The present invention relates to process devices of the type used to monitor or control operation of an industrial process. More specifically, the present invention relates to safety certification of such process devices.
Process devices are used in industrial process control systems to monitor and/or control industrial processes. A control device is a process device which is used to control the process. Example control devices include pumps, valves, actuators, solenoids, motors, mixers, agitators, breakers, crushers, rollers, mills, ball millers, kneaders, filters, blenders, cyclones, centrifuges, towers, dryers, conveyors, separators, elevators, hoists, heaters, coolers, and other such equipment. A transmitter is a process device which is used to sense (or monitor) operation of the process, for example by monitoring a process variable such as temperature, pressure, flow, etc. The monitored process variable is transmitted so that it can be used by other equipment in the process, for example by a central control room. Another example process device is a process monitor or communicator which is used to monitor operation of the process, equipment used in the process such as process transmitters or process controllers, and control process devices, for example by programming or sending instructions to the device.
Typically, process devices have a fairly robust design and are manufactured for long life with a low failure rate. The failure of a process device can have significant impact on the process and may require the process to be temporarily shut down while the device is repaired or replaced. However, there are some applications for process devices which require a level of performance which significantly surpasses the level provided by typical process devices. Such devices must meet a “safety certification process” or a “Safety Integrity Level” (SIL) certification. This certification provides a metric for configuring a process to meet a desired safety requirement.
Safety integrity levels are a set of standards which provide metrics which can be used to measure the safety of a process. Safety integrity levels can provide information and provide a way of measuring expectations regarding whether a process can perform safely, and, in case of a failure, will the process fail in a safe manner. SIL ratings are related to a products reliability. For example, a product must be shown to “be available” to perform its designated task at some predetermined rate. This availability is related to the mean time between failures (MTBF) for the product as well as the mean time to repair (MTTR), and the probability to fail on demand (PFD). In general, the use of safety integrity levels is described in “Functional Safety and Safety Integrity Levels” Applications Note Bently Nevada BN Part Number 149409-01 Revision A, April 2002. One technique which can be used to increase the safety integrity level certification for a device is to use components such as electrical or mechanical parts which are less likely to fail. Design procedures can also be used for example providing redundant systems to reduce failures. In addition to reducing failures, process devices can be used to detect a particular failure event and provide a desired response, such as a controlled shut down of the process. In general, designing a process device in order to meet such certification requirements is a difficult and time consuming process.
An apparatus for use in a process device provides a desired Safety Integrity Level (SIL) for the process device. A device interface couples to the process device and provides an output related to operation of a component of the process device. A component monitor monitors operation of the component with the output from the device interface and identifies a safety event of the component. A safety response module responds to the safety event of the component in accordance with a desired response.
Many industrial processes are inherently hazardous. These processes typically use toxic, flammable or reactive materials, and often at elevated temperatures and pressures. In the event of equipment malfunction or human error in these processes a catastrophic event may occur. Safety Instrumented Systems (SIS) are automation systems designed to prevent these events. Interest, particularly in the chemical, petrochemical, and refining industries, in these safety systems has increased over the last few years because of new international standards.
A Safety Instrumented System may be defined as a system composed of sensors, logic solvers and final control elements designed for the purpose of:
Safety Instrumented Systems (SIS) are very similar to Basic Process Control Systems (BPCS) in that they both use similar components. The systems include all the elements from the sensor to the final control element connected to the process, including inputs, outputs, SIS user interfaces, power supply, and a logic solver. SIS components are usually separate and independent from the BPCS. Given the purpose of a SIS, additional design requirements must be met. The Basic Process Control System (BPCS) Alarms, and Safety Instrumented Systems (SIS) are all prevention layers. Remaining layers are mitigation layers.
For example, a plant may have many layers of protection to protect personnel, equipment, and local communities from a catastrophic event. Some layers of protection are prevention layers and some layers are mitigation layers. A prevention layer is there to prevent the catastrophic event from happening. A mitigation layer is used to contain the event and reduce its cost after the event has occurred. The Basic Process Control System (BPCS), Alarms, and Safety Instrumented Systems are all prevention layers. Remaining layers are mitigation layers.
