Se ha denunciado esta presentación.
Se está descargando tu SlideShare. ×

Industry 4.0: Sensor Driven Manufacturing

Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Próximo SlideShare
Fundamentals of industry 4.0
Fundamentals of industry 4.0
Cargando en…3
×

Eche un vistazo a continuación

1 de 18 Anuncio

Industry 4.0: Sensor Driven Manufacturing

Descargar para leer sin conexión

Key Findings:
- We are in an industrial revolution… right now!
- User Experience must extend “from the screen to the shop”
- Security considerations continue to increase in scope
- AWS infrastructure and SMART COSMOS platform services are powerful options for realizing Industry 4.0

Key Findings:
- We are in an industrial revolution… right now!
- User Experience must extend “from the screen to the shop”
- Security considerations continue to increase in scope
- AWS infrastructure and SMART COSMOS platform services are powerful options for realizing Industry 4.0

Anuncio
Anuncio

Más Contenido Relacionado

Presentaciones para usted (20)

Similares a Industry 4.0: Sensor Driven Manufacturing (20)

Anuncio

Más reciente (20)

Industry 4.0: Sensor Driven Manufacturing

  1. 1. AWS Enterprise Summit, Frankfurt, 2015 Industry 4.0: Sensor Driven Manufacturing
  2. 2. About Us 31 March 2015 Page 2SMARTRAC TECHNOLOGY GROUP – ALL RIGHTS RESERVED Empowering the Eco-System of Connected Things SMARTRAC is the leading global company in the field of RFID technology. We make products smarter and enable businesses by allowing them to identify, authenticate, track and complement their product offerings with digital based services. Our technology enables businesses to link their specific product instances with back and front office IT systems as well as with Cloud services. SMARTRAC is uniquely positioned to develop and provide high security, high- quality products and services that can be linked to any object, including industrial assets, consumer goods, credit cards, passports, access control solutions, vehicles, and many more.
  3. 3. Understanding RFID 31 March 2015 Page 3 Chip Antenna 1. 2. Reader Sends RF Signal Transponder Receives RF Signal Transponder Sends RFID Data Back Reader Receives Response 3. Software Processes RFID Data Transponder is Identified Technology Benefits Security:  RFID offers superior theft and fraud protection, as well as authentication features Information:  RFID enables access to relevant information about processes; surrogate key capabilities, 2FA, etc. Efficiency:  RFID automates processes Longevity:  Passive RFID does not require batteries; decades of use depending on environmental conditions  SMARTRAC TECHNOLOGY GROUP – ALL RIGHTS RESERVED
  4. 4. RFID Strengths 31 March 2015 Page 4 Barcode RFID Range max. 5 cm* up to several meters Resistant to Soiling No Line of Sight Required No Influence of Item Positioning Copy Protection Information Content Limited to Code Completely Variable Readable Items per Second 1 up to 1000         QR-Code max. 5 cm* Variable, but Limited     1 * Depending on Size SMARTRAC TECHNOLOGY GROUP – ALL RIGHTS RESERVED
  5. 5. 31 March 2015 Page 5 Industrial Revolution Timeline 1. Industrial Revolution Follows introduction of water- and steam-powered mechanical manufacturing facilities End of 18th century Start of 20th century Start of 1970s TODAY Follows introduction of electrically-powered mass production based on the division of labor 1784 First mechanical Loom 1870 First production line, Cincinnati slaughterhouses 2. Industrial Revolution 3. Industrial Revolution 1969 First programmable logic controller (PLC), Modicon 084 4. Industrial Revolution Uses electronics and IT to achieve further automation of manufacturing Based on cyber-physical systems, new protocols like MQTT/CoAP, and RFID for product identification complexity time SMARTRAC TECHNOLOGY GROUP – ALL RIGHTS RESERVED 2014 - Machine-to-Machine (M2M), Product-to-Machine (P2M)
  6. 6. 31 March 2015 Page 6 Embracing the Cyber Revolution SMARTRAC TECHNOLOGY GROUP – ALL RIGHTS RESERVED
  7. 7. Data Security Data Volume Data Format Role of RFID in Industry 4.0 31 March 2015 Page 7SMARTRAC TECHNOLOGY GROUP – ALL RIGHTS RESERVED
