Abstract: The present disclosure relates to a system and method method for wireless bootloading and diagnosis of protection system over 3G and 4G networks. The system lets an authorized engineer send messages (binary files) to the GSM module connected with a protection unit over GPRS/3G/4G network. The binary file is forwarded to microcontroller using UART protocol to bootload the microcontroller based on wireless technology using GSM module.
Claims:1. A system configured to perform wireless bootloading, said system comprising:
a microcontroller operatively coupled with one or more peripheral devices; and
a GSM module that is operatively coupled with the microcontroller using UART protocol, wherein the GSM module is configured to receive a SMS having a binary file from a remote user, wherein the binary file is forwarded to the microcontroller using the UART protocol for bootloading at least one peripheral device when a fault is detected therein.
2. The system of claim 1, wherein the binary file is a hex file or an image file.
3. The system of claim 1, wherein the GSM module receives the SMS from the remote user over a 3G or 4G network.
4. The system of claim 1, wherein the remote user sends the SMS upon receipt of fault detection information for the at least one peripheral device.
5. The system of claim 1, wherein the binary file is initially loaded for diagnosis of the at least one peripheral device, wherein in case fault is detected in the hardware of the at least one peripheral device, an SMS is directly send to the nearest service center.
6. The system of claim 1, wherein in case no fault is detected in the hardware of the at least one peripheral device, a test run is executed to check status of the peripheral device, wherein in case the test run fails or a bug is detected, a corrective binary file or image file is loaded using UART bootloading.
7. The system of claim 6, wherein the corrective binary file or image file is sent by the remote user to the microcontroller.
8. The system of claim 6, wherein a password based verification of the remote user is performed before loading of the binary file or the image file using UART bootloading.
9. The system of claim 1, wherein the at least one peripheral device is a protection relay.
10. A method for performing wireless bootloading, said method comprising the steps of:
operating coupling a microcontroller with one or more peripheral devices;
operatively coupling a GSM module with the microcontroller using UART protocol;
receiving, at the GSM module, a SMS having a binary file from a remote user;
forwarding, at the GSM module, the binary file to the microcontroller using the UART protocol; and
bootloading, at the microcontroller, at least one peripheral device using the binary file when a fault is detected therein.
, Description:TECHNICAL FIELD
[0001] The present disclosure relates generally to the field of switchgear and protection relays. In particular, the present disclosure pertains to a system and method for wireless bootloading and diagnosis of protection system over 3G and 4G networks.
BACKGROUND
[0002] Background description includes information that may be useful in understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art.
[0003] Switchgears (MCCB, ACB, etc.,) are used for protection of high power low-voltage electronic circuits. In case of any fault in the protection system due to hardware, bugs or any other reasons, the fault needs to be fixed as soon as possible else the switchgear remains shut for a longer period affecting business of a company or organization and may result in heavy loss to the company or the organization.
[0004] Various issues from the field have been reported in the past wherein the display unit gets hanged, or garbage parameters are displayed, or nothing is displayed at all on the display unit. Such conditions may, at times, lead to abnormal behavior of the system or can result in arbitrary commands executed to the system causing nuisance, tripping or malfunctioning. When such an adverse condition occurs, it should be attended to quickly else the condition may be dangerous and result in serious damage to properties or even result in human fatalities.
[0005] GSM is a cellular network, which means that cell phones connect to it by searching for cells in the immediate vicinity. There are five different cell sizes in a GSM network - macro, micro, pico, femto, and umbrella cells. The coverage area of each cell varies according to the implementation environment. Macro cells can be regarded as cells where the base station antenna is installed on a mast or a building above average rooftop level. Micro cells are cells whose antenna height is under average rooftop level; they are typically used in urban areas. Pico cells are small cells whose coverage diameter is a few dozen meters; they are mainly used indoors. Femto cells are cells designed for use in residential or small business environments and connect to the service provider’s network via a broadband internet connection. Umbrella cells are used to cover shadowed regions of smaller cells and fill in gaps in coverage between those cells. Cell horizontal radius varies depending on antenna height, antenna gain, and propagation conditions from a couple of hundred meters to tens of kilometers. The longest distance the GSM specification supports in practical use is 35 km (22 mi).
