SlideShare a Scribd company logo
1 of 20
Copyright © Rockwell Automation, Inc. All Rights Reserved.
Introdução para Prosafe Trapped
Key Systems
PEDRO HENRIQUE MELO • TECHNOLOGY CONSULTANT BRAZIL SAFETY • 08•21
Copyright © Rockwell Automation, Inc. All Rights Reserved.
Overview
• Trapped Key systems are utilized to force a specific sequence of events in
order to reduce risk
• In this module we will discuss:
– Application example
– Common terminology
– Trapped Key Interlocks – why do we use them
– Prosafe products
– Product coding
Copyright © Rockwell Automation, Inc. All Rights Reserved.
Application Example
• Machine has two gates that need to be accessed
– On occasion, both gates will need to be accessed at the same time
• One gate will allow full-body access
• One gate will only allow partial body access (reach in with hands)
• Power must be removed from the hazards prior to opening either gate
Copyright © Rockwell Automation, Inc. All Rights Reserved.
Application Example – Video
Copyright © Rockwell Automation, Inc. All Rights Reserved.
Common Terminology
• Trapped Key Interlock – also known as key transfer systems
• Primary Key
– Used to start a sequence
• Secondary Key
– Trapped at the start of a sequence, released after primary key is rotated
• Personnel key
– Secondary key to be released and carried by the
person into the hazard
Primary
Key
Secondary
Keys
Primary
Key
Primary
Key
Secondary/
Personnel
Key
Copyright © Rockwell Automation, Inc. All Rights Reserved.
Trapped Key Interlocks –
Why Do We Use Them?
• Sequential access, to follow a predetermined sequence of events
– Based on the premise that one key can not be in two places at the same time
– Each product is coded
– Optional personnel key available to ensure that a person entering a cell has control over the
sequence
• Power to products is not required (for mechanical units)
• Stainless steel solution, good for harsh environments
Solenoid Release Unit
Solenoid
Release Unit
3 Way Key
Exchange Unit
1 in 2 out
Bolt Lock
Single Key
Access Lock
Dual Key
Personnel Key
released from
Access lock
Copyright © Rockwell Automation, Inc. All Rights Reserved.
Prosafe Products
• Isolation Devices
– Rotary Switches
– Solenoid Release
– Bolt Lock
• Key Exchange Units (also called Key Control Element)
• Guarded Area Access Devices
– Access / Chain Locks
– Slam Locks
– Bolt Lock
• Specialty Devices
– Electronic Timed Delay Unit
– Stopped Motion Unit
– Mini Valve Locks
– Switchgear Adaptors
Copyright © Rockwell Automation, Inc. All Rights Reserved.
Isolation Devices
• Rotary Switches
– Used to isolate power. Once power is switched off the
previously trapped key is released for use in the next
step.
– Offered in Single, Dual, Triple and Quad key versions
• Solenoid Release Units
– Used on applications with rundown time controlled by
a PLC. Once safe conditions are reached the
indicator light indicates the key can be removed and
used in the next step of the sequence
– Offered in Single, Dual, Triple and Quad key versions
Copyright © Rockwell Automation, Inc. All Rights Reserved.
Key Exchange Unit
• Key Exchange Unit (Key Control Element)
– Used in an interlocking sequence to link together other devices in the Prosafe system
– One to three primary keys
• All must be present to release secondary key(s)
– Up to 24 secondary keys
• Primary key(s) trapped until ALL secondary keys
have been re-inserted, rotated, and trapped
Copyright © Rockwell Automation, Inc. All Rights Reserved.
Guarded Area Access Devices
• Guarded Area Access Devices
• Offered in Single, Dual, Triple and Quad key versions
• Available in Mechanical, Electrical, Solenoid versions
– Bolt Lock
• Bolt is extended into recess in a handle or control
element of a switching device and blocks it
• Also used in sliding doors where a recess is present
for the bolt to be extended into
• Note: Bolt lock should not be used on hinged doors
without another safety switch
– Access/Chain Lock
• Access Lock for Loose Fitting Doors
• Chain Lock for Extreme Misalignment of Door
– Slamlock
• Tongue actuator guard locks with trapped key control
Bolt extends in to the
recess blocking the
handle form turning
Copyright © Rockwell Automation, Inc. All Rights Reserved.
Bolt Locks
• Bolt Locks – Two primary uses:
– Used as Isolation device / Start Sequence device
• Bolt is extended into recess in a handle or control
element of a switching device and locks it position
• In “safe” position, key can be removed
