or inputs into control program 1204 .
- the ledger 1126 may also record validated events that originate at other supply chain entities within the larger blockchain ecosystem (e.g., part or sub-assembly suppliers, OEMs, retailers, shipping companies, etc.), and control program 1204 an be written to reference these external supply chain events as control parameters as well.
- FIG. 21 is a diagram illustrating an example, high-level architecture for accessing blockchain information for a manufactured product using a mobile user interface application 2110 installed on a mobile device 2104 .
- User interface application 2110 can be configured to interface with a publicly accessible blockchain search system 2106 maintained on a public network or cloud platform 2106 .
- blockchain search system 2106 can comprise an interface component 2118 and a blockchain search and management component 2122 .
- components of blockchain search system 2106 components can comprise, for example, machine-executable components embodied within one or more machines, e.g., embodied in one or more computer-readable mediums (or media) associated with one or more machines that are accessible via the cloud platform or public network 2106 . These components can be stored on one or more memories and executed by one or more processors (not shown in FIG. 21 ) that make up part of blockchain search system 2106 .
- Blockchain search system 2106 can control remote access to versions of industrial blockchains 1304 a, 1304 b generated by industrial devices 1102 throughout a supply chain or other industrial blockchain ecosystem.
- user interface application 2110 allows a user to access subsets of relevant blockchain data associated with a finished product 2108 by scanning a scannable code, such as a QR code, imprinted on the product 2108 using the mobile device's optical scanning capabilities.
- the code establishes the identity of a source of the product's blockchain as well as the stored data to be accessed.
- Interface component 2118 can verify the identity included in request 2114 and determine a level of access associated with the identity. In response to determining that the identity is an authorized user identity and that the identity is permitted a degree of access to at least a subset of available industrial blockchain information, interface component 2118 instructs blockchain search and management component 2122 to search the blockchains 1304 a, 1304 b and retrieve a subset of relevant product data 2112 that the identified user is authorized to view based on the data request and identity.
- the interface component 2118 renders the results on mobile device 2104 .
- the user interface application 2110 can be configured to generate suitable graphical screens 2102 for rendering the authorized product data 2112 .
- Search and management component 2122 can be configured to retrieve the relevant blockchain data from any suitable source of the data accessible within the blockchain ecosystem, including but not limited to any of the blockchain-enabled industrial devices 1102 or other non-industrial sources of the requested data.
- This approach can allow product consumers to access and view information about a purchased product via their personal devices. For example, if a batch of bottled water is found to be contaminated, scanning the label on a bottle using a mobile device 2104 can cause user interface application 2110 to interact with search system 2116 to locate and retrieve information identifying a source of the water for that particular bottle.
- This water source information can be maintained in a public blockchain accessible to consumers. Production details for the bottle itself (e.g., quality check results, cap tightening data, etc.) can also be accessed in this manner Some of this production data may only be accessible to plant personnel or consumers of certain roles.
- data regarding the source of the produce e.g., the farm
- data regarding the source of the produce can be captured as a blockchain generated by the industrial equipment (including blockchain-enabled industrial devices 1102 ) that processes and packages the produce, such that the data can be retrieved by search system 2116 and presented on mobile device 2104 in response to scanning an optical code associated with the produce (e.g., a code on a tag affixed to the produce or on a bag containing the produce).
- this approach can allow consumers to verify the authenticity of their medications by retrieving blockchain information that tracks the medication's supply chain. This supply chain information can be captured in a public blockchain and made accessible to consumers.
- user interface application 2110 can combine scanning of a product's optical code with voice-based or text-based search.
- the user after scanning the product's scannable code, the user can enter or speak a request for a certain type of data relating to the product into their mobile device 2104 (e.g., “Confirm that this product is organic,” “where was this water bottled,” etc.).
- the user interface application 2110 translates the spoken information request into query information that can be combined with the scanned optical code information, submit this combined information to the blockchain search system on the cloud platform or public network 2106 , and retrieve a relevant subset of product data that satisfies the user's request and is permitted to be viewed by that particular user (in accordance with the user's identity and/or role).
- Blockchain search system 2116 can bundle and send blocks of industrial blockchains to customers upon request via the user interface application 2110 , which can include interactive search features that assist the user in easily locating desired information. For example, rather than walking the blockchain to find information of interest, the user interface application 2110 can allow users to drill down to blockchain information they wish to see. In an example use case, a user may a time range into user interface application 2110 together with a request to view all products that were created within the specified time range of interest. In response to this information, blockchain search system 2116 can retrieve, from the relevant blockchains 1304 a, 1304 b, identifiers of products that were created within the specified time range. Also, external indices with links for selectable dimensions of the product can be built to allow desired information to be found more quickly.
- Credit card purchases can also become transactions recorded in the blockchain for a product, allowing products to be traced to the end user (e.g., bottles with a cap that was produced as part of a specified batch can be traced to the owners of the bottles).
- Including consumer transactions in the product's blockchain can also allow notifications to be targeted to a specific subset of consumers known to have purchased a product (e.g., in the case of recall notifications for a particular batch of the product).
- Such notifications can be delivered to relevant client devices 2104 associated with known purchasers of a product by blockchain search system 2116 (e.g., by interface component 2118 ) in response to receiving a request to notify from an authorized vendor of the product.
- the request to notify can include, for example, an indication of the products for which a notification is to be delivered, a notification criterion that can be used to identify the subset of the products that are subject to the notification (e.g., a time range during which newly manufactured products are known to have been contaminated, a range of product serial numbers, a supplier known to have provided defective parts, etc.), and other relevant information that can be used by the system 2116 to determine which product purchasers should receive a notification.
- the search and management component 2122 can map the subset of product serial numbers identified by the notification criterion to the individuals known to have purchased those identified products. This mapping can be determined based on the transaction information stored in the product's blockchain.
- Interface component 2118 can then deliver suitable notifications to the client devices 2104 associated with the identified purchases.
- Including end user transactions as part of the product's blockchain can also allow the blockchain to be mined by sales entities for sales leads. In this way, sales people can readily determine what customers have ordered in the past, as well as identify who within a given company should be targeted for sales campaigns.
- the configurability of the blockchain-enabled industrial devices 1102 can allow manufacturers to choose the information that customers are allowed to access. Manufacturers or their associates (e.g., suppliers, OEMs, etc.) can also retroactively add to the set of data that may be accessed by consumers. For example, if a supplier wishes to provide more specific information regarding the source of their water after the products have shipped, the accessibility level of this additional information can be changed from private to public, thereby retroactively rendering this information accessible to consumers.
- FIG. 21 depicts a mobile device 2104 as the means by which industrial blockchain data is accessed
- HMI terminals and software can be configured to support blockchain interfaces that retrieve and visualize selected subsets of blockchain information relevant to a particular production area or plant facility within which the HMI terminal is installed.
- HMI terminals can be configured to interface with blockchain search system 2116 over the public network 2106 in a manner similar to client device 2104 , allowing operators to retrieve supply-chain level blockchain information from the HMI terminal.
- Blockchain search system 2116 can also be used to execute actions associated with smart contracts in some embodiments. For example, if a smart contract is between an OEM and a manufacturing entity of the blockchain ecosystem includes a provision for the OEM to replace machine components or devices after a defined number of production cycles (or based on another time-based or event-based criterion, such as total energy consumption, part count, downtime or alarm frequency, a KPI setpoint, etc.), search system 2116 can monitor relevant subsets of data logged in blockchains 1304 a or 1304 b to determine when the trigger for replacing the component has been satisfied. This monitoring can be performed by self-initiated searches performed by blockchain search and management component 2122 on a periodic or continuous basis based on instructions contained in the smart contract.
- interface component 2118 can generate and deliver a notification to personnel associated with the OEM entity that the component must be replaced at the manufacturing entity per the smart contract.
- search system 2116 may also initiate other procedures associated with replacement of the part when the replacement trigger has been satisfied, including generating a purchase order, submitting the order to a vendor, scheduling an on-site visit by the OEM to replace the component, etc.
- blockchain search system 2116 can be configured to enforce or execute provisions of a smart contract between entities of an industrial blockchain ecosystem by monitoring for conditions defined by the smart contract or for deviations from agreed provisions of the smart contract, and by executing appropriate notification, reporting, or control actions in line with the smart contract.
- FIGS. 22-23 illustrate various methodologies in accordance with one or more embodiments of the subject application. While, for purposes of simplicity of explanation, the one or more methodologies shown herein are shown and described as a series of acts, it is to be understood and appreciated that the subject innovation is not limited by the order of acts, as some acts may, in accordance therewith, occur in a different order and/or concurrently with other acts from that shown and described herein. For example, those skilled in the art will understand and appreciate that a methodology could alternatively be represented as a series of interrelated states or events, such as in a state diagram. Moreover, not all illustrated acts may be required to implement a methodology in accordance with the innovation.
- interaction diagram(s) may represent methodologies, or methods, in accordance with the subject disclosure when disparate entities enact disparate portions of the methodologies.
- two or more of the disclosed example methods can be implemented in combination with each other, to accomplish one or more features or advantages described herein.
- FIG. 22 illustrates an example methodology 2200 for aggregating industrial blockchains in connection with manufacture of a composite product.
- an industrial control program is executed that facilitates monitoring and control of an industrial process that assembles multiple components into a composite product.
- the industrial process can include, for example, a bottling process that fills, labels, and caps a bottle of beverage, an automotive manufacturing process that assembles a vehicle or a sub-assembly thereof, a process that manufactures computer chips or electronic devices, a batch process, a mining operation, or other such industrial processes.
- the control program can be executed by an industrial controller having integrated blockchain capabilities.
- control events associated with control of the industrial process are bundled into blocks of an industrial blockchain associated with the product.
- the control program may include industrial blockchain instructions that are configured to bundle the control events as validated transactions and record the transactions into one or more blocks of the industrial blockchain.
- the received blockchain may comprises manufacturing transactions associated with the corresponding component, which were recorded during production of the component by another production area or outside supplier facility. If such a blockchain is not received (NO at step 2206 ), steps 2202 - 2204 are repeated until a blockchain associated with one of the components is received.
- step 2208 the methodology proceeds to step 2208 , where an authenticity of the received blockchain is verified. Verification of the received blockchain can be based on a consensus technique (e.g., proof-of-work, proof-of-state, practical byzantine fault tolerance, etc.) in which a consortium of devices within an industrial blockchain system, including the industrial controller and other industrial devices and/or non-industrial devices), collectively verify the received blockchain's authenticity.
- a determination is made as to whether the result of step 2208 determines that the received blockchain is authentic. If the received blockchain is not authentic (NO at step 2210 ), the methodology returns to step 2202 and the received blockchain is not aggregated with the blockchain associated with the composite product. Alternatively, if the received blockchain is determined to be authentic (YES at step 2210 ), the received blockchain is aggregated into the blockchain associated with the composite product at step 2212 .
- FIG. 23 illustrates an example methodology 2300 for generating industrial blockchains having multiple levels of access permission.
- an industrial control program is executed that facilitates monitoring and control of an industrial process that facilitates manufacture of a product.
- a determination is made as to whether a first blockchain instruction of the industrial control program is executed. If the first blockchain instruction is executed (YES at step 2304 ), the methodology proceeds to step 2306 , where a first set of control events associated with control of the industrial process is bundled into blocks of a first industrial blockchain associated with the product in accordance with the first blockchain instruction.
- Per configuration parameters of the first blockchain instruction the first industrial blockchain have a first level of access permission defined by the first blockchain instruction.
- the first industrial blockchain may be designated to be a fully public blockchain comprising data that can be accessed and viewed by all participants of the blockchain ecosystem (e.g., a product supply and distribution chain), or may be a private blockchain accessible only to authorized users within the industrial facility within which the industrial process is being carried out.
- the first industrial blockchain may be configured to be semi-public, such that the blockchain data can be viewed only by one or more selected outside entities within the blockchain ecosystem (e.g., an OEM, a supplier, or a customer entity). If the first blockchain instruction is not executed (NO at step 2304 ), the methodology proceeds to step 2308 without executing step 2306 .
- Embodiments, systems, and components described herein, as well as industrial control systems and industrial automation environments in which various aspects set forth in the subject specification can be carried out can include computer or network components such as servers, clients, programmable logic controllers (PLCs), automation controllers, communications modules, mobile computers, wireless components, control components and so forth which are capable of interacting across a network.
- Computers and servers include one or more processors—electronic integrated circuits that perform logic operations employing electric signals—configured to execute instructions stored in media such as random access memory (RAM), read only memory (ROM), a hard drives, as well as removable memory devices, which can include memory sticks, memory cards, flash drives, external hard drives, and so on.
- RAM random access memory
- ROM read only memory
- removable memory devices which can include memory sticks, memory cards, flash drives, external hard drives, and so on.
- the term PLC or automation controller as used herein can include functionality that can be shared across multiple components, systems, and/or networks.
- one or more PLCs or automation controllers can communicate and cooperate with various network devices across the network. This can include substantially any type of control, communications module, computer, Input/Output (I/O) device, sensor, actuator, instrumentation, and human machine interface (HMI) that communicate via the network, which includes control, automation, and/or public networks.
- the PLC or automation controller can also communicate to and control various other devices such as standard or safety-rated I/O modules including analog, digital, programmed/intelligent I/O modules, other programmable controllers, communications modules, sensors, actuators, output devices, and the like.
- the network can include public networks such as the internet, intranets, and automation networks such as control and information protocol (CIP) networks including DeviceNet, ControlNet, and Ethernet/IP.
- CIP control and information protocol
- Other networks include Ethernet, DH/DH+, Remote I/O, Fieldbus, Modbus, Profibus, CAN, wireless networks, serial protocols, near field communication (NFC), Bluetooth, and so forth.
- the network devices can include various possibilities (hardware and/or software components). These include components such as switches with virtual local area network (VLAN) capability, LANs, WANs, proxies, gateways, routers, firewalls, virtual private network (VPN) devices, servers, clients, computers, configuration tools, monitoring tools, and/or other devices.
- VLAN virtual local area network
- WANs wide area network
- proxies gateways
- routers virtual private network
- VPN virtual private network
- FIGS. 24 and 25 are intended to provide a brief, general description of a suitable environment in which the various aspects of the disclosed subject matter may be implemented.
- an example environment 2410 for implementing various aspects of the aforementioned subject matter includes a computer 2412 (where computer 2412 may be an industrial controller or other type of industrial device, a server device, or another type of computing device).
- the computer 2412 includes a processing unit 2414 , a system memory 2416 , and a system bus 2418 .
- the system bus 2418 couples system components including, but not limited to, the system memory 2416 to the processing unit 2414 .
- the processing unit 2414 can be any of various available processors. Multi-core microprocessors and other multiprocessor architectures also can be employed as the processing unit 2414 .
- the system bus 2418 can be any of several types of bus structure(s) including the memory bus or memory controller, a peripheral bus or external bus, and/or a local bus using any variety of available bus architectures including, but not limited to, 8-bit bus, Industrial Standard Architecture (ISA), Micro-Channel Architecture (MSA), Extended ISA (EISA), Intelligent Drive Electronics (IDE), VESA Local Bus (VLB), Peripheral Component Interconnect (PCI), Universal Serial Bus (USB), Advanced Graphics Port (AGP), Personal Computer Memory Card International Association bus (PCMCIA), and Small Computer Systems Interface (SCSI).
- ISA Industrial Standard Architecture
- MSA Micro-Channel Architecture
- EISA Extended ISA
- IDE Intelligent Drive Electronics
- VLB VESA Local Bus
- PCI Peripheral Component Interconnect
- USB Universal Serial Bus
- AGP Advanced Graphics Port
- PCMCIA Personal Computer Memory Card International Association bus
- SCSI Small Computer Systems Interface
- the system memory 2416 includes volatile memory 2420 and nonvolatile memory 2422 .
- the basic input/output system (BIOS) containing the basic routines to transfer information between elements within the computer 2412 , such as during start-up, is stored in nonvolatile memory 2422 .
- nonvolatile memory 2422 can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable PROM (EEPROM), or flash memory.
- Volatile memory 2420 includes random access memory (RAM), which acts as external cache memory.
- RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).
- SRAM synchronous RAM
- DRAM dynamic RAM
- SDRAM synchronous DRAM
- DDR SDRAM double data rate SDRAM
- ESDRAM enhanced SDRAM
- SLDRAM Synchlink DRAM
- DRRAM direct Rambus RAM
- Computer 2412 also includes removable/non-removable, volatile/non-volatile computer storage media.
- FIG. 24 illustrates, for example a disk storage 2424 .
- Disk storage 2424 includes, but is not limited to, devices like a magnetic disk drive, floppy disk drive, tape drive, Jaz drive, Zip drive, LS- 100 drive, flash memory card, or memory stick.
- disk storage 2424 can include storage media separately or in combination with other storage media including, but not limited to, an optical disk drive such as a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive (DVD-ROM).
- CD-ROM compact disk ROM device
- CD-R Drive CD recordable drive
- CD-RW Drive CD rewritable drive
- DVD-ROM digital versatile disk ROM drive
- a removable or non-removable interface is typically used such as interface 2426 .
- FIG. 24 describes software that acts as an intermediary between users and the basic computer resources described in suitable operating environment 2410 .
- Such software includes an operating system 2428 .
- Operating system 2428 which can be stored on disk storage 2424 , acts to control and allocate resources of the computer 2412 .
- System applications 2430 take advantage of the management of resources by operating system 2428 through program modules 2432 and program data 2434 stored either in system memory 2416 or on disk storage 2424 . It is to be appreciated that one or more embodiments of the subject disclosure can be implemented with various operating systems or combinations of operating systems.
- Input devices 2436 include, but are not limited to, a pointing device such as a mouse, trackball, stylus, touch pad, keyboard, microphone, joystick, game pad, satellite dish, scanner, TV tuner card, digital camera, digital video camera, web camera, and the like. These and other input devices connect to the processing unit 2414 through the system bus 2418 via interface port(s) 2438 .
- Interface port(s) 2438 include, for example, a serial port, a parallel port, a game port, and a universal serial bus (USB).
- Output device(s) 2440 use some of the same type of ports as input device(s) 2436 .
- a USB port may be used to provide input to computer 2412 , and to output information from computer 2412 to an output device 2440 .
- Output adapters 2442 are provided to illustrate that there are some output devices 2440 like monitors, speakers, and printers, among other output devices 2440 , which require special adapters.
- the output adapters 2442 include, by way of illustration and not limitation, video and sound cards that provide a means of connection between the output device 2440 and the system bus 2418 . It should be noted that other devices and/or systems of devices provide both input and output capabilities such as remote computer(s) 2444 .
- Computer 2412 can operate in a networked environment using logical connections to one or more remote computers, such as remote computer(s) 2444 .
- the remote computer(s) 2444 can be a personal computer, a server, a router, a network PC, a workstation, a microprocessor based appliance, a peer device or other common network node and the like, and typically includes many or all of the elements described relative to computer 2412 .
- only a memory storage device 2446 is illustrated with remote computer(s) 2444 .
- Remote computer(s) 2444 is logically connected to computer 2412 through a network interface 2448 and then physically connected via communication connection 2450 .
- Network interface 2448 encompasses communication networks such as local-area networks (LAN) and wide-area networks (WAN).
- LAN technologies include Fiber Distributed Data Interface (FDDI), Copper Distributed Data Interface (CDDI), Ethernet/IEEE 802.3, Token Ring/IEEE 802.5 and the like.
- WAN technologies include, but are not limited to, point-to-point links, circuit switching networks like Integrated Services Digital Networks (ISDN) and variations thereon, packet switching networks, and Digital Subscriber Lines (DSL).
- ISDN Integrated Services Digital Networks
- DSL Digital Subscriber Lines
- Network interface 2448 can also encompass near field communication (NFC) or Bluetooth communication.
- Communication connection(s) 2450 refers to the hardware/software employed to connect the network interface 2448 to the system bus 2418 . While communication connection 2450 is shown for illustrative clarity inside computer 2412 , it can also be external to computer 2412 .
- the hardware/software necessary for connection to the network interface 2448 includes, for exemplary purposes only, internal and external technologies such as, modems including regular telephone grade modems, cable modems and DSL modems, ISDN adapters, and Ethernet cards.
- FIG. 25 is a schematic block diagram of a sample computing environment 2500 with which the disclosed subject matter can interact.
- the sample computing environment 2500 includes one or more client(s) 2502 .
- the client(s) 2502 can be hardware and/or software (e.g., threads, processes, computing devices).
- the sample computing environment 2500 also includes one or more server(s) 2504 .
- the server(s) 2504 can also be hardware and/or software (e.g., threads, processes, computing devices).
- the servers 2504 can house threads to perform transformations by employing one or more embodiments as described herein, for example.
- One possible communication between a client 2502 and servers 2504 can be in the form of a data packet adapted to be transmitted between two or more computer processes.
- the sample computing environment 2500 includes a communication framework 2506 that can be employed to facilitate communications between the client(s) 2502 and the server(s) 2504 .
- the client(s) 2502 are operably connected to one or more client data store(s) 2508 that can be employed to store information local to the client(s) 2502 .
- the server(s) 2504 are operably connected to one or more server data store(s) 2510 that can be employed to store information local to the servers 2504 .
- the terms (including a reference to a “means”) used to describe such components are intended to correspond, unless otherwise indicated, to any component which performs the specified function of the described component (e.g., a functional equivalent), even though not structurally equivalent to the disclosed structure, which performs the function in the herein illustrated exemplary aspects of the disclosed subject matter.
- the disclosed subject matter includes a system as well as a computer-readable medium having computer-executable instructions for performing the acts and/or events of the various methods of the disclosed subject matter.
- exemplary is used to mean serving as an example, instance, or illustration. Any aspect or design described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other aspects or designs. Rather, use of the word exemplary is intended to present concepts in a concrete fashion.
- Computer readable media can include but are not limited to magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips . . . ), optical disks [e.g., compact disk (CD), digital versatile disk (DVD) . . . ], smart cards, and flash memory devices (e.g., card, stick, key drive . . . ).
- magnetic storage devices e.g., hard disk, floppy disk, magnetic strips . . .
- optical disks e.g., compact disk (CD), digital versatile disk (DVD) . . .
- smart cards e.g., card, stick, key drive . . .
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Manufacturing & Machinery (AREA)
- Automation & Control Theory (AREA)
- Data Mining & Analysis (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Quality & Reliability (AREA)
- Geometry (AREA)
- Human Computer Interaction (AREA)
- Computational Linguistics (AREA)
- Computer Hardware Design (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
- This application claims priority to U.S. Provisional Application Ser. No. 62/665,864, filed on May 2, 2018, entitled “INDUSTRIAL BLOCKCHAINS FOR MANAGEMENT, USE, AND CONTROL OF MANUFACTURING AND SUPPLY CHAIN INFORMATION,” the entirety of which is incorporated herein by reference.
- The subject matter disclosed herein relates generally to industrial automation systems, and, more particularly, to storage, management, and distribution of manufacturing and supply chain data
- The following presents a simplified summary in order to provide a basic understanding of some aspects described herein. This summary is not an extensive overview nor is intended to identify key/critical elements or to delineate the scope of the various aspects described herein. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is presented later.
- In one or more embodiments, a system is provided, comprising a blockchain search and management component configured to search industrial blockchains that encode manufacturing data associated with a product, wherein the industrial blockchains comprise a first subset of the industrial blockchains that record first data defined to be viewable by first parties and a second subset of the industrial blockchains that record second data defined to be viewable by second parties; and an interface component configured to receive a user identifier and a request for a subset of the manufacturing data encoded in the industrial blockchains, wherein the blockchain search and management component is further configured to, in response to a determination that the user identifier has permission to access the subset of the manufacturing data, retrieve the subset of the manufacturing data from one of the first subset of the industrial blockchains or the second subset of the industrial blockchains selected based on a defined hierarchy of access privileges, and the interface component is further configured to render the subset of the manufacturing data on a client device associated with the user identifier.
- Also, one or more embodiments provide a method, comprising receiving, by a system comprising a processor, request data specifying a user identifier and a request for subset of supply chain information relating to a product; in response to determining that the user identifier is permitted access to the subset of the supply chain information, retrieving, by the system, the subset of the supply chain information from a first subset of industrial blockchains or a second subset of the industrial blockchains selected based on a defined hierarchy of access privileges, wherein the industrial blockchains encode the supply chain information associated with the product, the first subset of the industrial blockchains comprise first information, of the supply chain information, defined to be viewable by first parties, and the second subset of the industrial blockchains comprise second information, of the supply chain information, defined to be viewable by second parties; and rendering, by the system, the subset of the supply chain information on a client device associated with the user identifier.
- Also, according to one or more embodiments, a non-transitory computer-readable medium is provided having stored thereon instructions that, in response to execution, cause a system comprising a processor to perform operations, the operations comprising, receiving request data specifying a user identifier and a request for a subset of manufacturing information relating to a product; in response to determining that the user identifier is permitted access to the subset of the manufacturing information, retrieving, by the system, the subset of the manufacturing information from a first subset of industrial blockchains or a second subset of the industrial blockchains selected based on a defined hierarchy of access privileges; wherein the industrial blockchains encode the manufacturing information associated with the product, the first subset of the industrial blockchains comprise first information, of the manufacturing information, defined to be viewable by a first party, and the second subset of the industrial blockchains comprise second information, of the manufacturing information, defined to be viewable by a second party; and rendering the subset of the manufacturing information on a client device associated with the user identifier.
- To the accomplishment of the foregoing and related ends, certain illustrative aspects are described herein in connection with the following description and the annexed drawings. These aspects are indicative of various ways which can be practiced, all of which are intended to be covered herein. Other advantages and novel features may become apparent from the following detailed description when considered in conjunction with the drawings.
