OBTAINING INSTRUCTIONS WITHIN A WIND POWER PLANT PRIVATE NETWORK
20220403824 · 2022-12-22
Inventors
- Anders REIMER (Hadsten, DK)
- Morten Tim THORSEN (Tilst, DK)
- Jan Krogh Jensen (Hinnerup, DK)
- Peter TROJEL (Åbyhøj, DK)
Cpc classification
Y04S40/20
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
F03D7/047
MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
Y02E10/72
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
F03D7/048
MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
International classification
Abstract
Obtaining within a private network of a power plant one or more instructions for controlling the power plant, wherein the power plant includes one or more wind turbine generators, and wherein one or more instructions for controlling the power plant are received at an external digital storage device placed externally with respect to the private network. The one or more instructions are stored in a queue in the external digital storage device. The one or more instructions are fetched from the queue independent with respect to events initiated externally with respect to the private network.
Claims
1. A method for obtaining within a private network of a power plant one or more instructions for controlling the power plant, wherein the power plant is comprising one or more wind turbine generators, and wherein the method comprises: Receiving at an external digital storage device placed externally with respect to the private network one or more instructions for controlling the power plant; Storing the one or more instructions in a queue in the external digital storage device; and Obtaining within the private network on request from within the private network one or more instructions for controlling the power plant, wherein said obtaining includes that one or more devices within the private network are fetching from the queue in the external digital storage device said one or more instructions for controlling the power plant stored in the queue in the external digital storage device, wherein said fetching is independent with respect to events initiated externally with respect to the private network.
2. The method according to claim 1, further comprising: approving or rejecting, within the private network, the one or more instructions for controlling the power plant obtained within the private network.
3. The method of claim 2, wherein the approving or rejecting comprises validating a command of the one or more instructions.
4. The method of claim 3, wherein an instruction is rejected due to a lack of validation if the command is not on a predefined list of commands.
5. The method of claim 2, wherein the approving or rejecting comprises verifying that the one or more instructions originate from a trusted source.
6. The method of claim 5, wherein an instruction is rejected due to a lack of verification if the source is not on a predefined list of trusted sources.
7. The method of claim 1, wherein said fetching is halted if one or more predefined criteria are determined within the private network to be fulfilled.
8. The method of claim 7, wherein the one or more predefined criteria are determined to be fulfilled if one or more of the following corresponding conditions are determined to be true: rejecting, within the private network, the one or more instructions for controlling the power plant obtained within the private network; rejecting, within the private network, the one or more instructions for controlling the power plant obtained within the private network for failure to verify that the one or more instructions originate from a trusted source; determining that a temporal distribution of time of receipt of one or more instructions at the external digital storage device is not acceptable; determining that a number of instructions received at the external digital storage device exceeds a first predetermined number of instructions within a first predetermined period of time; determining that a number of instructions addressing assets which are not subject to control via the private network and received at the external digital storage device exceeds a second predetermined number of instructions within a second predetermined period of time; determining that a number of instructions not belonging to a predetermined set of instructions and received at the external digital storage device exceeds a third predetermined number of instructions within a third predetermined period of time; determining that an instruction received at the external digital storage device is not signed by a trusted source; determining that an signature of a trusted source on an instruction received at the external digital storage device is not validated by a device within the private network; determining that an instruction received at the external digital storage device belongs to a predetermined subset of instructions and a command of the instruction is outside a predefined set of commands for the predetermined subset of instructions; determining that an instruction received at the external digital storage device belongs to a predetermined subset of instructions and a command of the instruction relating to a rate of change of a value is outside a predefined range of rate of changes for the predetermined subset of instructions; determining that a value of a command of an instruction of a certain instruction type received at the external digital storage device is outside a predefined value range for the instruction type; determining that a rate of change of a value of a parameter of a command of an instruction of a certain instruction type received at the external digital storage device is outside a defined rate range for the instruction type; determining that an instruction would upon execution entail an absolute value of an operational parameter of the power plant exiting a first predetermined range; determining that an instruction would upon execution entail a relative change of a value of an operational parameter of the power plant exiting a second predetermined range; determining that an instruction received at the external digital storage device is malformed; determining that a number of non-executable instructions received at the external digital storage device exceeds a fourth predetermined number of instructions within a fourth predetermined period of time; and determining that a number of instructions addressing assets which are not connected to the private network and received at the external digital storage device exceeds a fifth predetermined number of instructions within a fifth predetermined period of time.
