EP2517442A1 - Dispositif de communication et procédé pour contrôler et commander des systèmes de sécurité - Google Patents
Dispositif de communication et procédé pour contrôler et commander des systèmes de sécuritéInfo
- Publication number
- EP2517442A1 EP2517442A1 EP10810956A EP10810956A EP2517442A1 EP 2517442 A1 EP2517442 A1 EP 2517442A1 EP 10810956 A EP10810956 A EP 10810956A EP 10810956 A EP10810956 A EP 10810956A EP 2517442 A1 EP2517442 A1 EP 2517442A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- security system
- interface
- communication device
- data
- communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000004891 communication Methods 0.000 title claims abstract description 108
- 238000012544 monitoring process Methods 0.000 title claims abstract description 20
- 238000000034 method Methods 0.000 title claims description 16
- 230000005540 biological transmission Effects 0.000 claims abstract description 14
- 230000002452 interceptive effect Effects 0.000 claims abstract description 7
- 230000001681 protective effect Effects 0.000 claims description 7
- 238000012546 transfer Methods 0.000 claims description 4
- 238000013461 design Methods 0.000 claims description 3
- 230000001419 dependent effect Effects 0.000 claims description 2
- 238000013500 data storage Methods 0.000 claims 1
- 238000012423 maintenance Methods 0.000 description 14
- 238000012360 testing method Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 238000006243 chemical reaction Methods 0.000 description 3
- 230000006378 damage Effects 0.000 description 3
- 238000011156 evaluation Methods 0.000 description 3
- 238000009434 installation Methods 0.000 description 3
- 238000012806 monitoring device Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000009423 ventilation Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 238000009420 retrofitting Methods 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 101710128742 Cytochrome b6-f complex iron-sulfur subunit 2 Proteins 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000008021 deposition Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000013021 overheating Methods 0.000 description 1
- 238000010248 power generation Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 239000000779 smoke Substances 0.000 description 1
- 238000012549 training Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2816—Controlling appliance services of a home automation network by calling their functionalities
- H04L12/2818—Controlling appliance services of a home automation network by calling their functionalities from a device located outside both the home and the home network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
Definitions
- the invention relates to a communication and maintenance device and a method for monitoring, controlling and switching of security systems and in particular, but not only the monitoring of remote security systems, which are often, but not only, installed in hard to reach places.
- the security systems relating to the invention are used inter alia. the monitoring of protective objects such as Buildings, rooms, machinery and equipment such. B.
- Safety systems optionally also for the initiation and triggering of protective measures such as alarms, initiation of switching operations such. Shutdowns or to trigger extinguishing systems.
- the security system may include at least one control device which is connected to the control device of the entire protection object. In this way it is achieved that in the case of e.g. a fire extinguishing system is triggered and combats the fire automatically.
- US Pat. No. 7,227,450 B2 discloses a remote monitoring device which communicates with monitoring systems locally via a communications network such as the Internet.
- the facility may have one or more selected ones
- the device may also transmit sensor-specific messages to a given alarm system for receiving data therefrom or for transmitting instructions or data thereto.
- Embodiments of the invention are the subject of the respective subclaims.
- the invention is based on the recognition that a separate communication device is "pre-connected" to an existing security system so that the two initially operate independently of one another
- the security system is self-sufficient by the communication device and the communication device can also be added or activated as an independent element at a later time so that no changes to the actual security system become necessary
- the communication device according to the invention thus comprises for
- a security system interface for receiving data from the at least one security system
- a database for storing the data received from the security system
- At least one TCP / IP interface for exchanging control commands and the cached data with an external user.
- TCP / IP interface for interactive communication with the security system
- a web interface is provided by means of http and or https protocol, which is connected via a switching device to the security system interface;
- the at least one TCP / IP interface with FTP protocol for automatic transmission of log files is set up to the outside, the FTP protocol is connected via an FTP daemon to the database;
- the communication device as a module in the at least one
- Security system is integrated, with supply and signal connections for the communication device of the at least one security system
- the internal connection can be a serial connection and in particular an RS232 connection;
- the external communication port may be an Ethernet port.