-
FIG. 1 is a block diagram of an example industrial control environment. -
FIG. 2 is a generalized high-level diagram illustrating the relationship between blockchain technology and applications that can leverage blockchains. -
FIG. 3 is a graphic illustrating a centralized model for accessing and modifying data. -
FIG. 4 is a graphic illustrating a decentralized model for accessing and modifying data. -
FIG. 5 is a graphic illustrating an example blockchain architecture. -
FIG. 6 is a diagram illustrating a general architecture of a blockchain. -
FIG. 7 is a diagram illustrating a generalized architecture of an example blockchain platform. -
FIG. 8 is a generalized diagram illustrating creation of blocks and validation of blocks via consensus-based validation. -
FIG. 9 is a generalized diagram illustrating implementation of smart contracts within a blockchain-driven system. -
FIG. 10 is a high-level overview of entities and enterprises within an industrial supply and distribution chain within which industrial-specific blockchains can be utilized. -
FIG. 11 is a block diagram of an example blockchain-enabled industrial device. -
FIG. 12 is a diagram illustrating configuration of an example blockchain-enabled industrial controller. -
FIG. 13 is a diagram illustrating operation of an example blockchain-enabled industrial controller during runtime. -
FIG. 14 is a diagram illustrating example inputs to the industrial blockchain engine and example outputs generated by the blockchain engine. -
FIG. 15 is a diagram of example blockchain-enabled industrial controller in which hardware and processing resources for carrying out industrial blockchain functions are segregated from processing resources that carry out the controller's primary control functionality. -
FIG. 16 is a diagram of an example ledger entry that can be added to an industrial device's ledger by a proof engine component. -
FIG. 17 is a diagram of an example industrial blockchain network architecture. -
FIG. 18 is a diagram of an example blockchain-enabled industrial controller illustrating generation of public and private blockchains. -
FIG. 19 is a diagram illustrating segregation of private and public blockchain information in an example industrial blockchain ecosystem. -
FIG. 20 is a diagram illustrating generation of blockchain data within a plant intranet. -
FIG. 21 is a diagram illustrating an example, high-level architecture for accessing blockchain information for a manufactured product using a mobile user interface application installed on a mobile device. -
FIG. 22 is a flowchart of an example methodology for aggregating industrial blockchains in connection with manufacture of a composite product. -
FIG. 23 is a flowchart of an example methodology for generating industrial blockchains having multiple levels of access permission. -
FIG. 24 is an example computing environment. -
FIG. 25 is an example networking environment. - The subject disclosure is now described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding thereof. It may be evident, however, that the subject disclosure can be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate a description thereof.
- As used in this application, the terms “component,” “system,” “platform,” “layer,” “controller,” “terminal,” “station,” “node,” “interface” are intended to refer to a computer-related entity or an entity related to, or that is part of, an operational apparatus with one or more specific functionalities, wherein such entities can be either hardware, a combination of hardware and software, software, or software in execution. For example, a component can be, but is not limited to being, a process running on a processor, a processor, a hard disk drive, multiple storage drives (of optical or magnetic storage medium) including affixed (e.g., screwed or bolted) or removable affixed solid-state storage drives; an object; an executable; a thread of execution; a computer-executable program, and/or a computer. By way of illustration, both an application running on a server and the server can be a component. One or more components can reside within a process and/or thread of execution, and a component can be localized on one computer and/or distributed between two or more computers. Also, components as described herein can execute from various computer readable storage media having various data structures stored thereon. The components may communicate via local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems via the signal). As another example, a component can be an apparatus with specific functionality provided by mechanical parts operated by electric or electronic circuitry which is operated by a software or a firmware application executed by a processor, wherein the processor can be internal or external to the apparatus and executes at least a part of the software or firmware application. As yet another example, a component can be an apparatus that provides specific functionality through electronic components without mechanical parts, the electronic components can include a processor therein to execute software or firmware that provides at least in part the functionality of the electronic components. As further yet another example, interface(s) can include input/output (I/O) components as well as associated processor, application, or Application Programming Interface (API) components. While the foregoing examples are directed to aspects of a component, the exemplified aspects or features also apply to a system, platform, interface, layer, controller, terminal, and the like.
- As used herein, the terms “to infer” and “inference” refer generally to the process of reasoning about or inferring states of the system, environment, and/or user from a set of observations as captured via events and/or data. Inference can be employed to identify a specific context or action, or can generate a probability distribution over states, for example. The inference can be probabilistic—that is, the computation of a probability distribution over states of interest based on a consideration of data and events. Inference can also refer to techniques employed for composing higher-level events from a set of events and/or data. Such inference results in the construction of new events or actions from a set of observed events and/or stored event data, whether or not the events are correlated in close temporal proximity, and whether the events and data come from one or several event and data sources.
- In addition, the term “or” is intended to mean an inclusive “or” rather than an exclusive “or.” That is, unless specified otherwise, or clear from the context, the phrase “X employs A or B” is intended to mean any of the natural inclusive permutations. That is, the phrase “X employs A or B” is satisfied by any of the following instances: X employs A; X employs B; or X employs both A and B. In addition, the articles “a” and “an” as used in this application and the appended claims should generally be construed to mean “one or more” unless specified otherwise or clear from the context to be directed to a singular form.
- Furthermore, the term “set” as employed herein excludes the empty set; e.g., the set with no elements therein. Thus, a “set” in the subject disclosure includes one or more elements or entities. As an illustration, a set of controllers includes one or more controllers; a set of data resources includes one or more data resources; etc. Likewise, the term “group” as utilized herein refers to a collection of one or more entities; e.g., a group of nodes refers to one or more nodes.
- Various aspects or features will be presented in terms of systems that may include a number of devices, components, modules, and the like. It is to be understood and appreciated that the various systems may include additional devices, components, modules, etc. and/or may not include all of the devices, components, modules etc. discussed in connection with the figures. A combination of these approaches also can be used.
- Industrial controllers and their associated I/O devices are central to the operation of modern automation systems. These controllers interact with field devices on the plant floor to control automated processes relating to such objectives as product manufacture, material handling, batch processing, supervisory control, and other such applications. Industrial controllers store and execute user-defined control programs to effect decision-making in connection with the controlled process. Such programs can include, but are not limited to, ladder logic, sequential function charts, function block diagrams, structured text, or other such platforms.
-
FIG. 1 is a block diagram of an exampleindustrial control environment 100. In this example, a number of industrial controllers 118 are deployed throughout an industrial plant environment to monitor and control respective industrial systems or processes relating to product manufacture, machining, motion control, batch processing, material handling, or other such industrial functions. Industrial controllers 118 typically execute respective control programs to facilitate monitoring and control ofindustrial devices 120 making up the controlled industrial assets or systems (e.g., industrial machines). One or more industrial controllers 118 may also comprise a soft controller executed on a personal computer or other hardware platform, or on a cloud platform. Some hybrid devices may also combine controller functionality with other functions (e.g., visualization). The control programs executed by industrial controllers 118 can comprise any conceivable type of code used to process input signals read from theindustrial devices 120 and to control output signals generated by the industrial controllers, including but not limited to ladder logic, sequential function charts, function block diagrams, or structured text. These programs can be developed and downloaded to the controllers 118 using asuitable client device 124 executing a controller configuration application. -
Industrial devices 120 may include both input devices that generate data relating to the controlled industrial systems to the industrial controllers 118, and output devices that respond to control signals generated by the industrial controllers 118 to control aspects of the industrial systems. Example input devices can include, but are not limited to, telemetry devices (e.g., temperature sensors, flow meters, level sensors, pressure sensors, etc.), manual operator control devices (e.g., push buttons, selector switches, etc.), safety monitoring devices (e.g., safety mats, safety pull cords, light curtains, etc.), and other such devices. Output devices may include motor drives, pneumatic actuators, signaling devices, robot control inputs, valves, and the like. - Industrial controllers 118 may communicatively interface with
industrial devices 120 over hardwired or networked connections. For example, industrial controllers 118 can be equipped with native hardwired inputs and outputs that communicate with theindustrial devices 120 to effect control of the devices. The native controller I/O can include digital I/O that transmits and receives discrete voltage signals to and from the field devices, or analog I/O that transmits and receives analog voltage or current signals to and from the devices. The controller I/O can communicate with a controller's processor over a backplane such that the digital and analog signals can be read into and controlled by the control programs. Industrial controllers 118 can also communicate withindustrial devices 120 over a network using, for example, a communication module or an integrated networking port. Exemplary networks can include the Internet, intranets, Ethernet, DeviceNet, ControlNet, Data Highway and Data Highway Plus (DH/DH+), Remote I/O, Fieldbus, Modbus, Profibus, wireless networks, serial protocols, and the like. The industrial controllers 118 can also store persisted data values that can be referenced by the control program and used for control decisions, including but not limited to measured or calculated values representing operational states of a controlled machine or process (e.g., tank levels, positions, alarms, etc.) or captured time series data that is collected during operation of the automation system (e.g., status information for multiple points in time, diagnostic occurrences, etc.). Similarly, some intelligent devices—including but not limited to motor drives, instruments, or condition monitoring modules—may store data values that are used for control and/or to visualize states of operation. Such devices may also capture time-series data or events on a log for later retrieval and viewing. - Industrial automation systems often include one or more human-machine interfaces (HMIs) 114 that allow plant personnel to view telemetry and status data associated with the automation systems, and to control some aspects of system operation.
HMIs 114 may communicate with one or more of the industrial controllers 118 over aplant network 116, and exchange data with the industrial controllers to facilitate visualization of information relating to the controlled industrial processes on one or more pre-developed operator interface screens.HMIs 114 can also be configured to allow operators to submit data to specified data tags or memory addresses of the industrial controllers 118, thereby providing a means for operators to issue commands to the controlled systems (e.g., cycle start commands, device actuation commands, etc.), to modify setpoint values, etc.HMIs 114 can generate one or more display screens through which the operator interacts with the industrial controllers 118, and thereby with the controlled processes and/or systems. Example display screens can visualize present states of industrial systems or their associated devices using graphical representations of the processes that display metered or calculated values, employ color or position animations based on state, render alarm notifications, or employ other such techniques for presenting relevant data to the operator. Data presented in this manner is read from industrial controllers 118 byHMIs 114 and presented on one or more of the display screens according to display formats chosen by the HMI developer. HMIs may comprise fixed location or mobile devices with either user-installed or pre-installed operating systems, and either user-installed or pre-installed graphical application software. - Some industrial environments may also include other systems or devices relating to specific aspects of the controlled industrial systems. These may include, for example, a
data historian 110 that aggregates and stores production information collected from the industrial controllers 118 or other data sources, enterprise resource planning (ERP) and/or manufacturing execution (MES)systems 104, workorder management systems 106, or electronic device documentation stores containing electronic documentation for the various industrial devices making up the controlled industrial systems, repositories for machine or process drawings and documentation, vendor product documentation storage, vendor knowledgebases, internal knowledgebases, work scheduling applications, or other such systems, some or all of which may reside on anoffice network 108 of the industrial environment. - The industrial assets that make up a given facility—including industrial controllers 118, their associated
industrial devices 120,HMIs 114, peripheral systems such as ERP systems, etc.—can generate large amounts of data during plant operation. Much of this information is tracked and recorded by various means in order to document the various manufacturing processes carried out by the assets. For example, data historians, data warehouses, or MES systems are often used to collect and archive manufacturing data generated by the industrial assets. This archived data can be leveraged to track production statistics, equipment health statistics, asset lifecycle management, inventory, key performance indicators (KPIs), power consumption, or other such factors. - The supply, manufacturing, and distribution chain for a manufactured product extends well beyond the boundaries of a single industrial facility, and crosses boundaries between several interconnected but substantially independent entities. For example, an industrial enterprise (which may comprise one or more manufacturing and warehouse facilities under a common ownership) may receive materials or component parts from one or more supplier entities that produce the materials or parts. The enterprise may also purchase industrial assets (e.g., custom-built machines, motor control cabinets, etc.) from one or more original equipment manufacturers (OEMs). Manufactured products are sold and distributed via retail outlets that may be owned and operated by entities who are independent from the industrial enterprise. While these independent entities may collect and track data generated within their own boundaries, as participants in a common supply chain these various entities may benefit from selective sharing of their collected data. Reliable and trusted sharing of data can be particularly crucial if business contracts between the entities are in place, since this shared information can ensure that the terms of the contracts are being satisfied. However, since each entity's data is typically collected and stored locally (or on protected remote storage, such as a proprietary cloud-based storage platform), shared data owned by one of the entities may not be easily and readily accessible by third parties, and trustworthiness of the shared data may be a concern.
- Moreover, even within the confines of a single industrial enterprise, information may be collected and tracked using separate (and possibly disparate) systems, and under different data formats, for different production areas or departments. Aggregating this segregated data into a common presentation that yields greater insight into manufacturing or business operations can be difficult, requiring normalization of the disparate information, time synchronization between the items of data, etc.
- To address these and other issues, one or more embodiments described herein relate to the use of blockchain platforms within an industrial facility as well as throughout a supply, manufacturing, and distribution chain. In one or more embodiments, industrial devices such as industrial controllers (e.g., PLCs or other types of automation controllers), motor drives, HMI terminals, telemetry devices, and other such devices are configured to support a number of industrial blockchain functions. Collections of these blockchain-enabled industrial devices can be networked to form an industrial blockchain system in which the collection of devices capture manufacturing events as transactions, which are verified using consensus-based techniques and added to an industrial blockchain associated with the product being manufactured. This creates a tamper-proof record of relevant manufacturing statistics for the product.
- Blockchain-enabled industrial devices can create multiple versions of such industrial blockchains associated with respective different levels of access permissions, including public blockchains that allow all participants within an industrial blockchain ecosystem to view information relating to the product as well as private or semi-public blockchains that can only be shared with selected members of the industrial blockchain ecosystem. This can allow information regarding a manufactured product to be reliably recorded in a distributed, decentralized, tamper-proof ledger that maintains both private information for exclusive use within a plant facility as well as public or semi-public information regarding the product's path through the larger supply chain. In another example implementation, industrial blockchains and associated smart contracts can be used to track machine usage and operating statistics in connection with subscription-based machine operation or maintenance management. Other example systems that leverage industrial blockchains will also be described herein.
- A general, high-level overview of blockchain technology is provided as a precursor to discussing the industrial-specific applications of blockchain technology discussed herein.
FIG. 2 is a generalized high-level diagram illustrating the relationship between blockchain technology andapplications 202 that can leverage blockchains. In general, blockchain is a foundational technology upon which applications can be built to leverage the technology. Digital currency such as Bitcoin is an example application that uses a public blockchain to act as a distributed ledger in a peer-to-peer network. Blockchain technology is also used to implement smart contracts, which allow a set of contractual rules to be programmed and enforced by a network of peer-to-peer devices without requiring a third-party mediator or broker. As will be discussed in more detail herein, one or more embodiments of the present disclosure can include industrial devices and applications that leverage blockchain technology to perform supply chain tracking, verify product compliance, perform identity management, monitor and record information relating to local manufacturing operations within a single facility (e.g., within the bounds of the plant's intranet), or other such industrial functions. - Blockchain-based platforms can provide access to data from multiple parties in a decentralized manner, in contrast to platforms that share data using a centralized model.
FIG. 3 is a graphic illustrating a centralized model for accessing and modifying data. According to this centralized model, there is a single “golden copy” 302 of the data being viewed and acted upon by one or more entities 304 (e.g., systems running applications that leverage the data represented by thegolden copy 302, client devices operated by respective users, etc.). Any of the entities 304 can copy data maintained on thegolden copy 302 as a whole or in part. Thisgolden copy 302 of the data model is updated by commanding state changes to the model (an example technique for communicating state changes of objects between components is described in U.S. Pat. No. 9,864,365, which is incorporated herein by reference). These state change instructions are referred to herein as “actions” 306. Copies and views of thegolden copy 302 remain synchronized by observing changes to thegolden copy 302 of the model. These observed changes are referred to herein as “reactions” 308. Table 314 represents a set of actions performed on the data and corresponding observed reactions accumulated as a result of the actions. The collection ofactions 306 andreactions 308 can be viewed as a set of changes ordeltas 310 ordered by time, as represented by table 312. This set ofdeltas 310 can be “played back” by any number of entities to obtain the same consistent data model, with thegolden copy 302 being the model that is trusted by everyone. - By contrast, blockchain-driven platforms decentralize the data model, eliminating the need to maintain a
golden copy 302 or distributing the multiple coordinated versions of the truth.FIG. 4 is a graphic illustrating a decentralized model. In a decentralized model, allentities 406 that interact with the data have a copy of the data, and all entities work to keep the data model's transactions ordered and consistent.Blocks 404 of changes to the data are recorded as a transaction. A distributedledger 402 of all these changes is maintained by all entities 406 (or nodes) that participate in the platform. If allentities 406 apply the changes to their own copy of the data then the copies remain consistent across theentities 406 without the need for a single golden copy. Each entity maintains a copy of theledger 402, which represents a continuous chain of transaction blocks 404, hence the term “blockchain.” When a transaction is performed on the data by one of theentities 406, allentities 406 process the transaction and make a determination regarding the validity of the transaction. If a consensus among theentities 406 is reached regarding the transaction's validity, each entity updates its copy of theledger 402 accordingly. - A blockchain consists of a data structure that orders blocks and links the blocks cryptographically, thereby acting as an immutable, verifiable, distributed ledger. Blockchains require no central authority; instead, trust is established and enforced cryptographically, with participating nodes (e.g., devices associated with entities 406) acting as a consortium and voting on the validity of a block using a consensus mechanism to manage the distributed ledger.
FIG. 5 is a graphic illustrating a blockchain architecture. Blockchains are a linkedhierarchical list 502 of transaction blocks 404, where chains of related, linked transaction blocks 404 within the hierarchy (e.g., chain 504) stem from aninitial genesis block 506. Eachblock 404 has a cryptographic identity, which is calculated by theheader data 508 in the block. Eachblock 404 contains the hash of the previous block in the chain. -
FIG. 6 is a diagram illustrating a general architecture of an example blockchain. Data 610 associated with the block's transactions is hashed, and the collection of transaction data 610 and their associated hashes 608 create aMerkle tree 606 of hashes 608 (only two items of data 610 are shown inFIG. 6 for clarity; however, ablock 404 may be associated with more than two transactions). In the illustrated example, eachdata item hashes hash value 602 at the next higher level in the Merkle tree hierarchy. Hash values at a given level of the Merkle tree may be combined with other hash values on that level to yield hash values at the next higher level until the top of the Merkle tree hierarchy is reached. - The
Merkle tree 606 is stored separately from theblock 404, and only the root fingerprint 612 (the top hash) is stored in theblock 404. Eachblock 404 also contains ahash 604 of the content of the immediately preceding block in the chain. For eachblock 404, the Merkle tree of hashes 608 and thehash 604 of the previous block in the chain are used to create thehash 602 for the block. The data 610 is stored in theMerkle tree 606 separately from theblock 404, with theroot fingerprint 612 being the only part of theMerkle tree 606 stored in theblock 404. This nesting of cryptographic hash values yields a digital fingerprint that renders unauthorized tampering difficult. Compounded with the chaining of transaction blocks 404, the blockchain becomes increasingly difficult to hack, producing a level of trustworthiness that increases over time. Improperly modifying ablock 404 would require tampering with the entire transaction history, rendering tampering nearly impossible. In this way, a verifiable, tamper-proof ledger of transactions can be efficiently maintained. -
FIG. 7 is a diagram illustrating a generalized architecture of a blockchain platform. The core blockchain functionality 702 (the blockchain creation and management features described above) is implemented on anetwork 704 of participating devices or nodes (e.g., entities 406). The core blockchain ledger is distributed throughout the network, and is independently validated by network members. In a public model, thenetwork 704 is purely peer-to-peer with no central trust authority. Instead of a central trust authority, network peers are responsible for validation and decentralized consensus for acceptance of new transactions (that is,new blocks 404 representing new transactions) into the blockchain. Public blockchains are secured by the amount of work required to create anew block 404. This proof-of-work model can prevent network peers from improperly hijacking or tampering with the blockchain. Private blockchain models—including blockchain applications used within an industrial facility as will be described herein—can employ a central authority to manage the ledger, user identities, and creation of new blocks. -
Applications 706 that employ blockchains are constructed on top of the network layer, which exposes the core blockchain functions. Participants in the network 704 (the peer devices) are uniquely identified with digital signatures granted by the network. Participant identities may be anonymous depending on the type of blockchain network model (e.g., public or private). In all cases, transactions are published, visible, and verifiable on the blockchain. -
FIG. 8 is a generalized diagram illustrating creation of blocks and validation of blocks via consensus-based validation.Single transactions 804 performed by entities 406 (participants in the blockchain network) are gathered intoblocks 806 by programmatic components executing on theentities 406 referred to as “miners” 802.Miners 802 possess the entire Merkle tree for the gathered transactions and compete to build a valid block out of the Merkle tree. Thefirst miner 802 to create a block is rewarded. The block is then validated by theother entities 406 based on the hashes. If valid, the block is added to theblockchain 808. - Since these
blocks 806 are created and validated in parallel, different versions of the truth can be generated. In these cases, the peers (entities 406) vote on which block should be used. Regardless of the final set of blocks, all choices are most likely valid. The participants in the blockchain network can validate transactions and reject invalid or nefarious transactions 810 (e.g., spending the same money twice in the case of digital currency applications). The system is ultimately consistent and valid. - Some blockchain platforms are also capable of implementing and enforcing smart contracts, which define rules or agreements between participants in the blockchain network.
FIG. 9 is a generalized diagram illustrating implementation of smart contracts within a blockchain-driven system. In general, smart contracts are sets oflogic 902 that execute on the blockchain and generate new types of transactions in accordance with rules defined by the logic. Thesmart contract logic 902 is executed by the participants of the blockchain. When asmart contract transaction 904 is generated, thelogic 902 executes on thetransaction 904 and may create severalnew transactions 906 designed to satisfy the contract. On the Ethereum platform, units of processing “fees” must be provided by an initiator of a smart contract transaction in order to execute the transaction. On the Ethereum platform, these fees are referred to as Ether or “gas.” The amount of gas required to execute a transaction is generally proportional to the amount of work required to execute the transaction. The more complex the transaction, the more gas must be spent to execute the transaction. These processing “fees” can be used to prioritize transactions based on relative values of the transactions, and can also protect against Denial of Service attacks (e.g., attacks that place the contract's logic in an infinite loop). Work on selected transactions can be prioritized by assigning extra gas to the transactions. - Various embodiments described herein leverage aspects of blockchain platforms within the context of industrial facilities, industrial enterprises, and manufacturing and distribution supply chains. To this end, industrial devices such as industrial controllers, motor drives, data historians, telemetry devices, HMIs, and other such industrial devices are configured to support creation, validation, and sharing of blockchains.
FIG. 10 is a high-level overview of entities and enterprises within an industrial supply and distribution chain within which industrial-specific blockchains can be utilized. In general, blockchain-enabled industrial devices can utilize blockchain technology in connection with such tasks as asset and product lifecycle management within afactory 1002; device, machine, line, or factory configuration integrity tracking; regulatory compliance verification; auditing of lock out/tag out safety procedures within thefactory 1002; customer/partner entitlements management, management and tracking ofsupply chains 1004 across enterprise boundaries; inventory management across a supply chain; contracts management; tracking of manufactured products across enterprises of a supply chain or within afactory 1002; or other applications to be discussed herein. - The use of blockchains between industrial enterprises can also open the possibility of subscription-based serves between
OEMs 1006 and owners offactories 1002, or between a manufacturing entity and its customers. Blockchains can also be used to track manufactured products to theend consumers 1008, and public blockchain data generated by a product's traversal through the manufacturing and supply chain can be accessed byconsumers 1008 to obtain information about their purchased products. Adevice vendor 1010 can manufacture and provide blockchain-enabled industrial devices that are used withinindustrial factories 1002,OEM facilities 1006, and other enterprises to facilitate blockchain-driven industrial applications. Thedevice vendor 1010 can also act as a trust authority for blockchain-driven systems that are implemented by the blockchain-enabled industrial devices. Robust identity management for organizations, people, and products that participate in an industrial blockchain system can ensure the trustworthiness of the participants and the blockchain data. Both public and private blockchain models can be implemented depending on the needs of the industrial application using the platform. -
FIG. 11 is a block diagram of an example blockchain-enabledindustrial device 1102 according to one or more embodiments of this disclosure. Aspects of the systems, apparatuses, or processes explained in this disclosure can constitute machine-executable components embodied within machine(s), e.g., embodied in one or more computer-readable mediums (or media) associated with one or more machines. Such components, when executed by one or more machines, e.g., computer(s), computing device(s), automation device(s), virtual machine(s), etc., can cause the machine(s) to perform the operations described. In some embodiments, one or more of the machine-executable components can also be embodied on silicon chips or other microprocessing platforms. - Blockchain-enabled
industrial device 1102 can comprise substantially any type of data-generating industrial device, including but not limited to an industrial controller, a motor drive, an HMI terminal, a vision system, an industrial optical scanner, a meter, a telemetry device, an industrial safety device, a safety relay, a barcode stamper, an ERP server, an MES server, an industrial Internet of Things (IIoT) device, or other such device or system.Industrial device 1102 can include aproof engine component 1104, acryptographic component 1106, ahashing component 1108, aninstruction execution component 1110, auser interface component 1112, one ormore processors 1116, andmemory 1118. In various embodiments, one or more of theproof engine component 1104, acryptographic component 1106, ahashing component 1108, aninstruction execution component 1110, auser interface component 1112, the one ormore processors 1116, andmemory 1118 can be electrically and/or communicatively coupled to one another to perform one or more of the functions of the blockchain-enabledindustrial device 1102. In some embodiments,components memory 1118 and executed by processor(s) 1116. Blockchain-enabledindustrial device 1102 may also interact with other hardware and/or software components not depicted inFIG. 11 . For example, processor(s) 1116 may interact with one or more external user interface devices, such as a keyboard, a mouse, a display monitor, a touchscreen, or other such interface devices. -
Proof engine component 1104 can be configured to validate industrial or supply chain transactions for inclusion in a new block of an industrial blockchain in accordance with a blockchain instruction.Cryptographic component 1106 can be configured to encrypt and decrypt transaction data, recipe data, or other information exchanged with other blockchain-enabled industrial devices within a blockchain system or ecosystem. In some embodiments,cryptographic component 1106 can leverageprivate keys 1122 andpublic keys 1124 in connection with encryption and decryption of blockchain information.Hashing component 1108 can be configured to hash transaction data and generate Merkle trees in accordance with a blockchain instruction.Instruction execution component 1110 can be configured to execute industrial blockchain instructions that create blocks representing transactions received or executed by the blockchain-enabledindustrial device 1102, add the blocks to industrial blockchains maintained on thedevice 1102, and update the device'sblockchain ledger 1126. -
User interface component 1112 can be configured to receive user input and to render output to the user in any suitable format (e.g., visual, audio, tactile, etc.). In some embodiments,user interface component 1112 can be configured to communicatively interface with a development application that executes on a client device (e.g., a laptop computer, tablet computer, smart phone, etc.) that is communicatively connected to the blockchain-enabled industrial device 1102 (e.g., via a hardwired or wireless connection). Theuser interface component 1112 can then receive user input data and render output data via the development application. In other embodiments,user interface component 1112 can be configured to generate and serve suitable graphical interface screens to a client device, and exchange data via these graphical interface screens. Input data that can be received viauser interface component 1112 can include, but is not limited to, user-defined control programs or routines that include industrial blockchain instructions, blockchain configuration parameters (which may be provided as configuration parameters of the blockchain instructions), or other such data. - The one or
more processors 1116 can perform one or more of the functions described herein with reference to the systems and/or methods disclosed.Memory 1118 can be a computer-readable storage medium storing computer-executable instructions and/or information for performing the functions described herein with reference to the systems and/or methods disclosed. As will be described in more detail below, processor(s) 1116 andmemory 1118 may be segregated from the primary memory that performs the device's real-time control functions. Collectively, components 1104-1112 described above (or a subset thereof) can be viewed as ablockchain engine 1128 that supplements an industrial device's native functionality with blockchain-related functionality, as will be described in more detail below. - In various embodiments, industrial devices such as industrial controllers, motor drives, HMI terminals, industrial appliances, industrial Internet of Things (IIoT) devices, and other such devices are provided with integrated blockchain creation, validation, sharing, and management functionalities. In some embodiments, aspects of these blockchain functions can be configured by the device owner.