– Used as Guarded Area Access device
• Only for sliding doors
• Bolt extends into a hole in the frame, locking sliding door
in safe position, then key can be removed
• Frame of door prevents the bolt from extending when the
sliding door is open
• Note: Bolt lock should not be used on hinged doors
without another safety switch
– Note that different versions of the bolt lock allow removing the
key based on the bolt being extended or retracted.
Bolt extends in to the
recess blocking the
handle from turning
Copyright © Rockwell Automation, Inc. All Rights Reserved.
Bolt Locks - Considerations
Hazard
• When using a Bolt Lock, care must be taken regarding the
mechanical considerations
• Example: Bolt Lock intended to hold sliding guard closed to
protect user from a hazard unless it is stopped
• What’s wrong with this implementation?
Bad – Bolt extended, key
removed, no protection
from hazard
Copyright © Rockwell Automation, Inc. All Rights Reserved.
Bolt Locks - Considerations
Hazard
Hazard
• System must be designed such that it mechanically prevents the bolt from extending when
the guard (or operating device) is NOT protecting a user from the hazard
• Proper implementation shown on the right
Bad – Bolt extended, key removed,
no protection from hazard
Good – When guard is open,
bolt cannot extend, therefore
key cannot be removed
Frame prevents bolt
from extending
Copyright © Rockwell Automation, Inc. All Rights Reserved.
Specialty Devices
• Specialty Devices
– Electronic Timed Delay Unit
• Timer output energizes internal solenoid, releasing key.
• Used in applications that required elapsed time before releasing key to allow
access to the hazard
– Stopped Motion Unit
• Stopped motion detection utilizing proximity sensors
• Detects when the hazardous motion has ceased before releasing the key to allow
access to the restricted area
– Mini Valve Locks
• Used to control the opening and closing of process valves in proper sequence
– Switchgear Adaptors
• Used to interlock preparatory switch gear applications
• Can be used to interlock host equipment such as spool valves
Copyright © Rockwell Automation, Inc. All Rights Reserved.
Hazard
Prosafe System
Key Free
Key Exchange Unit (2 in, 2 out)
Hazard
Isolation Valve
Bolt Lock
Solenoid
Release
Bolt
Lock
OFF
ON
Access Lock
Rotary Switch
Ca
Ca
Da
Da
Aa
Aa
Aa
Ba
Ba
Aa
Aa
Ba
Ba
Ca
Ca
Ea
Ea
Da
Da
Ea
Ea
Run
Safe
Blank
Blank
Copyright © Rockwell Automation, Inc. All Rights Reserved.
Product Coding
• The user must prevent codes from
being duplicated if multiple Prosafe
systems are used within the same
facility
• All codes have two letters when
ordered and are in capitals “AA”.
The actual units will have the first
letter capitalized and the second
letter lowercase, e.g. “Aa”
• Start the sequence with code Aa
and increment through the alphabet,
Ba, Ca, Da, etc. through Za, then
Ab, Bb, etc. through Zz.
Copyright © Rockwell Automation, Inc. All Rights Reserved.
Prosafe Builder – Software Simplification Tool
• Prosafe Builder – a software
tool to create a system BOM
– Part of the free ProposalWorks
suite
– Creates the product coding and
catalog numbers so that you
don’t have to
Copyright © Rockwell Automation, Inc. All Rights Reserved.
• Ejector key
– Some manufacturers find operators not taking
personnel key with them
– The Ejector Key promotes correct use of key by
the fact that is ejected from code barrel into
operator’s hand
– Ejection force is approximately 20 Newtons
• Replacement code barrels
– Used to replace damaged code barrel
– Easily replaceable with 2 specialty screws
Accessories
Copyright © Rockwell Automation, Inc. All Rights Reserved.
Lost, Broken Key, or Damaged Code Barrel?
• Emergency repair kit is the answer
– Kit includes 2 ER coded code barrels and key.
– Kits available ER1– ER9
• Simply replace the lost/broken “B” code barrel as well as the mating “B” code barrel in the
sequence with the ER1 coded barrels and your system is up and running
• Order replacement key or code barrel
Copyright © Rockwell Automation, Inc. All Rights Reserved.
Summary
• Trapped Key systems are utilized to force a specific sequence of events in
order to reduce risk
• You should now be able to:
– Explain why trapped key systems
are used
– Give an application example
– Define the common terminology
– Summarize the purpose of each type
of Prosafe product
– Understand the importance of codes
– Explain the purpose of Prosafe Builder
• Next you will complete a short knowledge check