[0006] GSM networks operate in a number of different carrier frequency ranges (separated into GSM frequency ranges for 2G and UMTS frequency bands for 3G), with most 2G GSM networks operating in the 900 MHz or 1800 MHz bands. Where these bands were already allocated, the 850 MHz and 1900 MHz bands were used instead (for example in Canada and the United States). In rare cases the 400 and 450 MHz frequency bands are assigned in some countries because they were previously used for first-generation systems. Most 3G networks in Europe operate in the 2100 MHz frequency band. For more information on worldwide GSM frequency usage, see GSM frequency bands.
[0007] One of the key features of GSM is the subscriber identity module (SIM). The SIM is a detachable smart card containing the user's subscription information and phone book. This allows the user to retain his or her information after switching handsets.
[0008] Bootloader is a piece of code that runs before any operating system is running. Bootloader is used to boot other operating systems; usually each operating system has a set of bootloaders specific to it. Bootloaders usually contain several ways to boot the OS kernel and also contain commands for debugging and/or modifying the kernel environment.
[0009] Universal asynchronous receiver/ transmitter (UART) performs serial-to-parallel conversions on data received from a peripheral device, and performs parallel-to-serial conversions on data received from CPU. UART includes a control capability and a processor interrupt system that can be tailored so as to minimize software management of a communications link. UART bootloader can manage communication with a host through a serial network, and can also access and perform requested operations on the on-chip flash memory. The UART bootloader can include some application programming interface (API) routines.
[0010] In unit setting UART configuration with GSM module enable/disable options are available. If user selects disable GSM module, an authorized person or service/maintenance engineer is not able to bootload the protection system, whereas if the user selects enable GSM module, the authorized person or service/maintenance engineer will be able to bootload the protection system.
[0011] 3G is a third generation mobile telecommunications technology, and is based on a set of standards used for mobile devices, wherein mobile telecommunications use services and networks that comply with International Mobile Telecommunications-2000 (IMT-2000) specifications defined by the International Telecommunication Union (ITU). 3G finds application in wireless voice telephony, mobile Internet access, fixed wireless Internet access, video calls and mobile TV. 3G telecommunication networks support services that provide information transfer rate of at least 200 kbps.
[0012] A 4G system, in addition to the usual voice and other services of 3G, provides mobile broadband Internet access, for example, to laptops with wireless modems, smartphones, and other mobile devices. Potential and current applications include amended mobile web access, IP telephony, gaming services, high-definition mobile TV, video conferencing, 3D television, and cloud computing.
[0013] The concept of UART Bootloading is not new. Further, there is a good knowledge of interfacing a GSM module with the microcontroller using UART protocol. In the present scenario, when a fault is reported, an engineer has to visit the site just to reprogram a unit while the hardware remains untouched. This could be time consuming and very costly in terms of manpower and money.
[0014] There is therefore a need for a system that allows detection of faults at the earliest, and provides for repair to take place remotely to enable saving of manpower, time, and money, and greatly reduce the time taken to rectify the problem and make the system up and running again.
[0015] All publications herein are incorporated by reference to the same extent as if each individual publication or patent application were specifically and individually indicated to be incorporated by reference. Where a definition or use of a term in an incorporated reference is inconsistent or contrary to the definition of that term provided herein, the definition of that term provided herein applies and the definition of that term in the reference does not apply.
[0016] In some embodiments, the numbers expressing quantities of ingredients, properties such as concentration, reaction conditions, and so forth, used to describe and claim certain embodiments of the invention are to be understood as being modified in some instances by the term “about”. Accordingly, in some embodiments, the numerical parameters set forth in the written description and attached claims are approximations that can vary depending upon the desired properties sought to be obtained by a particular embodiment. In some embodiments, the numerical parameters should be construed in light of the number of reported significant digits and by applying ordinary rounding techniques. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of some embodiments of the invention are approximations, the numerical values set forth in the specific examples are reported as precisely as practicable. The numerical values presented in some embodiments of the invention may contain certain errors necessarily resulting from the standard deviation found in their respective testing measurements.
[0017] As used in the description herein and throughout the claims that follow, the meaning of “a,” “an,” and “the” includes plural reference unless the context clearly dictates otherwise. Also, as used in the description herein, the meaning of “in” includes “in” and “on” unless the context clearly dictates otherwise.
[0018] The recitation of ranges of values herein is merely intended to serve as a shorthand method of referring individually to each separate value falling within the range. Unless otherwise indicated herein, each individual value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g. “such as”) provided with respect to certain embodiments herein is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention otherwise claimed. No language in the specification should be construed as indicating any non-claimed element essential to the practice of the invention.
