Abstract: The present disclosure relates to a method of configuring a numerical protection relay by means of a portable computing device comprising the steps of operatively connecting the portable computing device with the numerical protection relay; receiving, at the portable computing device, a unique identifier of the numerical protection relay; retrieving, at the portable computing device, desired configuration settings for the numerical protection relay based on the unique identifier; and enabling change in configuration of the numerical protection relay based on the retrieved desired configuration settings.
Claims:1. A method of configuring a numerical protection relay by means of a portable computing device comprising:
operatively connecting the portable computing device with the numerical protection relay;
receiving, at the portable computing device, a unique identifier of the numerical protection relay;
retrieving, at the portable computing device, desired configuration settings for the numerical protection relay based on the unique identifier; and
enabling change in configuration of the numerical protection relay based on the retrieved desired configuration settings.
2. The method of claim 1, wherein the portable computing device is selected from any or a combination of a mobile phone, a smart phone, a tablet, a portable computing device, and a laptop.
3. The method of claim 1, wherein the portable computing device and the numerical protection relay are operatively connected by means of at least one cable.
4. The method of claim 1, wherein the portable computing device is connected with the USB port of the numerical protection relay by means of two cables.
5. The method of claim 1, wherein the portable computing device and the numerical protection relay are wirelessly connected.
6. The method of claim 1, wherein the unique identifier of the numerical protection relay is any or a combination of a one-dimensional barcode of the numerical protection relay, two-dimensional barcode of the numerical protection relay, a device identifier of the numerical protection relay, or a unique number associated with the numerical protection relay.
7. The method of claim 1, wherein the configuration settings are retrieved from a database that is operatively coupled with the portable computing device through any or a combination of wired means or wireless means selected from any of near field communication (NFC), Wi-Fi, RFID, Zigbee protocol, Bluetooth, GPRS, 3G, and a wireless connection enabling means.
8. The method of claim 1, wherein display of the portable computing device is configured to present current configuration settings of the numerical protection relay, and further configured to enable comparison of the current configuration settings and the desired configuration settings.
9. The method of claim 1, wherein the portable computing device enables authentication of user of the device before configuration of the numerical protection relay is changed based on the retrieved desired configuration settings.
10. The method of claim 1, wherein the portable computing device is configured to log each change in configuration of the numerical protection relay.
11. A system of configuring a numerical protection relay by means of a portable computing device, said system comprising:
a connection module configured to operatively connect the portable computing device with the numerical protection relay;
a unique identifier receive module configured to receive, at the portable computing device, a unique identifier of the numerical protection relay;
a desired configuration settings retrieve module configured to retrieve, at the portable computing device, desired configuration settings for the numerical protection relay based on the unique identifier; and
a configuration settings change module configured to enable change in configuration of the numerical protection relay based on the retrieved desired configuration settings.
12. The system of claim 11, wherein the portable computing device is selected from any or a combination of a mobile phone, a smart phone, a tablet, a portable computing device, and a laptop.
13. The system of claim 11, wherein the portable computing device and the numerical protection relay are operatively connected through wired or wireless means.
14. The system of claim 11, wherein the unique identifier of the numerical protection relay is any or a combination of a one-dimensional barcode of the numerical protection relay, two-dimensional barcode of the numerical protection relay, a device identifier of the numerical protection relay, or a unique number associated with the numerical protection relay.
, Description:TECHNICAL FIELD
[0001] The present disclosure relates generally to protection relays, and particularly to configuration of protection relays.
BACKGROUND
[0002] Background description includes information that may be useful in understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art.
[0003] Numerical protection relays (such as 104 of FIG. 1) are installed in different panels in large quantities. During panel commissioning, it is observed that for frequently updating the parameters, an experienced operator/ professional technician is required who needs to carry a laptop (such as 102 of FIG. 1) installed with configuration software to update the parameters such as for limiting current, maximum load, over-voltage limit, protection setting, logic function etc. It is very stressful and cumbersome to update the parameter values in such large numbers, and at the same time, also keep in mind all the right values for the parameters. Furthermore, there is no other verification other than the visual check that can be done, and therefore only an expert can alter the configuration data.