  8. 8. Case Study: Passive Sensing 31 March 2015 Page 8SMARTRAC TECHNOLOGY GROUP – ALL RIGHTS RESERVED RFMicron • Challenge: • Detecting water ingress into vehicle at final quality control check is an error prone, time consuming process (historical err rates > 8%) • Critical issue in hybrid/electric vehicles with semi-sealed compartments • Solution: • RFMicron and SMARTRAC provide passive UHF tags that are attached to the chassis during manufacturing • Can pinpoint leak source and location before leaving the factory, reducing warranty claims
  9. 9. Case Study: Reactive Manufacturing 31 March 2015 Page 9SMARTRAC TECHNOLOGY GROUP – ALL RIGHTS RESERVED • Challenge: • Link details about custom design requirements and needed components, such as screws, hinges and glass to doors • Solution: • Israeli door manufacturer Pandoor affixes passive UHF tags to the wood planks it uses to make its products • A SMARTRAC “Short Dipole” tag with an Impinj Monza 4QT chip is encoded with a Customer ID to track who ordered that door and what custom features and patterns have been requested
  10. 10. Monetizing Industry 4.0 31 March 2015 Page 10SMARTRAC TECHNOLOGY GROUP – ALL RIGHTS RESERVED
  11. 11. SMART COSMOS Platform Services 31 March 2015 Page 11SMARTRAC TECHNOLOGY GROUP – ALL RIGHTS RESERVED
  12. 12. 31 March 2015 Page 12 Accelerating Industry 4.0 Adoption Without SMART COSMOS With SMART COSMOS In a world without SMART COSMOS, software engineers would have to spend 80% of their time building out foundation infrastructure before they could actually innovate in their specific vertical market. In a world with SMART COSMOS, software engineers can spend 80% of their time innovating. SMART COSMOS platform services take care of the foundation necessary to build RFID-centric powered solutions in any vertical market. SMARTRAC TECHNOLOGY GROUP – ALL RIGHTS RESERVED
  13. 13. Combating Counterfeit in Industry 4.0 31 March 2015 Page 13 Source: Lowe, Rebecca. “War on Fakes.” International Bar Association. 29 July 2013. Web. 22 Jan 2015. http://tinyurl.com/ibanet-fake-goods The trade in fake goods could cost the global economy $1.7 trillion by the end of 2015, according to the International Chamber of Commerce SMARTRAC TECHNOLOGY GROUP – ALL RIGHTS RESERVED
  14. 14. Historical Concerns Industry 4.0 Concerns • Data in Transit • TLS/SSL • Data at Rest • Encryption in a database • AuthN / AuthZ • Data at Rest on Premises • RFID tag, SIM card, etc. • Data in Transit on Premises • RFID Reader, BTLE, Zigbee • Data in Transit to Cloud • TLS/SSL • Data at Rest in Cloud • Encryption in a database Industry 4.0 Security Challenges 31 March 2015SMARTRAC TECHNOLOGY GROUP – ALL RIGHTS RESERVED Page 14
  15. 15. • Predefined production sequences limit flexibility • Reconfiguration difficult or impossible to achieve • Inability to support a custom “user experience” in the manufacturing process • Employees’ work defined by structure of production line Today 31 March 2015 Page 15SMARTRAC TECHNOLOGY GROUP – ALL RIGHTS RESERVED
  16. 16. • Dynamic manufacturing evolves because of new “separation of concerns” • Parts and raw materials become vocal and define their current state • Custom “user experience” can occur because assembly lines are no longer rigid and static Tomorrow 31 March 2015 Page 16SMARTRAC TECHNOLOGY GROUP – ALL RIGHTS RESERVED
  17. 17. • We are in an industrial revolution… right now! • User Experience must extend “from the screen to the shop” • Security considerations continue to increase in scope • AWS infrastructure and SMART COSMOS platform services are powerful options for realizing Industry 4.0 Final remarks 31 March 2015 Page 17SMARTRAC TECHNOLOGY GROUP – ALL RIGHTS RESERVED
  18. 18. Jason Weiss VP, Cloud Platforms and Applications jason.weiss@smartrac-group.com SMARTRAC TECHNOLOGY Fletcher, Inc. 267 Cane Creek Rd Fletcher, NC 28732 USA smartrac-group.com

Notas del editor

  • Drive home that a transponder doesn’t have 1TB of memory on it!
    By and large, what goes on the tag is generally accessible to anyone with a reader – link to future security concerns slide
    Discuss EPC equivalent concept in Industry, or lack thereof…
  • At the same time that the tag is being read, the reader encodes new data to the tag, indicating that the door is about to undergo the routing process, as well as when this will occur.
    In that way, an additional reader can interrogate the door's tag at a later date in order to confirm which manufacturing processes it has undergone, and to make sure that all work had been completed.
  • AuthN / AuthZ – mention Stormpath

    ** 10 minute plug for the AWS security expert **

×