FIG. 12 is a diagram illustrating configuration of a blockchain-enabledindustrial controller 1210, which may be a hardware controller, a soft controller, a cloud-based controller or other type of industrial controller. Although the example illustrated inFIG. 12 depicts anindustrial controller 1210 as the blockchain-enabled device, it is to be appreciated that industrial blockchain functionality is not limited to implementation on industrial controllers. Blockchain-enabledindustrial controller 1210 can be configured using a suitable device configuration application 1208 (e.g., a ladder logic development application) that executes on a client device 1206 (e.g., a laptop computer, a desktop computer, a tablet computer, a human-machine interface terminal, etc.). Usingdevice configuration application 1208, a user can develop and download a control program 1204 (e.g., a ladder logic program, a sequential function chart program, function block diagrams, structured text, etc.) to thecontroller 1210, as well as configure the controller's I/O modules and individual I/O parameters, networking parameters, and other such configurable features. -
Device configuration application 1208 also supports inclusion ofconfigurable blockchain instructions 1202 within thecontrol program 1204 for execution by theindustrial controller 1210. Eachblockchain instruction 1202 added to thecontrol program 1204 can have an associated set ofinstruction parameters 1212 that can be configured by the user via thedevice configuration application 1208.Example instruction parameters 1212 for anindustrial blockchain instruction 1202 can include, but are not limited to, production parameters of a manufactured product for which a blockchain is to be created, prior blockchain information that is expected to be received from other entities that participate in the blockchain (e.g., other controllers or industrial devices within the plant, outside entities that participate in a supply or manufacturing chain such as OEMs or part suppliers, etc.), supplier entities that provide materials or components for the manufactured product (if the supplier does not provide its own blockchain from which this information can be derived), an expiration time or expiration event for the blockchain defining a time that the blockchain can be deleted (in scenarios in which the blockchain only has utility for a limited time during production and can therefore be transient rather than persistent), or other such configuration aspects. In general,blockchain instruction 1202, when executed by the controller's instruction execution component 1110 (which may be part of the controller'sprogram execution component 1306 in some embodiments; seeFIG. 13 ), can create a block representing a number of transactions received or executed by thecontroller 1210, and add the block to an existing internal blockchain maintained on thecontroller 1210 or send the block to another node device in the production line or supply chain. - To simplify configuration of industrial devices to manage blockchains,
device configuration application 1208 can include a library of code specific to blockchain creation and management by industrial devices. Such libraries can include sets of blockchain instructions that are specific to defined industries, verticals, or industrial applications. For example, a Brew software library may include blockchain instructions specific to brewery systems. These industry- or application-specific blockchain instructions can set the root of the blockchain based on the selected industry or vertical and auto-generate code for configuring the blockchain in accordance with common standards used within the selected industry. Other user-configurable instruction parameters of these industry-specific blockchain instructions may allow the developer to specify parameters of their specific application (e.g., the number of brewing vats being used) that may vary across different implementations. - In some embodiments,
device configuration application 1208 can allow users to configure blockchains to be generated by a blockchain-enabled device 1102 (e.g.,controller 1210 or another type of industrial device) using unified modeling language (UML) diagrams or other interfaces for creating linkages and defining hierarchies. A blockchain editor ofdevice configuration application 1208 can allow the user to define dependency diagrams that include automation objects maintained in the blockchain-enabledindustrial device 1102. Each automation object defines the data and behavior of its associated device or data object, and can be set to be either public or private via the blockchain editor. The editor can display all available automation objects supported by theindustrial device 1102 and let the user check the objects to be included in the blockchain. In some embodiments, the blockchain editor can also allow dependency diagrams to be drawn to define reliance between objects. Inheritance rules can be leveraged for automation objects to automatically determine parents. The editor can also allow users to define whether an automation object is to be traced or untraced, where setting an object to be traced makes the object the root of the blockchain, and multiple traced automation objects yield a hierarchy of dependencies. In this way, industrial automation blockchains can be defined without requiring complicated programmingDevice configuration application 1208 can also include a template editor that can be used to define smart contracts to be enforced by the blockchain. - A blockchain tester or simulator can also be used to verify operation of the industrial blockchain before deployment. In an example scenario, an OEM may simulate a blockchain associated with their machine before shipping the machine to a customer (e.g., a manufacturing entity). In such scenarios, the blockchain can be run on the OEM's local network to confirm that the blocks are generated correctly.
-
FIG. 13 is a diagram illustrating operation of the blockchain-enabledindustrial controller 1210 during runtime. As noted above, one or more blockchain-enabling components of controller 1210 (e.g., components 1104-1110 described above in connection withFIG. 11 ) can implement ablockchain engine 1128 on thecontroller 1210 that supplements the controller's native functionality (e.g., execution of industrial control programs and associated I/O control in the case of industrial controllers) with blockchain-related functionality. In various embodiments,blockchain engine 1128 can be implemented as a special-purpose chip, a firmware module embedded in the blockchain-enabledindustrial controller 1210, a component built into the hardware design, a software module executing in an open operating system, or another implementation. - Blockchain-enabled
industrial controller 1210 includes aprogram execution component 1306 that executes acontrol program 1204, which was developed and installed on thecontroller 1210 as described above in connection withFIG. 12 . As noted above,control program 1204 can include one ormore blockchain instructions 1202 that facilitate creation of transaction blocks and management of industrial blockchains that include these blocks. - To facilitate monitoring and control of an industrial machine, system, or
process 1320 during runtime,controller 1210 receives input signals 1312 from one or more industrial input devices 1316 (e.g., sensors, telemetry devices, etc.) via the controller's analog and/or digital I/O 1308, andprogram execution component 1306 generates analog and/ordigital control outputs 1314 directed to one or more industrial output devices 1318 (e.g., actuators, motor drives, contactors, indicator lights, etc.) based on values of the input signals 1312 and control sequences defined by thecontrol program 1204.Control outputs 1314 can also be initiated in response to or based on operator commands 1302 received via anHMI 114 or other type of user interface or faceplate (e.g., the user controls of a motor drive). These operator commands 1302 can, for example, modify setpoint values or other parameters of the control sequence, initiate or halt control actions, select operating modes for the control sequence, or perform other types of manually initiated actions. In general, blockchain-enabledindustrial controller 1210 is capable of carrying out basic real-time monitoring and control functionality typically associated with industrial controllers. - In addition,
blockchain engine 1128 is capable of executingblockchain instructions 1202 included in thecontrol program 1204 and previously configured by the controller programmer For example,blockchain instruction 1202 can be configured to recognize specific user-defined events as transactions to be added to ablock 1322. Such transactions can include, for example, detected events or measured metrics observed on the controlled machine, system, orprocess 1320 based on input signals 1312 (e.g., temperature, pressure, or flow metrics; quality check results such as bolt torque or leak test values; etc.), operator actions identified based on the operator commands 1302 or operator interactions with control panel devices or safety devices (e.g., pushbuttons, switches, light curtains, safety mats, safety pull cords, etc.), programmatic events generated internally by thecontroller 1210 based on execution of control program 1204 (e.g., alarm events, controller diagnostic events, etc.), deviations of measured telemetry values from a defined range, detected states of industrial sensors, changes of states of industrial safety devices (e.g., light curtains, emergency stop push buttons, pull cords, safety mats, etc.), or other such recordable transactions. - In accordance with the configuration parameters associated with the
blockchain instruction 1202,blockchain engine 1128 can assign one or more industrial transactions to ablock 1322 having a format similar to those described above (see, e.g.,FIGS. 5 and 6 ) and assign theblock 1322 to ablockchain 1304. The determination as to whether a single transaction is to be added to ablock 1322 or, alternatively, if multiple transactions are to be aggregated into a block can depend in part on the workflow of the manufacturing process or user-defined preferences. As will be discussed in more detail below,blockchain 1304 can be one or both of a public blockchain or a private blockchain. In some embodiments, theinstruction parameters 1212 of the controller'sblockchain instructions 1202 can allow a user to configure whether ablock 1322 is to be added for each individual transaction or whether multiple transactions are to be bundled into asingle block 1322. In the latter case, theparameters 1212 can also allow the user to define the conditions for bundling transactions into a single block. For example, ablockchain instruction 1202 can be configured that bundles a selected set of data items or events into ablock 1322 upon completion of a defined production cycle corresponding to a single manufactured part or batch. In this way, eachblock 1322 can be associated with a set of transactions and data corresponding to a single part or production cycle. Other capture triggers or capture criteria that initiate capturing of a control event and adding a record of the event to ablock 1322 can also be configured usingblockchain instruction 1202. For example,blockchain instruction 1202 can be configured to capture one or more controller values or control event information on a periodic basis, to capture the controller values or control event information in response to a defined condition of the control event (e.g., when a measured performance parameter falls outside a defined range, in response to completion of a production cycle, etc.), to capture the controller values or control event information in response to a manual request to capture control event information received from an HMI or another device, etc.Blockchain engine 1128 can validate industrial transactions as well as add data to theblockchain 1304. -
FIG. 14 is a diagram illustratingexample inputs 1414 to theindustrial blockchain engine 1128 andexample outputs 1416 generated by theblockchain engine 1128. In general,blockchain engine 1128 allows industrial devices and applications (e.g.,industrial controller 1210 or other types of blockchain-enabledindustrial devices 1102 such as HMI terminals, motor drives, sensor and telemetry devices, IIoT devices, ERP and MES systems, industrial gateway devices, industrial data historians, or other such devices) to participate in a blockchain network comprising other blockchain-enabled industrial devices as well as non-industrial blockchain entities. In some implementations, the industrial blockchain network can reside entirely within the confines of a manufacturing facility on the plant's local intranet, such that the distributed database represented by the industrial blockchain is accessed exclusively by authorized plant personnel (e.g., a private blockchain). In other implantations, the blockchain network can comprise multiple entities within a manufacturing, supply, and retail chain, and access permissions to the blockchain information can be layered such that the degree of access is a function of user identity and/or role. In such implementations, the blockchain can comprise both public and private data, permitting selective access to information maintained in the distributed, de-centralized database. - In some embodiments, blockchain-enabled
industrial devices 1102 can be configured to support different types of blockchain instructions that execute different blockchain functions. For example, atransaction instruction 1402 can be used to configure theblockchain engine 1128 to generate hashes for transaction data in connection with generating anew block 1322, as well as to perform block validation. The blockchain engine'shashing component 1108 can be configured to hash transaction data and generate Merkle trees in accordance with thetransaction instruction 1402. Since new blocks leverage the hash of the previous block in the chain to generate the hash for the new block,blockchain engine 1128 can also receive theprevious hash 1406 of the previous block in the chain. If the previous block comprises transactions that were generated by thecontroller 1210 itself, theprevious hash 1406 may have been generated by theblockchain engine 1128 itself when the previous block was generated. In some scenarios, depending on the manufacturing workflow and the architecture of devices that execute the manufacturing process, the previous block of transactions may have been generated by another blockchain-enabled industrial device 1102 (e.g., another blockchain-enabledcontroller 1210 or another type of blockchain-enabled industrial device 1102) or by a third-party entity. In such scenarios, theprevious hash 1406 may be received by theindustrial controller 1210 from another device or system in the blockchain peer network. Thisprevious hash 1406 together with the data for a set of transactions to be included in a new block are used to generate thenext hash 1412 for the block. Theproof engine component 1104 can be configured to validate transactions for inclusion in the new block in accordance with thetransaction instruction 1402. In some embodiments, theproof engine component 1104 can cooperate with a consortium of other devices on the blockchain system to determine the validity of the transactions using consensus-based techniques. Similar to the techniques described above in connection withFIG. 8 ,proof engine component 1104 can leverage miners—programmatic entities that build blocks based on Merkle tree information for gathered transactions—in connection with consortium-based validation of blocks of transactions. - A block instruction 1404 (e.g.,
blockchain instruction 1202 in the case of industrial controllers) can configure theblockchain engine 1128 to perform updates to the controller'sledger 1126 to add one or more transactions of a new block after the block's transactions have been validated byproof engine component 1104. Theproof engine component 1104 can also validate transactions generated by other node devices on the industrial blockchain network in accordance with a consensus-based validation technique, and broadcast its validation findings regarding the validity of the transactions to other node devices on the blockchain network (e.g., other blockchain-enabled industrial devices 1102). In an example scenario,proof engine component 1104 can send information regarding a control event originating on its associated blockchain-enabledindustrial device 1102 to one or more other devices on the industrial blockchain network for validation. Theproof engine component 1104 of the originating device, as well as those of the other devices on the blockchain network, can independently validate the authenticity of the control event using a suitable consensus-based validation technique (e.g., proof-of-work, proof-of-state, practical byzantine fault tolerance, etc.). Theblockchain engines 1128 share their independently derived conclusions with one another, and will only update theirrespective blockchain ledgers 1126 if at least a minimum number of the devices report that the control event is authentic. - In some embodiments,
blockchain engine 1128 can broadcast validated transactions as verifiedledger deltas 1408 that can be used by other devices on the blockchain network to update theirown ledgers 1126.Proof engine component 1104 can also update the device's own copy ofledger 1126 based on verified ledger deltas received from other devices on the blockchain network to ensure that validated transactions originating elsewhere on the network are recorded in the device'sown ledger 1126.Blockchain engine 1128 can also generate and sendinformation regarding errors 1410 discovered in a block of transactions (either a self-generated block or a block received from another device on the blockchain network). - In some embodiments, blockchain-enabled
industrial devices 1102 may be configured such that only nodes (blockchain-enabled industrial devices) affected by a transaction will verify the transaction in order to reduce CPU usage relative to verifying the entire blockchain. In such embodiments, theproof engine component 1104 of anindustrial device 1102 may be configured to select whether to perform validation analysis on a given block of transactions based on a determination of whether the transactions of the block are relevant to the device's own monitoring and control operations. In an example implementation, theblockchain engine 1128 can allow a user to specify transaction criteria that theindustrial device 1102 will use as a basis for determining the types of transactions on which the device will perform validation analysis. Example transaction criteria can include, but are not limited to, identities a subset of other devices in the blockchain system whose transactions will be validated by thedevice 1102, identities of machines or industrial processes whose transactions will be validated by thedevice 1102, or other such criteria. Based on this configuration information, theproof engine component 1104 will perform its validation analysis only on transactions that satisfy the defined criteria. This selective merit-based verification of blocks can conserve processing resources on theindustrial device 1102 relative to verifying all blocks of a blockchain, while ensuring that all transactions are reliably verified by at least a subset ofindustrial devices 1102 to which the transactions are most relevant. - In some embodiments,
blockchain engine 1128 can also include aprivate key 1122 and apublic key 1124 that can be used by thecontroller 1210 or otherindustrial device 1102 to securely share information with other entities on the blockchain network. As will be discussed in more detail herein, this can include secure sharing of recipe data for execution on a selected industrial controller or at a selected industrial facility. - Each blockchain-enabled
industrial device 1102 can include a secure storage area (e.g., memory 1118) that is separate from the storage used for real-time monitoring and control. Similarly, processing resources used by the blockchain-enabledindustrial devices 1102 can be segregated from the primary processing resources that perform real-time monitoring and control (e.g., the processing resources used to executecontrol program 1204 and update the device's I/O). In this way, execution of blockchain functionality on theindustrial device 1102 does not impact performance of the device's primary monitoring and control functions. In some embodiments, this can be achieved using multi-core processing to partition blockchain transactions from real-time control.FIG. 15 is a diagram of example blockchain-enabledindustrial controller 1210 illustrating that hardware and processing resources for carrying out industrial blockchain functions are segregated from processing resources that carry out the controller's primary control functionality. In this example architecture,control components 1514 can include amemory 1504 on which is stored thecontrol program 1204 executed by thecontroller 1210 and the data table 1508 that stores real-time values of the controller's digital and analog inputs and outputs, setpoint values, calculated values, or other data tag values.Control components 1514 also include one or more I/O modules 1512, which interface thecontroller 1210 with input and output devices (not shown) that make up a controlled industrial system or process. I/O modules 1512 are communicatively connected to the controller'sbackplane 1516 or communication bus, and exchange data with the data table 1508 via thebackplane 1516. I/O modules 1512 can include input modules that measure aspects of the controlled system as digital and/or analog signals (e.g., 4-20 mA signals, 0-10 VDC signals, switched input voltages, etc.) and write these values to designated data tags or memory addresses of data table 1508. I/O modules 1512 can also include output modules that read digital or analog values from designated data tags or memory addresses of data table 1508 and translate these values into output signals (e.g., switched outputs, 4-20 mA output signals, 0-10 VDC output signals, etc.) directed to output devices of the controlled system. One ormore controller processors 1502 or execution engines execute thecontrol program 1204 and control updating of data values in the data table 1508 in accordance with measured data from the I/O modules 1512 and execution of thecontrol program 1204. - In this illustrated example,
blockchain engine 1128 is embodied as a sub-system ofcontroller 1210, and is implemented using separate memory and processing resources fromcontrol components 1514. For example,blockchain engine 1128 can utilize itsown processor 1116 andmemory 1118, which are separate from controller processor(s) 1502 andmemory 1504. In this way, blockchain functions (e.g., transaction processing and validation, block generation, smart contract processing and enforcement, etc.) performed by theblockchain engine 1128 is segregated from control-related analytics, and is not necessarily implemented using the primary control language of thecontroller 1210. While components of theblockchain engine 1128 can read data from and write data to the controller's data table 1508 (e.g., via a data bus 1518) in connection with performing blockchain creation and management functions, the processing resources used to carry out these blockchain functions are physically separated from those used to carry out control. In this way, blockchain functions carried out by theblockchain engine 1128 do not impact performance of the controller's basic control functionality. As noted above, althoughFIG. 15 depicts the embeddedblockchain engine 1128 as being a sub-system of an industrial controller,blockchain engine 1128 can also be embedded on other types of industrial devices, including but not limited to motor drives, industrial sensors, vision systems, safety relays, barcode stampers, or other such devices. -
FIG. 16 is a diagram of anexample ledger entry 1602 that can be added to the industrial device'sledger 1126 byproof engine component 1104 according to one or more embodiments.Ledger entry 1602 can represent a single block of the blockchain, and can be stored as part ofledger 1126 insecure memory 1118. Theledger 1126 can be one of multiple copies of the ledger distributed among multiple devices or entities that participate in the industrial blockchain network (e.g., multiple blockchain-enabledindustrial devices 1102 or other types of participating devices), with each device or entity maintaining its copy of theledger 1126 based on validated transaction deltas generated by the device itself or received from other devices on the blockchain network. -
Blockchain infrastructure data 1604 can include, but is not limited to, the hash of the previous block in the blockchain (e.g.,previous hash 604 inFIG. 6 ), an identifier for the block represented by the ledger entry 1602 (e.g.,index 614 inFIG. 6 ), timestamps for the transactions included in the block (e.g.,timestamp 616 inFIG. 6 ), repudiation-related data, the Merkle tree root (e.g., root fingerprint 612), or other data relating to the blockchain infrastructure. Thepayload 1606 of the ledger entry can includetransaction data 1608 as well as associatedmetadata 1618, which may be specific to the industrial applications that are leveraging the blockchain. For example,metadata 1618 can define data boundaries specifying who is permitted to access respective subsets of thetransaction data 1608. In this regard, selected subsets of thedata 1608 may be associated with respective user roles or user identities that are permitted to access and view those data subsets. In a related aspect,metadata 1618 can also define public/private boundaries for thedata 1608. These boundaries can specify which sets of thedata 1608 are to be made publicly accessible regardless of user roles or identities, and which sets are to be made privately accessible only to users within a given plant or industrial enterprise. In some embodiments, the data boundaries and public/private boundaries can be configured on thedevice 1102 using device configuration application 1208 (e.g., as one or more parameters of blockchain instruction 1202). -
Ledger entry 1602 can also include apublic key 1610 of the associated blockchain-enabledindustrial device 1102 and one or more private keys 1612. These keys can be used to encrypt and decrypt information shared with other devices or entities on the blockchain network. In an example specific to industrial applications, an entity on the blockchain network can provide encrypted recipe data to a blockchain-enabled controller (e.g., controller 1210). The recipe data may be proprietary information defining parameters and/or executable instructions for manufacturing a particular product or batch. The recipe data can be encrypted by the sending entity's private key 1612 and decrypted by the receiving controller using thepublic key 1610 and the controller's own private key. Once decrypted, the receiving controller can execute the recipe to facilitate manufacture of the product. In this example scenario, the receiving controller can leverage the blockchain information to verify that the recipe is from a trusted source before executing, and to verify that the controller itself has been authorized to execute the recipe. Distribution and use of the recipe data can be subject to a smart contract implemented by the blockchain network, as will be described in more detail herein. -
FIG. 17 is a diagram of an example industrial blockchain network architecture. In this example implementation, anindustrial blockchain ecosystem 1702 can comprise multiple participating blockchain systems 1704. One or more of the participating blockchain systems 1704 can be industrial systems comprising multiple blockchain-enabled industrial devices 1102 (e.g., blockchain-enabledcontrollers 1210, HMI terminals, gateway devices, MES systems, motor drives, meters or other telemetry devices, sensors, ERP systems, data historians IIoT devices, etc.). Theindustrial blockchain ecosystem 1702 can span multiple geographic, organizational, and business boundaries. The blockchain systems 1704 can be owned by, or may represent, entities representing different disciplines within the manufacturing, supply, distribution, and/or retail chain, including but not limited to engineering and product development, product manufacturing, product testing, shipping, technical support, business and accounting, etc. Systems 1704 may be associated with producers and manufacturers, suppliers, sub-system suppliers (e.g., OEMs), designers and engineers, retailers, shippers, customers, end consumers, or other such entities. - In some embodiments, blockchain-enabled
industrial devices 1102 can be added to this infrastructure in a substantially plug-and-play manner For example, upon power-up, a blockchain-enabledindustrial device 1102 can broadcast its identity as a blockchain-enabled device to other devices on the blockchain network, and can also detect other blockchain-enabled devices. Devices across all layers of a plant (control, middleware, enterprise, etc.) can share their identities, born-on certificates, firmware versions, and other such information with other peer devices on the blockchain system 1704 (and by extension the larger blockchain ecosystem 1702). These devices can be preconfigured to cooperate with other blockchain-enabled industrial devices as a consortium within the blockchain system 1704 to authenticate transactions using consensus mechanisms (e.g., practical byzantine fault tolerance, proof-of-work, proof-of-state, etc.). - To accommodate brownfield environments that include non-blockchain-capable devices, blockchain-enabled gateway devices can also be deployed. These gateway devices can allow legacy devices without integrated blockchain capability to proxy into the blockchain infrastructure. The gateway devices can create and link blocks of a blockchain based on data generated by the legacy devices and monitored by the gateway device via the network. In an example hybrid architecture, blocks can be created in an industrial controller while the blockchains that record transactions on the controller can reside within the gateway device. In another example architecture, an MES system can perform the blockchain creation and management functions for multiple monitored devices and systems within the plant. These proxy systems can synchronize blockchains from different sources, certify which chains are trusted, and perform other such blockchain management functions.