- the method according to the invention for monitoring at least one security system in particular a weather station, basically has the steps:
- At least one TCP / IP interface comprises interactive communication via an HTTP interface connected to the database via a web interface;
- the exchange of the stored data via the at least one TCP / IP interface comprises an automatic transmission of log files to an external user via an FTP protocol, which is connected via an FTP daemon to the database;
- VPN or via a Local Area Network.
- Communication capabilities of the communication device according to the invention access to hard to reach facilities, such as off-shore facilities, especially for remote monitoring and remote maintenance is possible.
- the communication device access to hard to reach facilities, such as off-shore facilities, especially for remote monitoring and remote maintenance is possible.
- the communication device access to hard to reach facilities, such as off-shore facilities, especially for remote monitoring and remote maintenance is possible.
- the communication device access to hard to reach facilities, such as off-shore facilities, especially for remote monitoring and remote maintenance is possible.
- the communication device can be integrated into the respective environment without great additional effort, ie in particular in the respective security system; the existing system facilities do not have to be changed or only insignificantly changed.
- the current state of the remote security system can be queried independently of various computers and locations, whereby the monitoring of, for example, off-shore installations can be performed flexibly.
- Connected to this is a simplified implementation of remote maintenance procedures, in which the reaction of the security system to individual specifications of the user can be tested in a particularly convenient manner via a web connection. It is also easy to update the software on the security system via such a connection.
- By assigning multiple IP addresses it is possible to monitor multiple security systems via one communication device, or levels of access in
- control parameters not generated independently by the safety system control parameters not generated independently by the safety system
- control parameters generated autonomously only by the safety system examples of through local control too influencing parameters are the triggering of extinguishing agents and the closing of ventilation flaps.
- the switching on of auxiliary lights can be controlled both locally and externally.
- FIG. 1 shows schematically the interaction of elements of the protected object, the protection system and the communication device and the user connection.
- Fig. 2 shows a block diagram with the essential elements of a system for a communication connection in an embodiment of the invention.
- FIG. 3 shows a flow diagram for the communication between the plant and the http server.
- Fig. 4 shows a flow diagram for the communication between plant and ftp server.
- Fig. 5 shows a block diagram with the essential elements of a third
- FIG. 6 shows a flow chart of the program flow of the interface 22 from FIG. 5.
- FIG. 7 shows a flow chart of the program flow of the switching device 27 from FIG. 5
- FIG. 8 shows a flowchart of the program sequence of the data transmission by means of FTP server from FIGS. 3 and 5.
- FIG. 1 schematically shows a field of protective objects, for example off-shore installations, which has a plurality of individual protective objects 1, each having one or more
- Security systems 13 includes. These are connected via a data connection 1a to an ISP (Internet Service Provider) server 2 on land. Via this ISP server 2, a connection to the Internet 3 is established, via which various users from their workstations 4 both e.g. in the control center of the protected object as well as any workplaces, e.g. also the service of the security system can access the data that has been stored in the communication device 17 and made available.
- ISP Internet Service Provider
- the data provided to users in this context may relate to the fire protection of the respective protected object 1. Their function and arrangement will be explained below.
- a plurality of electrical and mechanical components are accommodated, which also comprise movable elements.
- the movable elements can become hot, for example by friction, so that there is a local overheating of a component with subsequent fire.
- a fire can occur in control cabinets of the protected object and / or in cable lines and on terminals. The fire must be combated immediately to avoid damage from the rest of the facility.
- a security system 13 in the form of a fire alarm system, an extinguishing control device and extinguishing system is provided in each protected object 1, which detects a fire hazard and, where appropriate, prepared and executes countermeasures.
- the security system 13 is provided with at least one fire alarm or a combination of fire detectors (optionally, e.g.
- Ventilation control module be provided, the input variables for the assessment of the
- the security system 13 In order to enable monitoring of the protected object 1 via the purely local automatic control of fire sources, the security system 13 according to the invention is connected via an internal data connection to a communication device 17, which is likewise located in the protected object. This communication device 17 detects the signaling and control states of the security system 13 and prepares them for evaluation by a user.
- Message and control states can be:
- the communication device 17 communicates via a proprietary protocol for the data transmission with the security system 13.