[0019] Groupings of alternative elements or embodiments of the invention disclosed herein are not to be construed as limitations. Each group member can be referred to and claimed individually or in any combination with other members of the group or other elements found herein. One or more members of a group can be included in, or deleted from, a group for reasons of convenience and/or patentability. When any such inclusion or deletion occurs, the specification is herein deemed to contain the group as modified thus fulfilling the written description of all Markush groups used in the appended claims.
OBJECTS OF THE INVENTION
[0020] A general object of the present disclosure is to provide a system and method for wireless bootloading and diagnosis of protection systems over 3G and 4G networks.
SUMMARY
[0021] Aspects of the present disclosure relate to a system and method for wireless bootloading and diagnosis of protection system over 3G and 4G networks. In an aspect, the fault detection and repair is purely based on wireless 3G/ 4G network, making the protection system extremely efficient in diagnosis and fault repair.
[0022] In as aspect, the present disclosure relates to a system configured to perform wireless bootloading, wherein system can include a microcontroller operatively coupled with one or more peripheral devices; and a GSM module that is operatively coupled with the microcontroller using UART protocol, wherein the GSM module is configured to receive a SMS having a binary file from a remote user, wherein the binary file is forwarded to the microcontroller using the UART protocol for bootloading at least one peripheral device when a fault is detected therein.
[0023] In an aspect, the binary file can be a hex file or an image file. In another aspect, the GSM module can receive the SMS from the remote user over a 3G or 4G network. In another aspect, the remote user can send the SMS upon receipt of fault detection information for the at least one peripheral device. In another aspect, the binary file can be initially loaded for diagnosis of the at least one peripheral device, wherein in case fault is detected in the hardware of the at least one peripheral device, an SMS is directly send to the nearest service center. In another aspect, in case no fault is detected in the hardware of the at least one peripheral device, a test run can be executed to check status of the peripheral device, wherein in case the test run fails or a bug is detected, a corrective binary file or image file is loaded using UART bootloading.
[0024] In another aspect, the corrective binary file or image file can be sent by the remote user to the microcontroller.
[0025] In another aspect, a password based verification of the remote user can be performed before loading of the binary file or the image file using UART bootloading.
[0026] In an aspect, the at least one peripheral device can be a protection relay.
[0027] The present disclosure further relates to a method for performing wireless bootloading, wherein the method can include the steps of operating coupling a microcontroller with one or more peripheral devices; operatively coupling a GSM module with the microcontroller using UART protocol; receiving, at the GSM module, a SMS having a binary file from a remote user; forwarding, at the GSM module, the binary file to the microcontroller using the UART protocol; and bootloading, at the microcontroller, at least one peripheral device using the binary file when a fault is detected therein.
[0028] In an aspect, the system can include one or more settings, a microcontroller, a display unit, UART bootloading, and a GSM module that can be connected to a protection unit. A user can have access to the settings for bootloading using a keypad, where the user can navigate and change settings, if required. The microcontroller can be configured to receive commands from the user to perform various jobs, wherein the microcontroller can be connected to a display unit that the user can view for navigation purposes, or for inputting commands and viewing results.
[0029] The UART bootloading can be configured to receive instructions from the user via the microcontroller for bootloading by sending hex/ image files. The hex/ image files can be sent as SMS messages to GSM that is in turn connected to the protection unit over 3G/ 4G network. The antenna allows for the GSM communication. The power supply can supply necessary power to the various units.
[0030] In an aspect, a diagnosis tool continuously runs in the background at the switchgear, and can be configured to report faults, if any, to an authorized service engineer/ service centre via a SMS message. The authorized service engineer, subsequent to receiving the SMS, can take remote access of the faulty instrument and run diagnostic software that can be loaded via a mobile SMS message. The authorized service engineer can run certain tests to localize the fault. If the fault is found in the hardware, the authorized service engineer can intimate a nearest service centre for the replacement of the faulty hardware. If the fault is found in the preloaded hex/ image file stored in the flash memory of the microcontroller, the authorized service engineer can upload the correct hex/ image file using UART bootloading into microcontroller’s flash memory via SMS and can restart the system so that new features can be effective and the system is up and running.