To illustrate layers of protection, an example of a reaction in a vessel can be used. Given the right conditions, the reaction could “runaway” and without different layers of protection, the tank could explode and cause significant damage.
Example Protection Layers Include:
The SIS layer is the final prevention layer. If there is a failure in the SIS, the hazard cannot be prevented, only the mitigation layers remain to limit the amount of resulting damage. It is important that the SIS layer provide enough protection to prevent significant damage or loss of life. The amount of protection required equates to risk management.
Although all the elements and components must be considered when specifying a SIS, the three key components in the calculation include sensors, logic solvers and final control elements.
Sensors measure pressure, temperature, flow, mass flow, level, flame detectors, pH or other parameters. They range from simple pneumatic or electrical switches to Smart transmitters with on-board diagnostics. SIS sensors can be the same as typical process sensors (under certain qualifying conditions) or can be sensors specifically designed for SIS applications. Sensors specially designed for SIS may have extra internal diagnostics and software allowing fault detection and controlled access to device setup and calibration.
Safety standards do not prescribe any specific type or technology for sensors used in SIS applications. It is up to the designer of the system to determine an optimized/safe technology to meet the standard.
However, standards do define the specific requirements the end user must follow when specifying, installing, and maintaining SIS sensors.
The logic solver is typically a controller that reads signals from the sensors and executes preprogrammed actions to prevent a hazard. There are many similarities between a safety logic solver and a conventional Digital Control System (DCS) or Programmable Logic Controller (PLC). They both perform logic functions and both have input and output capability from sensors and final control elements. The difference is that the SIS Logic Solver is designed to be fault tolerant, have internal redundancy, and designed to fail in a safe mode. They are designed with extra internal diagnostics and hardware and software that will allow it to detect faults. The safety logic solver also has added security to ensure against accidental configuration changes.
Similar to sensors, standards do not dictate what type of Logic Solver to use, only the requirements for its application.
Final Control Elements represent the final stage in implementing a safety shutdown. This is the component that acts to bring about the safe state. These elements include solenoid valves, ON/OFF valves, and motor starters. The most common are solenoid valves which provide air to a diaphragm or the piston actuator of a process shutdown valve. Valve suppliers have recently released smart positioners expressly designed for SIS applications. Similar to sensors, SIS final control elements can be the same as typical process final control elements under certain qualifying conditions or they can be specifically designed for SIS applications. These specially designed final control elements have extra internal diagnostics and software enabling fault detection.
Again, similar to sensors, standards do not prescribe any specific technology for final control elements used in SIS applications. It is up to the designer of the system to determine an optimized/safe technology. The standard only states the requirements the end user must follow.
There is a similar theme in the three components of a SIS. That theme is diagnostics. A SIS is designed to detect a process upset and bring the process back to a safe state. It is imperative that the operator be made aware of any SIS fault and be able to respond to it.
As discussed above, process devices which are used to measure, monitor and control industrial processes, are typically designed to a very high level of reliability. However, there are some instances in which process devices must meet further operational requirements. For example in a Safety Instrumented System, the process device may be required to meet certain Safety Integrity Level (SIL) certifications. Example regulatory standards include IEC 61511, IEC 61508 and ISA SP 84.01. These standards require complex development processes, rigid control over changes in the components, and significant validation and verification activities. Compliance with these standards often requires extra design time and adds a level of uncertainty to the overall development cycle for new process devices. Further, once a device is certified, any change to the device must be analyzed and the device recertified, if necessary.
One of the primary elements of obtaining a Safety Integrity Level (SIL) certification is an analysis to determine the Safe Failure Fraction (SFF) of the device. SFF analysis is performed using a Failure Modes, Effects and Diagnostics Analysis (FMEDA) on the device to determine how the device behaves during various hardware and software fault conditions for all of the components in the device. This test attempts to determine the total number of potentially dangerous device failures and the percentage of those failures which are prevented from incorrectly altering the output of the device. In a specific example, to achieve a SIL2 certification, the FMEDA must indicate an SFF of at least 90%.
