CHECKING CONFIGURATION MODIFICATION FOR IED Russian patent published in 2014 - IPC G06F21/45 G06F21/64 H04L12/22 

Abstract RU 2523927 C2

FIELD: physics, control.

SUBSTANCE: invention relates to technological process control systems and substation automation, and specifically to monitoring safety aspects during configuration and parameterisation of devices in such systems. The method of checking a configuration modification for an intelligent electronic device (IED) in a process control (PCT) or substation automation (SA) system comprises authenticating, by the IED prior to receiving a configuration modification request, the approver independent of the client, and storing, in the memory of the IED, a configuration modification reliability check elaborated by the approver, wherein the reliability check includes a maintenance schedule for the IED, a set of rules, or an expert system, for judging whether the configuration modification is acceptable, and approving or rejecting the configuration modification request based on a result of the reliability check used for specific circumstances of the configuration modification request.

EFFECT: checking reliability when the approver is inaccessible, which minimises time delay caused by the checking procedure.

6 cl, 1 dwg

Similar patents RU2523927C2

Title Year Author Number
INTELLIGENT ELECTRONIC DEVICES FOR SUBSTATION AUTOMATION SYSTEM AND METHOD FOR DESIGN AND CONTROL THEREOF 2009
  • Verner Tomas
  • Turn'E Zhan-Sharl'
  • Rikhter Stefan
RU2504913C2
POLICY-CONTROLLED DELEGATION OF ACCOUNT DATA FOR SINGLE REGISTRATION IN NETWORK AND SECURED ACCESS TO NETWORK RESOURCES 2007
  • Medvinskij Gennadij
  • Ilak Kristian
  • Khagiu Kostin
  • Parsonz Dzhon Eh.
  • Fatkhalla Mokhamed Ehmad Ehl' Din
  • Lich Pol Dzh.
  • Kamel' Tarek Bukhaa Ehl'-Din Makhmud
RU2439692C2
INFORMATION PROCESSING APPARATUS AND METHOD OF CONTROLLING THE SAME 2014
  • Khosoda Yasukhiro
RU2607279C2
METHOD AND DEVICE FOR ESTABLISHING SECURITY ASSOCIATION 2006
  • Blom Rol'F
  • Norman Karl
RU2406251C2
TRUSTED INTEGRITY MANAGER (TIM) 2010
  • Tavo Sebast'En
  • Nakhari Khadi
  • Djupra Ehrik
RU2523304C2
METHOD FOR CONTROLLING PROTECTED COMMUNICATION LINE IN DYNAMIC NETWORKS 2001
  • Mur Timoti M.
  • Ajjagari Arun
  • Shetkh Sachin K.
  • Bakhl Pradip
RU2297037C2
ON-LINE COMMERCIAL TRANSACTIONS 2006
  • Dzhonson Brjus Eh.
  • Vebster-Lehm Chung
RU2402814C2
STABLE AUTHORISATION CONTEXT BASED ON EXTERNAL IDENTIFICATION 2008
  • Mauehrs Dehvid R.
  • Dubrovkin Dehniehl
  • Lejbehn Roj
  • Shmidt Donal'D I.
  • Visvanatan Rehm
  • Brezak Dzhon I.
  • Uord Richard B.
RU2390838C2
NETWORK NODE AND METHOD OF INSTALLING DISTRIBUTED NETWORK SECURITY ARCHITECTURE 2008
  • Garsija Morchon Oskar
  • Ehrdmann Bozhena
  • Khjubner Aksel' G.
  • Boldus Kheribert
RU2483476C2
CRYPTOGRAPHIC AUTHENTICATION AND IDENTIFICATION METHOD WITH REAL-TIME ENCRYPTION 2013
  • Bajdl Khajnrikh
  • Khrdi Ervin
  • Shauerkhuber Julius
RU2584500C2

RU 2 523 927 C2

Authors

Vimmer Vol'Fgang

Dates

2014-07-27Published

2010-08-10Filed