[0031] In an aspect, an enhanced password protection scheme can be achieved using UART bootloading. The UART can be configured for bootloading by an authorized service engineer who can send booting code to the microcontroller through the GSM module interface along with a password. In an aspect, a “SPY” password authorization scheme can be introduced to ensure authorized access to the microcontroller. The configurable 4-digit “SPY” password can be saved in the flash memory of the microcontroller. The GSM module can receive the password and validate if it is correct whereby the protection relay can go into boot mode. The microcontroller can wait to receive the hex/ image files, via serial communication, containing the boot code that can be sent by the authorized service engineer via SMS message. Once received, the bootloading process can be completed. The protection relay can automatically restart after the bootloading process and the new protection relay can start providing protection.
[0032] In an aspect, the proposed architecture takes full advantage of mobile phones and GPRS network. The protection units can be connected with a GSM module. In an aspect, a binary file can be sent from mobile (cellular) phones, by the service centre/ service engineer, to the GSM module connected with the protection unit over a GPRS network. An advantage of sending hex/ image files via 3G/4G technology is that the size and speed constraints that exist for conventional GSM can be overcome, and there can be no constraints faced in sending as such. The GSM module can be configured to forward the binary file, in turn, to the protection unit using the UART protocol, and an acknowledgement can be received at the service centre/ service engineer mobile regarding the status of protection unit whether it is programmed or not. With the descent of GPRS in near future, 3G or 4G can also be used as an alternate solution.
[0033] Various objects, features, aspects and advantages of the inventive subject matter will become more apparent from the following detailed description of preferred embodiments, along with the accompanying drawing figures in which like numerals represent like components.
BRIEF DESCRIPTION OF THE DRAWINGS
[0034] The accompanying drawings are included to provide a further understanding of the present disclosure, and are incorporated in and constitute a part of this specification. The drawings illustrate exemplary embodiments of the present disclosure and, together with the description, serve to explain the principles of the present disclosure.
[0035] FIG. 1 illustrates an exemplary block diagram of UART bootloading over 3G/ 4G system in accordance with embodiments of the present disclosure.
[0036] FIG. 2 illustrates an exemplary hardware diagnosis using SMS service flow diagramin accordance with embodiments of the present disclosure.
[0037] FIG. 3 illustrates an exemplary UART bootloading using 3G/ 4G flow diagramin accordance with embodiments of the present disclosure.
[0038] FIG. 4 illustrates an exemplary flow diagramfor diagnosis in accordance with embodiments of the present disclosure.
[0039] FIG. 5 illustrates an exemplary flow diagramfor bootloading in accordance with embodiments of the present disclosure.
DETAILED DESCRIPTION
[0040] The following is a detailed description of embodiments of the disclosure depicted in the accompanying drawings. The embodiments are in such detail as to clearly communicate the disclosure. However, the amount of detail offered is not intended to limit the anticipated variations of embodiments; on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present disclosure as defined by the appended claims.
[0041] Each of the appended claims defines a separate invention, which for infringement purposes is recognized as including equivalents to the various elements or limitations specified in the claims. Depending on the context, all references below to the "invention" may in some cases refer to certain specific embodiments only. In other cases it will be recognized that references to the "invention" will refer to subject matter recited in one or more, but not necessarily all, of the claims.
[0042] As used in the description herein and throughout the claims that follow, the meaning of “a,” “an,” and “the” includes plural reference unless the context clearly dictates otherwise. Also, as used in the description herein, the meaning of “in” includes “in” and “on” unless the context clearly dictates otherwise.
[0043] All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g., “such as”) provided with respect to certain embodiments herein is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention otherwise claimed. No language in the specification should be construed as indicating any non-claimed element essential to the practice of the invention.
[0044] Various terms as used herein. To the extent a term used in a claim is not defined, it should be given the broadest definition persons in the pertinent art have given that term as reflected in printed publications and issued patents at the time of filing.
[0045] Aspects of the present disclosure relate to a system and method for wireless bootloading and diagnosis of protection system over 3G and 4G networks. In an aspect, the fault detection and repair is purely based on wireless 3G/ 4G network, making the protection system extremely efficient in diagnosis and fault repair.
[0046] In as aspect, the present disclosure relates to a system configured to perform wireless bootloading, wherein system can include a microcontroller operatively coupled with one or more peripheral devices; and a GSM module that is operatively coupled with the microcontroller using UART protocol, wherein the GSM module is configured to receive a SMS having a binary file from a remote user, wherein the binary file is forwarded to the microcontroller using the UART protocol for bootloading at least one peripheral device when a fault is detected therein.
