METHOD FOR ACCESS MANAGEMENT OF A WIND TURBINE CONTROLLER OF A WIND TURBINE AS WELL AS WIND TURBINE CONTROLLER AND WIND TURBINE FOR THE METHOD

20230195920 ยท 2023-06-22

    Inventors

    Cpc classification

    International classification

    Abstract

    A method for the access management of a wind turbine controller of a wind turbine with an operating software. The method comprises receiving a user identification with one of several user interfaces and assigning the user identification or a portion of the user identification to an access group. One or several authorization groups of an overall number of authorization groups is allocated to the access group, and one or several output value storage locations and/or input value storage locations are allocated to each authorization group. The method further encompasses allowing an access from the user interface to all output value storage locations and/or input value storage locations that are allocated to the assigned access group via the authorization groups. The disclosure further relates to a computer product, a wind turbine controller, and a wind turbine with a wind turbine controller.

    Claims

    1. A method for access management of a wind turbine controller of a wind turbine with an operating software, the method comprising: receiving a user identification using a first user interface of a plurality of user interfaces; assigning at least a portion of the user identification to an access group, wherein one or more authorization groups of an overall plurality of authorization groups is allocated to the access group, and wherein one or more output value storage locations and/or input value storage locations are allocated to each authorization group; and allowing access from the first user interface to all output value storage locations and/or input value storage locations that are allocated to the assigned access group via the plurality of authorization groups.

    2. The method according to claim 1, comprising receiving a localization identifier with the user identification, wherein the localization identifier indicates at least whether the first user interface is within the wind turbine or is part of a remote computer via a wind turbine interface.

    3. The method according to claim 2, wherein the first user interface is within the wind turbine, wherein the localization identifier indicates from which of the plurality of user interfaces in the wind turbine the user identification was received, wherein different localization identifiers are received from a user interface in a tower of the wind turbine and a user interface in a nacelle of the wind turbine.

    4. The method according to claim 1, wherein the user identification is allocated to one of a plurality of different access groups as a function of the localization identifier received with the user identification.

    5. The method according to claim 1, comprising assigning an active status, wherein the active status is configured to be assigned at any point in time for a single user interface of the plurality user interfaces, and access, via the first or second user interface, to an input value storage location is permitted only if the operating software of the user interface has assigned the active status.

    6. The method according to claim 5, wherein a respective priority is allocated to each localization identifier, and after a request for an active status has been received from a user interface for a new access, performing a check to determine whether the active status was assigned for another user interface for a previously requested access, and in a case where the active status was assigned to a second user interface of the plurality to user interfaces, the active status is withdrawn from this other user interface if the localization identifier of the user interface for the new access has a higher priority than the localization identifier of the other user interface.

    7. The method according to claim 1, wherein a respective priority is allocated to each access group, and upon receipt of a request for an active status from a user interface, from which a user identification for a new access was received, performing a check to determine whether the active status was assigned for another user interface, and in a case where the active status was assigned, the active status is withdrawn from the other user interface if the access group of the new access allocated to the user identification has a higher priority than the access group of the received user identification from the other user interface.

    8. The method according to claim 5, wherein an active status is withdrawn after the assignment upon expiration of a specific period, or returned through release from a user interface to which the active status is assigned.

    9. The method according to claim 1, wherein the operating software has a plurality of software modules, wherein at least a portion of the communications outputs of the software modules are each prepared as an output value storage location, and at least a portion of the communications inputs of the software modules are each prepared as an input value storage location.

    10. The method according to claim 1, comprising displaying, on a user interface, data of the output value storage locations that are allocated to the assigned access group via the plurality of authorization groups.

    11. The method according to claim 1, wherein the user interface is used to receive data for the input value storage locations that are allocated to the assigned access group via the plurality of authorization groups.

    12. The method according to claim 1, wherein at least one identical set of output value storage locations and/or input value storage locations is allocated to a plurality of different user groups.

    13. A computer program product that comprises instructions which, when performed on a wind turbine controller, are configured to implement the method according to claim 1.

    14. A wind turbine controller comprising the computer program product according to claim 13.

    15. A wind turbine comprising a tower, a nacelle, and the wind turbine controller according to claim 14.

    16. The wind turbine according to claim 15, comprising at least one user interface in the wind turbine, and at least one user interface outside of the wind turbine for access to an operating software of the wind turbine.

    17. The wind turbine according to claim 16, wherein the at least one user interface outside of the wind turbine is a remote computer.