The present invention provides a supervisory overlayer for using with or in a process device. The supervisory overlayer monitors operation of the process device and is used to prevent, mitigate and/or detect failure of component(s) or other aspects of the device, including the supervisory overlayer itself. The present invention is applicable to Safety Instrumented Systems as well as Basic Process Control Systems.
In general, the present invention is applicable to any process device including measurement (sensor), control and host (logic solver) devices. A “supervisory wrapper” is placed around a device, or portions of a device, and provides an improved safety integrity level. This allows the creation of a safety certified device that includes non-certified components or devices. In one embodiment, a non-certified device can be upgraded, for example while in the field, into a certified device through a software upgrade. In a second embodiment, a non-certified device can be upgraded, for example while in the field through an electronics upgrade. In addition to its use with SIS, this “supervisory wrapper” can be used to provide improved capability for the device such as advanced diagnostics. The present invention uses various techniques to improve the safety integrity level for a device. For example, the “supervisory overlayer” provided by the invention can identify a component that may fail, or is in the process of failing prior to its ultimate failure such that the component can be replaced without triggering an unsafe condition. In another example, the invention can compensate for a component that has failed, or is in the process of failing such that an unsafe condition does not occur. In another example, the invention can provide an output which indicates that an unsafe condition has occurred, or is about to occur such that appropriate steps can be taken. When used with an SIS device, the invention can provide an indication that the device's monitoring or response capability has or may fail.
Transmitter 12 is coupled to a two-wire process control loop which operates in accordance with a communication protocol such as Fieldbus, Profibus or HART® standard. Currently, SIS systems are only approved with two-wire 4-20 mA loops. However, the invention is not limited to these standards or a two-wire configuration. Two-wire process control loop 18 runs between transmitter 12 and the control room 20. In an embodiment in which loop 18 operates in accordance with the HART® protocol, loop 18 carries a current I which is representative of a sensed process variable. Additionally, the HART® protocol allows a digital signal to be superimposed on the current through loop 18 such that digital information can be sent to or received from transmitter 12. When operating in accordance with the Fieldbus standard, loop 18 carries a digital signal and can be coupled to multiple field devices such as other transmitters.
The present invention is applicable to any process device which is used in a process control environment. In general, process devices, such as transmitter 12 shown in
As discussed above,
Any of the process devices 12, 20, 22 or 26 shown in
During operation, circuitry and components 102 of process device 100 operate generally in accordance with standard process device components. For example, the process device circuitry and components 102 may sense a process variable for use by the process device 100 or for transmission over the two-wire process control loop 18, or may generate an output which is used to control operation of the process, for example by controlling a valve. If supervisory overlayer 104 detects the occurrence of a component failure, an impending component failure, or the possibility that a component might fail, supervisory overlayer 104 controls the process device 100 in order to take steps appropriate with the desired safety integrity level certification. For example, supervisory overlayer 104 can compensate for measurement errors if the amount of the error can be accurately determined or approximated. Alternatively, or in addition to, supervisory overlayer 104 can take steps to shut down the process device 100 and/or send a message to external components, for example through process control loop 18, indicating the fault or failure that has been sensed or predicted by supervisory overlayer 104.
Microprocessor 204 is connected to windowed watch dog circuitry 250. The circuit 250 resets microprocessor 204 if microprocessor 204 does not provide periodic inputs to circuit 250. A voltage drop across a resistor 254 is measured by analog to digital (A/D) converter 256 which provides an output to microprocessor 204. The voltage drop across resistor 254 is related to the current flowing through loop 18. Microprocessor 204 also couples to a loop override circuit 226. In some embodiments, sensor module 202 also couples to a display 270 such that information can be locally displayed by process device 200.
Device 200 implements a number of different supervisory overlayer functions. The supervisory overlayer can be provided as a modular attachment for example by updating software in the memory of controller 204, or retrofit to existing process control devices.
One supervisory overlayer function may include monitoring the stream of process measurement data provided by sensor module 202. The process variables are carried on data bus 282 and 284. However, in addition to monitoring the process variable stream, the supervisory overlayer functionality can monitor other activity on data bus 282 and 284 and provide a desired alarm output. If the sensor module 202 stops providing process variable updates, programming instructions within microprocessor 204 identifies a safety event. Upon detection of a loss of data, the response of the microprocessor 204 can be configured as desired. For example, the microprocessor can provide a local alarm signal or can transmit an alarm signal on process control loop 18. If partial data loss is detected, in addition to providing an alarm signal, the microprocessor 204 can also attempt to interpolate between data points to provide limited functionality during the failure.