[0047] In an aspect, the binary file can be a hex file or an image file. In another aspect, the GSM module can receive the SMS from the remote user over a 3G or 4G network. In another aspect, the remote user can send the SMS upon receipt of fault detection information for the at least one peripheral device. In another aspect, the binary file can be initially loaded for diagnosis of the at least one peripheral device, wherein in case fault is detected in the hardware of the at least one peripheral device, an SMS is directly send to the nearest service center. In another aspect, in case no fault is detected in the hardware of the at least one peripheral device, a test run can be executed to check status of the peripheral device, wherein in case the test run fails or a bug is detected, a corrective binary file or image file is loaded using UART bootloading.
[0048] In another aspect, the corrective binary file or image file can be sent by the remote user to the microcontroller.
[0049] In another aspect, a password based verification of the remote user can be performed before loading of the binary file or the image file using UART bootloading.
[0050] In an aspect, the at least one peripheral device can be a protection relay.
[0051] The present disclosure further relates to a method for performing wireless bootloading, wherein the method can include the steps of operating coupling a microcontroller with one or more peripheral devices; operatively coupling a GSM module with the microcontroller using UART protocol; receiving, at the GSM module, a SMS having a binary file from a remote user; forwarding, at the GSM module, the binary file to the microcontroller using the UART protocol; and bootloading, at the microcontroller, at least one peripheral device using the binary file when a fault is detected therein.
[0052] In an aspect, the system can include one or more settings, a microcontroller, a display unit, UART bootloading, and a GSM module that can be connected to a protection unit. A user can have access to the settings for bootloading using a keypad, where the user can navigate and change settings, if required. The microcontroller can be configured to receive commands from the user to perform various jobs, wherein the microcontroller can be connected to a display unit that the user can view for navigation purposes, or for inputting commands and viewing results.
[0053] The UART bootloading can be configured to receive instructions from the user via the microcontroller for bootloading by sending hex/ image files. The hex/ image files can be sent as SMS messages to GSM that is in turn connected to the protection unit over 3G/ 4G network. The antenna allows for the GSM communication. The power supply can supply necessary power to the various units.
[0054] In an aspect, a diagnosis tool continuously runs in the background at the switchgear, and can be configured to report faults, if any, to an authorized service engineer/ service centre via a SMS message. The authorized service engineer, subsequent to receiving the SMS, can take remote access of the faulty instrument and run diagnostic software that can be loaded via a mobile SMS message. The authorized service engineer can run certain tests to localize the fault. If the fault is found in the hardware, the authorized service engineer can intimate a nearest service centre for the replacement of the faulty hardware. If the fault is found in the preloaded hex/ image file stored in the flash memory of the microcontroller, the authorized service engineer can upload the correct hex/ image file using UART bootloading into microcontroller’s flash memory via SMS and can restart the system so that new features can be effective and the system is up and running.
[0055] In an aspect, an enhanced password protection scheme can be achieved using UART bootloading. The UART can be configured for bootloading by an authorized service engineer who can send booting code to the microcontroller through the GSM module interface along with a password. In an aspect, a “SPY” password authorization scheme can be introduced to ensure authorized access to the microcontroller. The configurable 4-digit “SPY” password can be saved in the flash memory of the microcontroller. The GSM module can receive the password and validate if it is correct whereby the protection relay can go into boot mode. The microcontroller can wait to receive the hex/ image files, via serial communication, containing the boot code that can be sent by the authorized service engineer via SMS message. Once received, the bootloading process can be completed. The protection relay can automatically restart after the bootloading process and the new protection relay can start providing protection.
[0056] In an aspect, the proposed architecture takes full advantage of mobile phones and GPRS network. The protection units can be connected with a GSM module. In an aspect, a binary file can be sent from mobile (cellular) phones, by the service centre/ service engineer, to the GSM module connected with the protection unit over a GPRS network. An advantage of sending hex/ image files via 3G/4G technology is that the size and speed constraints that exist for conventional GSM can be overcome, and there can be no constraints faced in sending as such. The GSM module can be configured to forward the binary file, in turn, to the protection unit using the UART protocol, and an acknowledgement can be received at the service centre/ service engineer mobile regarding the status of protection unit whether it is programmed or not. With the descent of GPRS in near future, 3G or 4G can also be used as an alternate solution.
