[go: up one dir, main page]

EP2517442A1 - Dispositif de communication et procédé pour contrôler et commander des systèmes de sécurité - Google Patents

Dispositif de communication et procédé pour contrôler et commander des systèmes de sécurité

Info

Publication number
EP2517442A1
EP2517442A1 EP10810956A EP10810956A EP2517442A1 EP 2517442 A1 EP2517442 A1 EP 2517442A1 EP 10810956 A EP10810956 A EP 10810956A EP 10810956 A EP10810956 A EP 10810956A EP 2517442 A1 EP2517442 A1 EP 2517442A1
Authority
EP
European Patent Office
Prior art keywords
security system
interface
communication device
data
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP10810956A
Other languages
German (de)
English (en)
Inventor
Björn NIETHAMMER
Jens Lill
Axel Wörner
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Minimax GmbH and Co KG
Original Assignee
Minimax GmbH and Co KG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=43769068&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=EP2517442(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Minimax GmbH and Co KG filed Critical Minimax GmbH and Co KG
Publication of EP2517442A1 publication Critical patent/EP2517442A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2816Controlling appliance services of a home automation network by calling their functionalities
    • H04L12/2818Controlling appliance services of a home automation network by calling their functionalities from a device located outside both the home and the home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network

Definitions

  • the invention relates to a communication and maintenance device and a method for monitoring, controlling and switching of security systems and in particular, but not only the monitoring of remote security systems, which are often, but not only, installed in hard to reach places.
  • the security systems relating to the invention are used inter alia. the monitoring of protective objects such as Buildings, rooms, machinery and equipment such. B.
  • Safety systems optionally also for the initiation and triggering of protective measures such as alarms, initiation of switching operations such. Shutdowns or to trigger extinguishing systems.
  • the security system may include at least one control device which is connected to the control device of the entire protection object. In this way it is achieved that in the case of e.g. a fire extinguishing system is triggered and combats the fire automatically.
  • US Pat. No. 7,227,450 B2 discloses a remote monitoring device which communicates with monitoring systems locally via a communications network such as the Internet.
  • the facility may have one or more selected ones
  • the device may also transmit sensor-specific messages to a given alarm system for receiving data therefrom or for transmitting instructions or data thereto.
  • Embodiments of the invention are the subject of the respective subclaims.
  • the invention is based on the recognition that a separate communication device is "pre-connected" to an existing security system so that the two initially operate independently of one another
  • the security system is self-sufficient by the communication device and the communication device can also be added or activated as an independent element at a later time so that no changes to the actual security system become necessary
  • the communication device according to the invention thus comprises for
  • a security system interface for receiving data from the at least one security system
  • a database for storing the data received from the security system
  • At least one TCP / IP interface for exchanging control commands and the cached data with an external user.
  • TCP / IP interface for interactive communication with the security system
  • a web interface is provided by means of http and or https protocol, which is connected via a switching device to the security system interface;
  • the at least one TCP / IP interface with FTP protocol for automatic transmission of log files is set up to the outside, the FTP protocol is connected via an FTP daemon to the database;
  • the communication device as a module in the at least one
  • Security system is integrated, with supply and signal connections for the communication device of the at least one security system
  • the internal connection can be a serial connection and in particular an RS232 connection;
  • the external communication port may be an Ethernet port.
  • the method according to the invention for monitoring at least one security system in particular a weather station, basically has the steps:
  • At least one TCP / IP interface comprises interactive communication via an HTTP interface connected to the database via a web interface;
  • the exchange of the stored data via the at least one TCP / IP interface comprises an automatic transmission of log files to an external user via an FTP protocol, which is connected via an FTP daemon to the database;
  • VPN or via a Local Area Network.
  • Communication capabilities of the communication device according to the invention access to hard to reach facilities, such as off-shore facilities, especially for remote monitoring and remote maintenance is possible.
  • the communication device access to hard to reach facilities, such as off-shore facilities, especially for remote monitoring and remote maintenance is possible.
  • the communication device access to hard to reach facilities, such as off-shore facilities, especially for remote monitoring and remote maintenance is possible.
  • the communication device access to hard to reach facilities, such as off-shore facilities, especially for remote monitoring and remote maintenance is possible.
  • the communication device can be integrated into the respective environment without great additional effort, ie in particular in the respective security system; the existing system facilities do not have to be changed or only insignificantly changed.
  • the current state of the remote security system can be queried independently of various computers and locations, whereby the monitoring of, for example, off-shore installations can be performed flexibly.
  • Connected to this is a simplified implementation of remote maintenance procedures, in which the reaction of the security system to individual specifications of the user can be tested in a particularly convenient manner via a web connection. It is also easy to update the software on the security system via such a connection.