[0004] Therefore is therefore a need in the art to overcome the above-mentioned disadvantages and define a solution for the outlined problem of configuring numerical protection relays.
[0005] All publications herein are incorporated by reference to the same extent as if each individual publication or patent application were specifically and individually indicated to be incorporated by reference. Where a definition or use of a term in an incorporated reference is inconsistent or contrary to the definition of that term provided herein, the definition of that term provided herein applies and the definition of that term in the reference does not apply.
[0006] In some embodiments, the numbers expressing quantities of ingredients, properties such as concentration, reaction conditions, and so forth, used to describe and claim certain embodiments of the invention are to be understood as being modified in some instances by the term “about.” Accordingly, in some embodiments, the numerical parameters set forth in the written description and attached claims are approximations that can vary depending upon the desired properties sought to be obtained by a particular embodiment. In some embodiments, the numerical parameters should be construed in light of the number of reported significant digits and by applying ordinary rounding techniques. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of some embodiments of the invention are approximations, the numerical values set forth in the specific examples are reported as precisely as practicable. The numerical values presented in some embodiments of the invention may contain certain errors necessarily resulting from the standard deviation found in their respective testing measurements.
[0007] As used in the description herein and throughout the claims that follow, the meaning of “a,” “an,” and “the” includes plural reference unless the context clearly dictates otherwise. Also, as used in the description herein, the meaning of “in” includes “in” and “on” unless the context clearly dictates otherwise.
[0008] The recitation of ranges of values herein is merely intended to serve as a shorthand method of referring individually to each separate value falling within the range. Unless otherwise indicated herein, each individual value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g. “such as”) provided with respect to certain embodiments herein is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention otherwise claimed. No language in the specification should be construed as indicating any non-claimed element essential to the practice of the invention.
[0009] Groupings of alternative elements or embodiments of the invention disclosed herein are not to be construed as limitations. Each group member can be referred to and claimed individually or in any combination with other members of the group or other elements found herein. One or more members of a group can be included in, or deleted from, a group for reasons of convenience and/or patentability. When any such inclusion or deletion occurs, the specification is herein deemed to contain the group as modified thus fulfilling the written description of all Markush groups used in the appended claims.
OBJECTS OF THE INVENTION
[0010] It is an object of the present disclosure to provide an efficient means of configuring numerical protection relays.
[0011] It is an object of the present disclosure to provide a method and system for configuring numerical protection relays such that a layman, once shown, can go and update the parameters of all the units easily without any hassle to remember the parameters and even the details of present parameters remains well documented.
[0012] It is an object of the present disclosure to provide a method and system for configuring numerical protection relays that does not need any manual intervention.
[0013] It is an object of the present disclosure to provide a method and system for configuring numerical protection relays that senses the correct protection relay, selects proper configuration from database, and guides the user regarding the differences in present configuration of the target protection relay and the new configurations.
SUMMARY
[0014] The present disclosure relates generally to protection relays, and particularly to configuration of protection relays. A present disclosure further relates to a method for configuration of numerical protection relays using mobile/hand-held devices and management of configuration data thereof. The present disclosure further relates generally to protection relays, and more particularly to configuration of numerical protection relays and management of configuration data thereof.
[0015] In an aspect, the present disclosure relates to a method of configuring a numerical protection relay by means of a portable computing device comprising the steps of operatively connecting the portable computing device with the numerical protection relay; receiving, at the portable computing device, a unique identifier of the numerical protection relay; retrieving, at the portable computing device, desired configuration settings for the numerical protection relay based on the unique identifier; and enabling change in configuration of the numerical protection relay based on the retrieved desired configuration settings.