[0057] FIG. 1 illustrates an exemplary block diagram 100 of UART bootloading over 3G/ 4G system in accordance with embodiments of the present disclosure. The system can include settings 102, microcontroller 104, display unit 106, UART bootloading 108, GSM module 110, antenna 112, and power supply 114.
[0058] The block diagram 100 can describe the general interfacing of all blocks necessary to perform UART bootloading through 3G/ 4G technology. The settings 102 can be configured to allow the user to have access to the settings for the bootloading using keypad where the user can navigate and change settings, if required. The microcontroller 104 can be configured to receive commands from the user to perform various jobs. The microcontroller 104 can be connected to the display unit 106 that the user can view for navigation purposes, inputting commands and viewing results. The UART bootloading 108can be configured to receive instructions from the user via the microcontroller 104 for bootloading by sending hex/image files. The sending hex/ image files can be sent as SMS messages to GSM module 110 connected to a protection unit over 3G/ 4G network. The major advantage of sending hex/ image files via3G/4G technology is that size and speed constraints that exist for conventional GSM can be overcome and there can be no constraints faced in sending binary files as such. The antenna 112 allows for the GSM communication. The power supply 114 can supply necessary power to the various units/ blocks.
[0059] In as aspect, the present disclosure relates to a system configured to perform wireless bootloading, wherein system can include a microcontroller 104 operatively coupled with one or more peripheral devices; and a GSM module 110 that is operatively coupled with the microcontroller 104 using UART protocol 108, wherein the GSM module 110 can be configured to receive a SMS having a binary file from a remote user, wherein the binary file can be forwarded to the microcontroller 104 using the UART protocol for bootloading at least one peripheral device when a fault is detected therein.
[0060] In an aspect, the binary file can be a hex file or an image file. In another aspect, the GSM module 110 can receive the SMS from the remote user over a 3G or 4G network. In another aspect, the remote user can send the SMS upon receipt of fault detection information for the at least one peripheral device. In another aspect, the binary file can be initially loaded for diagnosis of the at least one peripheral device, wherein in case fault is detected in the hardware of the at least one peripheral device, an SMS is directly send to the nearest service center. In another aspect, in case no fault is detected in the hardware of the at least one peripheral device, a test run can be executed to check status of the peripheral device, wherein in case the test run fails or a bug is detected, a corrective binary file or image file is loaded using UART bootloading.
[0061] In another aspect, the corrective binary file or image file can be sent by the remote user to the microcontroller 104.
[0062] In another aspect, a password-based verification of the remote user can be performed before loading of the binary file or the image file using UART bootloading.
[0063] In an aspect, the at least one peripheral device can be a protection relay.
[0064] The present disclosure further relates to a method for performing wireless bootloading, wherein the method can include the steps of operating coupling a microcontroller with one or more peripheral devices; operatively coupling a GSM module with the microcontroller using UART protocol; receiving, at the GSM module, a SMS having a binary file from a remote user; forwarding, at the GSM module, the binary file to the microcontroller using the UART protocol; and bootloading, at the microcontroller, at least one peripheral device using the binary file when a fault is detected therein.
[0065] FIG. 2 illustrates an exemplary hardware diagnosis using SMS service flow diagram 200 in accordance with embodiments of the present disclosure. In an embodiment, the hardware diagnosis tool can always continue to run in the background in order to detect any fault in the instrument when it can intimate an authorized service engineer via a SMS message. The authorized service engineer, subsequent to receiving the SMS, can take remote access of the faulty instrument and run diagnostic software that can be loaded via a mobile SMS message. The authorized service engineer can run certain tests to localize the fault. If the fault is found in the hardware, the authorized service engineer can intimate a nearest service centre for the replacement of the faulty hardware. If the fault is found in the preloaded hex/ image file stored in the flash memory of the microcontroller, the authorized service engineer can upload the correct hex/ image file using UART bootloading into microcontroller’s flash memory via SMS and can restart the system so that new features can be effective.