  • By assigning multiple IP addresses it is possible to monitor multiple security systems via one communication device, or levels of access in
  • control parameters not generated independently by the safety system control parameters not generated independently by the safety system
  • control parameters generated autonomously only by the safety system examples of through local control too influencing parameters are the triggering of extinguishing agents and the closing of ventilation flaps.
  • the switching on of auxiliary lights can be controlled both locally and externally.
  • FIG. 1 shows schematically the interaction of elements of the protected object, the protection system and the communication device and the user connection.
  • Fig. 2 shows a block diagram with the essential elements of a system for a communication connection in an embodiment of the invention.
  • FIG. 3 shows a flow diagram for the communication between the plant and the http server.
  • Fig. 4 shows a flow diagram for the communication between plant and ftp server.
  • Fig. 5 shows a block diagram with the essential elements of a third
  • FIG. 6 shows a flow chart of the program flow of the interface 22 from FIG. 5.
  • FIG. 7 shows a flow chart of the program flow of the switching device 27 from FIG. 5
  • FIG. 8 shows a flowchart of the program sequence of the data transmission by means of FTP server from FIGS. 3 and 5.
  • FIG. 1 schematically shows a field of protective objects, for example off-shore installations, which has a plurality of individual protective objects 1, each having one or more
  • Security systems 13 includes. These are connected via a data connection 1a to an ISP (Internet Service Provider) server 2 on land. Via this ISP server 2, a connection to the Internet 3 is established, via which various users from their workstations 4 both e.g. in the control center of the protected object as well as any workplaces, e.g. also the service of the security system can access the data that has been stored in the communication device 17 and made available.
  • ISP Internet Service Provider
  • the data provided to users in this context may relate to the fire protection of the respective protected object 1. Their function and arrangement will be explained below.
  • a plurality of electrical and mechanical components are accommodated, which also comprise movable elements.
  • the movable elements can become hot, for example by friction, so that there is a local overheating of a component with subsequent fire.
  • a fire can occur in control cabinets of the protected object and / or in cable lines and on terminals. The fire must be combated immediately to avoid damage from the rest of the facility.
  • a security system 13 in the form of a fire alarm system, an extinguishing control device and extinguishing system is provided in each protected object 1, which detects a fire hazard and, where appropriate, prepared and executes countermeasures.
  • the security system 13 is provided with at least one fire alarm or a combination of fire detectors (optionally, e.g.
  • Ventilation control module be provided, the input variables for the assessment of the
  • the security system 13 In order to enable monitoring of the protected object 1 via the purely local automatic control of fire sources, the security system 13 according to the invention is connected via an internal data connection to a communication device 17, which is likewise located in the protected object. This communication device 17 detects the signaling and control states of the security system 13 and prepares them for evaluation by a user.
  • Message and control states can be:
  • the communication device 17 communicates via a proprietary protocol for the data transmission with the security system 13.
  • the captured data of the security system 13 are processed and preferably issued in accordance with the TCP / IP protocol, so that an external user via an external data connection, a web browser interface is available if he wants to access the data of the security system 13.
  • the invention is not limited to access via web browser. Further communication possibilities are shown in FIG. After the data from the
  • Security system 13 were transmitted to the communication device 17, they are provided after storage and pre-evaluation of the communication device 17 via the ISP server 2 in the Internet 3.
  • the data of a plurality of communication devices 17 can arrive, as indicated by the two additional arrows to the server 2 and away from the server 2.
  • This type of data distribution allows for different types of access.
  • the data acquisition, data distribution and control of the security system 13 can be controlled via the web browser interface.
  • Those users who communicate interactively with the communication device 17 access the device 17 via an http server 21.
  • the current state of the weather station for example, via the Internet to an ftp server 20 loaded, as a backup. Should an immediate response by maintenance personnel become necessary, the staff will be notified via an e-mail server 19.
  • Communication device 17 received and stored.
  • data from the database 23 are made available to the user, and control commands, insofar as they relate to the security system 13, are forwarded by the communication module to the latter.
  • control commands insofar as they relate to the security system 13, are forwarded by the communication module to the latter.
  • the interactive communication is composed of a plurality of such data and command transmissions.
  • the user interface of the web browser can easily be integrated into a more general concept or web portal.
  • Communication device thus represents a web server of a security system 13 with particular suitability for fire detection and extinguishing systems in wind turbines and other hard to reach objects.
  • the communication is restricted to fewer events than the http communication.
  • the data coming from the security system 13 are again received by the communication device 17 and buffered in an internal database 23.
  • the data is transmitted "bundled" by the communication device 17 to the ftp server 20. That is, once a certain time has passed, the data in the database 23 may be transmitted again to the ftp server 20, etc.
