Download - US 20130036311A1 (19) United States
US 20130036311A1
(12) Patent Application Publication (10) Pub. No.: US 2013/0036311 A1 (19) United States
Akyol et al. (43) Pub. Date: Feb. 7, 2013
(54) INTELLIGENT SENSOR AND CONTROLLER FRAMEWORK FOR THE POWER GRID
(75) Inventors: Bora A. Akyol, Richland, WA (US); Jereme Nathan Haack, West Richland, WA (US); Philip Allen Craig, JR., West Richland, WA (US); Cody William TeWs, Richland, WA (US); Anand V. Kulkarni, Richland, WA (US); Brandon J. Carpenter, Kennewick, WA (US); Wendy M. Maiden, Pasco, WA (US); Selim Ciraci, Richland, WA (US)
(73) Assignee: Battelle Memorial Institute
(21) Appl. No.: 13/204,606
(22) Filed: Aug. 5, 2011
Publication Classi?cation
(51) Int. Cl. H04L 9/00 (2006.01)
(52) US. Cl. ..................................................... .. 713/189
(57) ABSTRACT
Disclosed below are representative embodiments of methods, apparatus, and systems for monitoring and using data in an electric power grid. For example, one disclosed embodiment comprises a sensor for measuring an electrical characteristic of a power line, electrical generator, or electrical device; a network interface; a processor; and one or more computer readable storage media storing computer-executable instruc tions. In this embodiment, the computer-executable instruc tions include instructions for implementing an authorization and authentication module for validating a software agent received at the network interface; instructions for implement ing one or more agent execution environments for executing agent code that is included with the software agent and that causes data from the sensor to be collected; and instructions for implementing an agent packaging and instantiation mod ule for storing the collected data in a data container of the software agent and for transmitting the software agent, along with the stored data, to a next destination.
TO OPERATING SYSTEM
AGENT FRAMEWORK 50o AGENT
EXECUTION ENVIRONMENT
AGENT PACKAGING 540 DIRECTORY sERvICEs
AND INsTANTIATION 520
N
m w w /1 > PYROVER
*1’ - N \' L). U’) 5 CONFIGURATION 3 E POUC'ES 514 TRUsT STORE 512 E In £9
“24 <2: /1 > JAVA/JADE i 5 \I 544 % 55 >2 AUTHENTICATION AND O
2;‘ AUTHORIZATION 510 5 g _
E A > BINARY 546 z - “
RESOURCE MONITOR 530 LOCAL STORE 526
Patent Application Publication Feb. 7, 2013 Sheet 1 0f 18 US 2013/0036311 A1
0 D 0 6 MW
N 7 5 1 1 O 1 1 9' E T M mm H 6 m N E C A
I 0 m w DOn
N U V E T U E D
C D S
M E T . .
M N T U m 0 N U P H
C O P T
C W U
0
".3 §§§§§§§§§§§§§§§§§§§§§§§§§§§§§§§§§ i w 1..
w 0
N 1
O W Y 0 v R n W W
m M E
M m r M
w M R w ............................... .. I... n
V M G
N M N m E w w
G W 5 H
N w .l
I. . C T w 0 N
W m w W U
» 1
M H
w m-:......-....MUMHMVMMMHML. ........ z
SOFTWARE 180 FOR lMPLEMENTlNG SOFTWARE FRAMEWORK AND/OR AGENT APPLICATIONS
Patent Application Publication Feb. 7, 2013 Sheet 2 0f 18 US 2013/0036311 A1
200
I’ ‘s f
UTILITY 501 210
Y" SUBSTATION so: 212 “
"' FEEDER S0! 214 ‘ THIRD PARTY
_. s01
CUSTOMER PREMISES 216 220
:\ 1/
j
K j
X J \. J
FIG. 2
Patent Application Publication Feb. 7, 2013 Sheet 3 0f 18 US 2013/0036311 A1
.-------------------------------------------------------------------------------------_ , .H, ,My, ,N.‘ .H, 3.”. ,HH .N.‘ .H, ,My, I.’