- the captured data of the security system 13 are processed and preferably issued in accordance with the TCP / IP protocol, so that an external user via an external data connection, a web browser interface is available if he wants to access the data of the security system 13.
- the invention is not limited to access via web browser. Further communication possibilities are shown in FIG. After the data from the
- Security system 13 were transmitted to the communication device 17, they are provided after storage and pre-evaluation of the communication device 17 via the ISP server 2 in the Internet 3.
- the data of a plurality of communication devices 17 can arrive, as indicated by the two additional arrows to the server 2 and away from the server 2.
- This type of data distribution allows for different types of access.
- the data acquisition, data distribution and control of the security system 13 can be controlled via the web browser interface.
- Those users who communicate interactively with the communication device 17 access the device 17 via an http server 21.
- the current state of the weather station for example, via the Internet to an ftp server 20 loaded, as a backup. Should an immediate response by maintenance personnel become necessary, the staff will be notified via an e-mail server 19.
- Communication device 17 received and stored.
- data from the database 23 are made available to the user, and control commands, insofar as they relate to the security system 13, are forwarded by the communication module to the latter.
- control commands insofar as they relate to the security system 13, are forwarded by the communication module to the latter.
- the interactive communication is composed of a plurality of such data and command transmissions.
- the user interface of the web browser can easily be integrated into a more general concept or web portal.
- Communication device thus represents a web server of a security system 13 with particular suitability for fire detection and extinguishing systems in wind turbines and other hard to reach objects.
- the communication is restricted to fewer events than the http communication.
- the data coming from the security system 13 are again received by the communication device 17 and buffered in an internal database 23.
- the data is transmitted "bundled" by the communication device 17 to the ftp server 20. That is, once a certain time has passed, the data in the database 23 may be transmitted again to the ftp server 20, etc.
- the transmission of data to the ftp server 20 may be initiated whenever further data has been received by the communication device 17. This possibility is then similar to the notification the maintenance staff by an e-mail, if an accident is present, but here is not checked for a fault, but indiscriminately each parameter change triggers the transfer.
- the communication device 17 On the input side, the communication device 17 is connected to the security system 13.
- the interface of communication device 17 and security system 13 is shown as block 22.
- the interface 22 is connected to the internal database 23, to which the data supplied by the security system 13 are forwarded.
- the data In the first TCP / IP interface 24, the data is prepared for communication with an external http server 21 of an ISP.
- the interface 24 is preferably one
- Ethernet interface 24 for connection to a router or hub (not shown) or similar network components.
- the events transmitted from the communication device 17 to the user may include, but are not limited to: include: pre-alarm, fire, wire breakage, short-circuit fault, group switched off, group switched on, malfunction, power supply fault, central door open, fire from manual call point, alarm (general),
- Controlled, test condition, event in test condition It will be understood by those skilled in the art that the information is preferably protected when transmitted over the Internet, i. the website for accessing the security system 13 is password protected via the communication device 17. Furthermore, can
- the communication device 17 gets its own IP address and is integrated via link into the control software of the protected object 1.
- the communication device 17 preferably has an internal memory (database 23) for all messages.
- Storage is readable via the operator's web page and can be downloaded as a (text) file.
- the selection of the messages can be restricted by suitable filters or selection parameters.
- the stored events can also be used as history stores for the analysis of event sequences. Notwithstanding the protection in the transmission of data of the security system and the restriction of access for the control only to authorized persons is the website
- a status comparison is performed. This allows false alarms to be largely eliminated. A status comparison always takes place in order to detect a potential failure of one of the systems in good time.
- the security system 13 can be controlled via the communication device 17.
- the instruction set available for remote maintenance may be limited.
- options for the execution of the safety system 13 may be provided as a fire detection and extinguishing system for remote maintenance: on, off, test state on, test state off, reset. If more detailed information is to be queried, then preferably
- Sensors / fire detectors are selected according to group and detector number in a tree structure. Alternatively or additionally, the sensors / fire detectors can also after
- a switching device 27 (decoding and coding) which conveys transmitted commands such as the switching on or off of a circuit for a fan or a ventilation flap in the protected object.
