Energy reducing key for electronic trip units

ABSTRACT

Embodiments provide an Energy Reduction Maintenance Setting (ERMS) key that includes a data connector configured to communicatively couple to a data port of a target device. The ERMS key further includes an illumination device and an actuator mechanism having a base positional state and an actuated positional state. The ERMS key includes logic configured to, upon detecting the actuator mechanism has moved from the base positional state to the actuated positional state, generate and transmit a first data message to the target device through the data connector instructing the target device to enter a protected mode. The logic is further configured to, upon receiving a second data message from the target device over the data connector acknowledging that the target device as successfully entered the protected mode, cause the illumination device to illuminate.

TECHNICAL FIELD

The present disclosure relates to electrical distribution equipment, andmore particularly, to systems and techniques for using a key mechanismto place electrical distribution equipment in a protected arcing energymode to ensure the safety of maintenance personnel.

BACKGROUND

Electrical equipment typically requires periodic maintenance. Forinstance, electrical equipment often requires cleaning, repairs,testing, and/or adjustments. Further, some electrical equipment mayrequire replacement. Consequently, there is a need to provide servicepersonnel with means to create a safe working environment bydisconnecting electricity to the equipment which the service personnelare servicing. One way to accomplish this disconnecting of electricityis to disconnect power with a circuit breaker where contacts can beopened and the operator mechanism can be padlocked in the “open”position to prevent accidental closing of contacts. Preventing theclosing of contacts would prevent re-energizing the circuit. In general,facilities with electrical equipment have a specific procedure whichestablishes the minimum requirements for lockout of energy sources thatcould cause injury to service personnel. This procedure is commonlyreferred to as a lockout-tagout procedure.

Circuit breakers are typically used as an integral component in apower-distribution system. Circuit breakers, in addition to providingoverload current protection, can also be used as disconnect devices tode-energize downstream electrical distribution circuits as needed toperform, for example, maintenance. In some cases, however, it can occurthat maintenance or access to electrical systems must be done with suchsystems energized and this situation can present a significant risk forinjury or property damage. To address this risk, recent industry rulesand practices have evolved to create a “lower energy service mode” (alsoreferred to herein as a protected mode) that is achieved with specialhardware and procedures to reduce the afore-mentioned risks. Onedrawback of these systems is that they typically require the permanentinstallation of hardware resulting in additional costs to purchase,maintain, or retrofit separately each electrical system for which thebenefit of reduced risk is needed or desired.

BRIEF DESCRIPTION OF THE DRAWINGS

A more detailed description of the disclosure, briefly summarized above,may be had by reference to various embodiments, some of which areillustrated in the appended drawings. While the appended drawingsillustrate select embodiments of this disclosure, these drawings are notto be considered limiting of its scope, for the disclosure may admit toother equally effective embodiments.

FIG. 1 illustrates a trip unit configured for use with an EnergyReduction Maintenance Setting (ERMS) key, according to one embodimentdescribed herein.

FIG. 2 illustrates an energy reduction maintenance setting key in afirst position, according to one embodiment described herein.

FIG. 3 illustrates an energy reduction maintenance setting key in afirst position, according to one embodiment described herein.

FIG. 4 is a flow diagram illustrating a method for enabling a low energymode in a target device, according to one embodiment described herein.

FIG. 5 is a flow diagram illustrating a method for disabling a lowenergy mode in a target device, according to one embodiment describedherein.

FIG. 6 is a block diagram illustrating a system configured with an ERMSkey, according to one embodiment described herein.

Identical reference numerals have been used, where possible, todesignate identical elements that are common to the figures. However,elements disclosed in one embodiment may be beneficially utilized onother embodiments without specific recitation.

DETAILED DESCRIPTION

Lockout-tagout is a safety procedure outlined by the Occupational Safetyand Health Administration (OSHA). In general, lockout-tagout is used toprevent the release of hazardous energy during service, maintenance,and/or installation of industrial equipment. A typical lockout-tagoutprocedure involves service personnel physically taking a padlock with aunique key and identification tag and engaging the proper safety latchesto disable equipment before the service personnel begin service. Eachservice worker on the job uses their own padlock, and the padlock is notremoved until the service worker is done with service. Unique keys foreach worker prevent unlocking (e.g., accidental unlocking and/orintentional unlocking) by anyone else aside from the service workerintending the equipment to be locked out.