In another example of the supervisory overlayer, the data stream provided to the display 270 is monitored. If loss of the data stream is detected by microprocessor 204, the process device 200 can enter a selected alarm state, for example by transmitting an alarm over loop 18.
In another embodiment of the supervisory overlayer, the power control circuitry 255 monitors and controls power provided to the sensor module 202. For example, if the current drawn by the sensor module 202 exceeds a threshold, the power control circuit 255 can limit the current to the sensor module, or completely disconnect the sensor module if desired. Additionally, an alarm output can be provided. This allows the process device 200 to continue with limited functionality even though the sensor module 202 is failing without allowing the failure of sensor module 202 to cause complete failure of the entire device.
In another example embodiment of this supervisory overlayer, the current level to which the loop 18 is set is measured by the A/D 256 and provided to the microprocessor block 204. If the microprocessor detects that the loop current is different than the value to which the loop control circuitry 220 has set the current, the microprocessor 204 can provide an alarm output. If desired, the microprocessor 204 can temporarily recalibrate the loop control circuitry 220 such that the loop current I is set to the desired level. Similarly, in some embodiments the microprocessor 204 can activate loop override circuitry 226 which overrides operation of loop current control circuitry 220 and causes the loop current I to be driven to a predetermined level. The predetermined level can comprise, for example, an alarm level.
In yet another example implementation of the supervisory overlayer, a windowed watch dog circuit 250 monitors operation of microprocessor 204. During normal operation, the microprocessor 204 is configured to regularly send a signal to the watch dog circuitry 250. If the watch dog circuitry 250 either receives a signal from microprocessor 204 too frequently or too slowly, the watch dog circuitry 250 can cause the device 200 to provide a desired alarm, for example an alarm signal on loop 18 using loop override circuitry 226.
In another example, operation of the memory of microprocessor and memory block 204 is monitored. For example, memory can include a checksum bit or other error detection mechanism. If the error detection mechanism indicates that the data stored in the memory is in error, the microprocessor can provide a desired response, such as initiating an alarm condition. The memory can be either volatile or non-volatile memory.
In some embodiments, the supervisory overlayer of the present invention is adapted to be retrofit to an existing device. The retrofit can be performed during or after manufacturer. For example, the supervisory overlayer can be embodied in a feature module or board 203 for coupling to an existing sensor module 202 such as shown in
Although the present invention has been described with reference to preferred embodiments, workers skilled in the art will recognize that changes may be made in form and detail without departing from the spirit and scope of the invention. The examples specifically set forth herein are just for illustrative purposes only. The supervisory overlayer can detect other failures or conditions and provide a controlled response such as shutting down the process device and/or sending an alarm signal. By using the present invention, standard components used in process devices can be monitored such that the process device meets safety standards, such as those required in certain certification procedures, which the individual components and process device could not otherwise achieve. In general, the supervisory overlayer includes some type of device interface which couples to the process device and provides an output related to operation of component or components of the device. Some type of component monitor monitors operation of the component based upon the output from the device interface. A safety failure of the component is identified by the component monitor and a safety response module provides a desired safety response in accordance with the safety failure. The supervisory overlayer, device interface, component monitor and safety response module can be implemented in software and/or hardware. The supervisory overlay can monitor a plurality of process device including devices which a distributed across a control system. The supervisory overlayer can be implemented in a device which is completely powered with power from a two wire process control loop, or can receive power from another source. The present invention can be used in conjunction with techniques set forth in U.S. application Ser. No. 10/733,558, filed Dec. 11, 2003 and entitled PROCESS DEVICE WITH LOOP OVERRIDE.
