Abstract:
The present invention relates to a method for analysing a log (10) of a device or a plurality of devices of a first entity (1), the method comprising:generating an encrypted log (11) by encrypting said log (10) on at least one device of the first entity (1); generating at least an encrypted query (16) by encrypting said query (16) on at least one device for analysing the log (10); transferring said encrypted log (11) and said encrypted query (16) from said first entity (1) to a second entity (2); analysing said encrypted log (11) on said second entity (2) by using the encrypted query (16) and generating (20) an encrypted analysis result (21); transferring said encrypted analysis result (21) from said second entity (2) to said first entity (1); and decrypting (22) said encrypted analysis result (21) on said first entity (1), wherein said decrypted analysis result (23) can be verified by said first entity (1).
Abstract:
The present invention is concerned with a stability supervision or monitoring of a communication system of an industrial Process Control (PC) system, by measuring the communication load and comparing the latter to a previously established base load. The measured communication load is represented by a plurality of updated, or present, echo delay measurements for communication paths between a supervising Intelligent Electronic Device IED and end-IEDs of the communication system. The echo delays are established by sending, by the supervising IED, echo poll messages to the end-IEDs, and by receiving an echo from the end-IEDs. If a difference between measured and baseline echo delays exceeds a predetermined threshold, an overload status is signalled to an operator. Hence, a refined dynamic communication network status, beyond a mere binary good/bad indication, is obtained without additional hardware and excessive dedicated communication load.
Abstract:
The present invention discloses a method of transmitting time-critical messages in an OSI layer 2 network tunnel from an IED in a first substation to an IED in a second substation over a WAN, wherein each of the first and second substation comprises an edge IED and is associated with a substation LAN, wherein each of the time-critical messages comprises message parameters. The method comprises the steps of: a) creating a translation table comprising corresponding values of the message parameters, between the LANs and the WAN, b) defining a virtual IED model in the second substation using the translated values of the message parameters, to impersonate the IED of the first substation, c) translating the message parameters according to the translation table, d) forwarding the time-critical messages from the IED in the first substation to the WAN, and e) receiving the time-critical messages by the IED of the second substation from the WAN.
Abstract:
The present invention is concerned with a stability supervision or monitoring of a communication system of an industrial Process Control (PC) system, by measuring the communication load and comparing the latter to a previously established base load. The measured communication load is represented by a plurality of updated, or present, echo delay measurements for communication paths between a supervising Intelligent Electronic Device IED and end-IEDs of the communication system. The echo delays are established by sending, by the supervising IED, echo poll messages to the end-IEDs, and by receiving an echo from the end-IEDs. If a difference between measured and baseline echo delays exceeds a predetermined threshold, an overload status is signalled to an operator. Hence, a refined dynamic communication network status, beyond a mere binary good/bad indication, is obtained without additional hardware and excessive dedicated communication load.