In the switching and power industry, the main hazardous energy iselectrical power. However, in some circumstances, it can be safer towork on a given piece of equipment while it is powered, as the risk ofdepowering the unit could be greater due to the circumstances. As such,electrical distribution equipment can provide the ability to reducetheir incident energy environment. Today, the ability to reduce theincident energy environment of electrical distribution equipment ismandated by industry standards such as NFPA 70E. This mandate hasrequired responses from all manufactures to provide this feature. Forexample, this functionality can be provided by configuring a trip unitor protective relay to have lower trip settings while it is in theprotected mode. Some systems today include special trip unit variants,while others include special external relays and switches to provide theneeded function. These systems are normally permanently attached to aspecific piece of electrical equipment and are normally ordered andconfigured at significant cost. While it is possible to retrofit someexisting systems to include such functionality, such retrofits come witha significant cost (e.g., replacing trip units, adding additional wiringand switches, etc.).

As such, embodiments described herein provide apparatuses and techniquesfor placing a piece of equipment in a protected mode without requiringexpensive equipment replacement or retrofitting, and do so in a safemanner by enabling practices similar to “Lock Out, Tag Out” (LOTO) whichis the industry standard for entering, maintaining, and exiting an“electrically safe working condition” for typical maintenance and accessneeds and most commonly resulting in a de-energized condition. However,in the present disclosure, a lower electrical energy condition (or aprotected mode) is achieved as is needed to minimize risk and allow theelectrical system to continue operating during maintenance or service.

One embodiment described herein provides an Energy Reduction MaintenanceSetting (ERMS) key that can be used (e.g., by maintenance personnel) toplace a target device (e.g., a trip unit of a circuit breaker, switch,etc.) into or out of a low energy mode. For example, such a device maybe used as a maintenance tool and inserted into a port of the targetdevice to place the target device in a protected (i.e., lower) arcingenergy mode. In one embodiment, the ERMS key is a relatively small,portable device and is easily attached to the target device via a tripunit test port on the front of the device.

The functioning of this system could be regulated by following apractice similar to “Lock Out, Tag Out” (LOTO) which is the industrystandard for entering, maintaining, and exiting an “electrically safeworking condition” for typical maintenance and access needs, and mostcommonly resulting in a de-energized condition. However, this context, alower electrical energy condition is achieved as is needed to minimizerisk and allow the electrical system to continue to operate so while themethod for entering, maintaining and exiting the maintenance modes arethe same, the resulting electrical energy situation is different.

Once attached, the ERMS key can be instructed to place the trip unitinto the protected mode. For example, in one embodiment, a portion ofthe ERMS key can be rotated from a first position to a second position,and one or more electrical contacts within the ERMS key could beconfigured to close when the portion of the ERMS key is rotated into thesecond position. In response to the contacts closing, logic within theERMS key could transmit an instruction to the target device through thetest port, instructing the target device to activate its protected mode.Upon receiving an acknowledgement from the target device over the testport, the logic within the ERMS key could provide a visual indication tousers, indicating that the target device has successfully been placed inprotected mode. A lockout-tagout procedure could then be employed, whereusers can use padlocks or other suitable locking devices to secure theERMS key in the second position, thereby preventing the protected modefrom being deactivated until the service personnel remove the padlock.As such, the ERMS key can act as part of an electrical maintenanceoperator's toolkit and can be used to enable the protective mode formultiple different pieces of compatible electrical equipment, withoutthe need for permanent modification to the equipment and whilerespecting the established rules, practices and benefits of LOTO.

Additionally, when placing the trip unit into the protected mode, theERMS key can give a clear visual indication of the trip unit's status(e.g., by illuminating one or more light-emitting diodes (LEDs) withinthe ERMS key). In one embodiment, the ERMS key is configured to providesuch a visual indication only after receiving an acknowledgement fromthe trip unit, indicating that the trip unit has successfully beenplaced in protected mode. Doing so ensures that the visual indication isnot provided prematurely and ensures that the equipment is in a safestate for maintenance personnel when the visual indication is provided.Moreover, such a key can be integrated into a Safe Work process (e.g., aprocess that mirrors or closely follows LOTO) to insure the status ofthe target device and control the entrance into and out of the protectedstate. Advantageously, such an ERMS key does not require modification ofthe target piece of electrical equipment, is only attached temporarily(as in during the needed maintenance operation) and can be used in anycompatible trip unit.

FIG. 1 illustrates a trip unit configured for use with an ERMS key,according to one embodiment described herein. As shown, the trip unit100 includes a data port 110. In the depicted embodiment, the data port110 represents a round multi-pole data port. However, more generally,any suitable type of data port could be used, including (withoutlimitation) a Universal Serial Bus (USB) data port, data ports of othershapes (e.g., a rectangular multi-pole data port) and so on.

