Generation and Control of Network Events and Conversion to SCADA Protocol Data Types
-
0Associated
Cases -
0Associated
Defendants -
0Accused
Products -
66Forward
Citations -
0
Petitions -
2
Assignments
First Claim
1. . A system for communicating a network event to a central monitoring system comprising:
- an access controller configured to receive the network event, the access controller comprising;
a central monitoring system communications interface to communicate with the central monitoring system;
an information system communications interface to communicate with an information system;
a processor; and
a computer-readable storage medium in communication with the processor, the computer-readable storage medium comprising;
a network event module executable on the processor and configured to receive the network event, to transmit the network event to the information system, and to transmit the network event to a data mapping module; and
a data mapping module executable on the processor and configured to receive the network event, to create a mapped network event by mapping the network event into a format used by the central monitoring system, and to transmit the mapped network event to the central monitoring system through the central monitoring system communications interface.
2 Assignments
0 Petitions

Accused Products

Abstract
A system and method is disclosed for receiving a network event in a network format, mapping the network event into a format expected by a central monitoring system, and communicating the mapped network event to the central monitoring system. The system may employ a variety of communication protocols and physical architectures. The system may include an access controller that may connect a plurality of intelligent electronic devices and may be the primary interface with an information system or central monitoring system. The access controller may include a programmable logic engine in compliance with the IEC-61131-3 standard. The access controller may further be configured to implement rules designed to govern actions taken as a result of network information.
105 Citations
View as Search Results
ELECTRIC POWER SYSTEM AUTOMATION USING TIME COORDINATED INSTRUCTIONS | ||
Patent #
US 20110035065A1
Filed 08/10/2010
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
ELECTRIC POWER SYSTEM AUTOMATION USING TIME COORDINATED INSTRUCTIONS | ||
Patent #
US 20110035076A1
Filed 08/10/2010
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
ELECTRIC POWER SYSTEM AUTOMATION USING TIME COORDINATED INSTRUCTIONS | ||
Patent #
US 20110035066A1
Filed 08/10/2010
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Flexible Intelligent Electronic Device | ||
Patent #
US 20110157837A1
Filed 12/23/2010
|
Current Assignee
ABB Research Ltd.
|
Sponsoring Entity
ABB Research Ltd.
|
ROUTE AWARE NETWORK LINK ACCELERATION | ||
Patent #
US 20110296051A1
Filed 08/10/2010
|
Current Assignee
Circadence Corporation
|
Sponsoring Entity
Circadence Corporation
|
IED FOR, AND METHOD OF ENGINEERING, AND SA SYSTEM | ||
Patent #
US 20110257806A1
Filed 06/30/2011
|
Current Assignee
ABB Research Ltd.
|
Sponsoring Entity
ABB Research Ltd.
|
Systems and Methods for Under-Frequency Blackout Protection | ||
Patent #
US 20120053744A1
Filed 08/01/2011
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
DATA TRASMISSION DEVICE FOR REMOTE MONITORING AND REMOTE CONTROLLING IN A DISTRIBUTED PROCESS SYSTEM | ||
Patent #
US 20120131122A1
Filed 12/02/2011
|
Current Assignee
ABB Schweiz AG
|
Sponsoring Entity
ABB Schweiz AG
|
METHOD AND SYSTEM FOR POWER MANAGEMENT | ||
Patent #
US 20120226386A1
Filed 03/07/2012
|
Current Assignee
ABB Schweiz AG
|
Sponsoring Entity
ABB Schweiz AG
|
METHOD AND SYSTEM FOR ENGINEERING A SUBSTATION AUTOMATION SYSTEM | ||
Patent #
US 20120239170A1
Filed 02/14/2012
|
Current Assignee
ABB Schweiz AG
|
Sponsoring Entity
ABB Schweiz AG
|
Electric power system automation using time coordinated instructions | ||
Patent #
US 8,275,486 B2
Filed 08/10/2010
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Electric power system automation using time coordinated instructions | ||
Patent #
US 8,275,487 B2
Filed 08/10/2010
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Electric power system automation using time coordinated instructions | ||
Patent #
US 8,275,485 B2
Filed 08/10/2010
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Systems and Methods for Blackout Protection | ||
Patent #
US 20130018521A1
Filed 08/16/2012
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
RELAY AND DATA PROCESSING METHOD | ||
Patent #
US 20130067251A1
Filed 09/10/2012
|
Current Assignee
LSIS Co. Ltd.
|
Sponsoring Entity
LSIS Co. Ltd.
|
Systems and methods for synchronized control of electrical power system voltage profiles | ||
Patent #
US 8,476,874 B2
Filed 10/12/2010
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Route aware network link acceleration | ||
Patent #
US 8,510,468 B2
Filed 08/10/2010
|
Current Assignee
Circadence Corporation
|
Sponsoring Entity
Circadence Corporation
|
LOG MONITORING | ||
Patent #
US 20130227352A1
Filed 02/22/2013
|
Current Assignee
CommVault Systems Incorporated
|
Sponsoring Entity
CommVault Systems Incorporated
|
Protection against unauthorized access to automated system for control of technological processes | ||
Patent #
US 8,667,589 B1
Filed 10/27/2013
|
Current Assignee
Konstantin Saprygin
|
Sponsoring Entity
Konstantin Saprygin
|
Electric power system automation using time coordinated instructions | ||
Patent #
US 8,682,496 B2
Filed 08/23/2012
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Method and system for distributed power management | ||
Patent #
US 8,788,108 B2
Filed 02/14/2012
|
Current Assignee
ABB Schweiz AG
|
Sponsoring Entity
ABB Technology Limited
|
Systems and methods for protection of components in electrical power delivery systems | ||
Patent #
US 8,792,217 B2
Filed 09/15/2010
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Remote wind turbine reset system and method | ||
Patent #
US 8,805,596 B2
Filed 12/28/2010
|
Current Assignee
Inventus Holdings LLC
|
Sponsoring Entity
Inventus Holdings LLC
|
Systems and methods for synchronized control of electrical power system voltage profiles | ||
Patent #
US 8,816,652 B2
Filed 06/14/2013
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Mixed-Mode Communication Between Devices in an Electrical Power System | ||
Patent #
US 20140280714A1
Filed 03/15/2013
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Proxy Communication Between Devices in an Electrical Power System | ||
Patent #
US 20140280713A1
Filed 03/15/2013
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Method and system for engineering a substation automation system | ||
Patent #
US 8,923,993 B2
Filed 02/14/2012
|
Current Assignee
ABB Schweiz AG
|
Sponsoring Entity
ABB Technology Limited
|
Method for counting without the use of unique identifiers | ||
Patent #
US 8,954,566 B1
Filed 02/10/2011
|
Current Assignee
Google LLC
|
Sponsoring Entity
Google Inc.