More Related Content

Similar to Intro to Prosafe Trapped Key chave de segurança

Energy conservation security and complete automation
Energy conservation security and complete automationEnergy conservation security and complete automation
Energy conservation security and complete automationKishorKhandge1
 
Embabded system security for feuture .ppt
Embabded system security for feuture .pptEmbabded system security for feuture .ppt
Embabded system security for feuture .pptgunjansingh2917683
 
Safe Isolation Procedure
Safe Isolation ProcedureSafe Isolation Procedure
Safe Isolation Proceduretotalpeople
 
80377170-Alarm-Management_EEMUA 191.pptx
80377170-Alarm-Management_EEMUA 191.pptx80377170-Alarm-Management_EEMUA 191.pptx
80377170-Alarm-Management_EEMUA 191.pptxssusera75d07
 
4 david schepers certification process safety relay modules for machinery app...
4 david schepers certification process safety relay modules for machinery app...4 david schepers certification process safety relay modules for machinery app...
4 david schepers certification process safety relay modules for machinery app...Luiz Fernando Moraes
 
Frog J- Below-ground OPERATOR FOR SWING GATES UP TO 1.8 m (6 ft) PER GATE LEAF
Frog J- Below-ground OPERATOR FOR SWING GATES UP TO 1.8 m (6 ft) PER GATE LEAFFrog J- Below-ground OPERATOR FOR SWING GATES UP TO 1.8 m (6 ft) PER GATE LEAF
Frog J- Below-ground OPERATOR FOR SWING GATES UP TO 1.8 m (6 ft) PER GATE LEAFCAME India Automation Solutions Pvt.Ltd.
 
Perimeter facility-access-hardware
Perimeter facility-access-hardwarePerimeter facility-access-hardware
Perimeter facility-access-hardwareMail Box Production
 
Aaa lock smith company overview
Aaa lock smith   company overviewAaa lock smith   company overview
Aaa lock smith company overviewaaalocksmithinc
 
MECHATRONICS-UNIT 4-PROGRAMMABLE LOGIC CONTROLLER .ppt
MECHATRONICS-UNIT 4-PROGRAMMABLE LOGIC CONTROLLER .pptMECHATRONICS-UNIT 4-PROGRAMMABLE LOGIC CONTROLLER .ppt
MECHATRONICS-UNIT 4-PROGRAMMABLE LOGIC CONTROLLER .pptCHANDRA KUMAR S
 
A Comparison of Contemporary Electrical Distribution Equipment Standards
A Comparison of Contemporary Electrical Distribution Equipment StandardsA Comparison of Contemporary Electrical Distribution Equipment Standards
A Comparison of Contemporary Electrical Distribution Equipment Standardsmichaeljmack
 
De energization and lockout safety reminder training
De energization  and lockout safety reminder trainingDe energization  and lockout safety reminder training
De energization and lockout safety reminder trainingTerry Penney
 
Protection Relays - Ashida Electronics
Protection Relays - Ashida ElectronicsProtection Relays - Ashida Electronics
Protection Relays - Ashida ElectronicsAshida Electronics
 
Smart riding system using embedded systems by sakthivel.s praveen.r
Smart riding system using embedded systems by sakthivel.s praveen.rSmart riding system using embedded systems by sakthivel.s praveen.r
Smart riding system using embedded systems by sakthivel.s praveen.rJEEVA ARAVINTH
 
Are you at Risk? The Role of Lockout/Tagout in Pneumatic Safety
Are you at Risk? The Role of Lockout/Tagout in Pneumatic SafetyAre you at Risk? The Role of Lockout/Tagout in Pneumatic Safety
Are you at Risk? The Role of Lockout/Tagout in Pneumatic SafetyDesign World
 