Generally, embodiments described herein provide an ERMS key that can beinserted into the trip unit 100 and actuated in order to place the tripunit 100 into a protected operating mode. For example, a techniciancould insert the ERMS key into the data port 110 and could turn the ERMSkey (e.g., by approximately 90 degrees) to place the ERMS key into thelow energy mode position. An example of this can be seen in FIGS. 2 and3 , where FIG. 2 illustrates an ERMS key in a first positionrepresenting normal operation of the target device, and FIG. 3illustrates the ERMS key in a second position representing the ERMS keyin the low energy mode position. As can be seen in FIGS. 2 and 3 , theERMS key contains a translucent circular portion that can be illuminatedby an illumination device (e.g., one or more light-emitting diodes)within the ERMS key. In one embodiment, the ERMS key is configured toilluminate to provide a confirmation when a target device is in aprotected mode. Thus, in FIG. 2 , the illumination device (and thus thetranslucent circular portion) is not illuminated, as the ERMS key is ina base position. However, in FIG. 3 , the ERMS key has been rotated tothe second position which is used to place the target device in theprotected mode. In the depicted embodiment, logic within the ERMS keyhas received an acknowledgement from logic within the target device,indicating that the target device has successfully transitioned to theprotected mode. In response, the logic within the ERMS key has performedan operation causing the illumination device within the ERMS key toilluminate, and thus the translucent circular portion of the ERMS keyshown in FIG. 3 is illuminated.

The ERMS key may include a locking mechanism (e.g., one or more pins ofone or more bayonet connectors) that can secure the ERMS key, once theERMS key is turned to the low energy mode position. Additionally,additional security device can be used to ensure the ERMS key remains inthe low energy mode position. For example, a number of differentsecurity mechanism (e.g., padlocks) can be used as part of alockout/tagout or similar procedure, where each worker uses a separatesecurity mechanism to secure the ERMS key in place. Doing so furtherensures the safety of the workers, as each worker will need to removehis own security mechanism before the ERMS key can be disconnected andthe low energy mode can be disengaged.

FIG. 4 is a flow diagram illustrating a method for enabling a low energymode in a target device, according to one embodiment described herein.As shown, the method 400 begins at block 410, where a maintenancetechnician identifies a target device and determines reduced energy modefor the target device is desired. The technician determines that thetarget device is compatible with an ERMS key (block 415). The technicianthen inserts the ERMS key into the target device and secures the ERMSkey (block 420).

Generally, a number of different ways can be used to secure the ERMS keyto the target device. For instance, the ERMS key could include a bayonetconnector or other suitable fastening mechanism that can be insertedinto a corresponding plug on the target device and then rotated tosecure the connection. As an example, the ERMS key could include a malebayonet connector having one or more pins, and the target device couldinclude a female bayonet connector having one or more slots. Once theERMS key is rotated to a predefined position, a spring(s) could push theone or more pins into a serif (e.g., a short recess at the end of eachof the one or more slots), thereby locking the ERMS key into place untilthe pin(s) are removed from the serif.

In the depicted example, the technician then manipulates the ERMS key toa low energy mode position (block 425). For example, the techniciancould turn the ERMS key (e.g., by approximately 90 degrees) to place theERMS key into the low energy mode position. An example of this can beseen in FIGS. 2 and 3 , where FIG. 2 illustrates an ERMS key in a firstposition representing normal operation of the target device, and FIG. 3illustrates the ERMS key in a second position representing the ERMS keyin the low energy mode position. As discussed above, the ERMS key mayinclude a locking mechanism (e.g., one or more pins of one or morebayonet connectors) that can secure the ERMS key, once the ERMS key isturned to the low energy mode position. Additionally, additionalsecurity device can be used to ensure the ERMS key remains in the lowenergy mode position. For example, a number of different securitymechanism (e.g., padlocks) can be used as part of a lockout/tagout-styleprocedure, where each worker uses a separate security mechanism tosecure the ERMS key in place. Doing so further ensures the safety of theworkers, as each worker will need to remove his own security mechanismbefore the ERMS key can be disconnected and the low energy mode can bedisengaged.