  • the transmission of data to the ftp server 20 may be initiated whenever further data has been received by the communication device 17. This possibility is then similar to the notification the maintenance staff by an e-mail, if an accident is present, but here is not checked for a fault, but indiscriminately each parameter change triggers the transfer.
  • the communication device 17 On the input side, the communication device 17 is connected to the security system 13.
  • the interface of communication device 17 and security system 13 is shown as block 22.
  • the interface 22 is connected to the internal database 23, to which the data supplied by the security system 13 are forwarded.
  • the data In the first TCP / IP interface 24, the data is prepared for communication with an external http server 21 of an ISP.
  • the interface 24 is preferably one
  • Ethernet interface 24 for connection to a router or hub (not shown) or similar network components.
  • the events transmitted from the communication device 17 to the user may include, but are not limited to: include: pre-alarm, fire, wire breakage, short-circuit fault, group switched off, group switched on, malfunction, power supply fault, central door open, fire from manual call point, alarm (general),
  • Controlled, test condition, event in test condition It will be understood by those skilled in the art that the information is preferably protected when transmitted over the Internet, i. the website for accessing the security system 13 is password protected via the communication device 17. Furthermore, can
  • the communication device 17 gets its own IP address and is integrated via link into the control software of the protected object 1.
  • the communication device 17 preferably has an internal memory (database 23) for all messages.
  • Storage is readable via the operator's web page and can be downloaded as a (text) file.
  • the selection of the messages can be restricted by suitable filters or selection parameters.
  • the stored events can also be used as history stores for the analysis of event sequences. Notwithstanding the protection in the transmission of data of the security system and the restriction of access for the control only to authorized persons is the website
  • a status comparison is performed. This allows false alarms to be largely eliminated. A status comparison always takes place in order to detect a potential failure of one of the systems in good time.
  • the security system 13 can be controlled via the communication device 17.
  • the instruction set available for remote maintenance may be limited.
  • options for the execution of the safety system 13 may be provided as a fire detection and extinguishing system for remote maintenance: on, off, test state on, test state off, reset. If more detailed information is to be queried, then preferably
  • Sensors / fire detectors are selected according to group and detector number in a tree structure. Alternatively or additionally, the sensors / fire detectors can also after
  • a switching device 27 (decoding and coding) which conveys transmitted commands such as the switching on or off of a circuit for a fan or a ventilation flap in the protected object.
  • FIG. 7 A flowchart for the execution of the program sequence in the switching device 27 is shown in FIG. 7.
  • the security system 13 can also maintain the supply of power to the protected object in case of failure of an external power supply with a (not shown) emergency power device, which is turned on by the switching device 27.
  • the commands are transmitted from the switching device 27 via the security system interface 22 to the security system 13.
  • the communication device 17 also has a second TCP / IP interface 25, with which the transfer of files to an external FTP server 20 can take place, which can also be integrated into the server of the ISP 2 ,
  • ftp interface 25 of the communication device 17 are preferably continuously or at regular intervals data from the
  • Communication device 17 sent to the ftp server 20.
  • any event that occurs may be sent as a (text) file to the FTP server every 24 hours. This is particularly advantageous for a permanent monitoring of a protected object or a backup copy of the current state of the protected object.
  • the FTP client sends an event report to the operator's FTP server
  • an FTP process runs as server on the communication device 17, and an FTP process on the server 20 of the operator.
  • the individual program steps of the data transfer by means of FTP are shown in FIG. 8.
  • the program is started by means of a CRONjob.
  • TCP / IP interface 26 In order to carry out the data transmission event-dependent, another TCP / IP interface 26 is provided, which is set up for the transmission of e-mails. This third TCP / IP interface 26 is connected to an internal event filter (not shown) in the communication device 17, which constantly checks the incoming data from the security system 13. If an extraordinary incident occurs in the read and verified data, an internal alarm is triggered, which leads to the deposition of an e-mail to the e-mail server 19 of the operator of the protected object.
  • an internal event filter not shown
  • the signals of the security system 13 are simultaneously transported by the communication device 17 according to the invention via the first TCP / IP interface 24 into a Web browser-capable interface at the workstation of a user 4.
  • backup copies of the data are sent via the second TCP / IP interface 25 to an ftp server, and finally via a third TCP / IP interface 26
  • the communication device 17 is constructed as a module which is designed for integration in the security system 13.
  • the communication device 17 as a module in the existing
  • Safety system easier to install their design is preferably standardized (for example DIN rail). This means that there are three types of supply connections to consider: power supply connections, internal communication connections, and external communication connections with non-local users
  • module plug contacts on a bus system of the safety system 13 are used as a possible voltage supply.
  • a bus preferably based on a 9-pole sub-D RS 232 port, is used in a particularly preferred embodiment of the invention.
  • an Ethernet connection is used, via which the connection to a (not shown) hub, R uter or switch is made.
  • the Ethernet port is especially a RJ45 TP connector.
  • ISP servers Internet service providers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Alarm Systems (AREA)