- Since manufacturing and distribution chains can comprise multiple different entities having complex business interrelationships, each entity may wish to regulate access to the information shared with other entities within the chain. For example, a supplier entity that manufactures and provides parts used by another manufacturing entity for manufacture of its own products may wish to provide only a limited subset of its available blockchain data relating to manufacture of the part (e.g., results of quality tests, manufacturing time stamps, a source of materials used to manufacture the part, etc.), while withholding other proprietary manufacturing statistics generated during production of the part and recorded in a blockchain. Accordingly, blockchain-enabled
industrial devices 1102 can be configured to generate multiple versions of a blockchain with different degrees of access permissions.FIG. 18 is a diagram of an example blockchain-enabledindustrial controller 1210 illustrating generation of public and private blockchains. During runtime, one or more embodiments of blockchain-enabled industrial controller 1210 (or other blockchain-enabled industrial devices 1102) can be configured to create multiple versions of a blockchain to facilitate layered access to manufacturing data generated by the blockchain system within which thecontroller 1210 operates. This can include creating apublic blockchain 1304 a and aprivate blockchain 1304 b, each of which comprises data that respective different sets of users or systems within theblockchain ecosystem 1702 are allowed to access. For example, thepublic blockchain 1304 a may include publicly accessible part count or material source information that may be accessed by all blockchain systems 1704 within theecosystem 1702, while theprivate blockchain 1304 b may include proprietary recipe information that is to be kept private from the other systems 1704 within the ecosystem. - In some embodiments, users can identify which data items are to be included in each version of the
blockchain 1304, as well as the scope of access to be assigned to each version of theblockchain 1304, via a device configuration interface (e.g., device configuration application 1208). In an example configuration technique,device configuration application 1208 may allow the user to define two or more blockchains to which transactions are to be added by the blockchain-enabledindustrial controller 1210, as well as the scope of access to be to be assigned to each blockchain. The scope of access may be defined, for example, by identifying the devices, entities, or blockchain systems 1704 that are to be permitted access to the data recorded by each version of the blockchain. Once these various blockchain versions are defined,blockchain instructions 1202 can be added to theindustrial control program 1204. Theblockchain instructions 1202 can includeinstruction parameters 1212 that allow the user to select data items or control events (e.g., timed events, change-of-state events, alarm events etc.) that are to be considered transactions to be included in a blockchain, as well as a parameter that allows the user to select which of the defined versions of theblockchain 1304 the transaction is to be associated with. In another configuration example, a tag dialog can be invoked on thedevice configuration application 1208 that allows the user to select which data tags are to be made public so that other devices on the blockchain network can see the path. -
FIG. 19 is a diagram illustrating segregation of private and public blockchain information in an example industrial blockchain ecosystem. The example ecosystem depicted inFIG. 19 comprises a number of blockchain systems associated with respective entities that participate in a manufacturing and distribution chain, including supplier entities 1902, amanufacturing entity 1904, awarehouse entity 1906, and retail entities 1908. Supplier entities 1902 may be manufacturing entities that provide parts or materials tomanufacturing entity 1904 that manufactures a product using the provided parts or materials. One or more supplier entities 1902 may be OEMs that provide custom-built machines to themanufacturing entity 1904.Manufacturing entity 1904 may provide finished products to awarehouse 1906, which may be owned by the same industrial enterprise that owns themanufacturing entity 1904.Warehouse 1906 may distribute product to retail entities 1908. It is to be appreciated that the example industrial ecosystem depicted inFIG. 19 is only intended to be exemplary, and that an industrial blockchain ecosystem can comprise any collection of entities of various roles. - One or more of the blockchain systems that make up the ecosystem can maintain both
private blockchains 1304 b for internal use as well aspublic blockchains 1304 a accessible to other participating entities in the blockchain ecosystem. Public and private industrial blockchains can be used within a blockchain ecosystem comprising several business entities of a supply chain for a variety of applications, including but not limited to tracking of machine performance and usage, tracking of products across a manufacturing facility or within a single industrial enterprise, tracking of products across the larger supply and distribution chain, distribution of proprietary recipe information, and product auditing. These example industrial blockchain applications are discussed in more detail below. - Blockchain-enabled industrial devices that support generation of public and private industrial blockchains can be used to track performance and usage of machines sold by OEMs to their customer manufacturing entities. In an example scenario, multiple machines built by different OEMs (e.g., one or more supplier entities 1902) can be deployed to an end user manufacturing site (manufacturing entity 1904). According to a vertical-specific example,
manufacturing entity 1904 may be a beverage factory that runs a bottling line comprising fillers, sealers, conveyors, cartoners, and other machines. Some of the machines that make up the bottling line may be built and provided by one or more OEMs. During the machine build, blockchain-enabledindustrial devices 1102 at the OEMs can generateprivate blockchains 1304 b that record transactions and associated data associated with the machine building process that are to be accessible only by authorized devices and personnel associated with the OEM. - The OEM's blockchain-enabled
industrial devices 1102 can also be configured to generatepublic blockchains 1304 a that record publicly shared transaction data that can be accessed and viewed by other devices that participate in the blockchain ecosystem, including devices associated with thecustomer manufacturing entity 1904. This publicly accessible information can include, for example, results of factory acceptance tests (FATs) performed on the machine prior to shipping to the customer. Blockchain-enabled industrial devices that make up the machine, as well as blockchain-enabled test equipment used by the OEM, can capture these FAT results as transactions and record the results as validated blocks in the machine's public blockchain, which is shared with blockchain node devices at the manufacturing facility. - After the machines have been deployed at the
manufacturing entity 1904, industrial blockchains can be used to track each machine's performance. For example, during bottling and filling operations at themanufacturing entity 1904, blockchain-enabledindustrial devices 1102 at the facility can generate and update bothprivate blockchains 1304 b that record production data intended for internal use only, as well aspublic blockchains 1304 a comprising transaction data that can be accessed and viewed by devices associated with the relevant OEM. The manufacturing entity's private blockchain data may comprise, for example, proprietary information relating to the product being manufactured within the manufacturing facility (e.g., recipe data, product order information, product quality check results, etc.), while the public blockchain data accessible by the OEM may include only performance statistics associated with the particular machine that was built and provided by the OEM (e.g., machine downtime statistics, alarm histories, etc.). This allows the OEMs to track performance of their own custom-built machines without being privy to the manufacturing entity's proprietary manufacturing data or information regarding other OEMs' machines. If desired, the blockchain-enabledindustrial devices 1102 that make up the various machines of a production line or facility can be configured to maintain separate private blockchains for each OEM, so that performance of machines provided by different OEMs can be compared by the plant owner. - This selective sharing of blockchain data can also be used to generate a reliable tamper-proof ledger of machine usage statistics, which can be used in connection with subscription-based models of machine usage. For example, rather than purchasing a machine from an OEM, the
manufacturing entity 1904 may establish a subscription-based contract with the OEM to use the machine at the manufacturing facility and to pay the OEM based on usage (e.g., based on an amount of monthly run-time, product count, power cycles, energy consumption, etc.). In some implementations, terms of this machine subscription service can be enforced by a smart contract defined for the blockchain ecosystem comprising themanufacturing entity 1904 and the OEM (supplier entity 1902). During runtime, blockchain-enabledindustrial devices 1102—which can include both devices of the machine itself (e.g., industrial controllers, telemetry devices, power meters, drives, etc.) as well as other industrial devices or systems owned by the plant (e.g., power meters, ERP systems, etc.)—can track and record usage statistics for the machine as a tamper-proof blockchain that is shared with blockchain node devices at the OEM, eliminating the possibility of disputes between the manufacturer and OEM regarding actual machine usage. - Usage and/or status data recorded in the blockchain can also be monitored to determine when components of the machine should be replaced. For example, the smart contract can include provisions for the OEM to replace certain machine components or devices after a defined number of production cycles (or based on another time-based or event-based criterion, such as total energy consumption, part count, downtime or alarm frequency, a KPI setpoint, etc.). In response to a transaction indicating that the part replacement event has occurred, one or more systems within the blockchain ecosystem (
e.g. system 2106 described below in connection withFIG. 21 , or another system) can automatically initiate procedures for verifiably purchasing and delivering the replacement component (e.g., generating a purchase order, submitting the order to a vendor, scheduling an on-site visit by the OEM to replace the component, etc.). Similar to techniques described above in connection withFIG. 8 , some embodiments of blockchain-enabledindustrial devices 1102 may require submission of processing “fees” (e.g., Ether or “gas”) in exchange for execution of smart contract logic on relevant transactions. - An example workflow for facilitating device replacement within the context of an OEM service agreement is now described. In an example scenario, an OEM may build a custom machine for a manufacturing entity. Typically, the machine will comprise the controlled mechanical system as well as the electrical and control system that distributes power to the machine components and facilitates automated control of the machine. The control system is generally housed in a control cabinet and can include a number of industrial control devices, including but not limited to one or more industrial controllers, motor drives (e.g., variable frequency drives), or other such industrial devices. In this example, the industrial control devices are blockchain-enabled devices.
- During the building phase at the OEM facility, verifiable, unique identities of the machine components used in the machine assembly are recorded in the ledger of a public blockchain (similar to
public blockhains 1304 a illustrated inFIG. 19 ) stored on one or more of the industrial control devices to be shipped with the machine. A unique, verifiable identity for the machine itself is also recorded in the public blockchain ledger. Since the industrial controller will typically execute a custom control program or application developed by the OEM, the public ledger will also include a verifiable record of this control application. This record of the control application may be signed by the OEM's private key. Additionally, records of certain vendor-specific components used in the machine can be recorded in the public ledger. For example, the firmware version currently installed on the industrial controller or another industrial device in the machine's control cabinet may be recorded in the public ledger and signed by the vendor's private key. - In accordance with a contractual agreement between the OEM and the manufacturing entity (the purchaser), the OEM agrees to replace one or more specified component parts of the machine after completion of a defined number of machine operating cycles. The number of operating cycles that is to trigger a part replacement is defined on at least one of the machine's control devices (e.g., the industrial controller in the present example).
- During operation at the manufacturing entity's facility, the blockchain-enabled industrial controller tracks a number of production statistics, including an accumulated number of operating cycles performed by the machine, an accumulated amount of time that the machine has run, a number of parts produced by the machine, etc. The industrial devices of the machine's control cabinet record this production data in the public blockchain ledger, signing the production data using the manufacturing entity's private key. The control devices also record modifications made to the machine or its associated industrial devices by the manufacturing entity. For example, changes made to the firmware of the industrial controller or other control devices as a result of reimaging or patching are recorded in the public blockchain ledger, as are modifications made to the OEM-developed control program or application executed on the industrial controller.
- In response to determining that information stored in the public ledger satisfies a criterion (e.g., a criterion defined in a smart contract) indicating that the OEM is contractually obliged to perform a component replacement or other maintenance action on the machine (e.g., in response to execution of a defined number of machine cycles, when the accumulated machine run time exceeds a defined number of operating hours, when the machine has produced a defined number of parts, etc.), the block chain engine in the industrial controller signs, on behalf of the owner, a verifiable and contractually binding component replacement order as a transaction in the public blockchain.
- Since the OEM has access to data stored in the public blockchain, the OEM receives and verifies the component replacement order, and in response ships the necessary machine component to the manufacturing entity. The manufacturing entity installs the replacement component and records a signed conformation of the replacement in the public blockchain ledger. The OEM can use this verified transaction to initiate payment processing. Using this system, the replacement component, the vendor-specific device firmware, and the OEM-specific application are all verifiably tracked in the public blockchain ledger. The current state reflected in the public blockchain reflects the authorized production cycle count, which is viewable by both the OEM and the end user. For subscription-based operation of the machine, the OEM can authorize the production cycle count in the public blockchain ledger based on payment and agreement. The end-user can also set the criteria for the machine to automatically renew additional production authorization at defined thresholds.
- In addition to the information recorded in the public blockchain ledger as described above, the machine's control devices also maintain a private blockchain ledger (e.g.,
private blockchains 1304 b inFIG. 19 ) comprising data that can be accessed only by the manufacturing entity. This can include smart contracts for the authorization of machine downtime, approval of new firmware versions, and approval of new versions of the control application. These authorizations can be performed by the blockchain engines of the industrial devices without relying on a human entity to tell the machine to do so. - The private blockchain for the machine can also include records of maintenance operations performed on the machine that do not affect the OEM contract (e.g., maintenance operations that do not involve modifying the OEM's control application, replacing components that the OEM is obliged to replace, etc.). These maintenance records can also include records of which personnel performed the maintenance operation and when the maintenance operations were performed.
- The private blockchain can also include machine operation statistics that do not affect the OEM contract. Such production information can include, for example, identifications of plant employees who operated the machine during each shift, stoppage times during each shift, total machine runtime for each shift, etc. Other information that can be stored on in the private blockchain can include, but is not limited to, internal manufacturing information such as part identities (e.g., chip serial numbers used on an assembled printed circuit board), part defect statistics, improper machine operations, etc.
- Other types of entities involved in purchase or leasing of a machine from an OEM can also be included as participants in the industrial blockchain ecosystem. For example, as part of the process of installing a new production line, plant owners may obtain financing from a bank or purchase design services from an engineering firm. Like the OEM, these other entities may be paid by the
manufacturing entity 1904 in increments; e.g., based on project milestones or on a periodic basis. Public industrial blockchains generated bydevices 1102 can allow all parties to see the progression of the machine build project as the machine moves toward operation, with states of the project being tracked and recorded in the blockchain. Access to the data recorded by the blockchain can be regulated based on the role of the entity. For example, the OEM may be interested primarily in production numbers for billing purposes in a subscription-based contract, while designers may be afforded access to more granular device-level performance data. The diverse entities involved in the machine's lifecycle (e.g., designer, OEM, manufacturer, financial institution, etc.) can each be afforded layered levels of access to blockchain data generated for the machine at all stages of its lifecycle (e.g., design, commission, operation, and maintenance). - The public and private industrial blockchains can also be used to improve technical support services offered by the OEM or by other support entities. For example, if a machine downtime event or other performance issue is reported by the
manufacturing entity 1904, the blockchain transactions can be examined by the OEM or other technical support entity to determine the state of the customer's machine at the time of the reported event. Information encoded in the blockchain that may be leveraged by the technical support entity can include, but is not limited to, device identifiers, device configuration data, machine states, etc. The customer's shared blockchain can also log unscheduled maintenance events, skipped lock out/tag out events, or other operator actions that may be useful to technical support entities when tracking a root cause of a reported performance issue. As in previous examples, blockchain-enabledindustrial devices 1102 can maintain public blockchains that record transaction data accessible to outside technical support entities, while separately maintaining a private blockchain that records proprietary information that is inaccessible to the technical support entity. The public blockchain can be made accessible to all repair entities that are trusted members of the industrial blockchain ecosystem. - In a related aspect, blockchains generated for the machine (by the blockchain-enabled devices that make up the machine as well as by other peripheral systems such as ERP and MES systems) can be leveraged to perform machine warranty and maintenance tracking. For example, the machine's blockchain can record usage and repair information on the manufacturing entity's plant intranet. This information can include, for example, dates and times at which a maintenance operation was performed, identities of any components or devices that were replaced or reprogrammed, dates and times of lock out/tag out procedures that were followed in connection with a maintenance action, identities of the personnel who performed the maintenance action, etc. The blockchain that records this maintenance information can be maintained on distributed devices within the manufacturing entity's plant intranet, such that any single device on the plant's blockchain network can query the blockchain to obtain maintenance log information for the machine. This creates a tamper-proof record of maintenance operations that can be accessed without the need to log into a data historian. Some of this maintenance and operational information can be maintained on a private blockchain that is only accessible by devices on the plant's own intranet. Additionally, blockchain-enabled
devices 1102 within the plant can generate a public version of the machine's blockchain that includes warranty-related information that is accessible by outside support entities (e.g., OEMs or other technical support entities) who have a business interest in the information. Information in this public version of the blockchain can include, for example, operating hours, power cycles, identities of devices added to the machine (which may be unauthorized devices), etc. This public version of the machine's blockchain can be viewed by outside support entities to validate claims made by the machine owner regarding internal maintenance actions performed on the machine or the machine's operational history. - The techniques described above regarding the use of industrial blockchains to track an OEM-provided machine across its lifecycle can also be applied to parts, sub-assemblies, or materials provided by supplier entities 1902 to a
manufacturing entity 1904. For example, the blockchain systems that make up an example industrial blockchain ecosystem may be geographically distributed across multiple businesses that together form an integrated supply chain for a product. In an automotive example, sub-assemblies for a car produced by an automotive facility (themanufacturing entity 1904 in this example) may be manufactured by respective sub-assembly suppliers (supplier entities 1902). In addition to generatingprivate blockchains 1304 b that record proprietary manufacturing data generated in connection with the fabrication of the sub-assemblies, blockchain-enabledindustrial devices 1102 at the supplier entities 1902 can generatepublic blockchains 1304 a that record information regarding manufacture of the sub-assemblies permitted to be shared with themanufacturing entity 1904. Thesepublic blockchains 1304 are accessible by devices at themanufacturing entity 1904, and only comprise a subset of available sub-assembly manufacturing information that the supplier is contractually obligated to provide to the manufacturer. This public blockchain information can be incorporated into the manufacturer's own information tracking for the fully assembled and sold vehicles. - Also, similar to the OEM example described above,
public blockchains 1304 a that record transactions at themanufacturing entity 1904 can be used to share a selected subset of performance or test data for these sub-assemblies with their associated supplier entities 1902, allowing the sub-assembly suppliers to track the performance of their own sub-assemblies after the sub-assemblies have been sent to the manufacturer. - Blockchain-enabled
industrial devices 1102 can also be configured to support the use of blockchains in connection with distribution of proprietary recipes between supply chain entities and execution of those recipes on industrial controllers. A recipe may comprise a set of executable instructions and/or parameter values for manufacturing a specific type of product or material. When installed and executed on an industrial controller, the recipe instructs the controller how to produce the specified product or material. While many recipes are designed by engineers within the plant facility that produces the product, in some cases the recipe may be a proprietary set of instructions and/or parameters designed and distributed by an outside entity. In an example scenario, an OEM may design and distribute recipes to manufacturing customers that have purchased or leased the OEM's proprietary equipment, so that the OEM's recipe can be executed on the equipment in connection with manufacturing a particular type of product. In another example, a manufacturing entity may provide a recipe to a supplier entity to ensure that component parts or materials manufactured by the supplier for the manufacturing entity meet specification requirements. The provider of the recipe may wish to keep the details of the recipe hidden from the receiving entities that utilize the recipe to produce a batch of product. From the opposite perspective, the entity that receives and installs the recipe on their equipment requires verification that the recipe being installed is from a trustworthy source. - Accordingly, industrial blockchains can be used to ensure to the manufacturing entity that a recipe is from a trusted source and to track execution of the recipe on the end manufacturing entity's equipment. The blockchain can also track changes made to the recipe itself. In an example scenario, a recipe holder—such as a supplier entity that develops and provides recipes for execution at partner facilities—can deliver a signed, verifiable recipe to the recipe user (the manufacturing entity that will execute the recipe on one or more industrial controllers to yield a product or material in accordance with specifications encoded in the recipe). The recipe may be contractually bound to produce a specified number of units or batches, or may have an associated timed expiration beyond which production rights afforded to the recipe user expire. The recipe to be distributed to the supplier entity can be embedded in a blockchain, and a public key infrastructure (PM) system (implemented by the
cryptographic components 1106 of the blockchain-enabledindustrial devices 1102 and usingprivate keys 1122 and public keys 1124) can be used to ensure that the recipe is executed only on a specified target device (e.g., a specified industrial controller 1210). For example, a sending device can wrap the recipe with a private key to yield an encrypted recipe, and thecryptographic component 1106 of the receiving controller (e.g., controller 1210) on which the recipe is to be executed can unwrap the encrypted recipe with its ownprivate key 1122 using the public key. Blockchain-enabledindustrial controllers 1210 at the recipe user's facility can be configured to leverage the blockchain information to verify that the recipe is from a trusted source (the recipe holder) before executing, and to verify that the controller itself has been authorized to execute the recipe.Controllers 1210 can also execute the recipe without permitting the recipe holder to view the specifics of the recipe. In this regard, the blockchain-enabled system may place intentionally obfuscated ingredient orders through the recipe maker's supply chain. - In some embodiments, a licensed contract to use the recipe can also be embedded (e.g., as a smart contract enforced by
industrial devices 1102 that make up the industrial blockchain ecosystem) to prevent execution of the recipe on the recipient's controller after an agreed number of parts have been produced using the recipe (or based on another termination criterion, such as a specified expiratory date, consumption of a specified amount of power by the controlled system, etc.). Geotagging can also be used to verify that the recipe is being executed at an agreed location (e.g., at a specified plant facility). In such embodiments, the recipe can be made aware of its location based on geotagging functionality of theindustrial device 1102 on which the recipe is executed, and will only allow execution by theindustrial device 1102 if the geotagged location corresponds to the agreed location. - In such recipe sharing systems, when the recipe is delivered, the public ledger of the industrial blockchain—which can be accessed by both the recipe owner and the recipe maker—may include the signed and verified recipe, the authorized number of production units or batches and/or the authorized period of production. During production, the public ledger can also record the elapsed number of units produced and/or the elapsed runtime for the recipe. At the recipe maker's facility, blockchain-enabled industrial devices are configured to validate the recipe, to interpret the obfuscated recipe, to take the production order, and to determine the quantities and ingredients needed to execute the recipe. The blockchain-enabled devices can also control the production process by placing ingredient orders through the supply chain to the recipe maker. Also, during production, the blockchain-enabled
device 1102 can also maintain a private blockchain ledger that is visible only to the recipe maker, and includes proprietary recipe operations information, including but not limited to batches of different recipes for different recipe owners, private end user production statistics not covered by the recipe contract, private machine operational information (e.g., identities of plant personnel who operated the machine, runtime statistics for the machine, downtime statistics for the machine, etc.), internal manufacturing information, defect tracking statistics, and other such proprietary information. - In general, selective access to public and private industrial blockchains can be granularized as needed. For example, fully public industrial blockchains can render their associated transaction data available to all entities and devices that make up the blockchain ecosystem. Blockchain-enabled
industrial devices 1102 can also support semi-public industrial blockchains that allow transaction data to be shared only with a specified subset of all entities within the industrial blockchain ecosystem (e.g., as in the OEM and sub-assembly supplier examples described above, in which the public blockchains are only made accessible to the relevant OEM or supplier). Similarly,private blockchains 1304 b that only share transaction data among devices within a given industrial facility or industrial enterprise (e.g., among devices on a plant's intranet) may be accessed according to a layered access permission model. For example, some private industrial blockchains may be shared among all participating devices on a plant's intranet, while other private industrial blockchains may be shared only by a subset of devices that are associated with a given production area or production line. - Public and private industrial blockchains can also be used to track manufactured products through a manufacturing facility or across multiple facilities of an industrial enterprise.
FIG. 20 is a diagram illustrating generation of blockchain data within a plant intranet. The manufacturing facility depicted inFIG. 20 may correspond, for example, tomanufacturing entity 1904 or one of the supplier entities 1902 depicted in the supply chain ecosystem ofFIG. 19 . In the illustrated example plant architecture, a number ofproduction areas 1306 within a manufacturing facility—includingProduction Area 1 andProduction Area 2—produce component parts or materials that are provided toProduction Area 3, which assembles the parts or materials received from those upstream production areas. During runtime, blockchain-enabledindustrial devices 1102 that operate withinProduction Areas 1 and 2 (the supplier production areas) bundle transactions generated within their respective production areas in connection with production of the component parts or materials, generate and validate blocks of these transactions (e.g., collaboratively with other blockchain-enabledindustrial devices 1102 within the respective production areas using consensus-based validation techniques such as practical byzantine fault tolerance, proof-of-work, or proof-of-state), and add the validated blocks to aprivate blockchain 1304 b that is only accessible to participating devices on the plant's intranet (and not to other entities of the larger blockchain ecosystem). - Component parts or materials produced by
Production Areas Production Area 3 for assembly into either a finalized product or a sub-assembly of the final product. The blockchain-enabled industrial controller 1210 (or another blockchain-enabled industrial device 1102) that controls the industrial assets inProduction Area 3 can link the blockchains generated byProduction Areas Production Areas 1 and 2) may respectively produce a bottle, a cap, and a label which are then assembled atProduction Area 3. When a received bottle, cap, and label are assembled atProduction Area 3, the blockchain-enabledindustrial controller 1210 that monitors and controls theProduction Area 3 automation system can synchronize and link the blockchains associated with each of the components that were generated at the respective upstream production areas, yielding a composite blockchain for the assembled product (a capped and labeled bottle). The devices ofProduction Area 3 can also expand this composite blockchain by adding records of its own operations performed on the assembled product. As part of the controller's initial configuration, a ledger design tool (e.g., a tool of device configuration application 1208) can allow the user to define what information is to be included in the ledger (e.g., ledger 1126), and to select which automation object instantiated in thecontroller 1210 is to be used as the ledger root. - In some implementation, each assembled product can be represented by a new block in the industrial blockchain, with each block's transaction data comprising production statistics for the product. Example statistics that can be archived in the blockchain can include, but are not limited to, a part identifier (e.g. a VIN number of an assembled vehicle, a serial number of a capped and labeled bottle, etc.), a timestamp indicating a time of assembly or manufacture, measured quality metrics (e.g., leak test results, cap or bolt torque data, etc.), machine states or telemetric data at the time the product was assembled (e.g., oven temperatures, moisture levels, water or air pressures, etc.), or other such information that can be married to a unit or batch of product. In some implementations, each operation performed on the unit of product during its progress through the production process can be represented as a transaction within the industrial blockchain.
- This technique for linking industrial blockchains associated with component parts of a final assembled product can be extended to include parts, sub-assemblies, or materials received from outside supplier entities, and more generally to traversal of products across the entire supply chain (e.g., the supply chain depicted in
FIG. 19 ). In such scenarios, supplier-provided components (e.g., batches of material, sub-assemblies, component parts, etc.) can be received at the manufacturing facility together with blockchains that record transactions associated with production of the components at the supplier sites. One or more blockchain-enabledindustrial devices 1102 at the manufacturing facility can link these blockchains into a composite blockchain, adding its own transactions to the blockchain as new blocks as the received components are further assembled and/or processed. When the product leaves the manufacturing facility and arrives at the next entity in the supply chain (e.g., another manufacturing entity, a warehouse entity, a shipping entity, a retailer, etc.), any new transactions performed on the product at the next entity are added to the existing blockchain data associated with the product (including synchronized blockchain data associated with any of the product's sub-assemblies or component parts), either by adding new blocks to the existing blockchain or by synchronizing and linking the existing blockchain for the product with a new blockchain generated at the next entity to capture new transactions carried out on the product. In addition to manufacturing transactions, the composite industrial blockchain associated with the unit of product can also record product handling and location tracking information (e.g., warehouse shipping information) as well as business-related information (e.g., order information, purchase information, etc.). All of these diverse transactions are validated by a consortium of devices within the industrial blockchain system or ecosystem using suitable consensus-based validation techniques. - In another example configuration, an industrial blockchain generated for a component part to be assembled with other parts into a final product can include, in addition to production statistics for the component part, provenance information that defines, as immutable and verified blockchain data, an origin or source of the component part. This provenance information can comprise, for example, one or more of an identity of a vendor or supplier of the component part, a part identifier, identifies of other entities within the supply chain through which the part has traversed, a date of the part's manufacture, a cost of the part, or other such information. The part's blockchain can also include part characteristic information about the part, including but not limited to a type of the part, a color of the part, a composition of the part, a size of the part, or other such information.