In response to the ERMS key being manipulated to the low energy modeposition, logic in the target device detects the ERMS key being in thelow energy mode position and, in response, switches the target device tobegin operating in the low energy mode (block 430). For example, logicwithin the ERMS key could transmit one or more data messages over theconnection between the ERMS key and the target device indicating thatthe ERMS key has been turned into position, and logic on the targetdevice could receive these messages and react accordingly. Moregenerally, it is contemplated that any number of different communicationschemas could be used according to various embodiments described herein,including unidirectional communications (e.g., by either the logic onthe ERMS key or the logic on the target device), bidirectionalcommunications (initiated by either the logic on the ERMS key or thelogic on the target device) and so on. Could also authenticate ERMS key.The logic further provides an indication on the target device confirmingthat the low energy mode is engaged (e.g., by activating a lightemitting device, such as one or more light emitting diodes (LEDs)) andtransmits a signal to the ERMS key which, in response, provides aseparate visual indication indicating that the low energy mode isengaged (block 435), and the method 400 ends.

FIG. 5 is a flow diagram illustrating a method for disabling a lowenergy mode in a target device, according to one embodiment describedherein. As shown, the method 500 begins at block 510, where amaintenance technician determines that reduced energy mode is no longerdesired for a target device. The technician manipulates the ERMS key toswitch to a normal energy mode position (block 515). In response, logicin the target device detects the ERMS key is in the normal energy modeposition and, in response, disengages the low energy mode of operationfor the target device (block 520). Additionally, the logic deactivatesan indication on the target device confirming that low energy mode isengaged (e.g., by deactivating a light emitting device providing theindication) and transmits a signal to the ERMS key, indicating the ERMSkey should also deactivate its visual indication that low energy mode isactive (block 525). The technician unsecures the ERMS key and removesthe ERMS key from the target device (block 530), and the method 500ends.

FIG. 6 is a block diagram illustrating a system configured with an ERMSkey, according to one embodiment described herein. As shown, the system600 includes ERMS key 250 and target device 100. In the depictedembodiment, the ERMS key 250 includes logic 610, a power source 615, anillumination device 620, an actuator mechanism 625, an actuatormonitoring circuit 630, a data connector 635 and a lock attachmentmechanism 640. Generally, the power source 615 can be any suitable powersource, including a disposable battery and a rechargeable battery.Although the ERMS key 250 in the depicted embodiment has its own powersource 615, in one embodiment the ERMS key 250 is configured to receivepower over the data connector 635 when the data connector is connectedto data port 660 of the target device 100.

The illumination device 620 generally represents one or more devicescapable of illuminating when powered by the power source 615. In aparticular embodiment, the illumination device 620 represents one ormore light-emitting diodes (LEDs). The actuator mechanism 625 isconfigured to transition between a base positional state and an actuatedpositional state. For example, a rotary actuator mechanism such as theone shown in FIGS. 2 and 3 could be used, where the actuator mechanismcan be rotated between the base positional state and the actuatedpositional state. For example, when the actuator mechanism 625 is in thebase positional state, a user could rotate the actuator mechanism 625 90degrees

In a particular embodiment, the actuator mechanism 625 comprises aspring-based mechanism that is actuated by depressing the actuatormechanism 625. In such an embodiment, each time the spring-basedmechanism is actuated by pressing the spring-based mechanism, thespring-based mechanism transitions between the base positional state andthe actuated positional state. For example, if the actuator mechanism625 is in the base positional state and a user depresses the actuatormechanism 625, the actuator mechanism 625 could transition to theactuated positional state. If the user were to then depress the actuatormechanism 625 again, the actuator mechanism 625 could transition back tothe base positional state. Of course, the present examples are providedfor illustrative purposes only, and more generally, any suitablemechanism and/or manner of actuating the suitable mechanism can be used,consistent with the functionality described herein.

The actuator monitoring circuit 630 is generally configured to monitorthe actuator mechanism 625 and more specifically to determine when theactuator mechanism 625 transitions between the base positional state andthe actuated positional state. For example, the actuator monitoringcircuit 630 could include one or more electrical contacts positionedsuch that the one or more electrical contacts close when the actuatormechanism 625 is in the actuated positional state.

The data connector 635 generally any suitable connector for insertinginto and communicatively coupling with the data port 660 of the targetdevice 100. The data connector 635 could generally be one of any numberof different types of connectors, known and unknown, including amulti-pole (e.g., 7 pole) round data connector, a Universal Serial Bus(USB) data connector, and so on. Of course, the present examples areprovided for illustrative purposes only, and more generally, anysuitable mechanism and/or manner of actuating the suitable mechanism canbe used, consistent with the functionality described herein.

