IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
UP-0853655
(2004-05-25)
|
등록번호 |
US-7526347
(2009-07-01)
|
발명자
/ 주소 |
- Lucas, J. Michael
- Webb, Arthur
- Nixon, Mark J.
- Jundt, Larry O.
- Li, Jian
- Stevenson, Dennis L.
- Ott, Michael G.
- Koska, Herschel O.
- Havekost, Robert B.
|
출원인 / 주소 |
- Fisher Rosemount Systems, Inc.
|
대리인 / 주소 |
Marshall, Gerstein & Borun LLP
|
인용정보 |
피인용 횟수 :
23 인용 특허 :
45 |
초록
▼
A configuration system uses process plant items that may represent, or be capable of representing, entities in a process plant to assist in configuring, organizing, and changing the control and display activities within the process plant. Access to the items may be controlled by associating access c
A configuration system uses process plant items that may represent, or be capable of representing, entities in a process plant to assist in configuring, organizing, and changing the control and display activities within the process plant. Access to the items may be controlled by associating access control data with the items. The configuration system may also use objects that represent, or may be capable of representing, one or more steps to be performed by entities in the process plant. Access to these objects may be controlled by associating access control data with the objects. The access control data may indicate whether users or certain users may be able to, for example, view or modify all or some data associated with the process plant items or the objects. The process plant items may comprise, for example, module class objects which may be capable of generically representing process entities of the process plant, module objects which may be capable of specifically representing process entities of the process plant, composite templates, module templates, etc. The objects that represent, or may be capable of representing, one or more steps to be performed by entities in the process plant may comprise, for example, phase classes or unit phases.
대표청구항
▼
What is claimed is: 1. A method for controlling access to data associated with a process plant, comprising: receiving via a user interface a request to access an object representative of at least one of a process entity within the process plant or one or more steps to be performed by one or more pr
What is claimed is: 1. A method for controlling access to data associated with a process plant, comprising: receiving via a user interface a request to access an object representative of at least one of a process entity within the process plant or one or more steps to be performed by one or more process entities within the process plant, the object including a global security parameter and one or more sub-element security parameters corresponding to one or more sub-elements of the object; examining the global security parameter of the object to determine if access to the object is to be limited; determining a level of access based on the examined global security parameter, including determining whether the one or more sub-elements of the object should be hidden based on the one or more sub-element security parameters; and providing the level of access, including permitting sub-elements that should not be hidden to be viewed and preventing sub-elements that should be hidden from being viewed. 2. A method as defined in claim 1, wherein receiving the request comprises receiving a request to view the one or more sub-elements of the object. 3. A method as defined in claim 1, wherein receiving the request comprises receiving a request to modify the object; wherein determining the level of access further comprises determining whether to allow modification of the object, and; wherein providing the level of access further comprises permitting modification of the object only if it is determined that modification of the object is to be allowed. 4. A method as defined in claim 1, wherein determining the level of access further comprises determining the level of access further based on information associated with a user that initiated the request to access the object. 5. A method as defined in claim 4, wherein determining the level of access further comprises determining the level of access based on an identity of the user. 6. A method as defined in claim 4, wherein determining the level of access further comprises determining the level of access based on a security access level associated with the user. 7. A method as defined in claim 4, further comprising: prompting the user to enter a password; receiving a password entered by the user; comparing the password entered by the user with stored password data; wherein determining the level of access further comprises determining the level of access based on the comparison of the password entered by the user with the stored password data. 8. A method as defined in claim 1, wherein providing the level of access further comprises at least one of not permitting a user to modify the object, permitting the user to modify the object, or permitting the user to modify only some sub-elements of which the object is comprised. 9. A method as defined in claim 1, wherein receiving via the user interface the request to access the object comprises receiving via the user interface a request to access a class object that generically represents the process entity within the process plant. 10. A method as defined in claim 1, wherein receiving via the user interface the request to access the object comprises receiving via the user interface a request to access a class object that specifically represents the process entity within the process plant. 11. A method as defined in claim 1, wherein receiving via the user interface the request to access the object comprises receiving via the user interface a request to access at least one of a composite template, a module template, a phase class, and a unit phase. 12. A method for controlling access to data associated with a process plant, comprising: receiving via a user interface a request to modify a group of items, wherein each item in the group of items is representative of at least one of a corresponding process entity within the process plant or one or more steps to be performed by one or more process entities within the process plant, the group of items corresponding to a group object having a global group security parameter and a sub-element security parameter for each sub-element of the group of items; examining the global group security parameter to determine if access to the group of items is to be allowed; examining a sub-element security parameter for one or more sub-elements of the group of objects; determining if the one or more sub-elements of the group of items should be hidden based on the examined global group security parameter and the examined sub-element security parameter; permitting sub-elements of the group of items that should not be hidden to be viewed, and preventing sub-elements of the group of items that should be hidden from being viewed; determining whether to permit modification of the group of items based on the examined global group security parameter; and permitting the group of items to be modified only if it is determined that modification of the group of items is to be permitted. 13. A method as defined in claim 12, wherein receiving the request to modify comprises receiving via the user interface a request to modify a group of objects, wherein each object in the group of objects is representative of at least one of a corresponding process entity within the process plant and one or more steps to be performed by one or more process entities within the process plant. 14. A method as defined in claim 13, wherein at least one object in the group of objects generically represents a corresponding process entity within the process plant. 15. A method as defined in claim 13, wherein at least one object in the group of objects specifically represents a corresponding process entity within the process plant. 16. A method as defined in claim 13, wherein at least one object in the group of objects comprises at least one of a composite template, a module template, a phase class, and a unit phase. 