- One or both of the provenance information or the part characteristic information stored in the component part's blockchain can be leveraged by industrial devices at the manufacturing site to verify, prior to assembly of the part into the final product, that the correct part is being incorporated into the final product. For example, with reference to the example production facility depicted in
FIG. 20 , when component parts are received atProduction Area 3 for assembly into either a sub-assembly or a final product, one or more industrial devices atProduction Area 3 can be configured to incorporate a component part into a product assembly or sub-assembly only if the provenance and/or part characteristic information stored in the component part's blockchain satisfies one or more defined criteria. These criteria can define, for example, authorized sources or dates of manufacture of the component part (which can be verified based on reference to the provenance information); correct part types, sizes, and/or colors (which can be verified based on reference to the part characteristic information), or other such criteria. During operation, when component parts are received atProduction Area 3 for assembly into either a sub-assembly or a final product, the one or more industrial devices will reference the provenance and/or part characteristic data recorded in the parts' respective blockchains, determine whether the recorded information satisfies the defined assembly criteria, and proceed to incorporate each component part into the assembly only if the provenance and/or part characteristic information for the part satisfies the criteria. When the assembly is complete, the industrial devices can merge the provenance information for the component parts that were used in the assembly to yield composite as-built provenance information for the assembly as a whole, and record this as-built provenance information in a blockchain associated with the assembly. - In some implementations of this system, industrial devices that process a given component part can obtain some or all of the provenance information or part characteristic information for the part from a radio-frequency identifier (RFID) tag attached to or otherwise associated with the part. In such embodiments, items of provenance and/or part characteristic data can be written to the RFID tag associated with the part at certain points during traversal of the part through the supply chain. This information can subsequently be read from the part's RFID tag by one or more RFID readers and added to the part's blockchain as a transaction.
- Systems that support aggregation of component part blockchains into aggregate blockchains associated with a sub-assembly or final assembled product, as described above, can also leverage these aggregate assembly blockchains in connection with warranty returns. For example, a manufacturing entity that produces and ships a sub-assembly or assembled product can store, as immutable composite blockchains, assembly information identifying the various component parts that were used in the assembled product. This assembly information can include some or all of the provenance and/or part characteristic data described above. This composite assembly information can subsequently be checked to determine whether an assembled product that has been returned for repairs or replacement under warranty has been altered or tampered with by the customer. In the case of assembled products comprising RFID-tagged parts, this determination can be made by reading RFID data from the component parts that make up the returned product to determine the as-returned composition of the product, and comparing this as-returned composition with the as-built composition recorded in the assembled product's blockchain. An RFID tag reader interfaced to one or more sources of the plant's blockchain data can be configured to make this comparison and to output information identifying anomalous parts or part replacements present in the as-returned composition. Depending on the terms of the warranty, the manufacturing entity may choose to either deny or proceed with the repair or replacement. For example, the warranty may dictate replacement of one or more specified component parts by the end user is permitted and does not violate the terms of the warranty. If the system determines that only such component parts have been replaced, the replacement or repair may be permitted. Alternatively, if the system determines that a component part replaced by the end user violates the terms of the warranty, the replacement or repair may be denied.
- To minimize consumption of storage space, some embodiments of blockchain-enabled
industrial devices 1102 can allow users to configure selected blockchains for a product to be transient rather than persistent, such that the blockchains will be deleted after an expiration time or on an event basis. For example, a blockchain generated for a particular item or batch of product may be configured to delete itself from all devices across which the blockchain is distributed after a defined criterion has been satisfied. For example, the industrial blockchain associated with an item of perishable product can be configured to delete itself after an elapse of a time duration after which it can be assumed that the product was consumed (e.g., three months after the product is sold, as determined based on credit card transaction data). In another example, the blockchain associated with a product may be configured to delete itself after the product leaves the manufacturing facility if the blockchain's data only has utility internally during the manufacturing process. Automatic deletion of an industrial blockchain will extend back to the blockchain's root to ensure that blockchain's data can still be validated. Alternatively, when the deletion event occurs, the blocks of the blockchain can be maintained while the associated transaction data is deleted, or a new root can be set such that a later portion of the blockchain remains while an earlier portion is deleted. The portion of the blockchain that is deleted can be dependent on the blockchain's hierarchy. In another example configuration, a blockchain's expiration definition can specify that only a selected subset of participating devices—those not requiring the blockchain's data—may delete the blockchain in response to the deletion event, while other devices may maintain the blockchain. In an example scenario, a blockchain-enabled industrial controller may not need a product's blockchain after the product leaves the production area and deletes the blockchain accordingly (e.g., in response to recorded shipping information that indicates the product has left the facility), while an MES system may save the blockchain for archival purposes. - Since a product may pass through several different supply chain entities, some embodiments of blockchain-enabled
industrial devices 1102 can include contingency features for managing gaps within the product's blockchain. These gaps can occur, for example, when the product leaves one facility and is transported to another location in the chain via a truck with no communication capabilities. In some embodiments, artificial intelligence or other types of inference can be used to infer the missing information. When the product reaches another verified entity within the supply chain, historical information can be leveraged to interpolate and confirm that the product is back under control of an authenticated entity. - In addition to the
private blockchains 1304 b, the blockchain-enabledindustrial devices 1102 at the manufacturing facility can also generatepublic blockchains 1304 a that record, as transactions, manufacturing statistics for each unit of product that is to be shared with other devices on the larger industrial blockchain ecosystem. These publicindustrial blockchains 1304 a can be distributed across devices at the industrial facility and devices associated with other entities in the ecosystem (e.g., a supply chain), which are connected via a public orsemi-public network 2002 such as the internet or a public or private cloud platform. Publicindustrial blockchains 1304 a can include blockchains that are to be accessible by all participants in the blockchain ecosystem (i.e., fully public blockchains) as well as semi-public blockchains that are to be accessible only by selected entities and/or devices in the ecosystem. In this regard, blockchain-enabledindustrial devices 1102 can be configured to generate as many different tiers of blockchains as desired, with each blockchain defined and configured to permit access by a selected set of entities. - In an example scenario, the manufacturing facility may manufacture products for multiple different customers (e.g., a plant that produces custom computer chips for different computer manufacturers). Accordingly, blockchain-enabled
industrial devices 1102 used to manufacture the products may be configured to create a proprietary customer-specific blockchain for each customer, which each customer-specific blockchain comprises transaction data associated with that customer's product. In such implementations, the blockchain-enableddevices 1102 can create a new blockchain for each customer-specific manufacturing run. That is, after a production line switches operation from production of a batch of product for a first customer to a new batch for a second customer, the blockchain-enabled devices will cease updating the previous blockchain associated with the first customer's product and begin a new blockchain for the second customer to record transactions associated with the new product run. In this way, industrial devices participating in the blockchain system can segregate industrial blockchains according to customer. - In addition to maintaining separate blockchains for a given product or machine, with each blockchain having different access permissions, some embodiments of blockchain-enabled
industrial devices 1102 can be configured to manage selective access to a given single blockchain. For example, an industrial blockchain can be generated that allows the blockchain's hash information to be made public to all entities within the ecosystem while keeping the blockchain's transaction data private. This can allow a manufacturing entity to reassure outside parties that the plant's data is authentic without providing visibility into the data itself (which may be proprietary). In an example scenario, an OEM may vouch for a state of a machine or program, which can be confirmed by checking the publicly accessible hash values of the machine's blockchain. This hash information can be made available without allowing private information about the machine state itself to be viewed by entities outside of the OEM. - To ensure trust relationships between blockchain-enabled
industrial devices 1102 that make up anecosystem 1702 of industrial blockchain systems 1704 (e.g., a supply and/or distribution chain), a trusted entity can certify device vendors that produce blockchain-enabledindustrial devices 1102 and that participate in the supply chain, creating a supply chain with signed participation. In general, blockchain-enabledindustrial devices 1102 are configured to authenticate transactions (e.g., using digital fingerprinting or by other authentication means) within the global supply chain workflow, including transactions that occur within the manufacturing facility in which the transactions occur (e.g., transaction in which theindustrial devices 1102 are directly involved) as well as transactions that originate elsewhere in the supply chain (the industrial blockchain ecosystem) as part of a consortium comprising multipleindustrial devices 1102. As an example consensus criterion, a rule can be defined stating that at least 20 devices on the blockchain network must agree that a transaction is valid before adding the transaction to a block. - The use of blockchains throughout the supply chain, as described in previous examples, can also allow a consortium of entities to authenticate standards for a product from many levels. For example, different entities within an industrial blockchain ecosystem can certify that a product meets a defined standard in terms of safety, labor practices, equipment used to manufacture the product, certified plants at which the product was manufactured, etc. The devices making up the consortium can act as a mesh network, where different sub-entities can confirm that the defined standards are being met across multiple supply chain jurisdictions (e.g., that a product is organic, that a material used in the product is authentic, etc.). In an example scenario, to record that a product has been authentically produced by a certified plant and/or using legitimate equipment (e.g., certified machines or other approved industrial devices), the blockchain-enabled industrial devices that were involved in producing the product can record, as a transaction in the product's blockchain, validated identities of the blockchain-enabled industrial devices themselves. In some embodiments, this recorded device identity information can include both identity information for the device itself (e.g., model number, unique serial number, etc.) as well as an identity of the plant entity that owns the equipment. Recording this information as a blockchain transaction creates a tamper-proof, verifiable authentication that the product was produced by approved or certified equipment. In this way, the use of industrial blockchains can simplify the process of tracking compliance paperwork through multiple jurisdictions and ensure the authenticity of such claims.
- Industrial blockchains can also be used to authenticate carbon credits by tracking how much carbon dioxide was used to manufacture a product. In an example implementation, all carbon dioxide consumption can be aggregated by the blockchain-enabled
devices 1102 and added as a validated element of the blockchain. This trusted and validated consumption data can be submitted to appropriate regulatory agencies for carbon dioxide credits. - Both within the context of a single manufacturing facility (e.g., the system depicted in
FIG. 20 ) as well across an entire supply chain ecosystem (e.g., the ecosystem depicted inFIG. 19 ), multiple blockchains may be generated and aggregated during manufacture of a product or during traversal of the product through the supply and distribution chain. Some industrial blockchain systems can leverage these aggregated blockchains to correlate events within the facility or supply chain or to identify a chain of events. Accordingly, blockchain-enabledindustrial devices 1102 or associated analytic systems can identify temporal relations between transactions among different blockchains. This can involve real-time synchronization of industrial blockchains for historian analysis. Analysis of synchronized industrial blockchains can assist with the process of identifying root causes of machine failures, product defects, or other issues. For example, an associated industrial blockchain analytic system can analyze a slice of time across multiple synchronized blockchains and identify chains with commonality in connection with identifying a root cause of a supply chain or manufacturing event of interest. - To facilitate root cause analysis, blockchains generated by
industrial devices 1102 can be configured to capture transactions relating to operation and statuses of machines or production lines themselves. These machine history blockchains may be separate from those that capture transactions relating to manufacture of a product per se, and may capture, from the industrial devices and assets making up a manufacturing facility or supply chain, such information as diagnostic data, operating mode information, machine downtime durations and times, alarm information, telemetric data, or other such information. These blockchains can also capture records of maintenance actions, including but not limited to lock out/tag out actions, records of device or component replacements, operator actions gleaned from interactions with a control panel or HMI, or other such information. By capturing such information as blockchain transactions, industrial blockchains can create a tamper-proof ledger of information indicative of an exact state of a plant at any point in time. This information can be used in connection with troubleshooting issues within a facility or supply chain. These machine history or equipment history blockchains can also be correlated with the product-specific blockchains described above in order to determine a state of a machine or set of industrial assets corresponding to one or more manufactured products of interest. For example, if the blockchain transaction data for an item of manufactured product indicates a quality concern, this product-specific blockchain can be correlated in time with the machine-history blockchain for the production line responsible for manufacturing the product in order to determine if a state of the equipment that produced the product is relevant to the quality concern. - In an example implementation, a set of blockchain-enabled
industrial devices 1102 that make up an industrial blockchain system can be configured to generate a plant model blockchain that models the production lines, machines, hardware components, and/or software components (e.g., firmware versions, application versions, etc.) that make up a manufacturing facility (or a production area within the facility).Devices 1102 can assemble these blockchains as the production lines and machines are powered up and the associated sets of equipment report their identity and status information. Thedevices 1102 can record this identity and status information for all devices within the plant model blockchain, yielding a Merkle tree of hashes in which each element of the tree represents an item of equipment. This plant model blockchain can record, for each device, such information as model numbers, software or firmware revision numbers, configuration settings (e.g., controller or variable frequency drive settings), operating mode information, maintenance log information, safety device statuses, total accumulated runtime data, operating modes, or other such device or asset information. - During plant operation, the plant model blockchain can record changes to the states of the devices and/or machines within the plant, treating each change of a device's state as a transaction to be recorded in the plant model blockchain. In this way, the plant model blockchain can record changes to machine operating modes, changes to a device's firmware or software, changes in states of industrial safety devices, abnormal conditions, diagnostic data, lock out/tag out actions, states of safety lock switches, states of operator panel control devices (e.g., pushbuttons, switches, etc.), sensor states (e.g., part presence indications), or other such information. Thus, the plant model blockchain creates a verified history of the of the plant's overall state, as defined by the aggregated states of the devices and machines that make up the plant. In some implementation, the plant model blockchain may comprise multiple synchronized blockchains corresponding to different production areas or machines within the plant. Analysis tools can be used to analyze these plant model blockchains to identify a chain of cause-and-effect events, or to determine a root cause of an event (e.g., a machine failure, detection of a product defect, etc.). In an example general technique, such analysis tools can identify and analyze a slice of time corresponding to an event of interest across the multiple synchronized plant model blockchains, and identify chains with commonality in connection with identifying the root cause of the event.
- These plant model blockchains can also be referenced in connection with device replacements within the plant. In this regard, since the states and configurations of industrial devices currently deployed within the plant facility are recorded within a plant model blockchain, this information can be accessed to determine the correct firmware and/or application that should be installed on a new device that is to replace an existing device. Tracking this information using industrial blockchains can ensure that this replacement device configuration information is reliable, preventing misconfiguration of replacement devices prior to deployment
- This plant modeling technique can also be leveraged on a smaller scale to track states and events at the control cabinet level. In an example implementation, blockchain capabilities (e.g., blockchain engine 1128) can be implemented on motor drives (e.g., variable frequency drives or other types of motor drives) that are mounted within a motor control cabinet (MCC). This can allow the states of the MCC to be tracked, recorded, and analyzed.
- Since the industrial blockchain paradigm records transactions originating at one industrial asset or device in a decentralized manner across multiple blockchain-enabled devices, each participating industrial device has a degree of visibility into the operation of other devices or systems by virtue of the distributed
ledgers 1126 shared across the devices. In some embodiments, blockchain-enabledindustrial devices 1102 can incorporate information in this distributedledger 1126 into the device's control strategy. For example, as noted above, the blockchain-enabledindustrial controller 1210 depicted inFIG. 18 executes a control program 1204 (e.g., a ladder logic program or other type of control program) in connection with monitoring and controlling an industrial machine, system, orprocess 1320 via I/O 1308. Sinceindustrial controller 1210 supports blockchain functionality, thecontroller 1210 maintains one ormore blockchain ledgers 1126 corresponding to public and/or privateindustrial blockchains 1304 that record transactions (e.g., industrial events, manufacturing and supply chain activities, etc.) within the blockchain system and/or ecosystem within which thecontroller 1210 participates. Eachledger 1126 records not only transactions that originate on thecontroller 1210 or its associated controlledprocess 1320, but also validated transactions (received astransaction data 1324 or ledger deltas) that originate at other devices or systems that participate in the blockchain system or ecosystem (e.g., other blockchain-enabled industrial devices associated with other production areas or machines within the plant, or devices associated with other entities of the supply chain outside the plant). As described above, these transactions are only added to theledger 1126 after the transactions have been validated by the blockchain system using consensus-based validation techniques. - Since each industrial device within the blockchain system maintains a local copy of this
ledger 1126 of validated transaction data,program execution component 1306 can be configured to leverage selected items of this ledger data in connection with controlling the system orprocess 1320. For example,control program 1204 can be written to reference one or more items of transaction data stored in theledger 1126, such that these items of transaction data serve as parameters or inputs into thecontrol program 1204 that at least partially control the states of one ormore control outputs 1314. In this way, the blockchain-enabledindustrial controller 1210 can control a system orprocess 1320 based not only on monitored local inputs from the system (input signals 1312), but also on events that occur at other production areas or machines within the plant. - This ledger-based control is not limited to the use of plant-level events to effect control of
control outputs 1314. For example, if theledger 1126 records business-level transactions (e.g., work order information, inventory information, etc.),program execution component 1306 can leverage this information as parameters or inputs intocontrol program 1204. Theledger 1126 may also record validated events that originate at other supply chain entities within the larger blockchain ecosystem (e.g., part or sub-assembly suppliers, OEMs, retailers, shipping companies, etc.), andcontrol program 1204 an be written to reference these external supply chain events as control parameters as well. - Participants in an industrial blockchain ecosystem can access blockchain information to which they have authorized access in a variety of ways.
FIG. 21 is a diagram illustrating an example, high-level architecture for accessing blockchain information for a manufactured product using a mobileuser interface application 2110 installed on amobile device 2104.User interface application 2110 can be configured to interface with a publicly accessibleblockchain search system 2106 maintained on a public network orcloud platform 2106. In an example implementation,blockchain search system 2106 can comprise aninterface component 2118 and a blockchain search andmanagement component 2122. These components ofblockchain search system 2106 components can comprise, for example, machine-executable components embodied within one or more machines, e.g., embodied in one or more computer-readable mediums (or media) associated with one or more machines that are accessible via the cloud platform orpublic network 2106. These components can be stored on one or more memories and executed by one or more processors (not shown inFIG. 21 ) that make up part ofblockchain search system 2106. -
Blockchain search system 2106 can control remote access to versions ofindustrial blockchains industrial devices 1102 throughout a supply chain or other industrial blockchain ecosystem. In the illustrated example,user interface application 2110 allows a user to access subsets of relevant blockchain data associated with afinished product 2108 by scanning a scannable code, such as a QR code, imprinted on theproduct 2108 using the mobile device's optical scanning capabilities. The code establishes the identity of a source of the product's blockchain as well as the stored data to be accessed. When a product's code is scanned by themobile device 2104 and an authentic user identifier is provided to theuser interface application 2110, theapplication 2110 sends therequest 2114 together with the user identity information to theinterface component 2118 ofsearch system 2118.Interface component 2118 can verify the identity included inrequest 2114 and determine a level of access associated with the identity. In response to determining that the identity is an authorized user identity and that the identity is permitted a degree of access to at least a subset of available industrial blockchain information,interface component 2118 instructs blockchain search andmanagement component 2122 to search theblockchains relevant product data 2112 that the identified user is authorized to view based on the data request and identity. Theinterface component 2118 renders the results onmobile device 2104. Theuser interface application 2110 can be configured to generate suitablegraphical screens 2102 for rendering the authorizedproduct data 2112. Search andmanagement component 2122 can be configured to retrieve the relevant blockchain data from any suitable source of the data accessible within the blockchain ecosystem, including but not limited to any of the blockchain-enabledindustrial devices 1102 or other non-industrial sources of the requested data. - This approach can allow product consumers to access and view information about a purchased product via their personal devices. For example, if a batch of bottled water is found to be contaminated, scanning the label on a bottle using a
mobile device 2104 can causeuser interface application 2110 to interact withsearch system 2116 to locate and retrieve information identifying a source of the water for that particular bottle. This water source information can be maintained in a public blockchain accessible to consumers. Production details for the bottle itself (e.g., quality check results, cap tightening data, etc.) can also be accessed in this manner Some of this production data may only be accessible to plant personnel or consumers of certain roles. In the case of produce, data regarding the source of the produce (e.g., the farm) as well as the time that the produce was picked can be captured as a blockchain generated by the industrial equipment (including blockchain-enabled industrial devices 1102) that processes and packages the produce, such that the data can be retrieved bysearch system 2116 and presented onmobile device 2104 in response to scanning an optical code associated with the produce (e.g., a code on a tag affixed to the produce or on a bag containing the produce). In the case of pharmaceuticals, this approach can allow consumers to verify the authenticity of their medications by retrieving blockchain information that tracks the medication's supply chain. This supply chain information can be captured in a public blockchain and made accessible to consumers. - In some embodiments,
user interface application 2110 can combine scanning of a product's optical code with voice-based or text-based search. In an example embodiment, after scanning the product's scannable code, the user can enter or speak a request for a certain type of data relating to the product into their mobile device 2104 (e.g., “Confirm that this product is organic,” “where was this water bottled,” etc.). In response, theuser interface application 2110 translates the spoken information request into query information that can be combined with the scanned optical code information, submit this combined information to the blockchain search system on the cloud platform orpublic network 2106, and retrieve a relevant subset of product data that satisfies the user's request and is permitted to be viewed by that particular user (in accordance with the user's identity and/or role). -
Blockchain search system 2116 can bundle and send blocks of industrial blockchains to customers upon request via theuser interface application 2110, which can include interactive search features that assist the user in easily locating desired information. For example, rather than walking the blockchain to find information of interest, theuser interface application 2110 can allow users to drill down to blockchain information they wish to see. In an example use case, a user may a time range intouser interface application 2110 together with a request to view all products that were created within the specified time range of interest. In response to this information,blockchain search system 2116 can retrieve, from therelevant blockchains - Credit card purchases can also become transactions recorded in the blockchain for a product, allowing products to be traced to the end user (e.g., bottles with a cap that was produced as part of a specified batch can be traced to the owners of the bottles). Including consumer transactions in the product's blockchain can also allow notifications to be targeted to a specific subset of consumers known to have purchased a product (e.g., in the case of recall notifications for a particular batch of the product). Such notifications can be delivered to
relevant client devices 2104 associated with known purchasers of a product by blockchain search system 2116 (e.g., by interface component 2118) in response to receiving a request to notify from an authorized vendor of the product. The request to notify can include, for example, an indication of the products for which a notification is to be delivered, a notification criterion that can be used to identify the subset of the products that are subject to the notification (e.g., a time range during which newly manufactured products are known to have been contaminated, a range of product serial numbers, a supplier known to have provided defective parts, etc.), and other relevant information that can be used by thesystem 2116 to determine which product purchasers should receive a notification. Based on the information included in the request to notify, the search andmanagement component 2122 can map the subset of product serial numbers identified by the notification criterion to the individuals known to have purchased those identified products. This mapping can be determined based on the transaction information stored in the product's blockchain.Interface component 2118 can then deliver suitable notifications to theclient devices 2104 associated with the identified purchases. - Including end user transactions as part of the product's blockchain can also allow the blockchain to be mined by sales entities for sales leads. In this way, sales people can readily determine what customers have ordered in the past, as well as identify who within a given company should be targeted for sales campaigns.
- The configurability of the blockchain-enabled
industrial devices 1102 can allow manufacturers to choose the information that customers are allowed to access. Manufacturers or their associates (e.g., suppliers, OEMs, etc.) can also retroactively add to the set of data that may be accessed by consumers. For example, if a supplier wishes to provide more specific information regarding the source of their water after the products have shipped, the accessibility level of this additional information can be changed from private to public, thereby retroactively rendering this information accessible to consumers. - Although
FIG. 21 depicts amobile device 2104 as the means by which industrial blockchain data is accessed, other means for retrieving and viewing the information are also within the scope of one or more embodiments. For example, HMI terminals and software can be configured to support blockchain interfaces that retrieve and visualize selected subsets of blockchain information relevant to a particular production area or plant facility within which the HMI terminal is installed. In another example implementation, HMI terminals can be configured to interface withblockchain search system 2116 over thepublic network 2106 in a manner similar toclient device 2104, allowing operators to retrieve supply-chain level blockchain information from the HMI terminal. -
Blockchain search system 2116 can also be used to execute actions associated with smart contracts in some embodiments. For example, if a smart contract is between an OEM and a manufacturing entity of the blockchain ecosystem includes a provision for the OEM to replace machine components or devices after a defined number of production cycles (or based on another time-based or event-based criterion, such as total energy consumption, part count, downtime or alarm frequency, a KPI setpoint, etc.),search system 2116 can monitor relevant subsets of data logged inblockchains management component 2122 on a periodic or continuous basis based on instructions contained in the smart contract. In response to determining, based on the monitoring, that the replacement condition defined by the smart contract has been satisfied,interface component 2118 can generate and deliver a notification to personnel associated with the OEM entity that the component must be replaced at the manufacturing entity per the smart contract. In variations of such embodiments,search system 2116 may also initiate other procedures associated with replacement of the part when the replacement trigger has been satisfied, including generating a purchase order, submitting the order to a vendor, scheduling an on-site visit by the OEM to replace the component, etc. In general,blockchain search system 2116 can be configured to enforce or execute provisions of a smart contract between entities of an industrial blockchain ecosystem by monitoring for conditions defined by the smart contract or for deviations from agreed provisions of the smart contract, and by executing appropriate notification, reporting, or control actions in line with the smart contract. -
FIGS. 22-23 illustrate various methodologies in accordance with one or more embodiments of the subject application. While, for purposes of simplicity of explanation, the one or more methodologies shown herein are shown and described as a series of acts, it is to be understood and appreciated that the subject innovation is not limited by the order of acts, as some acts may, in accordance therewith, occur in a different order and/or concurrently with other acts from that shown and described herein. For example, those skilled in the art will understand and appreciate that a methodology could alternatively be represented as a series of interrelated states or events, such as in a state diagram. Moreover, not all illustrated acts may be required to implement a methodology in accordance with the innovation. Furthermore, interaction diagram(s) may represent methodologies, or methods, in accordance with the subject disclosure when disparate entities enact disparate portions of the methodologies. Further yet, two or more of the disclosed example methods can be implemented in combination with each other, to accomplish one or more features or advantages described herein. -
FIG. 22 illustrates anexample methodology 2200 for aggregating industrial blockchains in connection with manufacture of a composite product. At 2202, an industrial control program is executed that facilitates monitoring and control of an industrial process that assembles multiple components into a composite product. The industrial process can include, for example, a bottling process that fills, labels, and caps a bottle of beverage, an automotive manufacturing process that assembles a vehicle or a sub-assembly thereof, a process that manufactures computer chips or electronic devices, a batch process, a mining operation, or other such industrial processes. The control program can be executed by an industrial controller having integrated blockchain capabilities. - At 2204, control events associated with control of the industrial process are bundled into blocks of an industrial blockchain associated with the product. In an example implementation, the control program may include industrial blockchain instructions that are configured to bundle the control events as validated transactions and record the transactions into one or more blocks of the industrial blockchain.