Similar to Intro to Prosafe Trapped Key chave de segurança (20)

Energy conservation security and complete automation
Energy conservation security and complete automationEnergy conservation security and complete automation
Energy conservation security and complete automation
 
Embabded system security for feuture .ppt
Embabded system security for feuture .pptEmbabded system security for feuture .ppt
Embabded system security for feuture .ppt
 
Safe Isolation Procedure
Safe Isolation ProcedureSafe Isolation Procedure
Safe Isolation Procedure
 
Elearningtemplateppt
ElearningtemplatepptElearningtemplateppt
Elearningtemplateppt
 
80377170-Alarm-Management_EEMUA 191.pptx
80377170-Alarm-Management_EEMUA 191.pptx80377170-Alarm-Management_EEMUA 191.pptx
80377170-Alarm-Management_EEMUA 191.pptx
 
4 david schepers certification process safety relay modules for machinery app...
4 david schepers certification process safety relay modules for machinery app...4 david schepers certification process safety relay modules for machinery app...
4 david schepers certification process safety relay modules for machinery app...
 
Frog J- Below-ground OPERATOR FOR SWING GATES UP TO 1.8 m (6 ft) PER GATE LEAF
Frog J- Below-ground OPERATOR FOR SWING GATES UP TO 1.8 m (6 ft) PER GATE LEAFFrog J- Below-ground OPERATOR FOR SWING GATES UP TO 1.8 m (6 ft) PER GATE LEAF
Frog J- Below-ground OPERATOR FOR SWING GATES UP TO 1.8 m (6 ft) PER GATE LEAF
 
Perimeter facility-access-hardware
Perimeter facility-access-hardwarePerimeter facility-access-hardware
Perimeter facility-access-hardware
 
Lockout tagout
Lockout tagoutLockout tagout
Lockout tagout
 
Aaa lock smith company overview
Aaa lock smith   company overviewAaa lock smith   company overview
Aaa lock smith company overview
 
Poka yoke
Poka yokePoka yoke
Poka yoke
 
MECHATRONICS-UNIT 4-PROGRAMMABLE LOGIC CONTROLLER .ppt
MECHATRONICS-UNIT 4-PROGRAMMABLE LOGIC CONTROLLER .pptMECHATRONICS-UNIT 4-PROGRAMMABLE LOGIC CONTROLLER .ppt
MECHATRONICS-UNIT 4-PROGRAMMABLE LOGIC CONTROLLER .ppt
 
A Comparison of Contemporary Electrical Distribution Equipment Standards
A Comparison of Contemporary Electrical Distribution Equipment StandardsA Comparison of Contemporary Electrical Distribution Equipment Standards
A Comparison of Contemporary Electrical Distribution Equipment Standards
 
De energization and lockout safety reminder training
De energization  and lockout safety reminder trainingDe energization  and lockout safety reminder training
De energization and lockout safety reminder training
 
Physical access-system-brochure
Physical access-system-brochurePhysical access-system-brochure
Physical access-system-brochure
 
Chapter1
Chapter1Chapter1
Chapter1
 
Protection Relays - Ashida Electronics
Protection Relays - Ashida ElectronicsProtection Relays - Ashida Electronics
Protection Relays - Ashida Electronics
 
Lockout tagout
Lockout tagoutLockout tagout
Lockout tagout
 
Smart riding system using embedded systems by sakthivel.s praveen.r
Smart riding system using embedded systems by sakthivel.s praveen.rSmart riding system using embedded systems by sakthivel.s praveen.r
Smart riding system using embedded systems by sakthivel.s praveen.r
 
Are you at Risk? The Role of Lockout/Tagout in Pneumatic Safety
Are you at Risk? The Role of Lockout/Tagout in Pneumatic SafetyAre you at Risk? The Role of Lockout/Tagout in Pneumatic Safety
Are you at Risk? The Role of Lockout/Tagout in Pneumatic Safety
 

Recently uploaded

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 

Recently uploaded (20)