- FIG. 7 A flowchart for the execution of the program sequence in the switching device 27 is shown in FIG. 7.
- the security system 13 can also maintain the supply of power to the protected object in case of failure of an external power supply with a (not shown) emergency power device, which is turned on by the switching device 27.
- the commands are transmitted from the switching device 27 via the security system interface 22 to the security system 13.
- the communication device 17 also has a second TCP / IP interface 25, with which the transfer of files to an external FTP server 20 can take place, which can also be integrated into the server of the ISP 2 ,
- ftp interface 25 of the communication device 17 are preferably continuously or at regular intervals data from the
- Communication device 17 sent to the ftp server 20.
- any event that occurs may be sent as a (text) file to the FTP server every 24 hours. This is particularly advantageous for a permanent monitoring of a protected object or a backup copy of the current state of the protected object.
- the FTP client sends an event report to the operator's FTP server
- an FTP process runs as server on the communication device 17, and an FTP process on the server 20 of the operator.
- the individual program steps of the data transfer by means of FTP are shown in FIG. 8.
- the program is started by means of a CRONjob.
- TCP / IP interface 26 In order to carry out the data transmission event-dependent, another TCP / IP interface 26 is provided, which is set up for the transmission of e-mails. This third TCP / IP interface 26 is connected to an internal event filter (not shown) in the communication device 17, which constantly checks the incoming data from the security system 13. If an extraordinary incident occurs in the read and verified data, an internal alarm is triggered, which leads to the deposition of an e-mail to the e-mail server 19 of the operator of the protected object.
- an internal event filter not shown
- the signals of the security system 13 are simultaneously transported by the communication device 17 according to the invention via the first TCP / IP interface 24 into a Web browser-capable interface at the workstation of a user 4.
- backup copies of the data are sent via the second TCP / IP interface 25 to an ftp server, and finally via a third TCP / IP interface 26
- the communication device 17 is constructed as a module which is designed for integration in the security system 13.
- the communication device 17 as a module in the existing
- Safety system easier to install their design is preferably standardized (for example DIN rail). This means that there are three types of supply connections to consider: power supply connections, internal communication connections, and external communication connections with non-local users
- module plug contacts on a bus system of the safety system 13 are used as a possible voltage supply.
- a bus preferably based on a 9-pole sub-D RS 232 port, is used in a particularly preferred embodiment of the invention.
- an Ethernet connection is used, via which the connection to a (not shown) hub, R uter or switch is made.
- the Ethernet port is especially a RJ45 TP connector.
- ISP servers Internet service providers
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Automation & Control Theory (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Alarm Systems (AREA)
Abstract
L'invention concerne un dispositif de communication pour contrôler, commander et commuter au moins un système de sécurité (13), caractérisé en ce qu'il présente : une interface de système de sécurité (22) pour recevoir et/ou envoyer des données et des instructions; au moins une interface TCP/IP (24; 25; 26) pour échanger des instructions de commande et les données stockées avec un utilisateur externe (4), au moins une interface TCP/IP (24; 25; 26) se présentant sous la forme d'une interface HTTP (24) permettant d'établir une communication interactive avec le système de sécurité (13), un dispositif de codage et de décodage (27) et un serveur Web (21); un dispositif de codage et de décodage (27) qui est relié à un serveur Web (21) et à l'interface de système de sécurité (22) et peut être commandé par l'intermédiaire de l'interface HTTP (24); ainsi qu'un protocole de transmission de données.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE102009060417.0A DE102009060417B4 (de) | 2009-12-22 | 2009-12-22 | Kommunikationseinrichtung und Verfahren zum Überwachen und Steuern von Sicherheitssystemen |