|
Systems and methods for blackout protection | ||
Patent #
US 8,965,592 B2
Filed 08/16/2012
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Relay and data processing method | ||
Patent #
US 8,984,180 B2
Filed 09/10/2012
|
Current Assignee
LSIS Co. Ltd.
|
Sponsoring Entity
LSIS Co. Ltd.
|
Protection against unauthorized access to automated system for control of technological processes | ||
Patent #
US 8,990,923 B1
Filed 02/12/2014
|
Current Assignee
Konstantin Saprygin
|
Sponsoring Entity
Konstantin Saprygin
|
Systems and methods for under-frequency blackout protection | ||
Patent #
US 9,008,850 B2
Filed 08/01/2011
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
INTELLIGENT ELECTRICAL DISTRIBUTION GRID CONTROL SYSTEM DATA | ||
Patent #
US 20150127685A1
Filed 01/09/2015
|
Current Assignee
General Electric Technology GmbH
|
Sponsoring Entity
General Electric Technology GmbH
|
SYSTEMS AND METHODS FOR UNDER-FREQUENCY BLACKOUT PROTECTION | ||
Patent #
US 20150222123A1
Filed 04/14/2015
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Systems and methods for synchronizing distributed generation systems | ||
Patent #
US 9,128,130 B2
Filed 09/15/2011
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Exchange of messages between devices in an electrical power system | ||
Patent #
US 9,270,109 B2
Filed 03/15/2013
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
INDUSTRIAL SECURITY AGENT PLATFORM | ||
Patent #
US 20160087958A1
Filed 08/28/2015
|
Current Assignee
Accenture Global Services Limited
|
Sponsoring Entity
Accenture Global Services Limited
|
INDUSTRIAL SECURITY AGENT PLATFORM | ||
Patent #
US 20160085972A1
Filed 08/28/2015
|
Current Assignee
Accenture Global Services Limited
|
Sponsoring Entity
Accenture Global Services Limited
|
Transmission of data over a low-bandwidth communication channel | ||
Patent #
US 9,363,200 B2
Filed 02/18/2014
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Distributed coordinated electric power delivery control system using component models | ||
Patent #
US 9,383,735 B2
Filed 03/14/2013
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Method and system for power management | ||
Patent #
US 9,496,754 B2
Filed 03/07/2012
|
Current Assignee
ABB Schweiz AG
|
Sponsoring Entity
ABB Schweiz AG
|
Data transmission device for remote monitoring and remote controlling in a distributed process system | ||
Patent #
US 9,544,165 B2
Filed 12/02/2011
|
Current Assignee
ABB Schweiz AG
|
Sponsoring Entity
ABB Schweiz AG
|
Determining status of electric power transmission lines in an electric power transmission system | ||
Patent #
US 9,568,516 B2
Filed 09/23/2014
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Systems and methods for communicating data state change information between devices in an electrical power system | ||
Patent #
US 9,620,955 B2
Filed 03/15/2013
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Enhanced communication infrastructure for hierarchical intelligent power distribution grid | ||
Patent #
US 9,641,026 B2
Filed 06/08/2011
|
Current Assignee
Alstom Technology Ltd.
|
Sponsoring Entity
Alstom Technology Ltd.
|
Detection and correction of fault induced delayed voltage recovery | ||
Patent #
US 9,798,342 B2
Filed 02/23/2015
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Industrial security agent platform | ||
Patent #
US 9,864,864 B2
Filed 08/28/2015
|
Current Assignee
Accenture Global Services Limited
|
Sponsoring Entity
Accenture Global Services Limited
|
Industrial security agent platform | ||
Patent #
US 9,870,476 B2
Filed 08/28/2015
|
Current Assignee
Accenture Global Services Limited
|
Sponsoring Entity
Accenture Global Services Limited
|
Intelligent electrical distribution grid control system data | ||
Patent #
US 9,881,033 B2
Filed 01/09/2015
|
Current Assignee
General Electric Technology GmbH
|
Sponsoring Entity
General Electric Technology GmbH
|
Systems and methods for protection of components in electrical power delivery systems | ||
Patent #
US 9,898,062 B2
Filed 07/28/2014
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Decentralized generator control | ||
Patent #
US 9,906,041 B2
Filed 03/16/2016
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Decentralized generator control | ||
Patent #
US 9,912,158 B2
Filed 03/16/2016
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Management of log data | ||
Patent #
US 9,934,265 B2
Filed 04/09/2015
|
Current Assignee
CommVault Systems Incorporated
|
Sponsoring Entity
CommVault Systems Incorporated
|
Communication system and operating method thereof | ||
Patent #
US 9,979,673 B2
Filed 12/15/2015
|
Current Assignee
LSIS Co. Ltd.