    Description

    BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

    [0035] Additional embodiments may be gleaned from the exemplary embodiments explained in more detail on the figures. Shown here on:

    [0036] FIG. 1 is a wind turbine, and on

    [0037] FIG. 2 are the steps of the method according to an exemplary embodiment.

    DETAILED DESCRIPTION

    [0038] FIG. 1 shows a schematic view of a wind turbine 100 according to the invention. The wind turbine 100 has a tower 102 and a nacelle 104 on the tower 102. Provided on the nacelle 104 is an aerodynamic rotor 106 with three rotor blades 108 and a spinner 110. During operation of the wind turbine 100, the wind imparts a rotational motion to the aerodynamic rotor 106, which thus also turns an electrodynamic rotor or runner of a wind turbine generator, which is directly or indirectly coupled with the aerodynamic rotor 106. The electric wind turbine generator is arranged in the nacelle 104, and generates electric energy. The pitch angles of the rotor blades 108 can be changed by pitch motors on the rotor blade roots of the respective rotor blades 108.

    [0039] FIG. 2 shows a method 10 for the access management of a wind turbine controller of a wind turbine 100 with an operating software. In a step 12, one of a plurality of user interfaces 14a, 14b receives a user identification 16 and a localization identifier 18. The localization identifier 18 has a priority 20. After receipt at step 12, an access group 22a, 22b, 22c of a plurality of access groups 22a, 22b, 22c that depends on the user identifier 16 is assigned to the received user identifier in step 21.

    [0040] The access groups 22a, 22b, 22c comprise a plurality of authorization groups 24, wherein a plurality of output value storage locations 26 and input value storage locations 28 are allocated to each authorization group 24. The input value storage locations 28 as well as the output value storage locations 26 correspond to communications inputs 32 and communications outputs 30 of different software modules 34 of the operating software 36 of the wind turbine controller.

    [0041] In the following step 38, the user interface 14a, 14b is allowed to access all output value storage locations 26 and input value storage locations 28 allocated to the assigned access group 22a, 22b, 22c via the allocated authorization groups 24. An active status 42 is requested in step 40. To this end, a check is initially performed in step 44 to determine whether the active status 42 has already been assigned, specifically for another user interface 14a, 14b. If the active status 42 has already been assigned, and the new access has a higher priority 20, the active status 42 is withdrawn from the other user interface 14a, 14b in step 46, and assigned to the user interface 14a, 14b for the new access. For this purpose, the priority 20 is compared based on the localization identifier 18 received in step 12 with a priority 20 of the localization identifier 18 of the other user interface 14a, 14b.

    [0042] In step 50, an access is then made via the user interface 14a, 14b. In step 52, a check is performed to determine whether a predefined duration 54 has expired. The active status 42 is withdrawn in step 55 if the duration 54 has expired. In step 56, a logoff by the user from the user interface 14a, 14b is received, and the access is terminated.

    REFERENCE LIST

    [0043] 10 Method [0044] 12 Receiving a user identification and localization identifier [0045] 14a User interface [0046] 14b User interface [0047] 16 User identification [0048] 18 Localization identifier [0049] 20 Priority [0050] 21 Assigning the user identification to an access group [0051] 22a Access group [0052] 22b Access group [0053] 22c Access group [0054] 24 Authorization groups [0055] 26 Output value storage locations [0056] 28 Input value storage locations [0057] 30 Communications outputs [0058] 32 Communications inputs [0059] 34 Software modules [0060] 36 Operating software [0061] 38 Allowing access to output value storage locations and input value storage locations [0062] 40 Requesting active status [0063] 42 Active status [0064] 44 Checking to determine different assignment of active status [0065] 46 Withdrawing active status given a higher prioritization [0066] 50 Access [0067] 52 Checking predefined duration [0068] 54 Predefined duration [0069] 55 Withdrawing active status [0070] 56 User logoff and access termination [0071] 100 Wind turbine [0072] 102 Tower [0073] 104 Nacelle [0074] 106 Aerodynamic rotor [0075] 108 Rotor blades [0076] 110 Spinner

    [0077] The various embodiments described above can be combined to provide further embodiments. These and other changes can be made to the embodiments in light of the above-detailed description. In general, in the following claims, the terms used should not be construed to limit the claims to the specific embodiments disclosed in the specification and the claims, but should be construed to include all possible embodiments along with the full scope of equivalents to which such claims are entitled. Accordingly, the claims are not limited by the disclosure.