[0066] In an embodiment, the hardware diagnosis tool can be running in continuous recursive loop in the background checking for a fault at step 202. As and when the hardware diagnosis tool detects a fault, it can send a SMS message to an authorized service engineer at step 204. The authorized service engineer, subsequent to receiving the fault SMS message, can take control of the faulty instrument remotely for diagnosis at step 206. The authorized service engineer can load diagnosis software by sending SMS message via mobile phone at step 208. The authorized service engineer can then run hardware testing software to localize the fault at step 210. In case the hardware is faulty at step 212, the authorized service engineer can send a SMS message to the nearest service centre for hardware replacement at step 214. If the hardware is OK at step 212, a new set of test codes can be run to test the status of the protection devices and the authorized service engineer can receives addresses of the connected peripheral devices via SMS message at step 216. If no bug is detected at step 218, the authorized service engineer/ service centre can receive a SMS message that the instrument is OK at step 224 and no further action takes place. If a bug is detected at step 218, the authorized service engineer can examine the preloaded hex/ image file stored in the flash memory and can send a corrective hex/ image file via SMS message that can be loaded using UART bootloading into the microcontroller’s flash memory at step 220. Once the microcontroller’s flash memory is updated with correct hex/ image file, the system can be restarted so that new features of the corrected hex/ image file can be effective at step 222.
[0067] FIG. 3 illustrates an exemplary UART bootloading using 3G/ 4G flow diagram300in accordance with embodiments of the present disclosure. In an embodiment, an enhanced password protection scheme can be achieved using UART bootloading. The bootloading process can start with initialization of the peripheral devices. UART can be configured for bootloading through an authorized service engineer who can send the boot code to the microcontroller through the GSM module interface. In an embodiment, a “SPY” password authorization scheme can be introduced to ensure authorized access to the microcontroller. The “SPY” password can be saved in the flash memory of the microcontroller. The “SPY” scheme follows a schematic interchanging of the 4-digit password as shown in the table.
“Original” Password “SPY” Password
Let the 4-digit original password is “4321”
Number Original Position “SPY” Interchange Number
1 Unit’s Ten’s 2
2 Ten’s Thousand’s 4
3 Hundred’s Unit’s 1
4 Thousand’s Hundred’s 3
The “SPY” password is “3142”
[0068] In an embodiment, the authorized service engineer can access the microcontroller by entering “SPY” password “3142” when the original password was “4321”. The GSM module can receive the password and validate if it is correct whereby the protection relay can go into boot mode. The microcontroller can wait to receive the hex/ image files, via serial communication, containing the boot code that can be sent by the authorized service engineer via SMS message. Once received, the bootloading process can be completed. The protection relay can automatically restart after the bootloading process and the new protection relay can start providing protection.
[0069] In an embodiment, the bootloading process can start with the initialization of the peripheral devices at step 302. The UART can be configured for bootloading at step 304 by an authorized service engineer who can send the boot code to the microcontroller through the GSM module interface at step 306. A “SPY” based password can be saved in the flash memory of the microcontroller for added security at step 308. The authorized service engineer can send a “SPY” password to the GSM module at step 310. The GSM module can check if the password is correct at step 312. If the password is incorrect, a negative acknowledgement can be sent to the authorized service engineer by the GSM module at step 314 who can send another password to the GSM module at step 310. If the password is correct, a positive acknowledgement can be sent to the authorized service engineer by the GSM module at step 316. The protection relay can go into the boot and the GSM can send boot code to the microcontroller via SMS message at step 318. The microcontroller can receive the hex/ image file from the GSM via serial communication at step 320. Once received, the bootloading process can get completed at step 322. The protection relay can automatically restart after the bootloading process at step 324 and the new protection relay can start protecting at step 326.
[0070] FIG. 4 illustrates an exemplary flow diagram 400 for diagnosis in accordance with embodiments of the present disclosure. In an embodiment, the diagnosis tool can run continuously in the background to detect fault in the protection system at step 402. When a fault is detected, a SMS message can be sent to the service centre/ service engineer at step 404. The service engineer can take control of the faulty protection instrument remotely at step 406. The service engineer can run hardware tests to detect hardware faults at step 408. The service engineer can run software tests to detect program bugs at step 410. The service engineer can load Hex/ Image files via SMS message at step 412 and restart the protection instrument at step 414.