17. A method as defined in claim 13, wherein receiving the request to modify the group of objects comprises at least one of: receiving a request to modify one or more objects in the group of objects; receiving a request to remove one or more objects from the group of objects; and receiving a request to add one or more new objects to the group of objects. 18. A method as defined in claim 12, wherein determining whether to permit modification of the group of items based on the examined global group security parameter further comprises determining whether to permit modification of the group of items based on the examined global group security parameter and further based on information associated with a user that initiated the request to modify the group of items. 19. A method as defined in claim 18, wherein information associated with the user comprises data indicating an identity of the user. 20. A method as defined in claim 18, wherein information associated with the user comprises data indicating a security access level associated with the user. 21. A method as defined in claim 18, further comprising: prompting the user to enter a password; receiving a password entered by the user; and comparing the password entered by the user with stored password data; wherein determining whether to permit modification of the group of items based on the examined global group security parameter and the information associated with a user that initiated the request further comprises determining whether to permit modification of the group of items based on the comparison of the password entered by the user with the stored password data. 22. A method for exporting data capable of being associated with a process plant, comprising: receiving via a user interface a request to export one or more objects, each object capable of representing at least one of an item in a process plant or one or more steps to be performed by one or more process entities within the process plant; examining, for each object, a global security parameter of the object to determine if access to data of the object is to be limited; for each object, if access to data of the object is to be limited, encrypting the data to generate encrypted data; for each object, if access to data of the object is to be limited, replacing the data with the encrypted data; and exporting the one or more objects. 23. A method as defined in claim 22, wherein at least one object in the one or more objects generically represents a corresponding process entity within the process plant. 24. A method as defined in claim 22, wherein at least one object in the one or more objects specifically represents a corresponding process entity within the process plant. 25. A method as defined in claim 22, wherein at least one object in the one or more objects comprises a composite template. 26. A method as defined in claim 22, further comprising: for each object, if access to data of the object is to be limited, encrypting access security data associated with the object; for each object, if access to data of the object is to be limited, replacing the access security data with the encrypted access security data. 27. A system for facilitating configuration or viewing of a configuration associated with at least a portion of a process plant, comprising: a computer readable medium; a processor in communication with the computer-readable medium; a database to store an object representative of at least one of a process entity within the process plant or one or more steps to be performed by one or more process entities within the process plant, the object having a global security parameter and a sub-element security parameter corresponding to each of one or more sub-elements of the object; a routine stored on the computer-readable medium and configured to be executed by the processor to receive via a user interface a request to access the object; examine the global security parameter of the object to determine if access to the object is to be limited, determine a level of access based on the examined global security parameter, comprising determining whether the one or more of sub-elements of the object should be hidden based on the examined global security parameter and a sub-element security parameter corresponding to the one or more sub-elements of the object, and provide the level of access, comprising permitting sub-elements that should not be hidden to be viewed and preventing sub-elements that should be hidden from being viewed. 28. A method as defined in claim 27 wherein the routine is configured to be executed by the processor to receive the request to access the object via at least one of a user interface associated with a configuration system, a user interface associated with a debugging system, a user interface associated with a monitoring system, and a user interface associated with an asset management system. 29. A system for facilitating configuration or viewing of a configuration associated with at least a portion of a process plant, comprising: a computer readable medium; a processor in communication with the computer-readable medium; a database to store a group object corresponding to a group of items, wherein each item in the group of items is representative of at least one of a corresponding process entity within the process plant or one or more steps to be performed by one or more process entities within the process plant, the group object including a global group security parameter and a sub-element security parameter corresponding to each sub-element of the group of items; a routine stored on the computer-readable medium and configured to be executed by the processor to receive via a user interface a request to modify the group of items, examine the global group security parameter of the group object to determine if access to the group of items is to be allowed; examine a sub-element security parameter corresponding to one or more sub-elements of the group of items; determine if the one or more sub-elements of the group of items should be hidden based on the examined global group security parameter and the examined sub-element security parameter; permit sub-elements of the group of items that should not be hidden to be viewed, and preventing sub-elements of the group of items that should be hidden from being viewed; determine whether to permit modification of the group of items based on the examined global group security parameter; and permit the group of items to be modified only if it is determined that modification of the group of items is to be permitted. 30. A method as defined in claim 29, wherein the routine is configured to be executed by the processor to receive the request to modify the group of items via at least one of a user interface associated with a configuration system, a user interface associated with a debugging system, a user interface associated with a monitoring system, and a user interface associated with an asset management system. 31. A configuration system for facilitating configuration of a process plant, comprising: a computer readable medium; a processor in communication with the computer-readable medium; a database to store one or more objects, each object capable of representing at least one of a process entity within the process plant or one or more steps to be performed by one or more process entities within the process plant; a configuration routine stored on the computer-readable medium and configured to be executed by the processor to receive via a user interface a request to export some or all of the one or more objects; examining, for each object, a global security parameter of the object to determine if access to data of the object is to be limited; for each object, if access to data of the object is to be limited, encrypting the data to generate encrypted data; for each object, if access to data of the object is to be limited, replacing the data with the encrypted data; and exporting the some or all of the one or more objects.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.