9. The method of claim 1, wherein the method further comprises sending instructions from a source to the external digital storage device.
10. The method of claim 1, wherein the method further comprises: executing at the power plant of the one or more obtained instructions for controlling the power plant.
11. The method of claim 1, wherein the power plant is repeatedly sending power plant data to one or more recipients placed externally with respect to the private network, wherein power plant data comprises data regarding power plant operation and/or data regarding power plant conditions, wherein said sending is initiated from within the private network and independent with respect to requests originating externally with respect to the private network.
12. The method of claim 11, wherein the method comprises: Comparing the instructions received at the external digital storage device with power plant data and verifying execution at the power plant of the instructions received at the external digital storage device.
13. The method of claim 1, wherein the external digital storage device is in a demilitarized zone.
14. A system comprising: A power plant comprising: one or more wind turbine generators; and a private network; and An external digital storage device placed externally with respect to the private network, and wherein the system is configured to perform an operation, comprising: receiving, at an external digital storage device placed externally with respect to the private network, one or more instructions for controlling the power plant; storing the one or more instructions in a queue in the external digital storage device; and obtaining within the private network on request from within the private network one or more instructions for controlling the power plant, wherein said obtaining includes that one or more devices within the private network are fetching from the queue in the external digital storage device said one or more instructions for controlling the power plant stored in the queue in the external digital storage device, wherein said fetching is independent with respect to events initiated externally with respect to the private network.
15. (canceled)
16. The system according to claim 15, further comprising: approving or rejecting, within the private network, the one or more instructions for controlling the power plant obtained within the private network.
17. The system according to claim 16, wherein the approving or rejecting comprises validating a command of the one or more instructions.
18. The system according to claim 17, wherein an instruction is rejected due to a lack of validation if the command is not on a predefined list of commands.
19. The system according to claim 16, wherein the approving or rejecting comprises verifying that the one or more instructions originate from a trusted source.
20. A computer program product comprising instructions which, when executed by one or more processors, perform an operation of obtaining within a private network of a power plant one or more instructions for controlling the power plant, wherein the power plant comprises one or more wind turbine generators; the operation, comprising: receiving, at an external digital storage device placed externally with respect to the private network, one or more instructions for controlling the power plant; storing the one or more instructions in a queue in the external digital storage device; and obtaining within the private network on request from within the private network one or more instructions for controlling the power plant, wherein said obtaining includes that one or more devices within the private network are fetching from the queue in the external digital storage device said one or more instructions for controlling the power plant stored in the queue in the external digital storage device, wherein said fetching is independent with respect to events initiated externally with respect to the private network.
Description
BRIEF DESCRIPTION OF THE FIGURES
[0077] The method for obtaining within a private network of a power plant one or more instructions for controlling the power plant and the corresponding system and computer program product according to the invention will now be described in more detail with regard to the accompanying figures. The figures show one way of implementing the present invention and is not to be construed as being limiting to other possible embodiments falling within the scope of the attached claim set.
[0078]
[0079]
[0080]
DETAILED DESCRIPTION OF AN EMBODIMENT
[0081]
[0082]
[0086] As indicated by dashed line 216 representing a border of the private network 336, an instruction is entering into the private network when—and only when—it is obtained on request from within the private network and upon independent fetching. The method schematically illustrated in
[0087]
[0093]
[0094]
[0095] Each interface in
[0096] Although the present invention has been described in connection with the specified embodiments, it should not be construed as being in any way limited to the presented examples. The scope of the present invention is set out by the accompanying claim set. In the context of the claims, the terms “comprising” or “comprises” do not exclude other possible elements or steps. Also, the mentioning of references such as “a” or “an” etc. should not be construed as excluding a plurality. The use of reference signs in the claims with respect to elements indicated in the figures shall also not be construed as limiting the scope of the invention. Furthermore, individual features mentioned in different claims, may possibly be advantageously combined, and the mentioning of these features in different claims does not exclude that a combination of features is not possible and advantageous.