[0016] In an aspect, the portable computing device can be selected from any or a combination of a mobile phone, a smart phone, a tablet, a portable computing device, and a laptop. In another aspect, the portable computing device and the numerical protection relay can be operatively connected by means of at least one cable. In another aspect, the portable computing device can be connected with the USB port of the numerical protection relay by means of two cables. In another aspect, the portable computing device and the numerical protection relay can be wirelessly connected. In yet another aspect, the unique identifier of the numerical protection relay can be any or a combination of a one-dimensional barcode of the numerical protection relay, two-dimensional barcode of the numerical protection relay, a device identifier of the numerical protection relay, or a unique number associated with the numerical protection relay.
[0017] In an aspect, the configuration settings can be retrieved from a database that can be operatively coupled with the portable computing device through any or a combination of wired means or wireless means selected from any of near field communication (NFC), Wi-Fi, RFID, Zigbee protocol, Bluetooth, GPRS, 3G, and a wireless connection enabling means. In another aspect, display of the portable computing device can be configured to present current configuration settings of the numerical protection relay, and further configured to enable comparison of the current configuration settings and the desired configuration settings.
[0018] In another aspect, the portable computing device enables authentication of user of the device before configuration of the numerical protection relay is changed based on the retrieved desired configuration settings. In another aspect, the portable computing device can be configured to log each change in configuration of the numerical protection relay.
[0019] The present disclosure further relates to a system of configuring a numerical protection relay by means of a portable computing device, said system comprising a connection module configured to operatively connect the portable computing device with the numerical protection relay; a unique identifier receive module configured to receive, at the portable computing device, a unique identifier of the numerical protection relay; a desired configuration settings retrieve module configured to retrieve, at the portable computing device, desired configuration settings for the numerical protection relay based on the unique identifier; and a configuration settings change module configured to enable change in configuration of the numerical protection relay based on the retrieved desired configuration settings.
[0020] Various objects, features, aspects and advantages of the inventive subject matter will become more apparent from the following detailed description of preferred embodiments, along with the accompanying drawing figures in which like numerals represent like components
BRIEF DESCRIPTION OF THE DRAWINGS
[0021] The accompanying drawings are included to provide a further understanding of the present disclosure, and are incorporated in and constitute a part of this specification. The drawings illustrate exemplary embodiments of the present disclosure and, together with the description, serve to explain the principles of the present disclosure.
[0022] FIG. 1 illustrates an existing (prior art) mechanism of updating configuration of protection relays.
[0023] FIG. 2 illustrates exemplary functional modules of the proposed system for updation of configuration of numerical protection relays in accordance with an embodiment of the present disclosure.
[0024] FIG. 3 illustrates an exemplary set up required for updation of configuration of numerical protection relays in accordance with an embodiment of the present disclosure.
[0025] FIG. 4 illustrates an exemplary flow diagram showing updation of configuration of numerical protection relays in accordance with an embodiment of the present disclosure.
[0026] FIG. 5 illustrates another exemplary flow diagram showing updation of configuration of numerical protection relays in accordance with an embodiment of the present disclosure.
DETAILED DESCRIPTION
[0027] The following is a detailed description of embodiments of the disclosure depicted in the accompanying drawings. The embodiments are in such detail as to clearly communicate the disclosure. However, the amount of detail offered is not intended to limit the anticipated variations of embodiments; on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present disclosure as defined by the appended claims.
[0028] Each of the appended claims defines a separate invention, which for infringement purposes is recognized as including equivalents to the various elements or limitations specified in the claims. Depending on the context, all references below to the "invention" may in some cases refer to certain specific embodiments only. In other cases it will be recognized that references to the "invention" will refer to subject matter recited in one or more, but not necessarily all, of the claims.
[0029] As used in the description herein and throughout the claims that follow, the meaning of “a,” “an,” and “the” includes plural reference unless the context clearly dictates otherwise. Also, as used in the description herein, the meaning of “in” includes “in” and “on” unless the context clearly dictates otherwise.
[0030] All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g. “such as”) provided with respect to certain embodiments herein is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention otherwise claimed. No language in the specification should be construed as indicating any non-claimed element essential to the practice of the invention.
[0031] Various terms as used herein are shown below. To the extent a term used in a claim is not defined below, it should be given the broadest definition persons in the pertinent art have given that term as reflected in printed publications and issued patents at the time of filing.