Abstract

L'invention concerne un dispositif de communication pour contrôler, commander et commuter au moins un système de sécurité (13), caractérisé en ce qu'il présente : une interface de système de sécurité (22) pour recevoir et/ou envoyer des données et des instructions; au moins une interface TCP/IP (24; 25; 26) pour échanger des instructions de commande et les données stockées avec un utilisateur externe (4), au moins une interface TCP/IP (24; 25; 26) se présentant sous la forme d'une interface HTTP (24) permettant d'établir une communication interactive avec le système de sécurité (13), un dispositif de codage et de décodage (27) et un serveur Web (21); un dispositif de codage et de décodage (27) qui est relié à un serveur Web (21) et à l'interface de système de sécurité (22) et peut être commandé par l'intermédiaire de l'interface HTTP (24); ainsi qu'un protocole de transmission de données.
EP10810956A 2009-12-22 2010-12-21 Dispositif de communication et procédé pour contrôler et commander des systèmes de sécurité Withdrawn EP2517442A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102009060417.0A DE102009060417B4 (de) 2009-12-22 2009-12-22 Kommunikationseinrichtung und Verfahren zum Überwachen und Steuern von Sicherheitssystemen
PCT/DE2010/001499 WO2011076184A1 (fr) 2009-12-22 2010-12-21 Dispositif de communication et procédé pour contrôler et commander des systèmes de sécurité

Publications (1)

Publication Number Publication Date
EP2517442A1 true EP2517442A1 (fr) 2012-10-31

Family

ID=43769068

Family Applications (1)

Application Number Title Priority Date Filing Date
EP10810956A Withdrawn EP2517442A1 (fr) 2009-12-22 2010-12-21 Dispositif de communication et procédé pour contrôler et commander des systèmes de sécurité

Country Status (3)

Country Link
EP (1) EP2517442A1 (fr)
DE (2) DE102009060417B4 (fr)
WO (1) WO2011076184A1 (fr)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9549342B2 (en) * 2012-10-29 2017-01-17 Alcatel-Lucent Usa Inc. Methods and apparatuses for congestion management in wireless networks with mobile HTPP adaptive streaming
DE102017127389A1 (de) * 2017-11-21 2019-05-23 Wobben Properties Gmbh Sicherheitsvorrichtung zum Datenaustausch mit einer Windenergieanlage oder einem Windpark sowie System damit und Verfahren dafür
DE102019111615A1 (de) * 2019-05-06 2020-11-12 Minimax Viking Research & Development Gmbh Servicevorrichtung, Brandschutzanlage mit einer Servicevorrichtung, System zum Betreiben einer Brandschutzanlage und zugehöriges Verfahren
DE102019111613A1 (de) * 2019-05-06 2020-11-12 Minimax Viking Research & Development Gmbh Servicevorrichtung für eine Brandschutzanlage, entsprechende Brandschutzanlage, System zum Betreiben einer Brandschutzanlage sowie zugehöriges Verfahren
DE102019111614A1 (de) 2019-05-06 2020-11-12 Minimax Viking Research & Development Gmbh Servicevorrichtung für eine Brandschutzanlage, entsprechende Brandschutzanlage, System zum Betreiben einer Brandschutzanlage sowie zugehöriges Verfahren
DE102019111612A1 (de) * 2019-05-06 2020-11-12 Minimax Viking Research & Development Gmbh Servicevorrichtung für eine Brandschutzanlage, entsprechende Brandschutzanlage, System zum Betreiben einer Brandschutzanlage sowie zugehöriges Verfahren

