viii B90 Low Impedance Bus Differential System GE MultilinTABLE OF CONTENTS6.4 RECORDS6.4.1 USER-PROGRAMMABLE FAULT REPORTS .................................................6-116.4.2 EVENT RECORDS ...........................................................................................6-116.4.3 OSCILLOGRAPHY ...........................................................................................6-116.5 PRODUCT INFORMATION6.5.1 MODEL INFORMATION ...................................................................................6-126.5.2 FIRMWARE REVISIONS..................................................................................6-127. COMMANDS ANDTARGETS7.1 COMMANDS7.1.1 COMMANDS MENU ...........................................................................................7-17.1.2 VIRTUAL INPUTS ..............................................................................................7-17.1.3 CLEAR RECORDS .............................................................................................7-27.1.4 SET DATE AND TIME ........................................................................................7-27.1.5 RELAY MAINTENANCE .....................................................................................7-37.2 TARGETS7.2.1 TARGETS MENU ...............................................................................................7-47.2.2 TARGET MESSAGES ........................................................................................7-47.2.3 RELAY SELF-TESTS .........................................................................................7-48. SECURITY 8.1 PASSWORD SECURITY8.1.1 OVERVIEW ........................................................................................................8-18.1.2 PASSWORD SECURITY MENU ........................................................................8-28.1.3 LOCAL PASSWORDS........................................................................................8-28.1.4 REMOTE PASSWORDS ....................................................................................8-38.1.5 ACCESS SUPERVISION ...................................................................................8-38.1.6 DUAL PERMISSION SECURITY ACCESS........................................................8-48.2 SETTINGS SECURITY8.2.1 SETTINGS TEMPLATES ...................................................................................8-68.2.2 SECURING AND LOCKING FLEXLOGIC™ EQUATIONS ..............................8-108.2.3 SETTINGS FILE TRACEABILITY.....................................................................8-128.3 ENERVISTA SECURITY MANAGEMENT SYSTEM8.3.1 OVERVIEW ......................................................................................................8-158.3.2 ENABLING THE SECURITY MANAGEMENT SYSTEM..................................8-158.3.3 ADDING A NEW USER ....................................................................................8-158.3.4 MODIFYING USER PRIVILEGES ....................................................................8-169. THEORY OF OPERATION 9.1 INTRODUCTION9.1.1 BUS DIFFERENTIAL PROTECTION .................................................................9-19.2 DYNAMIC BUS REPLICA9.2.1 DYNAMIC BUS REPLICA MECHANISM............................................................9-29.2.2 CT RATIO MATCHING .......................................................................................9-29.3 DIFFERENTIAL PRINCIPLE9.3.1 BIASED DIFFERENTIAL CHARACTERISTIC....................................................9-39.3.2 DIFFERENTIAL AND RESTRAINING CURRENTS ...........................................9-49.3.3 ENHANCED SECURITY ....................................................................................9-59.4 DIRECTIONAL PRINCIPLE9.4.1 CURRENT DIRECTIONAL PROTECTION.........................................................9-69.5 SATURATION DETECTOR9.5.1 CT SATURATION DETECTION .........................................................................9-79.6 OUTPUT LOGIC AND EXAMPLES9.6.1 OUTPUT LOGIC .................................................................................................9-89.6.2 INTERNAL AND EXTERNAL FAULT EXAMPLE ...............................................9-8