- At 2206, a determination is made as to whether another blockchain associated with one of the multiple components that are assembled into the composite product has been received. The received blockchain may comprises manufacturing transactions associated with the corresponding component, which were recorded during production of the component by another production area or outside supplier facility. If such a blockchain is not received (NO at step 2206), steps 2202-2204 are repeated until a blockchain associated with one of the components is received.
- If a blockchain associated with one of the multiple components received (YES at step 2206), the methodology proceeds to step 2208, where an authenticity of the received blockchain is verified. Verification of the received blockchain can be based on a consensus technique (e.g., proof-of-work, proof-of-state, practical byzantine fault tolerance, etc.) in which a consortium of devices within an industrial blockchain system, including the industrial controller and other industrial devices and/or non-industrial devices), collectively verify the received blockchain's authenticity. At 2210, a determination is made as to whether the result of
step 2208 determines that the received blockchain is authentic. If the received blockchain is not authentic (NO at step 2210), the methodology returns to step 2202 and the received blockchain is not aggregated with the blockchain associated with the composite product. Alternatively, if the received blockchain is determined to be authentic (YES at step 2210), the received blockchain is aggregated into the blockchain associated with the composite product atstep 2212. -
FIG. 23 illustrates anexample methodology 2300 for generating industrial blockchains having multiple levels of access permission. Initially, at 2302, an industrial control program is executed that facilitates monitoring and control of an industrial process that facilitates manufacture of a product. At 2304, a determination is made as to whether a first blockchain instruction of the industrial control program is executed. If the first blockchain instruction is executed (YES at step 2304), the methodology proceeds to step 2306, where a first set of control events associated with control of the industrial process is bundled into blocks of a first industrial blockchain associated with the product in accordance with the first blockchain instruction. Per configuration parameters of the first blockchain instruction, the first industrial blockchain have a first level of access permission defined by the first blockchain instruction. For example, the first industrial blockchain may be designated to be a fully public blockchain comprising data that can be accessed and viewed by all participants of the blockchain ecosystem (e.g., a product supply and distribution chain), or may be a private blockchain accessible only to authorized users within the industrial facility within which the industrial process is being carried out. The first industrial blockchain may be configured to be semi-public, such that the blockchain data can be viewed only by one or more selected outside entities within the blockchain ecosystem (e.g., an OEM, a supplier, or a customer entity). If the first blockchain instruction is not executed (NO at step 2304), the methodology proceeds to step 2308 without executingstep 2306. - At 2308, a determination is made as to whether a second blockchain instruction of the industrial control program is executed. If the second blockchain instruction is executed (YES at step 2308), the methodology proceeds to step 2310, where a second set of control events associated with control of the industrial process is bundled into blocks of a second industrial blockchain associated with the product in accordance with the second blockchain instruction. Per the second blockchain instruction, the second industrial blockchain can have a second level of access permission that is different than the first industrial blockchain generated at
step 2306. - Embodiments, systems, and components described herein, as well as industrial control systems and industrial automation environments in which various aspects set forth in the subject specification can be carried out, can include computer or network components such as servers, clients, programmable logic controllers (PLCs), automation controllers, communications modules, mobile computers, wireless components, control components and so forth which are capable of interacting across a network. Computers and servers include one or more processors—electronic integrated circuits that perform logic operations employing electric signals—configured to execute instructions stored in media such as random access memory (RAM), read only memory (ROM), a hard drives, as well as removable memory devices, which can include memory sticks, memory cards, flash drives, external hard drives, and so on.
- Similarly, the term PLC or automation controller as used herein can include functionality that can be shared across multiple components, systems, and/or networks. As an example, one or more PLCs or automation controllers can communicate and cooperate with various network devices across the network. This can include substantially any type of control, communications module, computer, Input/Output (I/O) device, sensor, actuator, instrumentation, and human machine interface (HMI) that communicate via the network, which includes control, automation, and/or public networks. The PLC or automation controller can also communicate to and control various other devices such as standard or safety-rated I/O modules including analog, digital, programmed/intelligent I/O modules, other programmable controllers, communications modules, sensors, actuators, output devices, and the like.
- The network can include public networks such as the internet, intranets, and automation networks such as control and information protocol (CIP) networks including DeviceNet, ControlNet, and Ethernet/IP. Other networks include Ethernet, DH/DH+, Remote I/O, Fieldbus, Modbus, Profibus, CAN, wireless networks, serial protocols, near field communication (NFC), Bluetooth, and so forth. In addition, the network devices can include various possibilities (hardware and/or software components). These include components such as switches with virtual local area network (VLAN) capability, LANs, WANs, proxies, gateways, routers, firewalls, virtual private network (VPN) devices, servers, clients, computers, configuration tools, monitoring tools, and/or other devices.
- In order to provide a context for the various aspects of the disclosed subject matter,
FIGS. 24 and 25 as well as the following discussion are intended to provide a brief, general description of a suitable environment in which the various aspects of the disclosed subject matter may be implemented. - With reference to
FIG. 24 , anexample environment 2410 for implementing various aspects of the aforementioned subject matter includes a computer 2412 (wherecomputer 2412 may be an industrial controller or other type of industrial device, a server device, or another type of computing device). Thecomputer 2412 includes aprocessing unit 2414, asystem memory 2416, and asystem bus 2418. Thesystem bus 2418 couples system components including, but not limited to, thesystem memory 2416 to theprocessing unit 2414. Theprocessing unit 2414 can be any of various available processors. Multi-core microprocessors and other multiprocessor architectures also can be employed as theprocessing unit 2414. - The
system bus 2418 can be any of several types of bus structure(s) including the memory bus or memory controller, a peripheral bus or external bus, and/or a local bus using any variety of available bus architectures including, but not limited to, 8-bit bus, Industrial Standard Architecture (ISA), Micro-Channel Architecture (MSA), Extended ISA (EISA), Intelligent Drive Electronics (IDE), VESA Local Bus (VLB), Peripheral Component Interconnect (PCI), Universal Serial Bus (USB), Advanced Graphics Port (AGP), Personal Computer Memory Card International Association bus (PCMCIA), and Small Computer Systems Interface (SCSI). - The
system memory 2416 includesvolatile memory 2420 andnonvolatile memory 2422. The basic input/output system (BIOS), containing the basic routines to transfer information between elements within thecomputer 2412, such as during start-up, is stored innonvolatile memory 2422. By way of illustration, and not limitation,nonvolatile memory 2422 can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable PROM (EEPROM), or flash memory.Volatile memory 2420 includes random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM). -
Computer 2412 also includes removable/non-removable, volatile/non-volatile computer storage media.FIG. 24 illustrates, for example adisk storage 2424.Disk storage 2424 includes, but is not limited to, devices like a magnetic disk drive, floppy disk drive, tape drive, Jaz drive, Zip drive, LS-100 drive, flash memory card, or memory stick. In addition,disk storage 2424 can include storage media separately or in combination with other storage media including, but not limited to, an optical disk drive such as a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive (DVD-ROM). To facilitate connection of thedisk storage 2424 to thesystem bus 2418, a removable or non-removable interface is typically used such asinterface 2426. - It is to be appreciated that
FIG. 24 describes software that acts as an intermediary between users and the basic computer resources described insuitable operating environment 2410. Such software includes anoperating system 2428.Operating system 2428, which can be stored ondisk storage 2424, acts to control and allocate resources of thecomputer 2412.System applications 2430 take advantage of the management of resources byoperating system 2428 throughprogram modules 2432 andprogram data 2434 stored either insystem memory 2416 or ondisk storage 2424. It is to be appreciated that one or more embodiments of the subject disclosure can be implemented with various operating systems or combinations of operating systems. - A user enters commands or information into the
computer 2412 through input device(s) 2436.Input devices 2436 include, but are not limited to, a pointing device such as a mouse, trackball, stylus, touch pad, keyboard, microphone, joystick, game pad, satellite dish, scanner, TV tuner card, digital camera, digital video camera, web camera, and the like. These and other input devices connect to theprocessing unit 2414 through thesystem bus 2418 via interface port(s) 2438. Interface port(s) 2438 include, for example, a serial port, a parallel port, a game port, and a universal serial bus (USB). Output device(s) 2440 use some of the same type of ports as input device(s) 2436. Thus, for example, a USB port may be used to provide input tocomputer 2412, and to output information fromcomputer 2412 to anoutput device 2440.Output adapters 2442 are provided to illustrate that there are someoutput devices 2440 like monitors, speakers, and printers, amongother output devices 2440, which require special adapters. Theoutput adapters 2442 include, by way of illustration and not limitation, video and sound cards that provide a means of connection between theoutput device 2440 and thesystem bus 2418. It should be noted that other devices and/or systems of devices provide both input and output capabilities such as remote computer(s) 2444. -
Computer 2412 can operate in a networked environment using logical connections to one or more remote computers, such as remote computer(s) 2444. The remote computer(s) 2444 can be a personal computer, a server, a router, a network PC, a workstation, a microprocessor based appliance, a peer device or other common network node and the like, and typically includes many or all of the elements described relative tocomputer 2412. For purposes of brevity, only amemory storage device 2446 is illustrated with remote computer(s) 2444. Remote computer(s) 2444 is logically connected tocomputer 2412 through anetwork interface 2448 and then physically connected viacommunication connection 2450.Network interface 2448 encompasses communication networks such as local-area networks (LAN) and wide-area networks (WAN). LAN technologies include Fiber Distributed Data Interface (FDDI), Copper Distributed Data Interface (CDDI), Ethernet/IEEE 802.3, Token Ring/IEEE 802.5 and the like. WAN technologies include, but are not limited to, point-to-point links, circuit switching networks like Integrated Services Digital Networks (ISDN) and variations thereon, packet switching networks, and Digital Subscriber Lines (DSL).Network interface 2448 can also encompass near field communication (NFC) or Bluetooth communication. - Communication connection(s) 2450 refers to the hardware/software employed to connect the
network interface 2448 to thesystem bus 2418. Whilecommunication connection 2450 is shown for illustrative clarity insidecomputer 2412, it can also be external tocomputer 2412. The hardware/software necessary for connection to thenetwork interface 2448 includes, for exemplary purposes only, internal and external technologies such as, modems including regular telephone grade modems, cable modems and DSL modems, ISDN adapters, and Ethernet cards. -
FIG. 25 is a schematic block diagram of asample computing environment 2500 with which the disclosed subject matter can interact. Thesample computing environment 2500 includes one or more client(s) 2502. The client(s) 2502 can be hardware and/or software (e.g., threads, processes, computing devices). Thesample computing environment 2500 also includes one or more server(s) 2504. The server(s) 2504 can also be hardware and/or software (e.g., threads, processes, computing devices). Theservers 2504 can house threads to perform transformations by employing one or more embodiments as described herein, for example. One possible communication between aclient 2502 andservers 2504 can be in the form of a data packet adapted to be transmitted between two or more computer processes. Thesample computing environment 2500 includes acommunication framework 2506 that can be employed to facilitate communications between the client(s) 2502 and the server(s) 2504. The client(s) 2502 are operably connected to one or more client data store(s) 2508 that can be employed to store information local to the client(s) 2502. Similarly, the server(s) 2504 are operably connected to one or more server data store(s) 2510 that can be employed to store information local to theservers 2504. - What has been described above includes examples of the subject innovation. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the disclosed subject matter, but one of ordinary skill in the art may recognize that many further combinations and permutations of the subject innovation are possible. Accordingly, the disclosed subject matter is intended to embrace all such alterations, modifications, and variations that fall within the spirit and scope of the appended claims.
- In particular and in regard to the various functions performed by the above described components, devices, circuits, systems and the like, the terms (including a reference to a “means”) used to describe such components are intended to correspond, unless otherwise indicated, to any component which performs the specified function of the described component (e.g., a functional equivalent), even though not structurally equivalent to the disclosed structure, which performs the function in the herein illustrated exemplary aspects of the disclosed subject matter. In this regard, it will also be recognized that the disclosed subject matter includes a system as well as a computer-readable medium having computer-executable instructions for performing the acts and/or events of the various methods of the disclosed subject matter.
- In addition, while a particular feature of the disclosed subject matter may have been disclosed with respect to only one of several implementations, such feature may be combined with one or more other features of the other implementations as may be desired and advantageous for any given or particular application. Furthermore, to the extent that the terms “includes,” and “including” and variants thereof are used in either the detailed description or the claims, these terms are intended to be inclusive in a manner similar to the term “comprising.”
- In this application, the word “exemplary” is used to mean serving as an example, instance, or illustration. Any aspect or design described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other aspects or designs. Rather, use of the word exemplary is intended to present concepts in a concrete fashion.
- Various aspects or features described herein may be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques. The term “article of manufacture” as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media. For example, computer readable media can include but are not limited to magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips . . . ), optical disks [e.g., compact disk (CD), digital versatile disk (DVD) . . . ], smart cards, and flash memory devices (e.g., card, stick, key drive . . . ).
Claims (20)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/110,046 US20190340269A1 (en) | 2018-05-02 | 2018-08-23 | Blockchain-enabled industrial devices |
EP19172256.0A EP3564881A1 (en) | 2018-05-02 | 2019-05-02 | Blockchain-enabled industrial devices |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201862665864P | 2018-05-02 | 2018-05-02 | |
US16/110,046 US20190340269A1 (en) | 2018-05-02 | 2018-08-23 | Blockchain-enabled industrial devices |
Publications (1)
Publication Number | Publication Date |
---|---|
US20190340269A1 true US20190340269A1 (en) | 2019-11-07 |
Family
ID=68383797
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/110,031 Active 2038-10-31 US10747201B2 (en) | 2018-05-02 | 2018-08-23 | Subscription-based services using industrial blockchains |
US16/110,068 Active 2038-09-28 US10928803B2 (en) | 2018-05-02 | 2018-08-23 | Managing blockchains for multiple components in an industrial facility |
US16/110,046 Abandoned US20190340269A1 (en) | 2018-05-02 | 2018-08-23 | Blockchain-enabled industrial devices |
US16/918,366 Pending US20200333765A1 (en) | 2018-05-02 | 2020-07-01 | Subscription-based services using industrial blockchains |
US17/150,160 Active 2038-09-01 US11809159B2 (en) | 2018-05-02 | 2021-01-15 | Managing blockchains in an industrial facility based on firmware change |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/110,031 Active 2038-10-31 US10747201B2 (en) | 2018-05-02 | 2018-08-23 | Subscription-based services using industrial blockchains |
US16/110,068 Active 2038-09-28 US10928803B2 (en) | 2018-05-02 | 2018-08-23 | Managing blockchains for multiple components in an industrial facility |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/918,366 Pending US20200333765A1 (en) | 2018-05-02 | 2020-07-01 | Subscription-based services using industrial blockchains |
US17/150,160 Active 2038-09-01 US11809159B2 (en) | 2018-05-02 | 2021-01-15 | Managing blockchains in an industrial facility based on firmware change |
Country Status (1)
Country | Link |
---|---|
US (5) | US10747201B2 (en) |
Cited By (117)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190342077A1 (en) * | 2018-05-03 | 2019-11-07 | Honeywell International Inc. | Apparatus and method for using blockchains to establish trust between nodes in industrial control systems or other systems |
US20190362287A1 (en) * | 2018-05-24 | 2019-11-28 | Cisco Technology, Inc. | Real time updates and predictive functionality in block chain |
US20190375373A1 (en) * | 2017-10-11 | 2019-12-12 | Uniquid Inc. | Systems and methods for networked device security |
US20200014527A1 (en) * | 2018-07-03 | 2020-01-09 | Servicenow, Inc. | Multi-instance architecture supporting trusted blockchain-based network |
CN111143874A (en) * | 2019-12-16 | 2020-05-12 | 广州粤建三和软件股份有限公司 | Hoisting equipment monitoring method and system based on block chain and storage medium |
US20200202035A1 (en) * | 2018-12-19 | 2020-06-25 | Alibaba Group Holding Limited | Data isolation in a blockchain network |
US10698738B1 (en) * | 2019-06-27 | 2020-06-30 | Alibaba Group Holding Limited | Implementing a blockchain-based workflow |
US20200225643A1 (en) * | 2019-01-15 | 2020-07-16 | Fisher-Rosemount Systems, Inc. | Machine-to-Machine Transactions Using Distributed Ledgers in Process Control Systems |
US10742397B2 (en) * | 2018-04-26 | 2020-08-11 | Jonathan Sean Callan | Method and system for managing decentralized data access permissions through a blockchain |
US20200272966A1 (en) * | 2019-02-22 | 2020-08-27 | Jon Kirkegaard | Decentralized ledger supply chain planning interchange |
US10762228B2 (en) * | 2019-08-30 | 2020-09-01 | Alibaba Group Holding Limited | Transaction scheduling method and apparatus |
US10771239B2 (en) * | 2018-04-18 | 2020-09-08 | International Business Machines Corporation | Biometric threat intelligence processing for blockchains |
US10771384B2 (en) * | 2018-08-17 | 2020-09-08 | Tyson Trautmann | Routing based blockchain |
CN111818056A (en) * | 2020-07-09 | 2020-10-23 | 重庆邮电大学 | Industrial Internet identity authentication method based on block chain |
CN111865594A (en) * | 2020-07-16 | 2020-10-30 | 杭州溪塔科技有限公司 | Block chain based product testing method and system, electronic equipment and storage medium |
US10862787B2 (en) * | 2018-11-26 | 2020-12-08 | Canon Kabushiki Kaisha | System, management apparatus, method, and storage medium |
CN112070343A (en) * | 2020-07-29 | 2020-12-11 | 广东飞企互联科技股份有限公司 | Visualization method for industrial chain graph display |
US10871979B2 (en) * | 2019-04-19 | 2020-12-22 | Advanced New Technologies Co., Ltd. | Methods and devices for establishing communication between blockchain networks |
US10915521B2 (en) * | 2018-08-21 | 2021-02-09 | Syniverse Technologies, Llc | Blockchain gateway device and associated method of use |
US10924361B2 (en) * | 2019-03-29 | 2021-02-16 | EMC IP Holding Company LLC | Decentralized data analytics management |
US20210067536A1 (en) * | 2019-07-03 | 2021-03-04 | Battelle Memorial Institute | Blockchain cybersecurity audit platform |
US10944745B2 (en) * | 2018-12-06 | 2021-03-09 | Bank Of America Corporation | System and method for device and transaction authentication |
US20210089011A1 (en) * | 2019-09-25 | 2021-03-25 | Schneider Electric Industries Sas | Blockchain method for controlling an industrial process |
US10962965B2 (en) | 2019-01-15 | 2021-03-30 | Fisher-Rosemount Systems, Inc. | Maintaining quality control, regulatory, and parameter measurement data using distributed ledgers in process control systems |
US10979414B2 (en) | 2018-12-06 | 2021-04-13 | Bank Of America Corporation | System and method for hierarchical decisioning within a hybrid blockchain |
US20210122489A1 (en) * | 2019-10-29 | 2021-04-29 | Ga Telesis, Llc | System and method for monitoring and certifying aircrafts and components of aircrafts |
US11009859B2 (en) | 2019-05-06 | 2021-05-18 | Fisher-Rosemount Systems, Inc. | Framework for privacy-preserving big-data sharing using distributed ledger |
US11032289B2 (en) * | 2019-01-15 | 2021-06-08 | Xerox Corporation | Cloning management system for touchless device level or group fleet management |
US11036656B2 (en) * | 2019-04-07 | 2021-06-15 | Honeywell International Inc. | I/O mesh architecture for an industrial automation system |
US11039317B2 (en) * | 2018-12-31 | 2021-06-15 | T-Mobile Usa, Inc. | Using a blockchain to determine trustworthiness of messages within a telecommunications network for a smart city |
US20210182265A1 (en) * | 2019-12-13 | 2021-06-17 | Hyundai Motor Company | Blockchain generation system and method for operating the same |
US11057217B2 (en) * | 2019-04-12 | 2021-07-06 | Advanced New Technologies Co., Ltd. | Performing parallel execution of transactions in a distributed ledger system |
CN113129026A (en) * | 2019-12-27 | 2021-07-16 | 南京知物有格信息科技有限公司 | Intelligent management and control system for tracing to source of block chain commodities |
CN113126577A (en) * | 2019-12-31 | 2021-07-16 | 施耐德电子系统美国股份有限公司 | Safety network for safety PLC of industrial plant |
WO2021155384A1 (en) * | 2020-01-31 | 2021-08-05 | Steamchain.Io | Tracking of equipment utilization via a distributed ledger |
US20210241138A1 (en) * | 2020-02-04 | 2021-08-05 | Ford Global Technologies, Llc | Vehicle powertrain analysis in networked fleets |
CN113220665A (en) * | 2021-05-20 | 2021-08-06 | 成都质数斯达克科技有限公司 | Block chain data archiving method and device, electronic equipment and readable storage medium |
US11086664B2 (en) * | 2018-10-22 | 2021-08-10 | Honeywell International Inc. | Validating a task being performed on an HVAC system |
EP3865976A1 (en) * | 2020-02-11 | 2021-08-18 | The Boeing Company | Autonomously identifying and locating electronic equipment modules in a rack |
US11106487B2 (en) | 2019-04-12 | 2021-08-31 | Advanced New Technologies Co., Ltd. | Performing parallel execution of transactions in a distributed ledger system |
US11115218B2 (en) | 2019-01-15 | 2021-09-07 | Fisher-Rosemount Systems, Inc. | System for secure metering from systems of untrusted data derived from common sources |
US20210278823A1 (en) * | 2018-06-14 | 2021-09-09 | Siemens Aktiengesellschaft | Device and Method for Setting Up and/or Providing a Working Environment |
US11122087B2 (en) | 2019-06-27 | 2021-09-14 | Advanced New Technologies Co., Ltd. | Managing cybersecurity vulnerabilities using blockchain networks |
US20210319411A1 (en) * | 2020-04-09 | 2021-10-14 | Blockchain FOB | Systems and methods for tracking equipment lifetimes and generating history reports to the same |
US11159945B2 (en) | 2018-12-31 | 2021-10-26 | T-Mobile Usa, Inc. | Protecting a telecommunications network using network components as blockchain nodes |
WO2021219689A1 (en) * | 2020-04-29 | 2021-11-04 | Atlas Copco Industrial Technique Ab | Blockhain network based license management |
US20210352110A1 (en) * | 2020-05-08 | 2021-11-11 | Rockwell Automation Technologies, Inc. | Automatic endpoint security policy assignment by zero-touch enrollment |
US20220005051A1 (en) * | 2020-07-06 | 2022-01-06 | Vertical Solutions, Inc. | Alarm response automation in a supply chain environment |
US11233641B2 (en) | 2018-07-31 | 2022-01-25 | Hewlett Packard Enterprise Development Lp | Systems and methods for using distributed attestation to verify claim of attestation holder |