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 

Intro to Prosafe Trapped Key chave de segurança

  • 1. Copyright © Rockwell Automation, Inc. All Rights Reserved. Introdução para Prosafe Trapped Key Systems PEDRO HENRIQUE MELO • TECHNOLOGY CONSULTANT BRAZIL SAFETY • 08•21
  • 2. Copyright © Rockwell Automation, Inc. All Rights Reserved. Overview • Trapped Key systems are utilized to force a specific sequence of events in order to reduce risk • In this module we will discuss: – Application example – Common terminology – Trapped Key Interlocks – why do we use them – Prosafe products – Product coding
  • 3. Copyright © Rockwell Automation, Inc. All Rights Reserved. Application Example • Machine has two gates that need to be accessed – On occasion, both gates will need to be accessed at the same time • One gate will allow full-body access • One gate will only allow partial body access (reach in with hands) • Power must be removed from the hazards prior to opening either gate
  • 4. Copyright © Rockwell Automation, Inc. All Rights Reserved. Application Example – Video
  • 5. Copyright © Rockwell Automation, Inc. All Rights Reserved. Common Terminology • Trapped Key Interlock – also known as key transfer systems • Primary Key – Used to start a sequence • Secondary Key – Trapped at the start of a sequence, released after primary key is rotated • Personnel key – Secondary key to be released and carried by the person into the hazard Primary Key Secondary Keys Primary Key Primary Key Secondary/ Personnel Key
  • 6. Copyright © Rockwell Automation, Inc. All Rights Reserved. Trapped Key Interlocks – Why Do We Use Them? • Sequential access, to follow a predetermined sequence of events – Based on the premise that one key can not be in two places at the same time – Each product is coded – Optional personnel key available to ensure that a person entering a cell has control over the sequence • Power to products is not required (for mechanical units) • Stainless steel solution, good for harsh environments Solenoid Release Unit Solenoid Release Unit 3 Way Key Exchange Unit 1 in 2 out Bolt Lock Single Key Access Lock Dual Key Personnel Key released from Access lock
  • 7. Copyright © Rockwell Automation, Inc. All Rights Reserved. Prosafe Products • Isolation Devices – Rotary Switches – Solenoid Release – Bolt Lock • Key Exchange Units (also called Key Control Element) • Guarded Area Access Devices – Access / Chain Locks – Slam Locks – Bolt Lock • Specialty Devices – Electronic Timed Delay Unit – Stopped Motion Unit – Mini Valve Locks – Switchgear Adaptors
  • 8. Copyright © Rockwell Automation, Inc. All Rights Reserved. Isolation Devices • Rotary Switches – Used to isolate power. Once power is switched off the previously trapped key is released for use in the next step. – Offered in Single, Dual, Triple and Quad key versions • Solenoid Release Units – Used on applications with rundown time controlled by a PLC. Once safe conditions are reached the indicator light indicates the key can be removed and used in the next step of the sequence – Offered in Single, Dual, Triple and Quad key versions
  • 9. Copyright © Rockwell Automation, Inc. All Rights Reserved. Key Exchange Unit • Key Exchange Unit (Key Control Element) – Used in an interlocking sequence to link together other devices in the Prosafe system – One to three primary keys • All must be present to release secondary key(s) – Up to 24 secondary keys • Primary key(s) trapped until ALL secondary keys have been re-inserted, rotated, and trapped
  • 10. Copyright © Rockwell Automation, Inc. All Rights Reserved. Guarded Area Access Devices • Guarded Area Access Devices • Offered in Single, Dual, Triple and Quad key versions • Available in Mechanical, Electrical, Solenoid versions – Bolt Lock • Bolt is extended into recess in a handle or control element of a switching device and blocks it • Also used in sliding doors where a recess is present for the bolt to be extended into • Note: Bolt lock should not be used on hinged doors without another safety switch – Access/Chain Lock • Access Lock for Loose Fitting Doors • Chain Lock for Extreme Misalignment of Door – Slamlock • Tongue actuator guard locks with trapped key control Bolt extends in to the recess blocking the handle form turning