FRAMEWORK 310
IIIlililllllillllllilllllf‘llllllilllIISLIIIIISIIIIl,llllll,lllllllillllllillIIISISIIlllillllllilllll,lilllll\ N TD T WA“ c mug P P A
O 3 3 K R
a O . W
E
. M
. M . n
N E m
N Tm mmn C GU03 AP P A
6 3 3 m R EO HI Tm OC U P P A
O PERATI NG SYSTEM 320
BASE HARDWARE PLATFORM 312
DIGITAL AND ANALOG NETWORK COMMUNICATION SENSING/CONTROL
INTERFACES 314 INTERFACES 316
FIG. 3
Patent Application Publication Feb. 7, 2013 Sheet 4 0f 18 US 2013/0036311 A1
AGENT FRAMEWORK 400
AGENT AGENT APPLICATION . _ _ . _ APPLICATION
480 482
AGENT INSTANTIATION AND
MOBILITY 460 AGENT EXECUTION ENVIRONMENT 470
AGENT AUTHENTICATION AND AUTHORIZAT‘ON 440 RESOURCE SCHEDULING AND GUARANTEES 450
AGENT DISCOVERY, COOPERATION AND COLLABORATION 430
AGENT NETWORK COMMUNICATION 420
BASE HARDWARE DIRECT OPERATING SYSTEM INTERFACE 412 INTERFACE 410
4}
TO OPERATING TO HARDWARE SYSTEM
FIG. 4
AUTHORIZATION S10
Patent Application Publication Feb. 7, 2013 Sheet 5 0f 18 US 2013/0036311 A1
AGENT FRAMEWORK 500 AGENT EXECUTION
ENVIRONMENT AGENT PACKAGING 540
DRE T Y ERvI E I C 0:205 C 5 AND INsTANTIATION
N 522 m
3 /I > PYROVER * - i “ LL. Ln
5 CONFIGURATION 5 k z POLICIES 514 TRUST STORE 512 E m 0
§ 5 ,4 > IAvA/IAOE ; 5 \I 544 % 5 x AUTHENTICATION AND O 1 LL.
0 E
E Z
RESOURCE MONITOR 530
TO OPERATING SYSTEM
LOCAL STORE 526
FIG. 5
> BINARY 546
Patent Application Publication
600__
///////JJ Ch N N
Ch N .5
(II M (II
lwrlwrlxxx
Feb. 7, 2013 Sheet 6 0f 18 US 2013/0036311 A1
;,;\ DESTTNATION
J
‘3
SOU RCE J
‘x
TNITIATOR k .1 r ‘\
CREATOR & J
AGENT CODE .2
w‘ TMMUTABLE DATA
.2
w, MUTABLE DATA
1’
“a
VALIDATTON PAYLOAD j
w,‘
EXECUTION CONTRACT 1
FIG. 6
Patent Application Publication Feb. 7, 2013 Sheet 7 0f 18 US 2013/0036311 A1
700
CREATOR 720
CREATE AGENT 710
INITIATOR 722 5
; TASK AGENT 712 E
Z SEND AGENT 714 E
FIG. 7
Patent Application Publication
800
Feb. 7, 2013 Sheet 8 0f 18
810
US 2013/0036311 A1
DEFINE AGENT TYPE
812
DEFINE AGENT ACTIONS
DEFINE RESOURCE
REQUIREMENTS WITH
EXECUTION CONTRACT
814
816 SIGN WITH CREATOR
SIGNATURE
N EW AGENT
FIG. 8
Patent Application Publication Feb. 7, 2013 Sheet 9 0f 18 US 2013/0036311 A1
900
910
IS CREATOR SIGNATURE VALID?
DISCARD
916
IS
AGENT FROM F | G . ANOTHER
sOI
Y
918 X vALIDATE SOI AUTHENTICATION
AND AUTHORIZATION
ADD ADDITIONAL 920 TRUST INFORMATION \ TO IIVIIVIUTABLE
LUGGAGE
I >
922 Y
\ LOOKUP PATH
924 I \ PAYLOAD
CONSTRUCTION
926
TRANSPORT
Patent Application Publication Feb. 7, 2013 Sheet 10 0f 18 US 2013/0036311 A1
950
_ I _ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . {I AGENT RECEIVED
DISCARD AGENT c0012
DISCARD INITIATOR
INITIATOR DISCARD
974 -
- 1': IMMUTABLE DATA 1 .. __UTHENTIC? .. -
DISCARD
IVIUTABLE DATA .- DISCARD
. ...- UTHENTIC " "'
984 \ EXTRACT DATA
FIG. 9B
Patent Application Publication Feb. 7, 2013 Sheet 11 0f 18 US 2013/0036311 A1
1000
1010
AGENT
1012 VALIDATE AGENT \ AUTHENTICATION
AND AUTHORIZATION
1014
IS AGENT UPGRADE
AGENT?