US11250466B2 (en) | 2018-07-30 | 2022-02-15 | Hewlett Packard Enterprise Development Lp | Systems and methods for using secured representations of user, asset, and location distributed ledger addresses to prove user custody of assets at a location and time |
US20220058184A1 (en) * | 2019-06-03 | 2022-02-24 | Advanced New Technologies Co., Ltd. | Service identifier-based data indexing |
CN114103641A (en) * | 2020-08-28 | 2022-03-01 | 丰田自动车北美公司 | Dynamic vehicle energy control |
WO2022046818A1 (en) * | 2020-08-25 | 2022-03-03 | The Provenance Chain Network, Inc. | Product object story to track aspects of product lifecycle |
US20220066403A1 (en) * | 2020-08-31 | 2022-03-03 | Siemens Aktiengesellschaft | Controlling an operation of a technical system automatically |
US11271908B2 (en) | 2018-07-31 | 2022-03-08 | Hewlett Packard Enterprise Development Lp | Systems and methods for hiding identity of transacting party in distributed ledger transaction by hashing distributed ledger transaction ID using secured representation of distributed ledger address of transacting party as a key |
US11270403B2 (en) | 2018-07-30 | 2022-03-08 | Hewlett Packard Enterprise Development Lp | Systems and methods of obtaining verifiable image of entity by embedding secured representation of entity's distributed ledger address in image |
US11276032B2 (en) * | 2018-10-12 | 2022-03-15 | International Business Machines Corporation | Intelligent classification for product pedigree identification |
EP3979151A1 (en) * | 2020-09-30 | 2022-04-06 | Rockwell Automation Technologies, Inc. | Data driven remote support |
US11316691B2 (en) | 2019-04-15 | 2022-04-26 | Eygs Llp | Methods and systems for enhancing network privacy of multiple party documents on distributed ledger-based networks |
US20220138730A1 (en) * | 2018-08-20 | 2022-05-05 | Probloch LLC | Time-bounded activity chains with multiple authenticated agent participation bound by distributed single-source-of-truth networks that can enforce automated value transfer |
US11329982B2 (en) | 2018-12-31 | 2022-05-10 | T-Mobile Usa, Inc. | Managing internet of things devices using blockchain operations |
US11328347B2 (en) * | 2018-06-28 | 2022-05-10 | International Business Machines Corporation | Rental asset processing for blockchain |
US11341457B2 (en) * | 2019-10-17 | 2022-05-24 | International Business Machines Corporation | Upstream visibility in supply-chain |
US11356443B2 (en) | 2018-07-30 | 2022-06-07 | Hewlett Packard Enterprise Development Lp | Systems and methods for associating a user claim proven using a distributed ledger identity with a centralized identity of the user |
US11356243B2 (en) * | 2019-05-08 | 2022-06-07 | Mallservice Inc. | Information management system with blockchain authentication |
US11362808B2 (en) * | 2019-12-06 | 2022-06-14 | Sasken Technologies Ltd | Method and system for consensus in a permissioned blockchain |
US11361262B2 (en) * | 2020-02-18 | 2022-06-14 | Guangdong University Of Technology | Blockchain-enabled edge computing method for production scheduling |
US20220198392A1 (en) * | 2020-12-23 | 2022-06-23 | Abb Schweiz Ag | Distributed Ledger Arrangement For Supporting Service Transactions In An Industrial System |
US20220215382A1 (en) * | 2020-02-26 | 2022-07-07 | Byte to Byte LLC | Blockchain-based product authentication system |
US20220222245A1 (en) * | 2021-01-13 | 2022-07-14 | Unstoppable Domains Inc. | Blockchain registry scaling |
US11403674B2 (en) | 2018-07-30 | 2022-08-02 | Hewlett Packard Enterprise Development Lp | Systems and methods for capturing time series dataset over time that includes secured representations of distributed ledger addresses |
US11405180B2 (en) | 2019-01-15 | 2022-08-02 | Fisher-Rosemount Systems, Inc. | Blockchain-based automation architecture cybersecurity |
US20220245634A1 (en) * | 2019-09-30 | 2022-08-04 | Southeast University | Blockchain-enhanced open internet of things access architecture |
WO2022169456A1 (en) * | 2021-02-05 | 2022-08-11 | Hewlett-Packard Development Company, L.P. | Determining object creation instructions |
US20220255762A1 (en) * | 2019-09-27 | 2022-08-11 | Hewlett-Packard Development Company, L.P. | Lifecycle change cryptographic ledger |
US20220272203A1 (en) * | 2019-11-11 | 2022-08-25 | Huawei Technologies Co., Ltd. | Blockchain-Based Roaming Transaction Method and Apparatus |
US20220292621A1 (en) * | 2019-07-12 | 2022-09-15 | Shanghai Weilian Information Technology Co., Ltd. | Method and Apparatus For Processing Carbon Emission Reduction Data, and Computer Readable Storage Medium |
US20220327240A1 (en) * | 2021-04-12 | 2022-10-13 | Siemens Aktiengesellschaft | Method for securing asset maintenance information and asset having a lifecycle blockchain node |
US11475448B2 (en) * | 2018-05-30 | 2022-10-18 | Launch Tech Co., Ltd. | Maintenance plant management method, system and data management server |
US11481841B2 (en) | 2019-11-20 | 2022-10-25 | Eygs Llp | Systems, apparatus and methods for identifying distinguishing characteristics of fungible assets using zero-knowledge proof on a distributed ledger-based network |
US11488161B2 (en) | 2018-07-31 | 2022-11-01 | Hewlett Packard Enterprise Development Lp | Systems and methods for providing transaction provenance of off-chain transactions using distributed ledger transactions with secured representations of distributed ledger addresses of transacting parties |
US11488160B2 (en) | 2018-07-30 | 2022-11-01 | Hewlett Packard Enterprise Development Lp | Systems and methods for using captured time series of secured representations of distributed ledger addresses and smart contract deployed on distributed ledger network to prove compliance |
US11513490B2 (en) | 2020-03-24 | 2022-11-29 | Honeywell International Inc. | I/O mesh architecture for a safety instrumented system |
US11528141B2 (en) | 2018-08-18 | 2022-12-13 | Eygs Llp | Methods and systems for enhancing privacy and efficiency on distributed ledger-based networks |
US11531321B2 (en) * | 2018-11-26 | 2022-12-20 | Embraer S.A. | Multidimensional quantization and distributed automatic systems management |
US11544665B2 (en) | 2019-10-17 | 2023-01-03 | International Business Machines Corporation | Upstream visibility in supply-chain |
US11544229B1 (en) * | 2020-04-29 | 2023-01-03 | American Express Travel Related Services Company, Inc | Enhanced tracking of data flows |
US11550307B2 (en) * | 2020-08-26 | 2023-01-10 | Accenture Global Solutions Limited | Asset management, registry, and tracking on shared blockchain nodes |
US20230012832A1 (en) * | 2021-07-13 | 2023-01-19 | Rockwell Automation Technologies, Inc. | Industrial automation control project conversion |
US11574308B2 (en) | 2020-04-15 | 2023-02-07 | Eygs Llp | Intelligent assertion tokens for authenticating and controlling network communications using a distributed ledger |
US11575571B2 (en) | 2020-05-08 | 2023-02-07 | Rockwell Automation Technologies, Inc. | Centralized security event generation policy |
US20230066880A1 (en) * | 2021-08-31 | 2023-03-02 | Rockwell Automation Technologies, Inc. | Safety bus in an industrial device assembly |
WO2023027698A1 (en) * | 2021-08-24 | 2023-03-02 | The Provenance Chain Network, Inc. | Object story signaling for consumer communications |
US11601787B2 (en) | 2018-12-31 | 2023-03-07 | T-Mobile Usa, Inc. | Using a blockchain to determine trustworthiness of messages between vehicles over a telecommunications network |
US11627151B2 (en) * | 2018-10-31 | 2023-04-11 | General Electric Company | Industrial asset cyber-attack detection algorithm verification using secure, distributed ledger |
US20230136418A1 (en) * | 2021-10-28 | 2023-05-04 | Dell Products L.P. | System and method for secured shipment verification and component forensic tracking |
US11698897B2 (en) * | 2019-09-18 | 2023-07-11 | Boardwalktech, Inc | Cascading family of blockchains |
US20230244202A1 (en) * | 2020-08-19 | 2023-08-03 | Siemens Aktiengesellschaft | Systems and methods for digital authentication of usage data of an automation plant |
US20230289769A1 (en) * | 2021-10-15 | 2023-09-14 | Shtar Llc | Secure transaction networks |
US11762742B2 (en) | 2020-03-31 | 2023-09-19 | Honeywell International Inc. | Process control system with different hardware architecture controller backup |
US20230298048A1 (en) * | 2020-07-23 | 2023-09-21 | Thales | Method for sharing data relating to the manufacturing of a product |
US11799641B2 (en) * | 2021-01-19 | 2023-10-24 | Dell Products L.P. | System functionality activation using distributed ledger |
US11874938B2 (en) | 2020-11-03 | 2024-01-16 | Honeywell International Inc. | Admittance mechanism |
US11876774B2 (en) | 2020-09-28 | 2024-01-16 | Unstoppable Domains Inc. | Resolving blockchain domains |
US11922741B2 (en) * | 2019-06-07 | 2024-03-05 | Volvo Car Corporation | Secure installation of approved parts using blockchain |
US20240104520A1 (en) * | 2022-09-28 | 2024-03-28 | Rockwell Automation Technologies, Inc. | INDUSTRIAL SECURITY USING BLOCKCHAIN OR NFTs |
US11960473B2 (en) | 2019-01-15 | 2024-04-16 | Fisher-Rosemount Systems, Inc. | Distributed ledgers in process control systems |
US11972420B2 (en) | 2019-08-09 | 2024-04-30 | Eygs Llp | Methods and systems for preventing transaction tracing on distributed ledger-based networks |
US11989084B2 (en) | 2020-09-23 | 2024-05-21 | Honeywell International Inc. | Self-healing process control system |
US12001874B2 (en) | 2021-07-13 | 2024-06-04 | Rockwell Automation Technologies | Digital engineering secure remote access |
WO2024118512A1 (en) * | 2022-11-28 | 2024-06-06 | Fin3 Technologies, Inc. | System and methods for interfacing and integrating distributed ledger and financial services |
US12050510B2 (en) | 2021-09-24 | 2024-07-30 | Micro Focus Llc | Lifecycle hardware, firmware, and software tracking using blockchain |
US12079652B2 (en) | 2021-07-13 | 2024-09-03 | Rockwell Automation Technologies, Inc. | Digital engineering virtual machine infrastructure |
US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
US12105826B1 (en) | 2023-03-09 | 2024-10-01 | Istari Digital, Inc. | Security architecture for interconnected digital engineering and certification ecosystem |
US12130607B2 (en) * | 2019-06-28 | 2024-10-29 | Dmg Mori Co., Ltd. | Information processing apparatus and method for remotely correcting movement of a machine tool on the basis of measurement data measured during a licensing period |
US12140935B2 (en) * | 2018-06-14 | 2024-11-12 | Siemens Aktiengesellschaft | Device and method for setting up and/or providing a working environment |
Families Citing this family (51)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11521290B2 (en) * | 2013-05-22 | 2022-12-06 | Patrick Damien O'Brien | Systems and methods for storing contract information on multiple blockchain ledgers |
US20200348662A1 (en) * | 2016-05-09 | 2020-11-05 | Strong Force Iot Portfolio 2016, Llc | Platform for facilitating development of intelligence in an industrial internet of things system |
US20190155997A1 (en) * | 2017-11-17 | 2019-05-23 | 1969329 Ontario Inc. | Content licensing platform, system, and method |
CN108335206B (en) | 2018-02-14 | 2020-12-22 | 创新先进技术有限公司 | Asset management method and device and electronic equipment |
US20190363890A1 (en) | 2018-05-24 | 2019-11-28 | Walmart Apollo, Llc | Nested Blockchain System |
WO2019227052A1 (en) | 2018-05-24 | 2019-11-28 | Walmart Apollo, Llc | System and methods for multi-variant tracking |
US11204939B2 (en) * | 2018-07-18 | 2021-12-21 | Bank Of America Corporation | Data manifest as a blockchain service |
DE102018213304A1 (en) * | 2018-08-08 | 2020-02-13 | Robert Bosch Gmbh | Method and device for checking a situation in a decentralized transaction system |
US11341102B1 (en) | 2018-09-06 | 2022-05-24 | Side, Inc. | Multi-tier blockchain-based system and method for document transformation and accountability |
KR102086005B1 (en) * | 2018-10-08 | 2020-04-23 | 최상수 | Computing system for analyzing factory and method of using the computing system to manage factory |
DE102018126078A1 (en) * | 2018-10-19 | 2020-04-23 | Endress+Hauser Conducta Gmbh+Co. Kg | Procedure for handling exceptional conditions in a measuring system |
US11961039B2 (en) * | 2018-11-07 | 2024-04-16 | International Business Machines Corporation | Linked blockchain structures for accelerated multi-chain verification |
JP7423895B2 (en) * | 2019-03-12 | 2024-01-30 | オムロン株式会社 | Ladder diagram program creation support device, ladder diagram program creation support method, and ladder diagram program creation support program |
US11194770B2 (en) * | 2019-05-02 | 2021-12-07 | International Business Machines Corporation | Database mergeable ledgers |
US11410105B2 (en) * | 2019-07-03 | 2022-08-09 | Vertru Technologies Inc. | Blockchain based supply chain network systems |
US11860878B2 (en) * | 2019-08-21 | 2024-01-02 | Fanuc Corporation | Inquiry system and relay device |
WO2019228553A2 (en) * | 2019-08-27 | 2019-12-05 | Alibaba Group Holding Limited | System and method for registering subscribable sub-states in blockchain |
US11533127B1 (en) | 2019-09-20 | 2022-12-20 | Kaleidoscope Blockchain, Inc. | Determining data availability |
US11356274B2 (en) * | 2019-09-20 | 2022-06-07 | Kaleidoscope Blockchain, Inc. | Verifying a set of remotely stored data |
US11329804B2 (en) | 2019-10-18 | 2022-05-10 | Honeywell International Inc. | Systems and methods for providing provenance and anti-counterfeiting of a part using blockchain technology |
US11720526B2 (en) | 2019-11-12 | 2023-08-08 | ClearTrace Technologies, Inc. | Sustainable energy tracking system utilizing blockchain technology and Merkle tree hashing structure |
CN111262872B (en) * | 2020-01-20 | 2022-01-11 | 新晨科技股份有限公司 | Enterprise block chain service platform |
US20210248523A1 (en) * | 2020-02-10 | 2021-08-12 | Cascadia Carbon Inc. | Distributed ledger platform for tracking crowdsourced and individual-based carbon offsets in real time |
US11539787B2 (en) | 2020-04-30 | 2022-12-27 | T-Mobile Usa, Inc. | 5G enabled massively distributed on-demand personal cloud system and method |
US11418587B2 (en) | 2020-04-30 | 2022-08-16 | T-Mobile Usa, Inc. | 5G on-demand dynamically instantiated blockchain for highly distributed peer-to-peer consumer cloud |
CN111651498A (en) * | 2020-05-20 | 2020-09-11 | 链石(上海)信息科技有限公司 | Efficient retrieval method and device for block chain data |
CN113804244B (en) * | 2020-06-17 | 2024-06-25 | 富联精密电子(天津)有限公司 | Defect analysis method and device, electronic device and computer readable storage medium |
US11991284B1 (en) * | 2020-07-02 | 2024-05-21 | Steven Ali Ghabel | Blockchain-based authentication system and method |
CN111522800B (en) | 2020-07-03 | 2020-10-30 | 支付宝(杭州)信息技术有限公司 | Block chain consensus method, node and system of badger Byzantine fault-tolerant consensus mechanism |
CN111526217B (en) | 2020-07-03 | 2020-10-09 | 支付宝(杭州)信息技术有限公司 | Consensus method and system in block chain |
CN111526219B (en) | 2020-07-03 | 2021-02-09 | 支付宝(杭州)信息技术有限公司 | Alliance chain consensus method and alliance chain system |
EP3941012A1 (en) * | 2020-07-14 | 2022-01-19 | Siemens Aktiengesellschaft | Method for publishing process data of a industrial facility |
WO2022024340A1 (en) * | 2020-07-31 | 2022-02-03 | 日本電信電話株式会社 | Information management device, information management method, and program |
CN112070510A (en) * | 2020-08-12 | 2020-12-11 | 上海连尚网络科技有限公司 | Method and equipment for detecting unqualified commodities based on block chain |
DE102020121982A1 (en) * | 2020-08-21 | 2022-02-24 | Endress+Hauser Flowtec Ag | Method for integrating a field device in automation technology into a distributed ledger |
US11865939B2 (en) | 2020-08-28 | 2024-01-09 | Toyota Motor North America, Inc. | Power allocation to transports |
US11703829B2 (en) * | 2020-11-13 | 2023-07-18 | Ford Global Technologies, Llc | Systems and methods for flexible modular assembly manufacturing |
CA3206764C (en) | 2021-01-29 | 2024-02-27 | Troy Martin | Sustainable energy physical delivery tracking and verification of actual environmental impact |
CN112953793A (en) * | 2021-02-08 | 2021-06-11 | 福州大学 | Industrial gateway testing system and method |
US20220318888A1 (en) * | 2021-04-06 | 2022-10-06 | Lifelabs Design, Inc. | System and method for generating and applying qr code for persistent access to product information |
US20220337434A1 (en) * | 2021-04-16 | 2022-10-20 | Noodle Technology Inc. | Secure supply chain and provisioning of devices and methods |
US12099965B2 (en) * | 2021-05-21 | 2024-09-24 | Red Hat, Inc. | Tracking qualitative parameters using a blockchain provenance system |
US11645252B2 (en) | 2021-07-23 | 2023-05-09 | Bank Of America Corporation | System and method for efficiently validating time-series data using a hash-based representation of the data |
US11640389B2 (en) | 2021-07-23 | 2023-05-02 | Bank Of America Corporation | Hash-based identification of data corruption issues in time-series data |
US20230059811A1 (en) * | 2021-08-17 | 2023-02-23 | Ncr Corporation | Blockchain-based supply chain and inventory management system and method |
CN114024822B (en) * | 2021-11-02 | 2023-09-22 | 中国联合网络通信集团有限公司 | Block chain-based Internet of things equipment management method, equipment, server and medium |
US12093029B2 (en) * | 2022-01-21 | 2024-09-17 | Caterpillar Inc. | Integrated record of asset usage, maintenance, and condition, and associated systems and methods |
WO2024052502A1 (en) * | 2022-09-07 | 2024-03-14 | Huntsman International Llc | Method, device, system, and storage medium for in situ production of polyurethane polyol blends |
US12045814B2 (en) * | 2022-09-12 | 2024-07-23 | Toshiba Tec Kabushiki Kaisha | System and method for tracking and controlling print cartridge ownership transfers using non-fungible tokens |
CN116188030A (en) * | 2022-11-23 | 2023-05-30 | 深圳华稷科技有限公司 | Secret recipe work tracing method and secret recipe work tracing system |
US11960954B1 (en) * | 2023-09-27 | 2024-04-16 | Industrial Networks Llc | Dynamic communication methods for smart tag systems |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180096175A1 (en) * | 2016-10-01 | 2018-04-05 | James L. Schmeling | Blockchain Enabled Packaging |
US20180117446A1 (en) * | 2016-05-02 | 2018-05-03 | Bao Tran | Smart device |
US20190238525A1 (en) * | 2018-01-31 | 2019-08-01 | Salesforce.Com, Inc. | Systems, methods, and apparatuses for implementing super community and community sidechains with consent management for distributed ledger technologies in a cloud based computing environment |
Family Cites Families (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030023408A1 (en) | 2001-03-06 | 2003-01-30 | Robin Wight | System for collecting and storing information |
US7035877B2 (en) | 2001-12-28 | 2006-04-25 | Kimberly-Clark Worldwide, Inc. | Quality management and intelligent manufacturing with labels and smart tags in event-based product manufacturing |
US9565275B2 (en) * | 2012-02-09 | 2017-02-07 | Rockwell Automation Technologies, Inc. | Transformation of industrial data into useful cloud information |
US20040198374A1 (en) | 2002-06-27 | 2004-10-07 | Bajikar Sundeep M. | Location control and configuration system |
US9626487B2 (en) | 2007-12-21 | 2017-04-18 | Invention Science Fund I, Llc | Security-activated production device |
US10834094B2 (en) | 2013-08-06 | 2020-11-10 | Bedrock Automation Platforms Inc. | Operator action authentication in an industrial control system |
JP6317099B2 (en) | 2013-01-08 | 2018-04-25 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America | Confirmation method and confirmation system for confirming validity of program |
US9378522B2 (en) | 2013-02-26 | 2016-06-28 | W.W. Grainger, Inc. | Methods and systems for the nonintrusive identification and ordering of component parts |
US11716211B2 (en) | 2016-10-01 | 2023-08-01 | James L. Schmeling | 3D-printed packaging with blockchain integration |
US20160164884A1 (en) | 2014-12-05 | 2016-06-09 | Skuchain, Inc. | Cryptographic verification of provenance in a supply chain |
US10402792B2 (en) | 2015-08-13 | 2019-09-03 | The Toronto-Dominion Bank | Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers |
US9948467B2 (en) | 2015-12-21 | 2018-04-17 | Mastercard International Incorporated | Method and system for blockchain variant using digital signatures |
US20170243216A1 (en) * | 2016-01-28 | 2017-08-24 | Bradley Elliott Kohn | Digital payment processing utilizing encrypted computer networking |
US10346406B2 (en) * | 2016-03-28 | 2019-07-09 | International Business Machines Corporation | Decentralized autonomous edge compute coordinated by smart contract on a blockchain |
US11209815B2 (en) | 2016-04-01 | 2021-12-28 | Intel Corporation | Drone control registration |
US20170302663A1 (en) | 2016-04-14 | 2017-10-19 | Cisco Technology, Inc. | BLOCK CHAIN BASED IoT DEVICE IDENTITY VERIFICATION AND ANOMALY DETECTION |
US10529042B2 (en) | 2016-04-18 | 2020-01-07 | Rs Ltd. | System and method for managing transactions in dynamic digital documents |
US10152760B2 (en) * | 2016-04-24 | 2018-12-11 | Christoph Adam Kohlhepp | Methods for an autonomous robotic manufacturing network |
EP3455684B1 (en) * | 2016-05-09 | 2024-07-17 | Strong Force Iot Portfolio 2016, LLC | Methods and systems for the industrial internet of things |
WO2017194976A1 (en) | 2016-05-13 | 2017-11-16 | De La Rue International Limited | Methods and systems for processing assets |
US11204597B2 (en) * | 2016-05-20 | 2021-12-21 | Moog Inc. | Outer space digital logistics system |
US20180108024A1 (en) | 2016-06-03 | 2018-04-19 | Chronicled, Inc | Open registry for provenance and tracking of goods in the supply chain |
US10447478B2 (en) | 2016-06-06 | 2019-10-15 | Microsoft Technology Licensing, Llc | Cryptographic applications for a blockchain system |
US10826685B1 (en) * | 2016-06-28 | 2020-11-03 | Amazon Technologies, Inc. | Combined blockchain integrity |
US11188883B2 (en) | 2016-09-23 | 2021-11-30 | International Business Machines Corporation | Using ledger sensors to enable contextual contracts across various enterprise blockchain applications |
DE102016118613A1 (en) * | 2016-09-30 | 2018-04-05 | Endress+Hauser Process Solutions Ag | System and method for determining or monitoring a process variable in a plant of automation technology |
US12056691B2 (en) | 2016-09-30 | 2024-08-06 | Cable Television Laboratories, Inc. | Systems and methods for securely tracking consumable goods using a distributed ledger |
US10586210B2 (en) | 2016-11-30 | 2020-03-10 | International Business Machines Corporation | Blockchain checkpoints and certified checkpoints |
US10698675B2 (en) * | 2016-12-19 | 2020-06-30 | International Business Machines Corporation | Decentralized automated software updates via blockchain |
EP3355230A1 (en) * | 2017-01-25 | 2018-08-01 | Siemens Aktiengesellschaft | Method and apparatus for computer-assisted preparing and running of a control function |
US20180211202A1 (en) * | 2017-01-26 | 2018-07-26 | Eugenio S. YNION, JR. | Method, system, apparatus, and program for real-time and online freight management |
US20180219676A1 (en) | 2017-01-27 | 2018-08-02 | Walmart Apollo, Llc | Managing smart appliances using blockchain technology |
US11249977B2 (en) * | 2017-03-03 | 2022-02-15 | Mastercard International Incorporated | Method and system for storage and transfer of verified data via blockchain |
US10467586B2 (en) | 2017-03-23 | 2019-11-05 | International Business Machines Corporation | Blockchain ledgers of material spectral signatures for supply chain integrity management |
US10489597B2 (en) | 2017-03-28 | 2019-11-26 | General Electric Company | Blockchain verification of network security service |
WO2018183768A1 (en) | 2017-03-29 | 2018-10-04 | Innit International S.C.A. | Trusted food traceability system and method and sensor network |
US10270599B2 (en) * | 2017-04-27 | 2019-04-23 | Factom, Inc. | Data reproducibility using blockchains |
US20180315055A1 (en) | 2017-05-01 | 2018-11-01 | International Business Machines Corporation | Blockchain For Issue/Defect Tracking System |
US11004028B2 (en) | 2017-05-26 | 2021-05-11 | Chris Broveleit | Blockchain-based logistics systems |
CN107508812B (en) | 2017-08-29 | 2020-10-23 | 广东工业大学 | Industrial control network data storage method, calling method and system |
US10404455B2 (en) * | 2017-09-01 | 2019-09-03 | Accenture Global Solutions Limited | Multiple-phase rewritable blockchain |
US10659473B2 (en) * | 2017-11-09 | 2020-05-19 | Nokia Solutions And Networks Oy | Method and apparatus for blockchain powered integrity protection system |
US10819722B2 (en) | 2018-03-21 | 2020-10-27 | Honeywell International Inc. | Blockchain for securing distributed IIoT or edge device data at rest |
US10084826B1 (en) * | 2018-05-14 | 2018-09-25 | Xage Security, Inc. | Protocol agnostic security by using out-of-band health check |
EP3624026B1 (en) | 2018-09-11 | 2023-08-02 | The Procter & Gamble Company | Systems and methods for decentralized manufacturing production planning and control |
-
2018
- 2018-08-23 US US16/110,031 patent/US10747201B2/en active Active
- 2018-08-23 US US16/110,068 patent/US10928803B2/en active Active
- 2018-08-23 US US16/110,046 patent/US20190340269A1/en not_active Abandoned
-
2020
- 2020-07-01 US US16/918,366 patent/US20200333765A1/en active Pending
-
2021
- 2021-01-15 US US17/150,160 patent/US11809159B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180117446A1 (en) * | 2016-05-02 | 2018-05-03 | Bao Tran | Smart device |
US20180096175A1 (en) * | 2016-10-01 | 2018-04-05 | James L. Schmeling | Blockchain Enabled Packaging |
US20190238525A1 (en) * | 2018-01-31 | 2019-08-01 | Salesforce.Com, Inc. | Systems, methods, and apparatuses for implementing super community and community sidechains with consent management for distributed ledger technologies in a cloud based computing environment |
Cited By (161)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190375373A1 (en) * | 2017-10-11 | 2019-12-12 | Uniquid Inc. | Systems and methods for networked device security |
US10682981B2 (en) * | 2017-10-11 | 2020-06-16 | Uniquid, Inc. | Systems and methods for networked device security |
US10771239B2 (en) * | 2018-04-18 | 2020-09-08 | International Business Machines Corporation | Biometric threat intelligence processing for blockchains |
US10742397B2 (en) * | 2018-04-26 | 2020-08-11 | Jonathan Sean Callan | Method and system for managing decentralized data access permissions through a blockchain |