  • 11. Copyright © Rockwell Automation, Inc. All Rights Reserved. Bolt Locks • Bolt Locks – Two primary uses: – Used as Isolation device / Start Sequence device • Bolt is extended into recess in a handle or control element of a switching device and locks it position • In “safe” position, key can be removed – Used as Guarded Area Access device • Only for sliding doors • Bolt extends into a hole in the frame, locking sliding door in safe position, then key can be removed • Frame of door prevents the bolt from extending when the sliding door is open • Note: Bolt lock should not be used on hinged doors without another safety switch – Note that different versions of the bolt lock allow removing the key based on the bolt being extended or retracted. Bolt extends in to the recess blocking the handle from turning
  • 12. Copyright © Rockwell Automation, Inc. All Rights Reserved. Bolt Locks - Considerations Hazard • When using a Bolt Lock, care must be taken regarding the mechanical considerations • Example: Bolt Lock intended to hold sliding guard closed to protect user from a hazard unless it is stopped • What’s wrong with this implementation? Bad – Bolt extended, key removed, no protection from hazard
  • 13. Copyright © Rockwell Automation, Inc. All Rights Reserved. Bolt Locks - Considerations Hazard Hazard • System must be designed such that it mechanically prevents the bolt from extending when the guard (or operating device) is NOT protecting a user from the hazard • Proper implementation shown on the right Bad – Bolt extended, key removed, no protection from hazard Good – When guard is open, bolt cannot extend, therefore key cannot be removed Frame prevents bolt from extending
  • 14. Copyright © Rockwell Automation, Inc. All Rights Reserved. Specialty Devices • Specialty Devices – Electronic Timed Delay Unit • Timer output energizes internal solenoid, releasing key. • Used in applications that required elapsed time before releasing key to allow access to the hazard – Stopped Motion Unit • Stopped motion detection utilizing proximity sensors • Detects when the hazardous motion has ceased before releasing the key to allow access to the restricted area – Mini Valve Locks • Used to control the opening and closing of process valves in proper sequence – Switchgear Adaptors • Used to interlock preparatory switch gear applications • Can be used to interlock host equipment such as spool valves
  • 15. Copyright © Rockwell Automation, Inc. All Rights Reserved. Hazard Prosafe System Key Free Key Exchange Unit (2 in, 2 out) Hazard Isolation Valve Bolt Lock Solenoid Release Bolt Lock OFF ON Access Lock Rotary Switch Ca Ca Da Da Aa Aa Aa Ba Ba Aa Aa Ba Ba Ca Ca Ea Ea Da Da Ea Ea Run Safe Blank Blank
  • 16. Copyright © Rockwell Automation, Inc. All Rights Reserved. Product Coding • The user must prevent codes from being duplicated if multiple Prosafe systems are used within the same facility • All codes have two letters when ordered and are in capitals “AA”. The actual units will have the first letter capitalized and the second letter lowercase, e.g. “Aa” • Start the sequence with code Aa and increment through the alphabet, Ba, Ca, Da, etc. through Za, then Ab, Bb, etc. through Zz.
  • 17. Copyright © Rockwell Automation, Inc. All Rights Reserved. Prosafe Builder – Software Simplification Tool • Prosafe Builder – a software tool to create a system BOM – Part of the free ProposalWorks suite – Creates the product coding and catalog numbers so that you don’t have to
  • 18. Copyright © Rockwell Automation, Inc. All Rights Reserved. • Ejector key – Some manufacturers find operators not taking personnel key with them – The Ejector Key promotes correct use of key by the fact that is ejected from code barrel into operator’s hand – Ejection force is approximately 20 Newtons • Replacement code barrels – Used to replace damaged code barrel – Easily replaceable with 2 specialty screws Accessories
  • 19. Copyright © Rockwell Automation, Inc. All Rights Reserved. Lost, Broken Key, or Damaged Code Barrel? • Emergency repair kit is the answer – Kit includes 2 ER coded code barrels and key. – Kits available ER1– ER9 • Simply replace the lost/broken “B” code barrel as well as the mating “B” code barrel in the sequence with the ER1 coded barrels and your system is up and running • Order replacement key or code barrel
  • 20. Copyright © Rockwell Automation, Inc. All Rights Reserved. Summary • Trapped Key systems are utilized to force a specific sequence of events in order to reduce risk • You should now be able to: – Explain why trapped key systems are used – Give an application example – Define the common terminology – Summarize the purpose of each type of Prosafe product – Understand the importance of codes – Explain the purpose of Prosafe Builder • Next you will complete a short knowledge check