[0071] FIG. 5 illustrates an exemplary flow diagram 500 for bootloading in accordance with embodiments of the present disclosure. In an embodiment, the bootloading process can start with the service engineer initializing the peripheral devices at step 502. The UART can be configured for bootloading at step 504. The service engineer can send boot code via SMS message to the microcontroller at step 506. A password can be saved in “SPY” based format into the flash memory for added security at step 508. The service engineer can send a "SPY" password via SMS message at step 510 that must be validated before the bootloading process can be initiated. The booting of the protection relay can take place at step 512. Microcontroller can receive Hex/ Image files via serial communication at step 514. The bootloading process completes at step 516 and the protection relay can be restarted at step 518.
[0072] While the foregoing describes various embodiments of the invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof. The scope of the invention is determined by the claims that follow. The invention is not limited to the described embodiments, versions or examples, which are included to enable a person having ordinary skill in the art to make and use the invention when combined with information and knowledge available to the person having ordinary skill in the art.
ADVANTAGES OF THE INVENTION
[0073] The present disclosure provides a system and method for wireless bootloading and diagnosis of protection systems over 3G and 4G networks.
[0074] The present disclosure provides a system and method for wireless bootloading that reduced manpower, enables reprogramming of the protection system remotely, reduces cost, and works without any range/distance limitation.
[0075] The present disclosure provides a system and method for wireless bootloading that reduces the time required to reprogram a faulty system.
| # | Name | Date |
|---|---|---|
| 1 | Form 5 [31-03-2016(online)].pdf | 2016-03-31 |
| 2 | Form 3 [31-03-2016(online)].pdf | 2016-03-31 |
| 3 | Drawing [31-03-2016(online)].pdf | 2016-03-31 |
| 4 | Description(Complete) [31-03-2016(online)].pdf | 2016-03-31 |
| 5 | Other Patent Document [21-09-2016(online)].pdf | 2016-09-21 |
| 6 | 201621011349-Power of Attorney-260916.pdf | 2018-08-11 |
| 7 | 201621011349-Form 1-260916.pdf | 2018-08-11 |
| 8 | 201621011349-Correspondence-260916.pdf | 2018-08-11 |
| 9 | 201621011349-FER.pdf | 2019-12-03 |
| 10 | 201621011349-FORM-26 [19-05-2020(online)].pdf | 2020-05-19 |
| 11 | 201621011349-FER_SER_REPLY [19-05-2020(online)].pdf | 2020-05-19 |
| 12 | 201621011349-DRAWING [19-05-2020(online)].pdf | 2020-05-19 |
| 13 | 201621011349-CORRESPONDENCE [19-05-2020(online)].pdf | 2020-05-19 |
| 14 | 201621011349-COMPLETE SPECIFICATION [19-05-2020(online)].pdf | 2020-05-19 |
| 15 | 201621011349-CLAIMS [19-05-2020(online)].pdf | 2020-05-19 |
| 16 | 201621011349-ABSTRACT [19-05-2020(online)].pdf | 2020-05-19 |
| 17 | 201621011349-PA [09-12-2020(online)].pdf | 2020-12-09 |
| 18 | 201621011349-ASSIGNMENT DOCUMENTS [09-12-2020(online)].pdf | 2020-12-09 |
| 19 | 201621011349-8(i)-Substitution-Change Of Applicant - Form 6 [09-12-2020(online)].pdf | 2020-12-09 |
| 20 | 201621011349-US(14)-HearingNotice-(HearingDate-06-05-2022).pdf | 2022-04-05 |
| 21 | 201621011349-Correspondence to notify the Controller [03-05-2022(online)].pdf | 2022-05-03 |
| 22 | 201621011349-US(14)-ExtendedHearingNotice-(HearingDate-27-05-2022).pdf | 2022-05-05 |
| 23 | 201621011349-FORM-26 [24-05-2022(online)].pdf | 2022-05-24 |
| 24 | 201621011349-Correspondence to notify the Controller [24-05-2022(online)].pdf | 2022-05-24 |
| 25 | 201621011349-Written submissions and relevant documents [10-06-2022(online)].pdf | 2022-06-10 |
| 26 | 201621011349-Annexure [10-06-2022(online)].pdf | 2022-06-10 |
| 27 | 201621011349-PatentCertificate07-02-2023.pdf | 2023-02-07 |
| 28 | 201621011349-IntimationOfGrant07-02-2023.pdf | 2023-02-07 |
| 29 | 201621011349-FORM-27 [13-09-2024(online)].pdf | 2024-09-13 |
| 1 | Searchstrategy_27-11-2019.pdf |
| 2 | NewSearchstrategy201621011349AE_03-12-2020.pdf |