|
Sponsoring Entity
LSIS Co. Ltd.
|
Inertia compensated load tracking in electrical power systems | ||
Patent #
US 10,135,250 B2
Filed 05/25/2016
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Intelligent electrical distribution grid control system data | ||
Patent #
US 10,198,458 B2
Filed 12/15/2017
|
Current Assignee
General Electric Technology GmbH
|
Sponsoring Entity
General Electric Technology GmbH
|
Communication system and operating method thereof | ||
Patent #
US 10,203,675 B2
Filed 12/03/2015
|
Current Assignee
LSIS Co. Ltd.
|
Sponsoring Entity
LSIS Co. Ltd.
|
Communication gateway for facilitating communications with a supervisory control and data acquisition system | ||
Patent #
US 10,212,162 B2
Filed 11/24/2014
|
Current Assignee
ATT Mobility II LLC
|
Sponsoring Entity
ATT Mobility II LLC
|
Load phase balancing at multiple tiers of a multi-tier hierarchical intelligent power distribution grid | ||
Patent #
US 10,261,535 B2
Filed 03/02/2016
|
Current Assignee
General Electric Technology GmbH
|
Sponsoring Entity
General Electric Technology GmbH
|
Management of log data | ||
Patent #
US 10,296,613 B2
Filed 03/31/2017
|
Current Assignee
CommVault Systems Incorporated
|
Sponsoring Entity
CommVault Systems Incorporated
|
Systems and methods for under-frequency blackout protection | ||
Patent #
US 10,310,480 B2
Filed 04/14/2015
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Mode-based output synchronization using relays and a common time source | ||
Patent #
US 10,312,694 B2
Filed 06/23/2017
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Transient simulation modeling for dynamic remedial action schemes using real-time protection setting updates | ||
Patent #
US 10,333,301 B2
Filed 05/04/2017
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Electric power generator selection, shedding, and runback for power system stability | ||
Patent #
US 10,381,835 B1
Filed 02/09/2018
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Communication system and operating method thereof | ||
Patent #
US 10,444,736 B2
Filed 12/15/2015
|
Current Assignee
LSIS Co. Ltd.
|
Sponsoring Entity
LSIS Co. Ltd.
|
Optimized decoupling and load shedding | ||
Patent #
US 10,476,268 B2
Filed 02/09/2018
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Devices, systems, and/or methods regarding a programmable logic controller | ||
Patent #
US 20080052435A1
Filed 06/29/2007
|
Current Assignee
Siemens Industry Incorporated
|
Sponsoring Entity
Siemens Industry Incorporated
|
Apparatus and method for process control using people and asset tracking information | ||
Patent #
US 20080109099A1
Filed 11/08/2006
|
Current Assignee
Honeywell International Inc.
|
Sponsoring Entity
-
|
Apparatus and method for integrating people and asset tracking information into a process control system | ||
Patent #
US 20080109098A1
Filed 11/08/2006
|
Current Assignee
Honeywell International Inc.
|
Sponsoring Entity
Honeywell International Inc.
|
SCADA System with Instant Messaging | ||
Patent #
US 20080154393A1
Filed 12/22/2006
|
Current Assignee
IPNP LTD.
|
Sponsoring Entity
-
|
APPARATUS, METHODS, AND SYSTEM FOR ROLE-BASED ACCESS IN AN INTELLIGENT ELECTRONIC DEVICE | ||
Patent #
US 20080162930A1
Filed 12/28/2006
|
Current Assignee
General Electric Company
|
Sponsoring Entity
General Electric Company
|
Method, and Computer Based-System and Virtual Asset Register | ||
Patent #
US 20080195576A1
Filed 02/18/2005
|
Current Assignee
ABB Technology Limited
|
Sponsoring Entity
-
|
Method And System For Determination Of An Appropriate Strategy For Supply Of Renewal Energy Onto A Power Grid | ||
Patent #
US 20080228553A1
Filed 03/12/2007
|
Current Assignee
AIRTRICITY HOLDINGS LIMITED
|
Sponsoring Entity
AIRTRICITY HOLDINGS LIMITED
|
Handheld communication tester and method for testing direct serial communication capability of an intelligent electronic device in a power system | ||
Patent #
US 7,460,590 B2
Filed 09/14/2005
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Relay-to-relay direct communication system and method in an electric power system | ||
Patent #
US 7,463,467 B2
Filed 08/25/2005
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Systems and methods for performing a redundancy check using intelligent electronic devices in an electric power system | ||
Patent #
US 7,460,347 B2
Filed 02/01/2006
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
System and method for aligning data between local and remote sources thereof | ||
Patent #
US 7,231,003 B2
Filed 06/29/2001
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Remote terminal unit and monitoring, protection and control of power systems | ||
Patent #
US 20070206644A1
Filed 02/26/2007
|
Current Assignee
ABB Technology AG
|
Sponsoring Entity
ABB Technology AG
|
Extensible computer management rule engine | ||
Patent #
US 7,080,142 B2
Filed 09/20/2002
|
Current Assignee
Hewlett Packard Enterprise Development LP
|
Sponsoring Entity
Hewlett-Packard Development Company L.P.
|
Man-machine interface for a virtual annunciator panel display | ||
Patent #
US 6,380,949 B2
Filed 03/09/2001
|
Current Assignee
General Electric Company
|
Sponsoring Entity
General Electric Company
|
Relay-to-relay direct communication system in an electric power system | ||
Patent #
US 6,947,269 B2
Filed 07/06/2001
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Facility to transmit network management data to an umbrella management system | ||
Patent #
US 6,871,224 B1
Filed 01/04/1999
|
Current Assignee
Cisco Technology Incorporated
|
Sponsoring Entity
Cisco Technology Incorporated
|
Fast switching of data packet with common time reference | ||
Patent #
US 6,757,282 B1
Filed 03/28/2000
|
Current Assignee
SYNCHRODYNE NETWORKS INC.
