1 / 5

Management of Critical Settings (MCS)

This software allows safe adjustment of interlock thresholds in critical machinery settings through digital signatures, ensuring data integrity and security during operation.

bleake
Download Presentation

Management of Critical Settings (MCS)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Management of Critical Settings (MCS) Management of Critical Settings (MCS) User Info… 19Dec06

  2. Introduction... TrimEditor RBA Role based access: authentication + authorisation If authorised: the new value is stored in the DB plus MCS digital signature. If cycle resident: the new value is sent to the HW plusMCS digital signature. LSA DB CMW FESA FESA verifies the MCS digital signature. If successful, new interlock threshold stored in HW. • Software to manage interlock thresholds which might need adjusting during operation in a safe way… In order to change a critical setting (interlock threshold)… Digital signature is generated from data set with a secret private key, guarantees integrity of data. 19Dec06

  3. Scope (1) • The MCS should only handle key machine protection related interlock settings and parameters • restricted to only these machine elements • Interlock settings can be • single values • functions of time, energy, b* • tables (LHC BLM thresholds,…) 19Dec06

  4. Scope (2) • The MCS will/could also be used to manage • reference values for beam dump XPOC • reference values for the Software Interlocking System • operating conditions during commissioning 19Dec06

  5. MCS & digital signatures…Info • Simplified picture: • MCS signs data with a private key and front-ends only accept data with the correct signature, verified with the public key. • MCS Method • after the initialisation or modification of critical settings • new signature is generated from data with private key AND stored with the data in the database • the data is sent to hardware from the database • FESA has the public key and verifies the signature • in case of correct signature data is transferred to front-end expert code otherwise rejected • front-end expert codes will stay untouched 19Dec06

More Related