[0032] The present disclosure relates generally to protection relays, and particularly to configuration of protection relays. A present disclosure further relates to a method for configuration of numerical protection relays using mobile/hand-held devices and management of configuration data thereof. The present disclosure further relates generally to protection relays, and more particularly to configuration of numerical protection relays and management of configuration data thereof.
[0033] In an aspect, the present disclosure relates to a method of configuring a numerical protection relay by means of a portable computing device comprising the steps of operatively connecting the portable computing device with the numerical protection relay; receiving, at the portable computing device, a unique identifier of the numerical protection relay; retrieving, at the portable computing device, desired configuration settings for the numerical protection relay based on the unique identifier; and enabling change in configuration of the numerical protection relay based on the retrieved desired configuration settings.
[0034] In an aspect, the portable computing device can be selected from any or a combination of a mobile phone, a smart phone, a tablet, a portable computing device, and a laptop. In another aspect, the portable computing device and the numerical protection relay can be operatively connected by means of at least one cable. In another aspect, the portable computing device can be connected with the USB port of the numerical protection relay by means of two cables. In another aspect, the portable computing device and the numerical protection relay can be wirelessly connected. In yet another aspect, the unique identifier of the numerical protection relay can be any or a combination of a one-dimensional barcode of the numerical protection relay, two-dimensional barcode of the numerical protection relay, a device identifier of the numerical protection relay, or a unique number associated with the numerical protection relay.
[0035] In an aspect, the configuration settings can be retrieved from a database that can be operatively coupled with the portable computing device through any or a combination of wired means or wireless means selected from any of near field communication (NFC), Wi-Fi, RFID, Zigbee protocol, Bluetooth, GPRS, 3G, and a wireless connection enabling means. In another aspect, display of the portable computing device can be configured to present current configuration settings of the numerical protection relay, and further configured to enable comparison of the current configuration settings and the desired configuration settings.
[0036] In another aspect, the portable computing device enables authentication of user of the device before configuration of the numerical protection relay is changed based on the retrieved desired configuration settings. In another aspect, the portable computing device can be configured to log each change in configuration of the numerical protection relay.
[0037] The present disclosure further relates to a system of configuring a numerical protection relay by means of a portable computing device, said system comprising a connection module configured to operatively connect the portable computing device with the numerical protection relay; a unique identifier receive module configured to receive, at the portable computing device, a unique identifier of the numerical protection relay; a desired configuration settings retrieve module configured to retrieve, at the portable computing device, desired configuration settings for the numerical protection relay based on the unique identifier; and a configuration settings change module configured to enable change in configuration of the numerical protection relay based on the retrieved desired configuration settings.
[0038] The present disclosure does not require any manual intervention, senses the correct device, selects proper configuration from the database, and guides the user regarding the differences in present configuration of the target relay and the new configurations. Hence, there remains no scope for human errors such as wrong configuration, configuration of wrong device etc. There is no requirement to have complicated hardware/software to detect correct target relay etc. and no need to open the relay from the switch board panel. The proposed system and method further allow an engineer / experienced operator to set parameters of all units from one place on his/her desk, and further allows scanning of 1D/2D barcode of sticker placed nearby the numerical relay along with an option of manually entering the numerical relay device identifier (Unit ID or device ID) that can ensure that the right unit is configured with the right parameters.
[0039] The proposed system and method can also allow configuration of password protection that can prevent unauthorized changes to parameters, and at the same time allows a layman to also go and configure the unit without chances of error. Furthermore, the proposed system allows maintenance of configured parameters, say in an excel sheet/CSV file that can be transferred to a computer and can be well maintained for monitoring and debugging purposes.