|
Sponsoring Entity
SYNCHRODYNE NETWORKS INC.
|
SYSTEM AND METHOD FOR DATA SYNCHRONIZATION OVER A NETWORK USING A PRESENTATION LEVEL PROTOCOL | ||
Patent #
US 20060075105A1
Filed 09/30/2004
|
Current Assignee
Citrix Systems Inc.
|
Sponsoring Entity
Citrix Systems Inc.
|
System and method for providing communication between intelligent electronic devices via an open channel | ||
Patent #
US 20060083260A1
Filed 10/20/2004
|
Current Assignee
Electro IndustriesGaugetech
|
Sponsoring Entity
Electro IndustriesGaugetech
|
Isolating system that couples fieldbus data to a network | ||
Patent #
US 20060155908A1
Filed 01/12/2005
|
Current Assignee
Rosemount Incorporated
|
Sponsoring Entity
Rosemount Incorporated
|
Enhanced fiber infrastructure for building interiors | ||
Patent #
US 20050058451A1
Filed 08/12/2003
|
Current Assignee
Barrett Ross
|
Sponsoring Entity
Barrett Ross
|
On-line service/application monitoring and reporting system | ||
Patent #
US 20050138111A1
Filed 01/31/2005
|
Current Assignee
Microsoft Technology Licensing LLC
|
Sponsoring Entity
Microsoft Technology Licensing LLC
|
Relay-to relay direct communication system and method in an electric power system | ||
Patent #
US 20050280965A1
Filed 08/25/2005
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Apparatus and method for wireless gas monitoring | ||
Patent #
US 20040056771A1
Filed 09/24/2003
|
Current Assignee
Gastronics Inc.
|
Sponsoring Entity
Gastronics Inc.
|
Communications architecture for intelligent electronic devices | ||
Patent #
US 6,751,562 B1
Filed 03/22/2001
|
Current Assignee
Power Measurement Ltd.
|
Sponsoring Entity
Power Measurement Ltd.
|
Method and system for master slave protocol communication in an intelligent electronic device | ||
Patent #
US 6,792,337 B2
Filed 12/17/2001
|
Current Assignee
Power Measurement Ltd.
|
Sponsoring Entity
Power Measurement Ltd.
|
Harnessing information about the timing of a user's client-server interactions to enhance messaging and collaboration services | ||
Patent #
US 20040199663A1
Filed 06/18/2003
|
Current Assignee
Microsoft Technology Licensing LLC
|
Sponsoring Entity
-
|
Hub which converts scada protocols to the BLUEJAYTM protocol | ||
Patent #
US 20040213263A1
Filed 05/22/2004
|
Current Assignee
Beckwith Robert W.
|
Sponsoring Entity
Beckwith Robert W.
|
Modem communicator | ||
Patent #
US 20030030556A1
Filed 09/07/2001
|
Current Assignee
GE Security Incorporated
|
Sponsoring Entity
GE Security Incorporated
|
Method and system for sharing data between wired and wireless platforms | ||
Patent #
US 20030055880A1
Filed 10/24/2001
|
Current Assignee
INVENTEC TOMORROW STUDIO CORPORATION
|
Sponsoring Entity
INVENTEC TOMORROW STUDIO CORPORATION
|
Credential management and network querying | ||
Patent #
US 20030131096A1
Filed 04/22/2002
|
Current Assignee
Avaya Incorporated
|
Sponsoring Entity
-
|
Telephony security system | ||
Patent #
US 20020021791A1
Filed 07/17/2001
|
Current Assignee
SecureLogix Corporation
|
Sponsoring Entity
SecureLogix Corporation
|
Method and apparatus for automatically generating a SCADA system | ||
Patent #
US 20020193888A1
Filed 10/04/2001
|
Current Assignee
Wewalaarachchi Bandu, Pramod V. Bhave
|
Sponsoring Entity
Wewalaarachchi Bandu, Pramod V. Bhave
|
Apparatus and method for wireless gas monitoring | ||
Patent #
US 6,252,510 B1
Filed 06/15/1999
|
Current Assignee
Hewlett-Packard Development Company L.P.