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2493214C (fr) * 2002-07-29 2011-01-18 Uhs Systems Pty Ltd Systeme de telemetrie
WO2004044801A2 (fr) * 2002-11-14 2004-05-27 Addi-Data Gmbh Dispositif comprenant un systeme integre, destine aux domaines des techniques industrielles de mesure et de reglage et de l'automatisation
DE10321652A1 (de) * 2003-05-13 2004-12-02 Tentaclion Gmbh Modulares Datenerfassungs-und Übertragungssystem sowie Übertragungseinrichtung dafür
US20050005167A1 (en) * 2003-07-02 2005-01-06 Kelly Thomas J. Systems and methods for providing security operations in a work machine
US7516244B2 (en) * 2003-07-02 2009-04-07 Caterpillar Inc. Systems and methods for providing server operations in a work machine
DE102004006748A1 (de) * 2004-02-06 2005-09-15 Siemens Ag Datenübertragungsmodul
US7227450B2 (en) 2004-03-12 2007-06-05 Honeywell International, Inc. Internet facilitated fire alarm monitoring, control system and method
US20070241866A1 (en) * 2006-04-13 2007-10-18 Troy Cool Wireless service tool for automated protection systems
US8032614B2 (en) * 2006-04-30 2011-10-04 General Electric Company Method for configuring a windfarm network
DE102008039132A1 (de) * 2008-08-21 2010-02-25 Billy Hou Intelligenter Bild-Rauch/Flammensensor und Detektionssystem

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2011076184A1 *

Also Published As

Publication number Publication date
DE202009018171U1 (de) 2011-04-28
DE102009060417A1 (de) 2011-06-30
WO2011076184A1 (fr) 2011-06-30
DE102009060417B4 (de) 2014-09-04

Similar Documents

Publication Publication Date Title
DE69902503T2 (de) Managementsystem von Feldgeräten
DE102009060417B4 (de) Kommunikationseinrichtung und Verfahren zum Überwachen und Steuern von Sicherheitssystemen
EP1527554B1 (fr) Reseau informatique comportant des noeuds informatiques de diagnostic
EP2299650A1 (fr) Procédé de détection des anomalies dans un réseau de contrôle
DE10241953B4 (de) Verfahren zum Übertragen von Meldungen industrieller Steuerungen über Internet-Technologien an vordefinierte Empfänger
EP1398937A2 (fr) Système pour surveiller et indiquer l'état de sécurité de dispositifs
EP3122016B1 (fr) Reseau d'automatisation et procede de surveillance de la securite de la transmission de paquets de donnees
EP3417433B1 (fr) Détecteur d'incendie et/ou d'étincelles modulaire à capteurs multiples
EP2705650B1 (fr) Commande à distance d'une installation technique
EP2954534B1 (fr) Dispositif et procédé de détection de manipulations non autorisée de l'état du système d'une unité de commande et de régulation d'une installation nucléaire
DE202023105695U1 (de) Steuersystem zum Steuern und Überwachen einer Industrieanlage, Industrieanlage, externe Steuereinrichtung und extern gesteuertes Industrieanlagensystem
DE102011053616A1 (de) Verfahren zur Überwachung kritischer Temperaturentwicklungen an Solaranlagen mit Photovoltaik-Modulen und Vorrichtung zur Durchführung des Verfahrens
EP3699705A1 (fr) Procédé de surveillance d'un réseau de communication industriel, système de sécurité, réseau de communication industriel, programme informatique et support lisible par ordinateur
WO2006018123A2 (fr) Dispositif de regulation de l'alimentation en energie d'un dispositif de traitement de donnees
DE19519879A1 (de) Verfahren sowie Anordnung zur Sicherung und Überwachung von Objekten mit Hilfe vorhandener Rechnernetze, bzw. autonomer Rechnersysteme
DE10260404A1 (de) System und Verfahren zur Überwachung von technischen Anlagen und Objekten
DE10154262C2 (de) Verfahren zur Akquisition, Überwachung und/oder Analyse von Betriebsparametern elektrischer Betriebsmittel, insbesondere Schaltanlagen und deren Komponenten, wobei den Betriebsmitteln oder einer Gruppe von Betriebsmitteln Sensoren und mindestens ein Rechner zugeordnet sind und die Betriebsmittel-Rechner über eine Schnittstelle einen Intranet- oder Internetzugang besitzen
DE102004044673B4 (de) Verfahren zum Überwachen zumindest einer Anlagenkomponente einer technischen Anlage
EP1102167B1 (fr) Mise en place et opération d'une connection avec une unité de commande
EP0599131A2 (fr) Système de surveillance d'installations domestiques
EP2500788A1 (fr) Procédé de traitement d'alertes dans un réseau de communication d'une installation d'automatisation industrielle
DE102013112730B4 (de) Rechnerzentrum und Verfahren zum Betrieb eines Rechnerzentrums
DE102023211136A1 (de) Sensormodul für eine Schaltanlage
DE20316299U1 (de) System zur Video-Fern-Bewachung
EP4487430A1 (fr) Système de surveillance et procédé de surveillance d'un réseau de tension

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20120619

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20160115

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Effective date: 20160726