FIELD: physics, control.
SUBSTANCE: invention relates to technological process control systems and substation automation, and specifically to monitoring safety aspects during configuration and parameterisation of devices in such systems. The method of checking a configuration modification for an intelligent electronic device (IED) in a process control (PCT) or substation automation (SA) system comprises authenticating, by the IED prior to receiving a configuration modification request, the approver independent of the client, and storing, in the memory of the IED, a configuration modification reliability check elaborated by the approver, wherein the reliability check includes a maintenance schedule for the IED, a set of rules, or an expert system, for judging whether the configuration modification is acceptable, and approving or rejecting the configuration modification request based on a result of the reliability check used for specific circumstances of the configuration modification request.
EFFECT: checking reliability when the approver is inaccessible, which minimises time delay caused by the checking procedure.
6 cl, 1 dwg
Title | Year | Author | Number |
---|---|---|---|
INTELLIGENT ELECTRONIC DEVICES FOR SUBSTATION AUTOMATION SYSTEM AND METHOD FOR DESIGN AND CONTROL THEREOF | 2009 |
|
RU2504913C2 |
POLICY-CONTROLLED DELEGATION OF ACCOUNT DATA FOR SINGLE REGISTRATION IN NETWORK AND SECURED ACCESS TO NETWORK RESOURCES | 2007 |
|
RU2439692C2 |
INFORMATION PROCESSING APPARATUS AND METHOD OF CONTROLLING THE SAME | 2014 |
|
RU2607279C2 |
METHOD AND DEVICE FOR ESTABLISHING SECURITY ASSOCIATION | 2006 |
|
RU2406251C2 |
TRUSTED INTEGRITY MANAGER (TIM) | 2010 |
|
RU2523304C2 |
METHOD FOR CONTROLLING PROTECTED COMMUNICATION LINE IN DYNAMIC NETWORKS | 2001 |
|
RU2297037C2 |
ON-LINE COMMERCIAL TRANSACTIONS | 2006 |
|
RU2402814C2 |
STABLE AUTHORISATION CONTEXT BASED ON EXTERNAL IDENTIFICATION | 2008 |
|
RU2390838C2 |
NETWORK NODE AND METHOD OF INSTALLING DISTRIBUTED NETWORK SECURITY ARCHITECTURE | 2008 |
|
RU2483476C2 |
CRYPTOGRAPHIC AUTHENTICATION AND IDENTIFICATION METHOD WITH REAL-TIME ENCRYPTION | 2013 |
|
RU2584500C2 |
Authors
Dates
2014-07-27—Published
2010-08-10—Filed