Bridge for an industrial control system using data manipulation techniques
First Claim
1. A network safety control system comprising:
- a bridge for connecting a first and second communication network, each with communication protocols;
a first communication module attached to the first communication network to transmit two messages on the first communication network to pass through the bridge to the second network, the two messages containing redundant data, the redundant data of a first message reversibly altered with respect to a second message;
a second communication module attached to the second communication network to receive the two messages on the second communication network and compare the data of the first and second messages to detect any alteration of the redundant data by the bridge; and
wherein errors in an operation of a standard bridge may be detected without modification of the bridge.
1 Assignment
0 Petitions
Accused Products
Abstract
A bridge usable in a highly reliable industrial control system provides an interface between a producer module transmitting redundant messages in accordance with a communication protocol and a consumer module receiving the messages in accordance with a different communication protocol. The bridge includes a first network interface receiving two messages from the producer, a microprocessor capable of converting the messages from the producer communication protocol to consumer communication protocol, and a second network interface transmitting the messages to the consumer. One of the messages is reversible altered with respect to the other message. The altered message is uninverted in the consumer module, and compared to the other message to ensure that no transmission errors have occurred.
71 Citations
24 Claims
-
1. A network safety control system comprising:
- a bridge for connecting a first and second communication network, each with communication protocols;
a first communication module attached to the first communication network to transmit two messages on the first communication network to pass through the bridge to the second network, the two messages containing redundant data, the redundant data of a first message reversibly altered with respect to a second message; a second communication module attached to the second communication network to receive the two messages on the second communication network and compare the data of the first and second messages to detect any alteration of the redundant data by the bridge; and wherein errors in an operation of a standard bridge may be detected without modification of the bridge. - View Dependent Claims (2, 3, 4, 5, 6, 7)
- a bridge for connecting a first and second communication network, each with communication protocols;
-
8. A safety control protocol executed on a first and second communication module communicating via messages sent on at least one network, the method comprising the steps of:
-
(a) transmitting first and second redundant messages from the first communication module to the second communication module through the network, data of at least one of the first and second redundant messages being reversibly altered; (b) receiving the first and second messages at the second communication module to; (i) compare the data of the first and second message to confirm that the data matches; (ii) determine a time between transmission of the first and second messages and receiving of the first and second messages is less than a predetermined amount;
wherein errors caused by standard network hardware can be detected. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of detecting errors in a standard network bridge joining at least two communication networks without modification of the bridge, the method comprising:
-
sending a first and second message on a first communication network connected to the bridge, wherein at least one message is reversibly altered to pass through the bridge to the second network without modification of the bridge; and comparing the first and second messages to detect corruption of the messages by the bridge. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
Specification