|
Sponsoring Entity
Dungan Bud
|
System of communicating output function status indications between two or more power system protective relays | ||
Patent #
US 5,793,750 A
Filed 05/29/1996
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Communications processor for electric power substations | ||
Patent #
US 5,680,324 A
Filed 04/07/1995
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Display transducer apparatus | ||
Patent #
US 5,160,926 A
Filed 04/04/1991
|
Current Assignee
Schweitzer Engineering Laboratories Incorporated
|
Sponsoring Entity
Schweitzer Engineering Laboratories Incorporated
|
Position angle transducer for tap changing transformers | ||
Patent #
US 4,591,831 A
Filed 05/08/1984
|
Current Assignee
INTELLIGENT CONTROLS INC BOX 638 297 N. ST SACO ME 04072 A ME CORP
|
Sponsoring Entity
INTELLIGENT CONTROLS INC BOX 638 297 N. ST SACO ME 04072 A ME CORP
|
Systems and methods for secure and certified electronic messaging | ||
Patent #
US 8,527,751 B2
Filed 06/26/2009
|
Current Assignee
PRIVACYDATASYSTEMS LLC
|
Sponsoring Entity
PRIVACYDATASYSTEMS LLC
|
36 Claims
- 1. . A system for communicating a network event to a central monitoring system comprising:
an access controller configured to receive the network event, the access controller comprising; a central monitoring system communications interface to communicate with the central monitoring system; an information system communications interface to communicate with an information system; a processor; and a computer-readable storage medium in communication with the processor, the computer-readable storage medium comprising; a network event module executable on the processor and configured to receive the network event, to transmit the network event to the information system, and to transmit the network event to a data mapping module; and a data mapping module executable on the processor and configured to receive the network event, to create a mapped network event by mapping the network event into a format used by the central monitoring system, and to transmit the mapped network event to the central monitoring system through the central monitoring system communications interface. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
- 18. . An access controller, comprising:
a first interface configured to receive a network event according to a network format; a second interface configured to communicate monitored system data with a central monitoring system according to a central monitoring system format; a processor; and a computer-readable storage medium in communication with the processor, the computer-readable storage medium comprising; a data mapping module executable on the processor and in communication with the first interface and the second interface;
the data mapping module configured to map the network event from the network format into the central monitoring system format and to transmit the mapped network event to the central monitoring system through the second interface.- View Dependent Claims (19, 20, 21, 22, 23)
- 24. . A method for communicating a network event to a central monitoring system comprising:
receiving a network event in a network format; communicating the network event to an access controller configured to receive the network event; generating a mapped network event by mapping the network event from the network format to a format used by the central monitoring system; and communicating the mapped network event to the central monitoring system. - View Dependent Claims (25, 26)
- 27. . An access controller in communication with an intelligent electronic device and configured to receive a network event, the access controller comprising:
a central monitoring system communications interface to communicate with a central monitoring system; a processor; and a computer-readable storage medium in communication with the processor, the computer-readable storage medium comprising; a rules module executable on the processor and configured to receive the network event, to generate a control instruction based on the network event and a rule, and to transmit the control instruction to the intelligent electronic device. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36)
1 Specification
This application claims the benefit under 35 U.S.C. §119(e) of U.S. Provisional Application No. 61/042,349, titled “Generation and Control of Network Events and Conversion to SCADA Protocol Data Types” filed 4 Apr. 2008, naming Beau Kidwell, Mark Weber, and Daniel N. Morman as inventors, and which is hereby incorporated by reference herein in its entirety.
This disclosure relates to communication, generation, and control of operational and network events within an automation, control, monitoring, or protection system. More particularly, this disclosure relates to a method and apparatus capable of generation and control of network events and conversion of network events to a protocol used by a central monitoring system, such as Supervisory Control and Data Acquisition (SCADA) systems, outage management systems, Automatic Meter Reading (AMR) systems, Advanced Metering Infrastructure (AMI) systems, and the like.
Additional aspects and advantages will be apparent from the following detailed description of preferred embodiments, which proceeds with reference to the accompanying drawings, wherein:
Modern automation, electric power transmission, and distribution systems typically include intelligent electronic devices (“IEDs”) for protection, control, automation, and/or monitoring of equipment in the system. IEDs may be used to monitor equipment of many types including electric transmission lines, current transformers, pumps, compressors, valves, etc.
Generally, an IED may refer to any microprocessor-based device that monitors, controls, automates, and/or protects monitored equipment within the system. Such devices may include, for example, remote terminal units, differential relays, distance relays, directional relays, feeder relays, overcurrent relays, voltage regulator controls, voltage relays, breaker failure relays, generator relays, motor relays, automation controllers, bay controllers, meters, recloser controls, communications processors, computing platforms, programmable logic controllers (PLCs), programmable automation controllers, input and output modules, motor drives, and the like. IEDs gather status information from one or more pieces of monitored equipment, and may control various aspects relating to the monitored equipment. IEDs may receive information concerning monitored equipment using sensors, transducers, actuators, and the like.
IEDs may be configured to transmit information gathered about monitored equipment to central monitoring system such as SCADA, ARM, and AMI systems. IEDs may be configured to communicate information, such as voltages, currents, equipment status, temperature, frequency, pressure, density, infrared absorption, radio-frequency information, partial pressures, viscosity, speed, rotational velocity, mass, switch status, valve status, circuit breaker status, tap status, meter readings, and the like. IEDs may also be configured to communicate calculations, such as phasors (which may or may not be synchronized as synchrophasors), events, fault distances, differentials, impedances, reactances, frequency, and the like. IEDs may also communicate settings information, IED identification information, communications information, status information, alarm information, and the like. Information of the types listed above, or more generally, information about the status of monitored equipment is referred to as monitored system data.
IEDs may also issue control instructions to the monitored equipment. For example, an IED may be in communication with a circuit breaker, and may be capable of sending a command to open and/or close the circuit breaker, thus connecting or disconnecting a portion of a power system. The IED may also be capable of making load-shedding decisions. In another example, an IED may be in communication with a recloser and capable of commanding reclosing operations. In another example, an IED may be in communication with a voltage regulator and capable of commanding the voltage regulator to tap up and/or down. Other examples of control instructions that may be implemented using IEDs may be known to one having skill in the art, but are not listed here. Information of the types listed above, or more generally, information or instructions directing an IED or other device to perform a certain action is referred to as control instructions.
IEDs may be linked together using a data communications network, and may further be linked to a central monitoring system or an information system. The data communications network may include a variety of network technologies, and may comprise network devices such as modems, routers, firewalls, virtual private network servers, and the like. IEDs and other network devices are connected to the communications network through a network interface module (NIM).