US20190342077A1 (en) * | 2018-05-03 | 2019-11-07 | Honeywell International Inc. | Apparatus and method for using blockchains to establish trust between nodes in industrial control systems or other systems |
US10855448B2 (en) * | 2018-05-03 | 2020-12-01 | Honeywell International Inc. | Apparatus and method for using blockchains to establish trust between nodes in industrial control systems or other systems |
US11038948B2 (en) * | 2018-05-24 | 2021-06-15 | Cisco Technology, Inc. | Real time updates and predictive functionality in block chain |
US20190362287A1 (en) * | 2018-05-24 | 2019-11-28 | Cisco Technology, Inc. | Real time updates and predictive functionality in block chain |
US11475448B2 (en) * | 2018-05-30 | 2022-10-18 | Launch Tech Co., Ltd. | Maintenance plant management method, system and data management server |
US20210278823A1 (en) * | 2018-06-14 | 2021-09-09 | Siemens Aktiengesellschaft | Device and Method for Setting Up and/or Providing a Working Environment |
US12140935B2 (en) * | 2018-06-14 | 2024-11-12 | Siemens Aktiengesellschaft | Device and method for setting up and/or providing a working environment |
US11328347B2 (en) * | 2018-06-28 | 2022-05-10 | International Business Machines Corporation | Rental asset processing for blockchain |
US10826682B2 (en) * | 2018-07-03 | 2020-11-03 | Servicenow, Inc. | Multi-instance architecture supporting trusted blockchain-based network |
US20200014527A1 (en) * | 2018-07-03 | 2020-01-09 | Servicenow, Inc. | Multi-instance architecture supporting trusted blockchain-based network |
US11403674B2 (en) | 2018-07-30 | 2022-08-02 | Hewlett Packard Enterprise Development Lp | Systems and methods for capturing time series dataset over time that includes secured representations of distributed ledger addresses |
US11488160B2 (en) | 2018-07-30 | 2022-11-01 | Hewlett Packard Enterprise Development Lp | Systems and methods for using captured time series of secured representations of distributed ledger addresses and smart contract deployed on distributed ledger network to prove compliance |
US11356443B2 (en) | 2018-07-30 | 2022-06-07 | Hewlett Packard Enterprise Development Lp | Systems and methods for associating a user claim proven using a distributed ledger identity with a centralized identity of the user |
US11250466B2 (en) | 2018-07-30 | 2022-02-15 | Hewlett Packard Enterprise Development Lp | Systems and methods for using secured representations of user, asset, and location distributed ledger addresses to prove user custody of assets at a location and time |
US11270403B2 (en) | 2018-07-30 | 2022-03-08 | Hewlett Packard Enterprise Development Lp | Systems and methods of obtaining verifiable image of entity by embedding secured representation of entity's distributed ledger address in image |
US11233641B2 (en) | 2018-07-31 | 2022-01-25 | Hewlett Packard Enterprise Development Lp | Systems and methods for using distributed attestation to verify claim of attestation holder |
US11271908B2 (en) | 2018-07-31 | 2022-03-08 | Hewlett Packard Enterprise Development Lp | Systems and methods for hiding identity of transacting party in distributed ledger transaction by hashing distributed ledger transaction ID using secured representation of distributed ledger address of transacting party as a key |
US11488161B2 (en) | 2018-07-31 | 2022-11-01 | Hewlett Packard Enterprise Development Lp | Systems and methods for providing transaction provenance of off-chain transactions using distributed ledger transactions with secured representations of distributed ledger addresses of transacting parties |
US10771384B2 (en) * | 2018-08-17 | 2020-09-08 | Tyson Trautmann | Routing based blockchain |
US11528141B2 (en) | 2018-08-18 | 2022-12-13 | Eygs Llp | Methods and systems for enhancing privacy and efficiency on distributed ledger-based networks |
US20220138730A1 (en) * | 2018-08-20 | 2022-05-05 | Probloch LLC | Time-bounded activity chains with multiple authenticated agent participation bound by distributed single-source-of-truth networks that can enforce automated value transfer |
US10915521B2 (en) * | 2018-08-21 | 2021-02-09 | Syniverse Technologies, Llc | Blockchain gateway device and associated method of use |
US11276032B2 (en) * | 2018-10-12 | 2022-03-15 | International Business Machines Corporation | Intelligent classification for product pedigree identification |
US11086664B2 (en) * | 2018-10-22 | 2021-08-10 | Honeywell International Inc. | Validating a task being performed on an HVAC system |
US11627151B2 (en) * | 2018-10-31 | 2023-04-11 | General Electric Company | Industrial asset cyber-attack detection algorithm verification using secure, distributed ledger |
US10862787B2 (en) * | 2018-11-26 | 2020-12-08 | Canon Kabushiki Kaisha | System, management apparatus, method, and storage medium |
US11531321B2 (en) * | 2018-11-26 | 2022-12-20 | Embraer S.A. | Multidimensional quantization and distributed automatic systems management |
US10986079B2 (en) | 2018-12-06 | 2021-04-20 | Bank Of America Corporation | System and method for hierarchical decisioning within a hybrid blockchain |
US10944745B2 (en) * | 2018-12-06 | 2021-03-09 | Bank Of America Corporation | System and method for device and transaction authentication |
US10979414B2 (en) | 2018-12-06 | 2021-04-13 | Bank Of America Corporation | System and method for hierarchical decisioning within a hybrid blockchain |
US11074358B2 (en) * | 2018-12-19 | 2021-07-27 | Advanced New Technologies Co., Ltd. | Data isolation in a blockchain network |
US11106817B2 (en) | 2018-12-19 | 2021-08-31 | Advanced New Technologies Co., Ltd. | Data isolation in a blockchain network |
US20200202035A1 (en) * | 2018-12-19 | 2020-06-25 | Alibaba Group Holding Limited | Data isolation in a blockchain network |
US11601787B2 (en) | 2018-12-31 | 2023-03-07 | T-Mobile Usa, Inc. | Using a blockchain to determine trustworthiness of messages between vehicles over a telecommunications network |
US11329982B2 (en) | 2018-12-31 | 2022-05-10 | T-Mobile Usa, Inc. | Managing internet of things devices using blockchain operations |
US20210274350A1 (en) * | 2018-12-31 | 2021-09-02 | T-Mobile Usa, Inc. | Using a blockchain to determine trustworthiness of messages within a telecommunications network for a smart city |
US11039317B2 (en) * | 2018-12-31 | 2021-06-15 | T-Mobile Usa, Inc. | Using a blockchain to determine trustworthiness of messages within a telecommunications network for a smart city |
US11843950B2 (en) | 2018-12-31 | 2023-12-12 | T-Mobile Usa, Inc. | Protecting a telecommunications network using network components as blockchain nodes |
US11159945B2 (en) | 2018-12-31 | 2021-10-26 | T-Mobile Usa, Inc. | Protecting a telecommunications network using network components as blockchain nodes |
US11968607B2 (en) | 2018-12-31 | 2024-04-23 | T-Mobile Usa, Inc. | Using a blockchain to determine trustworthiness of messages between vehicles over a telecommunications network |
US20200225643A1 (en) * | 2019-01-15 | 2020-07-16 | Fisher-Rosemount Systems, Inc. | Machine-to-Machine Transactions Using Distributed Ledgers in Process Control Systems |
US11032289B2 (en) * | 2019-01-15 | 2021-06-08 | Xerox Corporation | Cloning management system for touchless device level or group fleet management |
US11042147B2 (en) * | 2019-01-15 | 2021-06-22 | Fisher-Rosemount Systems, Inc. | Machine-to-machine transactions using distributed ledgers in process control systems |
US11960473B2 (en) | 2019-01-15 | 2024-04-16 | Fisher-Rosemount Systems, Inc. | Distributed ledgers in process control systems |
US10962965B2 (en) | 2019-01-15 | 2021-03-30 | Fisher-Rosemount Systems, Inc. | Maintaining quality control, regulatory, and parameter measurement data using distributed ledgers in process control systems |
US11405180B2 (en) | 2019-01-15 | 2022-08-02 | Fisher-Rosemount Systems, Inc. | Blockchain-based automation architecture cybersecurity |
US11115218B2 (en) | 2019-01-15 | 2021-09-07 | Fisher-Rosemount Systems, Inc. | System for secure metering from systems of untrusted data derived from common sources |
US12093891B2 (en) | 2019-02-22 | 2024-09-17 | Jon Kirkegaard | Decentralized ledger supply chain planning interchange |
US11636425B2 (en) * | 2019-02-22 | 2023-04-25 | Jon Kirkegaard | Decentralized ledger supply chain planning interchange |
US20200272966A1 (en) * | 2019-02-22 | 2020-08-27 | Jon Kirkegaard | Decentralized ledger supply chain planning interchange |
US10924361B2 (en) * | 2019-03-29 | 2021-02-16 | EMC IP Holding Company LLC | Decentralized data analytics management |
US11036656B2 (en) * | 2019-04-07 | 2021-06-15 | Honeywell International Inc. | I/O mesh architecture for an industrial automation system |
US11082230B2 (en) * | 2019-04-12 | 2021-08-03 | Advanced New Technologies Co., Ltd. | Performing parallel execution of transactions in a distributed ledger system |
US11106487B2 (en) | 2019-04-12 | 2021-08-31 | Advanced New Technologies Co., Ltd. | Performing parallel execution of transactions in a distributed ledger system |
US11057217B2 (en) * | 2019-04-12 | 2021-07-06 | Advanced New Technologies Co., Ltd. | Performing parallel execution of transactions in a distributed ledger system |
US11231957B2 (en) | 2019-04-12 | 2022-01-25 | Alibaba Group Holding Limited | Performing parallel execution of transactions in a distributed ledger system |
US11316691B2 (en) | 2019-04-15 | 2022-04-26 | Eygs Llp | Methods and systems for enhancing network privacy of multiple party documents on distributed ledger-based networks |
US10871979B2 (en) * | 2019-04-19 | 2020-12-22 | Advanced New Technologies Co., Ltd. | Methods and devices for establishing communication between blockchain networks |
US11009859B2 (en) | 2019-05-06 | 2021-05-18 | Fisher-Rosemount Systems, Inc. | Framework for privacy-preserving big-data sharing using distributed ledger |
US11782421B2 (en) | 2019-05-06 | 2023-10-10 | Fisher-Rosemount Systems, Inc. | Framework for privacy-preserving big-data sharing using distributed ledgers |
US11356243B2 (en) * | 2019-05-08 | 2022-06-07 | Mallservice Inc. | Information management system with blockchain authentication |
US20220058184A1 (en) * | 2019-06-03 | 2022-02-24 | Advanced New Technologies Co., Ltd. | Service identifier-based data indexing |
US11816099B2 (en) * | 2019-06-03 | 2023-11-14 | Advanced New Technologies Co., Ltd. | Service identifier-based data indexing |
US11922741B2 (en) * | 2019-06-07 | 2024-03-05 | Volvo Car Corporation | Secure installation of approved parts using blockchain |
US11122087B2 (en) | 2019-06-27 | 2021-09-14 | Advanced New Technologies Co., Ltd. | Managing cybersecurity vulnerabilities using blockchain networks |
US10698738B1 (en) * | 2019-06-27 | 2020-06-30 | Alibaba Group Holding Limited | Implementing a blockchain-based workflow |
US12130607B2 (en) * | 2019-06-28 | 2024-10-29 | Dmg Mori Co., Ltd. | Information processing apparatus and method for remotely correcting movement of a machine tool on the basis of measurement data measured during a licensing period |
US20210067536A1 (en) * | 2019-07-03 | 2021-03-04 | Battelle Memorial Institute | Blockchain cybersecurity audit platform |
US11621973B2 (en) * | 2019-07-03 | 2023-04-04 | Battelle Memorial Institute | Blockchain cybersecurity audit platform |
US20220292621A1 (en) * | 2019-07-12 | 2022-09-15 | Shanghai Weilian Information Technology Co., Ltd. | Method and Apparatus For Processing Carbon Emission Reduction Data, and Computer Readable Storage Medium |
US11972420B2 (en) | 2019-08-09 | 2024-04-30 | Eygs Llp | Methods and systems for preventing transaction tracing on distributed ledger-based networks |
US10762228B2 (en) * | 2019-08-30 | 2020-09-01 | Alibaba Group Holding Limited | Transaction scheduling method and apparatus |
US11698897B2 (en) * | 2019-09-18 | 2023-07-11 | Boardwalktech, Inc | Cascading family of blockchains |
US11693393B2 (en) * | 2019-09-25 | 2023-07-04 | Schneider Electric Industries Sas | Blockchain method for controlling an industrial process |
US20210089011A1 (en) * | 2019-09-25 | 2021-03-25 | Schneider Electric Industries Sas | Blockchain method for controlling an industrial process |
US20220255762A1 (en) * | 2019-09-27 | 2022-08-11 | Hewlett-Packard Development Company, L.P. | Lifecycle change cryptographic ledger |
US11954681B2 (en) * | 2019-09-30 | 2024-04-09 | Southeast University | Blockchain-enhanced open internet of things access architecture |
US20220245634A1 (en) * | 2019-09-30 | 2022-08-04 | Southeast University | Blockchain-enhanced open internet of things access architecture |
US11544665B2 (en) | 2019-10-17 | 2023-01-03 | International Business Machines Corporation | Upstream visibility in supply-chain |
US11341457B2 (en) * | 2019-10-17 | 2022-05-24 | International Business Machines Corporation | Upstream visibility in supply-chain |
US12099969B2 (en) | 2019-10-17 | 2024-09-24 | International Business Machines Corporation | Upstream visibility in supply-chain |
US11734647B2 (en) | 2019-10-17 | 2023-08-22 | International Business Machines Corporation | Upstream visibility in supply-chain |
US20220237562A1 (en) * | 2019-10-17 | 2022-07-28 | International Business Machines Corporation | Upstream visibility in supply-chain |
US11861558B2 (en) * | 2019-10-17 | 2024-01-02 | International Business Machines Corporation | Upstream visibility in supply-chain |
US20210122489A1 (en) * | 2019-10-29 | 2021-04-29 | Ga Telesis, Llc | System and method for monitoring and certifying aircrafts and components of aircrafts |
US11820529B2 (en) * | 2019-10-29 | 2023-11-21 | Ga Telesis, Llc | System and method for monitoring and certifying aircrafts and components of aircrafts |
US20220272203A1 (en) * | 2019-11-11 | 2022-08-25 | Huawei Technologies Co., Ltd. | Blockchain-Based Roaming Transaction Method and Apparatus |
US11481841B2 (en) | 2019-11-20 | 2022-10-25 | Eygs Llp | Systems, apparatus and methods for identifying distinguishing characteristics of fungible assets using zero-knowledge proof on a distributed ledger-based network |
US11362808B2 (en) * | 2019-12-06 | 2022-06-14 | Sasken Technologies Ltd | Method and system for consensus in a permissioned blockchain |
US20210182265A1 (en) * | 2019-12-13 | 2021-06-17 | Hyundai Motor Company | Blockchain generation system and method for operating the same |
US11580087B2 (en) * | 2019-12-13 | 2023-02-14 | Hyundai Motor Company | Blockchain generation system and method for operating the same |
CN111143874A (en) * | 2019-12-16 | 2020-05-12 | 广州粤建三和软件股份有限公司 | Hoisting equipment monitoring method and system based on block chain and storage medium |
CN113129026A (en) * | 2019-12-27 | 2021-07-16 | 南京知物有格信息科技有限公司 | Intelligent management and control system for tracing to source of block chain commodities |
US12007740B2 (en) * | 2019-12-31 | 2024-06-11 | Schneider Electric Systems Usa, Inc. | Secure network of safety PLCs for industrial plants |
CN113126577A (en) * | 2019-12-31 | 2021-07-16 | 施耐德电子系统美国股份有限公司 | Safety network for safety PLC of industrial plant |
WO2021155384A1 (en) * | 2020-01-31 | 2021-08-05 | Steamchain.Io | Tracking of equipment utilization via a distributed ledger |
US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
US20210241138A1 (en) * | 2020-02-04 | 2021-08-05 | Ford Global Technologies, Llc | Vehicle powertrain analysis in networked fleets |
EP3865976A1 (en) * | 2020-02-11 | 2021-08-18 | The Boeing Company | Autonomously identifying and locating electronic equipment modules in a rack |
US11328137B2 (en) | 2020-02-11 | 2022-05-10 | The Boeing Company | Autonomously identifying and locating electronic equipment modules in a rack |
US11361262B2 (en) * | 2020-02-18 | 2022-06-14 | Guangdong University Of Technology | Blockchain-enabled edge computing method for production scheduling |
US20220215382A1 (en) * | 2020-02-26 | 2022-07-07 | Byte to Byte LLC | Blockchain-based product authentication system |
US11513490B2 (en) | 2020-03-24 | 2022-11-29 | Honeywell International Inc. | I/O mesh architecture for a safety instrumented system |
US11762742B2 (en) | 2020-03-31 | 2023-09-19 | Honeywell International Inc. | Process control system with different hardware architecture controller backup |
US20210319411A1 (en) * | 2020-04-09 | 2021-10-14 | Blockchain FOB | Systems and methods for tracking equipment lifetimes and generating history reports to the same |
US11574308B2 (en) | 2020-04-15 | 2023-02-07 | Eygs Llp | Intelligent assertion tokens for authenticating and controlling network communications using a distributed ledger |
US11783333B2 (en) | 2020-04-15 | 2023-10-10 | Eygs Llp | Intelligent assertion tokens for authenticating and controlling network communications using a distributed ledger |
US11544229B1 (en) * | 2020-04-29 | 2023-01-03 | American Express Travel Related Services Company, Inc | Enhanced tracking of data flows |
WO2021219689A1 (en) * | 2020-04-29 | 2021-11-04 | Atlas Copco Industrial Technique Ab | Blockhain network based license management |
US20210352110A1 (en) * | 2020-05-08 | 2021-11-11 | Rockwell Automation Technologies, Inc. | Automatic endpoint security policy assignment by zero-touch enrollment |
US11575571B2 (en) | 2020-05-08 | 2023-02-07 | Rockwell Automation Technologies, Inc. | Centralized security event generation policy |
US11588856B2 (en) * | 2020-05-08 | 2023-02-21 | Rockwell Automation Technologies, Inc. | Automatic endpoint security policy assignment by zero-touch enrollment |
US12052137B2 (en) | 2020-05-08 | 2024-07-30 | Rockwell Automation Technologies, Inc. | Centralized security event generation policy |
US20220005051A1 (en) * | 2020-07-06 | 2022-01-06 | Vertical Solutions, Inc. | Alarm response automation in a supply chain environment |
CN111818056A (en) * | 2020-07-09 | 2020-10-23 | 重庆邮电大学 | Industrial Internet identity authentication method based on block chain |
CN111865594A (en) * | 2020-07-16 | 2020-10-30 | 杭州溪塔科技有限公司 | Block chain based product testing method and system, electronic equipment and storage medium |
US20230298048A1 (en) * | 2020-07-23 | 2023-09-21 | Thales | Method for sharing data relating to the manufacturing of a product |
CN112070343A (en) * | 2020-07-29 | 2020-12-11 | 广东飞企互联科技股份有限公司 | Visualization method for industrial chain graph display |
US20230244202A1 (en) * | 2020-08-19 | 2023-08-03 | Siemens Aktiengesellschaft | Systems and methods for digital authentication of usage data of an automation plant |
WO2022046818A1 (en) * | 2020-08-25 | 2022-03-03 | The Provenance Chain Network, Inc. | Product object story to track aspects of product lifecycle |
EP4204922A4 (en) * | 2020-08-25 | 2024-02-21 | The Provenance Chain Network, Inc. | Product object story to track aspects of product lifecycle |
EP4204923A4 (en) * | 2020-08-25 | 2024-02-21 | The Provenance Chain Network, Inc. | Product object story signaling for consumer communications |
US20230325753A1 (en) * | 2020-08-25 | 2023-10-12 | The Provenance Chain Network, Inc. | Product object story to track aspects of product lifecycle |
EP4204924A4 (en) * | 2020-08-25 | 2024-02-21 | The Provenance Chain Network, Inc. | Conditional performance of actions based on product object story |
EP4204904A4 (en) * | 2020-08-25 | 2024-02-21 | The Provenance Chain Network, Inc. | Product object story signaling for tracking product lifecycle |
WO2022046819A1 (en) * | 2020-08-25 | 2022-03-03 | The Provenance Chain Network, Inc. | Product object story signaling for consumer communications |
WO2022046821A1 (en) * | 2020-08-25 | 2022-03-03 | The Provenance Chain Network, Inc. | Conditional performance of actions based on product object story |
US11550307B2 (en) * | 2020-08-26 | 2023-01-10 | Accenture Global Solutions Limited | Asset management, registry, and tracking on shared blockchain nodes |
CN114103641A (en) * | 2020-08-28 | 2022-03-01 | 丰田自动车北美公司 | Dynamic vehicle energy control |
US20220066403A1 (en) * | 2020-08-31 | 2022-03-03 | Siemens Aktiengesellschaft | Controlling an operation of a technical system automatically |
US11989084B2 (en) | 2020-09-23 | 2024-05-21 | Honeywell International Inc. | Self-healing process control system |
US11876774B2 (en) | 2020-09-28 | 2024-01-16 | Unstoppable Domains Inc. | Resolving blockchain domains |
US11985252B1 (en) | 2020-09-28 | 2024-05-14 | Unstoppable Domains Inc. | Resolving and managing blockchain domains |
EP3979151A1 (en) * | 2020-09-30 | 2022-04-06 | Rockwell Automation Technologies, Inc. | Data driven remote support |
US11874938B2 (en) | 2020-11-03 | 2024-01-16 | Honeywell International Inc. | Admittance mechanism |
US20220198392A1 (en) * | 2020-12-23 | 2022-06-23 | Abb Schweiz Ag | Distributed Ledger Arrangement For Supporting Service Transactions In An Industrial System |
US20220222245A1 (en) * | 2021-01-13 | 2022-07-14 | Unstoppable Domains Inc. | Blockchain registry scaling |
US20240104090A1 (en) * | 2021-01-13 | 2024-03-28 | Unstoppable Domains Inc. | Blockchain registry scaling |
US11886425B2 (en) * | 2021-01-13 | 2024-01-30 | Unstoppable Domains Inc. | Blockchain registry scaling |
US11799641B2 (en) * | 2021-01-19 | 2023-10-24 | Dell Products L.P. | System functionality activation using distributed ledger |
WO2022169456A1 (en) * | 2021-02-05 | 2022-08-11 | Hewlett-Packard Development Company, L.P. | Determining object creation instructions |
US20220327240A1 (en) * | 2021-04-12 | 2022-10-13 | Siemens Aktiengesellschaft | Method for securing asset maintenance information and asset having a lifecycle blockchain node |
EP4075350A1 (en) * | 2021-04-12 | 2022-10-19 | Siemens Aktiengesellschaft | Method for securing asset maintenance information and asset with a life cycle blockchain node |
CN113220665A (en) * | 2021-05-20 | 2021-08-06 | 成都质数斯达克科技有限公司 | Block chain data archiving method and device, electronic equipment and readable storage medium |
US20230012832A1 (en) * | 2021-07-13 | 2023-01-19 | Rockwell Automation Technologies, Inc. | Industrial automation control project conversion |
US12001874B2 (en) | 2021-07-13 | 2024-06-04 | Rockwell Automation Technologies | Digital engineering secure remote access |
US12020056B2 (en) * | 2021-07-13 | 2024-06-25 | Rockwell Automation Technologies, Inc. | Industrial automation control project conversion |
US12079652B2 (en) | 2021-07-13 | 2024-09-03 | Rockwell Automation Technologies, Inc. | Digital engineering virtual machine infrastructure |
WO2023027698A1 (en) * | 2021-08-24 | 2023-03-02 | The Provenance Chain Network, Inc. | Object story signaling for consumer communications |
US20230066880A1 (en) * | 2021-08-31 | 2023-03-02 | Rockwell Automation Technologies, Inc. | Safety bus in an industrial device assembly |
US11677348B2 (en) * | 2021-08-31 | 2023-06-13 | Rockwell Automation Technologies, Inc. | Safety bus in an industrial device assembly |
US12050510B2 (en) | 2021-09-24 | 2024-07-30 | Micro Focus Llc | Lifecycle hardware, firmware, and software tracking using blockchain |
US20230289769A1 (en) * | 2021-10-15 | 2023-09-14 | Shtar Llc | Secure transaction networks |
US20230136418A1 (en) * | 2021-10-28 | 2023-05-04 | Dell Products L.P. | System and method for secured shipment verification and component forensic tracking |
US20240104520A1 (en) * | 2022-09-28 | 2024-03-28 | Rockwell Automation Technologies, Inc. | INDUSTRIAL SECURITY USING BLOCKCHAIN OR NFTs |
WO2024118512A1 (en) * | 2022-11-28 | 2024-06-06 | Fin3 Technologies, Inc. | System and methods for interfacing and integrating distributed ledger and financial services |
US12105826B1 (en) | 2023-03-09 | 2024-10-01 | Istari Digital, Inc. | Security architecture for interconnected digital engineering and certification ecosystem |
Also Published As
Publication number | Publication date |
---|---|
US10747201B2 (en) | 2020-08-18 |
US20210132582A1 (en) | 2021-05-06 |
US11809159B2 (en) | 2023-11-07 |
US10928803B2 (en) | 2021-02-23 |
US20190339668A1 (en) | 2019-11-07 |
US20200333765A1 (en) | 2020-10-22 |
US20190339678A1 (en) | 2019-11-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11809159B2 (en) | Managing blockchains in an industrial facility based on firmware change | |
EP3564881A1 (en) | Blockchain-enabled industrial devices | |
US11733683B2 (en) | Industrial data services platform | |
US10026049B2 (en) | Risk assessment for industrial systems using big data | |
CN114253941A (en) | Data modeling and asset management using an industrial information center | |
US7809683B2 (en) | Library that includes modifiable industrial automation objects | |
CN114137910B (en) | Industrial automation asset and control project analysis | |
EP3971666A1 (en) | Connectivity to an industrial information hub | |
CN115623014A (en) | Secure remote access to digital engineering | |
CN114167814A (en) | Digital engineering for industrial development centers | |
CN115617447A (en) | Digital engineering virtual machine infrastructure | |
US20240028014A1 (en) | Field Device Digital Twins in Process Control and Automation Systems | |
EP4152227A1 (en) | Industrial machine monitoring path for computerized maintenance management system | |
US20210058460A1 (en) | Securing an automation component | |
CN114237164B (en) | Industrial development center library and design tool | |
US20240111273A1 (en) | Performance-based smart contracts in industrial automation | |
EP4345719A1 (en) | Industrial automation blockchain data management | |
US20240106666A1 (en) | INDUSTRIAL AUTOMATION MANUFACTURING WITH NFTs AND SMART CONTRACTS | |
US20240106665A1 (en) | Industrial blockchain enabled automation control | |
US20240106667A1 (en) | Tokenized industrial automation software | |
EP4343600A2 (en) | Industrial blockchain enabled automation control | |
US20240104520A1 (en) | INDUSTRIAL SECURITY USING BLOCKCHAIN OR NFTs | |
US20240039870A1 (en) | Location specific communications gateway for multi-site enterprise | |
WO2023250186A1 (en) | Supply chain visualization and control |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ROCKWELL AUTOMATION TECHNOLOGIES, INC., OHIO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BIERNAT, TIM S.;WEINHOFER, JUERGEN K.;BADDAM, SHARATH CHANDER REDDY;AND OTHERS;REEL/FRAME:046677/0628 Effective date: 20180823 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCV | Information on status: appeal procedure |
Free format text: NOTICE OF APPEAL FILED |
|
STCV | Information on status: appeal procedure |
Free format text: APPEAL BRIEF (OR SUPPLEMENTAL BRIEF) ENTERED AND FORWARDED TO EXAMINER |
|
STCV | Information on status: appeal procedure |
Free format text: ON APPEAL -- AWAITING DECISION BY THE BOARD OF APPEALS |
|
STCV | Information on status: appeal procedure |
Free format text: BOARD OF APPEALS DECISION RENDERED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |