Supercharge Your Innovation With Domain-Expert AI Agents!

Relay protection key data redundancy storage and reliability recovery system and method

A relay protection and key data technology, applied in the direction of electrical digital data processing, error detection of redundant codes, error detection of redundant data in calculations, etc., can solve the problem of reducing the operating efficiency of the processor and the switching speed of two machines Slow, low real-time remote database backup and other issues, to achieve reliable backup, improve operating efficiency, and high reliability

Active Publication Date: 2020-10-09
NARI TECH CO LTD +4
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] Purpose of the present invention: In order to solve the problems of slow dual-machine switching speed, low real-time performance of remote database backup, and low processor operation efficiency due to single-device backup, the present invention proposes a redundant storage and reliability recovery system for key data of relay protection and The method realizes reliable backup of key data for relay protection of substation secondary equipment and reliable recovery when the device is abnormal. It has the characteristics of low cost, does not affect CPU operating efficiency, high reliability of backup data, and is easy to implement for embedded devices.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Relay protection key data redundancy storage and reliability recovery system and method
  • Relay protection key data redundancy storage and reliability recovery system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] see figure 1 , a system for redundant storage and reliability recovery of relay protection key data in this embodiment includes a memory data area, a non-volatile data area and a processor; the memory data area includes a memory operation area and a memory backup area; the non-volatile The lost data area includes a non-volatile primary backup area and a non-volatile secondary backup area. The processor is used for data backup and recovery of the internal memory data area and the non-volatile data area, and to calculate and judge check codes.

[0050] The memory operation area, the memory backup area, the non-volatile main backup area and the non-volatile secondary backup area are all divided into a check code storage space and a data storage space. The check code storage space stores the check code calculated according to the stored data. The data storage space is used to store key data of relay protection.

[0051] Among them, the memory data is divided into the whole...

Embodiment 2

[0053] see figure 1 and figure 2 , on the basis of Embodiment 1, this embodiment proposes a method for redundant storage and reliability recovery of key data of relay protection, which is carried out according to the following steps:

[0054] Step 1: When initializing the data space, the memory data is classified and stored according to the type of relay protection data. Each type of data is based on the memory page and each page is verified separately. The verification code is based on the summary of the national secret SM3; non-volatile The data is classified and stored according to the type of relay protection data. Each type of data is in the unit of data block and each block is checked separately. The check code is based on the summary of the national secret SM3.

[0055] The check code of the memory data is stored separately from the content, the size of the data content space is allocated in advance, divided according to the memory pages, and the summary generated by ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a relay protection key data redundancy storage and reliability recovery system and method. Reliable backup of relay protection key data of secondary equipment of a transformersubstation and reliable recovery when the device is abnormal are realized; and the system and method have the characteristics of low cost, no influence on CPU operation efficiency, high reliability ofbackup data, easiness in realization of embedded equipment and the like.

Description

technical field [0001] The invention belongs to the field of embedded industrial control, and in particular relates to a system and method for redundant storage and reliability restoration of key data of relay protection. Background technique [0002] As the first line of defense of the power system, relay protection must meet the four basic requirements of selectivity, rapidity, sensitivity and reliability technically. The reliable operation of relay protection is of great significance to the safety and stability of the power system. Relay protection equipment uses a file system or non-volatile memory to store key data such as events, fixed values, entire groups, and waveforms. However, there are often key data damages, Lost or incomplete structure makes the relay protection equipment run abnormally or fail to start normally. [0003] At present, the mainstream backup system is composed of a backup server and a client, and the server and the client perform data backup and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/14G06F11/10
CPCG06F11/1469G06F11/1012
Inventor 郑奕李友军周华良郑玉平崔玉戴欣欣巴超周化
Owner NARI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More