| PCT/DE2010/001499 WO2011076184A1 (fr) | 2009-12-22 | 2010-12-21 | Dispositif de communication et procédé pour contrôler et commander des systèmes de sécurité |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| EP2517442A1 true EP2517442A1 (fr) | 2012-10-31 |
Family
ID=43769068
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP10810956A Withdrawn EP2517442A1 (fr) | 2009-12-22 | 2010-12-21 | Dispositif de communication et procédé pour contrôler et commander des systèmes de sécurité |
Country Status (3)
| Country | Link |
|---|---|
| EP (1) | EP2517442A1 (fr) |
| DE (2) | DE102009060417B4 (fr) |
| WO (1) | WO2011076184A1 (fr) |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9549342B2 (en) * | 2012-10-29 | 2017-01-17 | Alcatel-Lucent Usa Inc. | Methods and apparatuses for congestion management in wireless networks with mobile HTPP adaptive streaming |
| DE102017127389A1 (de) * | 2017-11-21 | 2019-05-23 | Wobben Properties Gmbh | Sicherheitsvorrichtung zum Datenaustausch mit einer Windenergieanlage oder einem Windpark sowie System damit und Verfahren dafür |
| DE102019111615A1 (de) * | 2019-05-06 | 2020-11-12 | Minimax Viking Research & Development Gmbh | Servicevorrichtung, Brandschutzanlage mit einer Servicevorrichtung, System zum Betreiben einer Brandschutzanlage und zugehöriges Verfahren |
| DE102019111613A1 (de) * | 2019-05-06 | 2020-11-12 | Minimax Viking Research & Development Gmbh | Servicevorrichtung für eine Brandschutzanlage, entsprechende Brandschutzanlage, System zum Betreiben einer Brandschutzanlage sowie zugehöriges Verfahren |
| DE102019111614A1 (de) | 2019-05-06 | 2020-11-12 | Minimax Viking Research & Development Gmbh | Servicevorrichtung für eine Brandschutzanlage, entsprechende Brandschutzanlage, System zum Betreiben einer Brandschutzanlage sowie zugehöriges Verfahren |
| DE102019111612A1 (de) * | 2019-05-06 | 2020-11-12 | Minimax Viking Research & Development Gmbh | Servicevorrichtung für eine Brandschutzanlage, entsprechende Brandschutzanlage, System zum Betreiben einer Brandschutzanlage sowie zugehöriges Verfahren |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CA2493214C (fr) * | 2002-07-29 | 2011-01-18 | Uhs Systems Pty Ltd | Systeme de telemetrie |
| WO2004044801A2 (fr) * | 2002-11-14 | 2004-05-27 | Addi-Data Gmbh | Dispositif comprenant un systeme integre, destine aux domaines des techniques industrielles de mesure et de reglage et de l'automatisation |
| DE10321652A1 (de) * | 2003-05-13 | 2004-12-02 | Tentaclion Gmbh | Modulares Datenerfassungs-und Übertragungssystem sowie Übertragungseinrichtung dafür |
| US20050005167A1 (en) * | 2003-07-02 | 2005-01-06 | Kelly Thomas J. | Systems and methods for providing security operations in a work machine |
| US7516244B2 (en) * | 2003-07-02 | 2009-04-07 | Caterpillar Inc. | Systems and methods for providing server operations in a work machine |
| DE102004006748A1 (de) * | 2004-02-06 | 2005-09-15 | Siemens Ag | Datenübertragungsmodul |
| US7227450B2 (en) | 2004-03-12 | 2007-06-05 | Honeywell International, Inc. | Internet facilitated fire alarm monitoring, control system and method |
| US20070241866A1 (en) * | 2006-04-13 | 2007-10-18 | Troy Cool | Wireless service tool for automated protection systems |
| US8032614B2 (en) * | 2006-04-30 | 2011-10-04 | General Electric Company | Method for configuring a windfarm network |
| DE102008039132A1 (de) * | 2008-08-21 | 2010-02-25 | Billy Hou | Intelligenter Bild-Rauch/Flammensensor und Detektionssystem |
-
2009
- 2009-12-22 DE DE102009060417.0A patent/DE102009060417B4/de not_active Withdrawn - After Issue
- 2009-12-22 DE DE202009018171U patent/DE202009018171U1/de not_active Expired - Lifetime
-