Number | Name | Date | Kind |
---|---|---|---|
4356900 | Sommer | Nov 1982 | A |
4804958 | Longsdorf | Feb 1989 | A |
5036886 | Olsen et al. | Aug 1991 | A |
5058043 | Skeirik | Oct 1991 | A |
5416409 | Hunter | May 1995 | A |
5481200 | Voegele et al. | Jan 1996 | A |
5573032 | Lenz et al. | Nov 1996 | A |
5764891 | Warrior | Jun 1998 | A |
5828567 | Eryurek et al. | Oct 1998 | A |
5874895 | Devarney | Feb 1999 | A |
5956663 | Eryurek et al. | Sep 1999 | A |
5970430 | Burns et al. | Oct 1999 | A |
6017143 | Eryurek et al. | Jan 2000 | A |
6026352 | Burns et al. | Feb 2000 | A |
6047220 | Eryurek | Apr 2000 | A |
6176247 | Winchcomb et al. | Jan 2001 | B1 |
6186167 | Grumstrup et al. | Feb 2001 | B1 |
6389568 | Leshay et al. | May 2002 | B1 |
6476522 | Hays et al. | Nov 2002 | B1 |
6631882 | Mack | Oct 2003 | B2 |
6647301 | Sederlund et al. | Nov 2003 | B1 |
6654697 | Eryurek et al. | Nov 2003 | B1 |
6957115 | Meyer-Grafe et al. | Oct 2005 | B1 |
6970003 | Rome et al. | Nov 2005 | B2 |
7018800 | Huisenga et al. | Mar 2006 | B2 |
7046180 | Jongsma et al. | May 2006 | B2 |
7054765 | Flaemig et al. | May 2006 | B2 |
7089086 | Schoonover | Aug 2006 | B2 |
7098798 | Huisenga et al. | Aug 2006 | B2 |
7464721 | Perry et al. | Dec 2008 | B2 |
7486997 | Muneta | Feb 2009 | B2 |
7667354 | Graupner et al. | Feb 2010 | B2 |
7809449 | Esch et al. | Oct 2010 | B2 |
7813820 | Opem et al. | Oct 2010 | B2 |
7853339 | Miller et al. | Dec 2010 | B2 |
7865251 | Law et al. | Jan 2011 | B2 |
7918134 | Hedtke et al. | Apr 2011 | B2 |
20020121910 | Rome et al. | Sep 2002 | A1 |
20030062494 | Snowbarger et al. | Apr 2003 | A1 |
20030236579 | Hauhia et al. | Dec 2003 | A1 |
20050113942 | Longsdorf et al. | May 2005 | A1 |
20050149295 | Pfundlin et al. | Jul 2005 | A1 |
20050168343 | Longsdorf et al. | Aug 2005 | A1 |
20050274417 | Perry et al. | Dec 2005 | A1 |
20060069455 | Longsdorf et al. | Mar 2006 | A1 |
20070270982 | Foss et al. | Nov 2007 | A1 |
20110057811 | Hedtke | Mar 2011 | A1 |
Number | Date | Country |
---|---|---|
42 09 785 | Sep 1993 | DE |
298 24 256 | Jul 2001 | DE |
1 396 771 | Mar 2004 | EP |
1274260 | Nov 1989 | JP |
4116473 | Apr 1991 | JP |
5134712 | Jun 1993 | JP |
8035653 | Feb 1996 | JP |
8087317 | Apr 1996 | JP |
9130446 | May 1997 | JP |
10229588 | Aug 1998 | JP |
11341003 | Aug 1999 | JP |
2000076571 | Mar 2000 | JP |
2000215113 | Aug 2000 | JP |
2000308277 | Nov 2000 | JP |
2002111705 | Apr 2002 | JP |
2002229867 | Aug 2002 | JP |
2003050677 | Feb 2003 | JP |
2003233416 | Aug 2003 | JP |
WO 9829785 | Jul 1998 | WO |
WO 0079352 | Dec 2000 | WO |
WO 0079352 | Dec 2000 | WO |
WO 0079359 | Dec 2000 | WO |
WO0079352 | Dec 2000 | WO |
WO 03019310 | Mar 2003 | WO |
WO 03040657 | May 2003 | WO |
WO 03040851 | May 2003 | WO |
WO 03060851 | Jul 2003 | WO |
Number | Date | Country | |
---|---|---|---|
20050113942 A1 | May 2005 | US |