[0040] FIG. 2 illustrates exemplary functional modules 200 of the proposed system for updation of configuration of numerical protection relays in accordance with an embodiment of the present disclosure. In an aspect, the proposed system can include a connection module 202 that can be configured to operatively connect the portable computing device with the numerical protection relay. The system can further include a unique identifier receive module 204 that can be configured to receive, at the portable computing device, a unique identifier of the numerical protection relay. System 200 can further include a desired configuration settings retrieve module 206 that can be configured to retrieve, at the portable computing device, desired configuration settings for the numerical protection relay based on the unique identifier. System 200 can further include a configuration settings change module 208 that can be configured to enable change in configuration of the numerical protection relay based on the retrieved desired configuration settings. In an aspect, the portable computing device can be selected from any or a combination of a mobile phone, a smart phone, a tablet, a portable computing device, and a laptop.
[0041] In another aspect, the portable computing device and the numerical protection relay can be operatively connected through wired or wireless means. In yet another aspect, the unique identifier of the numerical protection relay can be any or a combination of a one-dimensional barcode of the numerical protection relay, two-dimensional barcode of the numerical protection relay, a device identifier of the numerical protection relay, or a unique number associated with the numerical protection relay.
[0042] With respect to FIG. 3, in an aspect, any existing mobile device or smartphone or tablet302 with OTG (USB On-The-Go) and camera capability can be used for this purpose, and hence there is no need of any other specialized hardware. In an aspect, existing Mobile Phones/Tablets 302 are available with USB OTG (On The Go) capability, also having camera that can also read 1D/2D barcodes. Display unit of Numerical Relays 304 have USB device interface on the front for configuration using Laptop/PC in general, which can communicate using an USB cable 306.
[0043] In an aspect, an exemplary method in which the configuration using hand held devices can be done includes the step of a user application being installed in the hand-held device, including but not limited to mobile phone/tablet etc, wherein the user application can have capabilities including, but not limited to, ability to connect to Numerical relay by a virtual serial port, ability to read / write the setting of the connected numerical relay, ability to read/ decode barcode of 1 or 2 dimension and identify the device being read, interface to display/change the individual setting of the connected device, memory allocated to store the settings retrieved, communication ability to get the updated data from the database in a remote PC/server by modes of communication including but not limited to Wi-Fi, Bluetooth, NFC, GPRS, 3G etc. The method can further include the step of connecting the hand-held device having the installed mobile application to the USB device port of Display Unit of the target Numerical protection relay using 2 cables (as shown in the FIG. 3).The user can then run the installed application, wherein the application can ask the user to show the barcode (1-Dimensional or 2-Dimensional) located on the display of the target numerical relay calling the camera application. The mobile application can recognize the numerical relay to be configured by image processing the barcode sticker, wherein in case the barcode is not available, the user can be provided with an option to manually enter the device ID/ address of the numerical relay to be configured. The mobile application can then initiate USB communication, wherein the hand-held device can act as a Host and the display unit of the relay device can act as the USB slave device. Once the communication is successful, the Application can read and display the present configuration of the target relay, wherein the mobile application can also display the difference with the configuration settings in the database, which can be fetched by the handheld device using wireless communication such as GPRS/3G/4G.The user can then select the desired/final configuration to be loaded in the target numerical relay, and the mobile application can be configured to write the new configuration in the target relay after a valid password is provided.
[0044] In an aspect, the new configuration can be updated /synchronized to the database for future reference and verification. In another aspect, a log of changes can also be generated/saved in the mobile device/database for future reference, which can be transferred to database/ printed as per requirement.
[0045] In an aspect, the above method also applies for changing internal firmware of the display or numerical relay or any of its expansion modules, given that a suitable boot-loader is already programmed previously into the Numerical Protection relay.
[0046] In an aspect, the proposed method and system disclose use of existing smartphones /tablets using two cables (in an embodiment) in a way to use for any or a combination of identification of target relay, fetching parameters available from database and relay and comparing them on the display, password protection, writing of the selected parameters, Updation of database with latest parameters, verification of the parameters after being written, and option to change the firmware of the protection relay by boot-loader already available in hardware. Due to such means, an engineer / experienced operator can set/monitor parameters of all units from one place on his/her desk, which in turn can be programmed by less technical persons on individual relays, simultaneously. The proposed system further relates to scanning of 1D/2D barcode of sticker placed nearby Numerical Relay, along with options of manually entering the UNIT ID that can ensure that the right unit is configured with the right parameters.