2010
- 2010-12-21 WO PCT/DE2010/001499 patent/WO2011076184A1/fr active Application Filing
- 2010-12-21 EP EP10810956A patent/EP2517442A1/fr not_active Withdrawn
Non-Patent Citations (1)
| Title |
|---|
| See references of WO2011076184A1 * |
Also Published As
| Publication number | Publication date |
|---|---|
| DE202009018171U1 (de) | 2011-04-28 |
| DE102009060417A1 (de) | 2011-06-30 |
| WO2011076184A1 (fr) | 2011-06-30 |
| DE102009060417B4 (de) | 2014-09-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| DE69902503T2 (de) | Managementsystem von Feldgeräten | |
| DE102009060417B4 (de) | Kommunikationseinrichtung und Verfahren zum Überwachen und Steuern von Sicherheitssystemen | |
| EP1527554B1 (fr) | Reseau informatique comportant des noeuds informatiques de diagnostic | |
| EP2299650A1 (fr) | Procédé de détection des anomalies dans un réseau de contrôle | |
| DE10241953B4 (de) | Verfahren zum Übertragen von Meldungen industrieller Steuerungen über Internet-Technologien an vordefinierte Empfänger | |
| EP1398937A2 (fr) | Système pour surveiller et indiquer l'état de sécurité de dispositifs | |
| EP3122016B1 (fr) | Reseau d'automatisation et procede de surveillance de la securite de la transmission de paquets de donnees | |
| EP3417433B1 (fr) | Détecteur d'incendie et/ou d'étincelles modulaire à capteurs multiples | |
| EP2705650B1 (fr) | Commande à distance d'une installation technique | |
| EP2954534B1 (fr) | Dispositif et procédé de détection de manipulations non autorisée de l'état du système d'une unité de commande et de régulation d'une installation nucléaire | |
| DE202023105695U1 (de) | Steuersystem zum Steuern und Überwachen einer Industrieanlage, Industrieanlage, externe Steuereinrichtung und extern gesteuertes Industrieanlagensystem | |
| DE102011053616A1 (de) | Verfahren zur Überwachung kritischer Temperaturentwicklungen an Solaranlagen mit Photovoltaik-Modulen und Vorrichtung zur Durchführung des Verfahrens | |
| EP3699705A1 (fr) | Procédé de surveillance d'un réseau de communication industriel, système de sécurité, réseau de communication industriel, programme informatique et support lisible par ordinateur | |
| WO2006018123A2 (fr) | Dispositif de regulation de l'alimentation en energie d'un dispositif de traitement de donnees | |
| DE19519879A1 (de) | Verfahren sowie Anordnung zur Sicherung und Überwachung von Objekten mit Hilfe vorhandener Rechnernetze, bzw. autonomer Rechnersysteme | |
| DE10260404A1 (de) | System und Verfahren zur Überwachung von technischen Anlagen und Objekten | |
| DE10154262C2 (de) | Verfahren zur Akquisition, Überwachung und/oder Analyse von Betriebsparametern elektrischer Betriebsmittel, insbesondere Schaltanlagen und deren Komponenten, wobei den Betriebsmitteln oder einer Gruppe von Betriebsmitteln Sensoren und mindestens ein Rechner zugeordnet sind und die Betriebsmittel-Rechner über eine Schnittstelle einen Intranet- oder Internetzugang besitzen | |
| DE102004044673B4 (de) | Verfahren zum Überwachen zumindest einer Anlagenkomponente einer technischen Anlage | |
| EP1102167B1 (fr) | Mise en place et opération d'une connection avec une unité de commande | |
| EP0599131A2 (fr) | Système de surveillance d'installations domestiques | |
| EP2500788A1 (fr) | Procédé de traitement d'alertes dans un réseau de communication d'une installation d'automatisation industrielle | |
| DE102013112730B4 (de) | Rechnerzentrum und Verfahren zum Betrieb eines Rechnerzentrums | |
| DE102023211136A1 (de) | Sensormodul für eine Schaltanlage | |
| DE20316299U1 (de) | System zur Video-Fern-Bewachung | |
| EP4487430A1 (fr) | Système de surveillance et procédé de surveillance d'un réseau de tension |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| 17P | Request for examination filed |
Effective date: 20120619 |
|
| AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
| DAX | Request for extension of the european patent (deleted) | ||
| 17Q | First examination report despatched |
Effective date: 20160115 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN |
|
| 18W | Application withdrawn |
Effective date: 20160726 |