IEDs may be configured to communicate with a central IED, which may also be the primary interface with an information system or central monitoring system. A central IED may be for example the SEL-2020, SEL-2030, SEL-2032, or SEL-3332 available from Schweitzer Engineering Laboratories, Inc. of Pullman, Wash., and also as described in U.S. Pat. No. 5,680,324, the entirety of which is incorporated herein by reference. IEDs communicate information to the central IED including, but not limited to status and control information about the individual IEDs, IED settings information, calculations made by individual IEDs, event (fault) reports, communications network information, network security events, and the like. Central IEDs, or communications processors, may be cascaded in order to increase the number of connections to pieces of monitored equipment. An access controller, as described in detail below, may serve as a central IED or communications processor.
The physical architecture of the data communication network connecting IEDs and other network devices may be any known to one having skill in the art, and may include fiber-optic, contact inputs and outputs, Ethernet, and the like. IEDs may follow any of a number of different protocols in communicating with an access controller as described below. IEDs may all communicate using the same protocol, or may communicate over different protocols to the access controller. Some available communications protocols include, for example, Schweitzer Engineering Laboratories Mirrored Bits® (described in U.S. Pat. Nos. 5,793,750, 6,947,269, and US Patent Application Publication No. 2005/0280965, all assigned to the assignee of this patent application, and the entirety of each of which are incorporated herein by reference), Schweitzer Engineering Laboratories Fast Message, Distributed Network Protocol (DNP) 3.0 Serial, DNP 3.0 LAN/WAN, MODBUS RTU, MODBUS TCP, IEC 61850, IEEE C37.118 and the like. Central monitoring systems may likewise use these same protocols or formats for communicating with individual IEDs or central IEDs.
Individual IEDs, central IEDs, or other network devices may allow users to log into the device to perform actions such as change settings, upgrade systems, conduct tests, gather information, and perform other functions. Some devices may allow a user to login remotely from another location using the communications network. Similarly, other devices connected to the data communications network may allow users to login and perform a variety of tasks.
Improper changes to an IED or other data communications network device may result in disruption of a monitored system. Accordingly, IEDs and other network devices may employ various techniques to ensure that only authorized users are allowed access. IEDs and other network devices may employ various systems to authenticate a user before allowing access to a device or permitting a user to change settings. At a minimum, a password is typically required in order to log into an IED or other network device. Other methods of authentication, for example biometric authentication, may also be used.
IEDs and other network devices may log network related events or statistics such as user logins, user logouts, failed logins, setting changes, updates, tests, repeated password attempts, network diagnostics, unidentified access attempts through restricted Internet Protocol ports, firewall access, packet size, packet latency, and the like. Information of the types listed above, or more generally, information relating to events or statistics pertaining to the data communications network connecting IEDs and other network devices is referred to as network data or a network event.
Network data is typically transmitted or made available only to an information system. The information system generally includes network communication, network security, user administration, Internet and intranet administration, remote network access and the like. The information system uses information about the network to maintain and sustain a reliable, quality, and secure communications network by running real-time business logic on network security events, perform network diagnostics, optimize network performance, and the like. Network events may be automatically pushed to the information system, or may be contained in logs that are accessible upon request to the information system.
Historically, monitored system information has been transmitted to the central monitoring systems, such as a SCADA system. Due to network security and operational concerns, information is not typically shared between the central monitoring systems and the information system. The division between the central monitoring systems and information system may have been beneficial from a network security standpoint in that risk of unauthorized access to the SCADA system is reduced; however, certain information that is typically communicated only to the information system may also be useful to operators of a central monitoring system. Communicating network data to a SCADA control center, for example, may be advantageous because SCADA control centers may be continuously staffed, and SCADA information may be often reviewed in near real-time. Automating the delivery of network events to SCADA may provide a further safeguard to ensure that only authorized users have access to the communications network. Further, centralizing information related both to monitored system data and network data may simplify procedures required to comply with corporate and government regulations.
Network events that may be of use to an operator of a central monitoring system include user logins, user logouts, setting changes, invalid password attempts, network diagnostics, unidentified access attempts through restricted Internet Protocol ports, firewall access, packet size, packet latency, and the like. This data is helpful so that people or systems monitoring the system know who is logging into and out of each network device, which settings are being changed, whether login attempts have failed, and the like. Providing central monitoring system operators access to network events may also help to ensure that correct settings are being applied to each device as changes are made. Access to network information is also helpful in post-event analysis and security analysis that may be required by government or corporate regulations. Such advantages may not have been realized historically because of the security and operational concerns discussed above, and because protocols used to transmit network data to the information system may not be compatible with the infrastructure and protocols used by central monitoring systems.
The systems and methods of this disclosure allow for the mapping of network events to any number of protocols using existing infrastructure. As such, the benefits discussed above may be realized without significant changes to existing infrastructure.
Turning now to
The IEDs 182-198 are all in communication with an access controller 150. Access controller 150 may be configured to receive information from various IEDs and communicate the information to a central monitoring system, such as SCADA system 128, and to information system 126. Access controller 150 may also be in communication with a second access controller 152 in a cascaded configuration. The cascaded configuration permits access controller 152 to receive information from additional IEDs.
Access controller 150 may also be in communication with local human-machine interface (HMI) 124. Local HMI 124 may be located at the same substation as access controller 150. Local HMI 124 may be used to view data from access controller 150 and/or initiate communications with access controller 150 to change settings, issue control instructions, retrieve an event (fault) report, retrieve data, and the like.
Common time source 122 may be available to access controller 150 for providing a common time to access controller 150 and connected IEDs. Common time source 122 may be used by access controller 150 for time stamping information and data. Time synchronization may be helpful for data organization, real-time decision-making, as well as post-event analysis. Time synchronization may further be applied to network communications. Common time source 122 may be any time source that is an acceptable form of time synchronization. For example, common time source 122 may be available from GPS satellites and follow the IRIG-B protocol, may be provided over the WWB or WWVB radio networks, or may be kept locally by access controller 150. Time may be synchronized throughout the system using a SCADA protocol (such as DNP 3.0 or IEC 61850), or using network time synchronization (such as Network Time Protocol or Simple Network Time Protocol). In the absence of a discrete common time source, access controller 150 may serve as the time source by distributing a time synchronization signal (received from one of the sources described).
