Download document () of 20

How to design future-proof HMIs

Operators in modern industrial settings often control multiple pieces of equipment via tablets or mobile devices. User-centered HMIs on mobile or wearable devices offer many benefits, providing task-specific information anytime, anywhere. These devices can perform various functions, from alerting operators about upcoming steps to enabling remote monitoring.

However, using smart devices for issuing commands, not just notifications, presents challenges. These include minimizing cybersecurity threats, establishing secure control and ensuring data consistency.

Implementing secure, context-specific control

You will need to establish a comprehensive understanding of the use context, including each user’s role. First, identify different categories of users, such as general operators, supervisors and maintenance staff. Then, allocate each of them a user group, with a description of the respective role profile. This makes it possible to assign the information needs and permissions in a role-specific manner, while enhancing safety and security.

Some key considerations for designing context-specific control 

  • Role-based logins determine the level of access – by filtering content at login rather than building a homogenized user experience for everyone.
  • Role-specific dialog boxes can feature varying levels of detail so only information necessary for the task at hand is displayed.
  • Limit access to sensitive user interface sections by role, but ensure key info and controls remain available to all users

 

Embracing industry 4.0, securely  

More and more machines are being connected to the cloud, to enhance the availability of data, maximize uptime and drive the trend in smart manufacturing. In parallel, certain workflows, particularly monitoring and maintenance, are often outsourced. This demands the secure integration of external service providers.

All of this has implications for HMI design to ensure data availability, cloud connectivity and (cyber)security:

  • Facilitate the integration of external roles by implementing task control via a cloud infrastructure.
  • Always ensure cybersecurity is one of the main criteria for component selection and HMI system design.
  • Provide external roles with restricted access, so that they receive status updates, warnings and alerts deemed necessary to servicing the machines they are responsible for.
  • Allow your external service providers to leverage this data effectively to autonomously determine whether an intervention or repair is necessary as part of predictive maintenance approaches.