1016 \ INITIATE UPGRADE INITIATE AGENT
EXECUTION
FIG. 10A
Patent Application Publication Feb. 7, 2013 Sheet 12 0f 18 US 2013/0036311 A1
1050
1060 ‘ EXECUTION
COMPLETE
1062 \ COLLECT LNFORMATLON
l 1064 \ LOOKUP PATH
l 1066 \ PAYLOAD
CONSTRUCTION
l 1068
‘ TRANSPORT
FIG. 10B
Patent Application Publication Feb. 7, 2013 Sheet 13 0f 18 US 2013/0036311 A1
1100
AGENT ON THIS PLATFORM?
DISCARD
SNAPSHOT RUNNING
AGENT, THEN TERMINATE
1116
HAS AGENT TERMINATED?
TERMINATE AGENT
1120 \ UPGRADE AGENT
AND REINITATE
1122
HAS AGENT STARTED?
RESTORE FROM SNAPSHOT
Patent Application Publication Feb. 7, 2013 Sheet 14 0f 18 US 2013/0036311 A1
1200
( START VALIDATION ) / 1210
1212 IS
AGENT SIGNATURE VALID?
1214
IS INITIATOR VALID?
1218 IS
INITIATOR ‘ UTH'RZDT’
1222
IS CGNFIG. DATA
AUTHENTIC? N
Y
1226 1228
IS IVIUTABLE DATA AUTHENTIC? N
Y
1230 1232 ARE
RESOURCES VAILABLE?
Y
C RETURN VALID )
Patent Application Publication Feb. 7, 2013 Sheet 15 0f 18 US 2013/0036311 A1
1300
1310 \ RECEIVE ENERGY GOAL
FIG. 13A 1311 \ RECEIVE OATA FROM OTHER
HOMES
1312 \ SUBTRACT BASE LOAD FOR HOMES
1314 \ SUBTRACT ENERGY USE FROM HOMES WITH TOKEN
1316
ENERGY REMAINING?
1317 \ RUN APPL¥ANCE(S) IF HOUSE
HAS TOKEN, DECREMENT <—® TOKEN
Patent Application Publication Feb. 7, 2013 Sheet 16 0f 18 US 2013/0036311 A1
FIG. 13B 1318 1 LIST HOUSES WITH NO TOI<EN
1320
ANY ANY HOUSE < TANK HOUSE < LOW
ATER MARK?
1322\ 1334 SELECT HOUSE FARTHEST \ SELECT HOUSE CLOSEST FROM LOW WATER MARK To TANK ENERGY GOAL
1324 1336
AGENT’S AGENT'S
HOUSE? izs HOUSE? 1338
CLAIM CLAIM TOKEN TOI<EN
1328 SUBTRACT ENERGY \ 1340 SUBTRACT ENERGY NEEDS OF SELECTED \ NEEDS OF SELECTED +
HOUSE HOUSE
‘7 ‘V
1329 1 2 \ REMOvE HOUSE 34 \ REMOVE HOUSE
FROM LIST FROM LIST
1344
Y ENERGY REMAINING?
ENERGY REMAINING?
Patent Application Publication Feb. 7, 2013 Sheet 17 0f 18 US 2013/0036311 A1
1410 \
1420 \
1430 \
Cooperative
FIG. 14
Patent Application Publication Feb. 7, 2013 Sheet 18 0f 18 US 2013/0036311 A1
1500
DISTRIBUTION SUBSTATION FOR LOCAL FEEDER
1510
US 2013/0036311A1
INTELLIGENT SENSOR AND CONTROLLER FRAMEWORK FOR THE POWER GRID
ACKNOWLEDGMENT OF GOVERNMENT SUPPORT
[0001] This invention Was made With Government support under Contract DE-AC05 -76RLO1830 awarded by the US. Department of Energy. The Government has certain rights in the invention.
FIELD
[0002] This application relates generally to the ?eld of poWer grid monitoring and control.
BACKGROUND
[0003] The number of sensors and controllers connected to the electric poWer system is expected to groW by several orders of magnitude over the next several years. HoWever, the information netWorks that are currently used to transmit and analyze data on the system are ill-equipped to handle the volume of communications resulting from the increased number of sensors. For example, the current information net Works are incapable of delivering large amounts of data col lected by the sensors in a predictable, time-effective, and reliable manner.