As illustrated in
Centralizing communications using access controller 150 may also allow for improved security. Access controller 150 may incorporate various security features, such as an authentication system, firewall, VPN server, and other security features. Routing all communications through access controller 150 allows for devices connected to access controller 150 to benefit from these security features, rather than requiring that various security devices be connected to each IED or piece of monitored equipment. Such a configuration also reduces the potential area for attack by unauthorized users. As discussed above, access controller 150 may allow for communication with IEDs operating on any number of protocols, including legacy devices that may not natively include up to date security features and protocols. The use of access controller 150 may allow such legacy devices to remain in service and benefit from the secure environment created by access controller 150.
The connection between access controller 150 and SCADA system 128 and information system 126 may be a single connection that is capable of simultaneously supporting the protocols and bandwidth requirements of SCADA system 128 and information system 126.
In an embodiment illustrated in
IEDs 102-120 receive power system information from the electric power system 160. The IEDs 102-120 may receive the power system information from sensors or from the monitored equipment in the power system or combinations thereof. IEDs may be individually configured as to what information they are to communicate to access controller 150. For example, IEDs 102-120 may receive current waveforms from current transducers installed on conductors or within other equipment of the electric power system. Likewise, IEDs 102-120 may receive voltage information from potential transducers installed on conductors or within other equipment of the electric power system. Alternatively, IEDs 102-120 may receive breaker status information directly from a circuit breaker (open or closed). IEDs 102-120 may receive tap information from voltage regulators. Other types of information may be gathered using IEDs may be known to one having skill in the art, but are not listed here.
IEDs 102-120 may further perform calculations on the power system information. Depending on the type, configuration, and settings of an individual IED, calculations may be performed that generate control instructions. For example, an IED may be configured to make calculations as to overcurrent conditions, undervoltage conditions, out-of-balance conditions, excessive power swing conditions, and to generate appropriate control instructions to address each condition.
In one embodiment, the LE 300 may operate in accordance with the International Electrotechnical Commission (IEC) 61131-3 standard. IEC 61131-3 defines two graphical and two textual PLC programming language standards. Languages included in the IEC 61131-3 standard are graphical languages, Ladder Diagram (LD) and Function Block Diagram (FBD), as well as textual languages, Structured Text (ST), Instruction List (IL), and Sequential Function Chart (SFC).
Monitored system data and network data from the various IEDs and access controller 150 are processed by LE 300. Monitored system data is routed to SCADA data module 302. Network data is routed to network data module 302. SCADA data module 302 processes data intended to be communicated to and from SCADA system 128 into data points corresponding with the communication protocol used by SCADA. SCADA data module 302 may translate information from one protocol to another protocol. For example, if SCADA system 128 expects data to be organized in accordance with the MODBUS TCP protocol, and IED 102 communicated data using the Schweitzer Engineering Laboratories Fast Message protocol, SCADA data module 302 will translate the data into the MODBUS TCP protocol. SCADA data module 302 may then form data packets according to the expected SCADA protocol and transmit the data packets to SCADA system 128 using SCADA communications interface 310.
Network data received from IEDs 102-106 or generated by access controller 150 is processed by network data module 304. Network data module 304 processes the data intended for information system 126 into the format or protocol expected by information system 126. For example, if information system 126 expects communication according to the TCP/IP protocol, then network data module 304 will map the data intended for information system 126 into the TCP/IP protocol. Network data module 304 may then form data packets according to the expected network protocol and transmit the data packets to information system 126 using information system communications interface 312.
LE 300 further includes data-mapping module 306 configured to map data from network data module 304 to SCADA data module 302. As described above, it may be desirable to communicate network data that is typically only communicated to information system 126 to SCADA system 128. The conditions for determining which network events are sent to data mapping module 306 can be selected based on operational importance. For example, network data module 304 may be configured to not transmit data routine network events (i.e. a successful user logon) to data mapping module 306 because such events are not of operational importance. On the other hand, network data module 304 may be configured to transmit repeated failed attempts to logon to data mapping module 306 because such activity may indicate that an unauthorized user is attempting to gain access to the system. In this manner, only the network events and data that are important for SCADA system 128 to receive for monitoring and operations will be mapped into the SCADA module 302. The conditions for selecting which events will be mapped may be based on programmable logic in LE 300.
Access controller 150 may include a computer readable storage medium 308. Computer readable storage medium 308 may serve a variety of functions, such as maintaining a log of monitored system data and network data. The log may include timestamps indicating the receipt time of each piece of data and may serve as an on site backup to data transmitted to SCADA system 128 and information system 126. Computer readable storage medium 308 may also be the repository of software modules or other computer readable instructions utilized by access controller 150. Computer readable storage medium 308 may be any type of computer readable storage medium, including but not limited to a hard drive or flash memory. Computer readable storage medium 308 may be accessible via SCADA system 128 (connection not shown), via information system 126 (connection not shown), or via local HMI 124 (connection not shown).
In step 406, the network data module determines whether the network data is of a type that is to be transmitted to a SCADA system. As discussed above, only certain network data may be of interest to SCADA operators. If the network data is of the type that is transmitted to SCADA, the network data is also routed to data mapping module 306 and the process continues to step 416.