[0047] FIG. 4 illustrates an exemplary flow diagram 400 showing updation of configuration of numerical protection relays in accordance with an embodiment of the present disclosure. At step 402, the method can include the step of operatively connecting the portable computing device with the numerical protection relay. At step 404, the method can include the step of receiving, at the portable computing device, a unique identifier of the numerical protection relay. At step 406, the method can include the step of retrieving, at the portable computing device, desired configuration settings for the numerical protection relay based on the unique identifier. At step 408, the method can include the step of enabling change in configuration of the numerical protection relay based on the retrieved desired configuration settings.
[0048] FIG. 5 illustrates another exemplary flow diagram 500 showing updation of configuration of numerical protection relays in accordance with an embodiment of the present disclosure. At step 502, configuration parameters for target numerical protection relay can be set at a remote database server, for instance. At step 504, configuration mobile application can be installed on the mobile/smart phone/device. At step 506, USB cable can be connected to the display of the relay device. At step 508, the mobile application can be opened, and at step 510, existing/current parameters of the relay device can be read. At step 512, the mobile application fetches desired configuration data for the relay device and compares the same with the existing/current parameters/configuration data. At step 514, the user can select the required changes or can accept all the changes. At step 516, the application authenticates the user, and at step 518, checks whether the user is authenticated, which if affirmative, enables the application to write the changes to the relay device and update the central database at step 520, else at step 522, the application can reject the new configuration.
[0049] While the foregoing describes various embodiments of the invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof. The scope of the invention is determined by the claims that follow. The invention is not limited to the described embodiments, versions or examples, which are included to enable a person having ordinary skill in the art to make and use the invention when combined with information and knowledge available to the person having ordinary skill in the art.
ADVANTAGES OF THE INVENTION
[0050] The present disclosure provides an efficient means of configuring numerical protection relays.
[0051] The present disclosure provides a method and system for configuring numerical protection relays such that a layman, once shown, can go and update the parameters of all the units easily without any hassle to remember the parameters and even the details of present parameters remains well documented.
[0052] The present disclosure provides a method and system for configuring numerical protection relays that does not need any manual intervention.
[0053] The present disclosure provides a method and system for configuring numerical protection relays that senses the correct protection relay, selects proper configuration from database, and guides the user regarding the differences in present configuration of the target protection relay and the new configurations.
| # | Name | Date |
|---|---|---|
| 1 | 201621010087-FER.pdf | 2019-09-30 |
| 1 | Form 9 [23-03-2016(online)].pdf | 2016-03-23 |
| 2 | 201621010087-Correspondence-220916.pdf | 2018-08-11 |
| 2 | Form 5 [23-03-2016(online)].pdf | 2016-03-23 |
| 3 | Form 3 [23-03-2016(online)].pdf | 2016-03-23 |
| 3 | 201621010087-Form 1-220916.pdf | 2018-08-11 |
| 4 | Form 18 [23-03-2016(online)].pdf | 2016-03-23 |
| 4 | 201621010087-Power of Attorney-220916.pdf | 2018-08-11 |
| 5 | ABSTRACT1.jpg | 2018-08-11 |
| 5 | Drawing [23-03-2016(online)].pdf | 2016-03-23 |
| 6 | Description(Complete) [23-03-2016(online)].pdf | 2016-03-23 |
| 6 | Other Patent Document [19-09-2016(online)].pdf | 2016-09-19 |
| 7 | Other Patent Document [19-09-2016(online)].pdf | 2016-09-19 |
| 8 | ABSTRACT1.jpg | 2018-08-11 |
| 9 | 201621010087-Power of Attorney-220916.pdf | 2018-08-11 |
| 10 | 201621010087-Form 1-220916.pdf | 2018-08-11 |
| 11 | 201621010087-Correspondence-220916.pdf | 2018-08-11 |
| 12 | 201621010087-FER.pdf | 2019-09-30 |
| 1 | 201621010087_05-09-2019.pdf |