[0004] Without the ability to manage and use data from the sensors, the deployment of sensors into the poWer grid (e.g., phasor measurement sensors into the transmission system and smart meters into the distribution system) Will not result in the desired improvements. For example, conventional information netWorks for poWer system are incapable of man aging tWo-Way poWer ?oW, thus hampering efforts to fully utilize distributed generation capabilities (e.g., poWer genera tion from home solar panels, electric vehicles, and the like). [0005] Accordingly, improved systems, methods, and apparatus for managing and using data in an electric poWer grid are desired.
SUMMARY
[0006] Disclosed beloW are representative embodiments of methods, apparatus, and systems for monitoring and using data in an electric poWer grid. Certain embodiments, for example, bring intelligence from the control rooms of a utility to devices located at or near customer premises. The applica tion of the disclosed embodiments to electrical utilities and to a poWer grid should not be construed as limiting, hoWever, as the disclosed technology is more generally applicable to other environments in Which agent-based data communications are desired. [0007] Among the exemplary embodiments disclosed herein is a method that comprises receiving data representing a softWare agent, the data including data indicating a crypto graphic signature for the softWare agent, data indicating resource requirements for executing the softWare agent, and executable code for performing an agent task; determining that the executable code is authorized for execution; and executing the executable code on a processor, thereby per forming the agent task. In this exemplary method, the deter mining that the executable code is authorized for execution comprises verifying that the softWare agent is authorized using the data indicating the cryptographic signature, and verifying that suf?cient computing resources are available for the softWare agent using the data indicating the resource
Feb. 7, 2013
requirements. In certain implementations, the data represent ing the softWare agent further comprises data indicating an identity of an initiator of the softWare agent, and the act of determining that the executable code is authorized for execu tion further comprises verifying that the initiator is a recog nized and authorized initiator using the data indicating the identity of the initiator of the softWare agent. In some imple mentations, the data representing the softWare agent further comprises data indicating a cryptographic signature for con ?guration data of the softWare agent (the con?guration data indicating parameters for the executable code and destination nodes for the softWare agent), and the act of determining that the executable code is authorized for execution further com prises verifying that the con?guration data of the softWare agent has not been altered using the cryptographic signature for the con?guration data. In certain implementations, the data representing the softWare agent further comprises data indicating a cryptographic signature for mutable data of the softWare agent, and the act of determining that the executable code is authorized for execution further comprises verifying that the mutable data of the softWare agent has not been altered using the cryptographic signature for the mutable data. In some implementations, the method is performed by computing hardWare in communication With one of (a) a sensor for measuring an electrical parameter of a poWer line of a poWer grid, (b) a sensor for measuring an electrical parameter of a distributed generator coupled to the poWer grid, (c) an electrical meter for a household coupled to the poWer grid, (d) a control unit for one or more household electrical devices that receive poWer from the poWer grid, or (e) a control unit for controlling poWer distribution on the poWer grid. In certain implementations, the act of executing the executable code comprises instantiating an instance of an agent execution environment, and executing the executable code in the agent execution environment. In some implemen tations, the agent task is to update agent code for an existing agent. In certain implementations, the method further com prises receiving data from a sensor as a result of executing the executable code on the processor; storing the collected data in a mutable data container of the softWare agent; and transmit ting the softWare agent, along With the collected data, to a next destination in a manner in Which the mutable data container is protected from tampering during transmission. The sensor in such implementations can be con?gured to measure an elec trical characteristic of a poWer line, a distributed generator, or an electrical device.
[0008] Another exemplary embodiment disclosed herein is a system comprising a sensor for measuring an electrical characteristic of a poWer line, electrical generator, or electri cal device; a netWork interface; a processor; and one or more computer-readable storage media storing computer-execut able instructions. In this embodiment, the computer-execut able instructions include instructions for implementing an authorization and authentication module for validating a soft Ware agent received at the netWork interface; instructions for implementing one or more agent execution environments for executing agent code that is included With the softWare agent and that causes data from the sensor to be collected; and instructions for implementing an agent packaging and instan tiation module for storing the collected data in a data con tainer of the softWare agent and for transmitting the softWare agent, along With the stored data, to a next destination. In certain implementations, the sensor is a phasor measurement sensor. In some implementations, the system is part of an