All network data continues from step 406 to 408, where network data module 304 determines whether the data received is in the format expected by an information system. If the data is not in the expected format, the data is translated in step 410. In step 412, the data is in the expected format, and a network data packet is created. In step 412 a data packet header may be created including routing information indicating the source and destination of the packet, the length of the packet, and error-checking or error-correcting information. The network data packet is transmitted to the information system in step 414.
In step 416, the network data is mapped into a format expected by SCADA. As discussed herein, data may be mapped into a variety of formats. The mapped data format may be any data format used by the SCADA system. In step 416 a data type conversion (i.e. conversion to an analog data type) may be performed if necessary.
In step 418 SCADA data module 302 determines whether the monitored system data is in a format expected by the SCADA system. If the data is not in the expected format, the data is translated in step 420. The translation performed at steps 420 and 410 may allow for the use of any number of different protocols, thus allowing for the use of devices that may communicate with access controller 150 using different protocols.
In step 422, the data (including translated data or mapped network data) is in the format expected by the SCADA system, and a SCADA data packet is created. As with a network packet, a SCADA data packet may include a header containing routing information indicating the source and destination of the packet, the length of the packet, and error-checking or error-correcting information. The SCADA data packet is transmitted to the SCADA system in step 424.
SCADA Data Module formats the DNP packet for transmission to SCADA system 128. The DNP frame includes a header section 506 (which includes sync, length, link control, destination address, source address, and cyclic redundancy check information) and a data section 508. Data points associated with network data 504 are mapped into the data section 508 of the DNP frame. DNP_Point_3 and DNP_Point_4 are mapped using the Structured Text programming language provided by the IEC 61131-3 standard to network events representing a user logging in and logging out. In this example, DNP_Point_3 and DNP_Point_4 are DNP analog data types. DNP_Point_3 is associated to a user login network event and DNP_Point_4 is a user logout network event. In this case, the data mapping module 306 will populate DNP_Point_3 with an integer appropriate for the user logging into the system. Likewise, it will populate DNP_Point_4 with an integer appropriate for the user logging out of the system. In this example, the integer to be used for each user is configurable within data-mapping module 306. A data type conversion may or may not be necessary depending on the network event data.
Rules module 602 may be used to generate and control network and user access rules using the rules module 602. One benefit of the rules module 602 is that actions may be taken to prevent unwanted access more quickly than by simply monitoring data received by SCADA system. Implementing rules using rules module 602 avoids inevitable communication delays and/or human interaction latencies that would be incurred by transmitting data to SCADA system 128 or information system 126 and awaiting the intervention of an operator. Computer readable storage medium 308 may further store a log of actions taken by rules module 602, and may also store various modules for storing, creating, modifying, and implementing various rules. Rules may be added to rules module 602 using local HMI 124 or SCADA 128, and may be programmed according to the IED 61131-3 standard.
Using rules module 602, a user may create rules that govern access to access controller 600 and/or IEDs based on certain network events and/or information from the SCADA data module 302. For example, rules module 602 may implement rules to increase or decrease user access to access controller 600, an individual IED, and/or all connected IEDs based on certain conditions. Rules module 602 may be configured as a firewall (e.g. a device that inspects traffic passing through it, and denies or permits passage based on a set of rules). Rule module 602 may be configured to administer user account rules governing access to access controller 600 or various IEDs connected to access controller 600. Rules module 602 may administer user account rules such as requiring users to change passwords after a specified length of time or number of logins, granting varying levels of access to different users (e.g. read only access, read/write access), or automatically making available certain types of data when a particular user logs in.
Rules module 602 may also be configured to implement control instructions, automation actions, and/or protection actions in conjunction with various IEDs. For example, when SCADA data meets conditions defined by a rule, rules module 602 may issue a control instruction to an IED in communication with a circuit breaker to open and/or close the circuit breaker, thus connecting or disconnecting a portion of a power system. In another example, rules module 602 may issue a control instruction to an IED in communication with a voltage regulator to tap up and/or down when SCADA data meets conditions defined by a rule.
Embodiments disclosed herein may include various steps, which may be embodied in computer executable instructions stored on a computer readable medium to be executed by a general-purpose or special-purpose computer (or other electronic device). For example, the access controller described above may be implemented using a programmable logic controller. The computer readable medium described herein may include, but is not limited to, hard drives, floppy diskettes, optical disks, CD-ROMs, DVD-ROMs, ROMs, RAMs, flash memory, EPROMs, EEPROMs, magnetic or optical cards, solid-state memory devices, or other types of media/computer readable medium suitable for storing electronic instructions. Alternatively, the steps may be performed by hardware components that include specific logic for performing the steps or by a combination of hardware, software, and/or firmware.
Several aspects of the embodiments described have been illustrated as software modules or components. As used herein, a software module or component may include any type of computer instruction or computer executable code located within a memory device. A software module may, for instance, comprise one or more physical or logical blocks of computer instructions, which may be organized as a routine, program, object, component, data structure, etc., that performs one or more tasks or implements particular abstract data types.
In certain embodiments, a particular software module may comprise disparate instructions stored in different locations of a memory device, which together implement the described functionality of the module. Indeed, a module may comprise a single instruction or many instructions and may be distributed over several different code segments, among different programs, and across several memory devices. Some embodiments may be practiced in a distributed computing environment where tasks are performed by a remote processing device linked through a communications network. In a distributed computing environment, software modules may be located in local and/or remote memory storage devices. In addition, data being tied or rendered together in a database record may be resident in the same memory device, or across several memory devices, and may be linked together in fields of a record in a database across a network.
While specific embodiments and applications of the disclosure have been illustrated and described, it is to be understood that the disclosure is not limited to the precise configuration and components disclosed herein. Various modifications, changes, and variations apparent to those of skill in the art may be made in the arrangement, operation, and details of the methods and systems of the disclosure without departing from the spirit and scope of the disclosure.