The lock attachment mechanism 640 generally represents a mechanismthrough which a locking mechanism (e.g., a padlock) can be placed inorder to restrict the actuation of the actuator 625. One example of thelock attachment mechanism 640 can be seen in FIGS. 2 and 3 , where thetwo plates having respective holes align when the actuator mechanism 625is rotated into the actuated position (shown in FIG. 3 ). A lockingmechanism can then be passed through the aligned holes, affixing theactuator 625 in place. This allows the ERMS key 250 to supportLogout/Tagout practices and procedures, as required by OSHA, otherregulating bodies and general best practices.

The logic 610 generally represents computer logic (e.g., executing on aprocessor or microprocessor within the ERMS key 250, not shown) thatperforms control operations for the ERMS key 250. For example, in oneembodiment, the logic 610 can monitor the actuator monitoring circuit630 to detect when the actuator mechanism 625 moves between the basepositional state and the actuated positional state. Upon detecting theactuator mechanism has moved from the base positional state to theactuated positional state, the logic could generate and transmit a firstdata message to the target device 100 through the data connector 635instructing the target device 100 to enter a protected mode (e.g., alower arcing energy mode).

In the depicted embodiment, the target device 100 includes logic 650 anddata port 660. The logic 650 generally represents control logic for thetarget device 100. Upon receiving the first data message through thedata port 660, the logic 650 could perform an operation to place thetrip unit in the protected mode. Generally, the specifics of thisoperation can vary greatly across different target devices 100. It iscontemplated that any suitable operation for transition a target device100 from a normal operating state (or other operating state) to aprotected operating state can be used, consistent with the functionalitydescribed herein. The logic 650 could confirm that the target device 100successfully performed the operation and is now operating in theprotected mode and, in response, could generate and transmit through thedata port 660 a second data message acknowledging that the target device100 is successfully operating in the protected mode.

The logic 610 could receive the second data message over the dataconnector 635 and upon receiving the second data message acknowledgingthat the target device has successfully entered the protected mode, thelogic 610 could perform an operation to cause the illumination device620 to illuminate. Doing so provides a visual indication indicating to auser(s) that the target device 100 is operating in the protected mode.

At some later point in time, the logic 610 could determine from theactuator monitoring circuit 630 that the actuator mechanism 625 hasmoved from the actuated positional state to the base positional state.In response to this determination, the logic 610 could generate andtransmit a third data message to the target device 100 through the dataconnector 635, instructing the target device 100 to exit the protectedmode.

The logic 650 could receive the third data message over the data port660 and could perform an operation to return the target device 100 to anormal operating mode. Generally, the specifics of such an operation canvary greatly across different target devices 100. It is contemplatedthat any suitable operation for transition a target device 100 from theprotected operating state to a normal operating state (or otheroperating state) can be used, consistent with the functionalitydescribed herein. Upon confirming that the operation was successfullyperformed and the target device 100 is operating in the normal operatingmode, the logic 650 could generate and transmit over the data port 660 afourth data message acknowledging that the target device 100 hassuccessfully exited the protected mode and is now operating in thenormal operating mode.

The logic 610 could receive the fourth data message from the targetdevice 100 over the data connector 635 acknowledging that the targetdevice 100 has successfully exited the protected mode. In response, thelogic 610 could perform an operation causing the illumination device 620to deactivate.

In the preceding, reference is made to various embodiments. However, thescope of the present disclosure is not limited to the specific describedembodiments. Instead, any combination of the described features andelements, whether related to different embodiments or not, iscontemplated to implement and practice contemplated embodiments.Furthermore, although embodiments may achieve advantages over otherpossible solutions or over the prior art, whether or not a particularadvantage is achieved by a given embodiment is not limiting of the scopeof the present disclosure. Thus, the preceding aspects, features,embodiments and advantages are merely illustrative and are notconsidered elements or limitations of the appended claims except whereexplicitly recited in a claim(s).

The various embodiments disclosed herein may be implemented as a system,method or computer program product. Accordingly, aspects may take theform of an entirely hardware embodiment, an entirely software embodiment(including firmware, resident software, micro-code, etc.) or anembodiment combining software and hardware aspects that may allgenerally be referred to herein as a “circuit,” “module” or “system.”Furthermore, aspects may take the form of a computer program productembodied in one or more computer-readable medium(s) havingcomputer-readable program code embodied thereon.

Any combination of one or more computer-readable medium(s) may beutilized. The computer-readable medium may be a non-transitorycomputer-readable medium. A non-transitory computer-readable medium maybe, for example, but not limited to, an electronic, magnetic, optical,electromagnetic, infrared, or semiconductor system, apparatus, ordevice, or any suitable combination of the foregoing. More specificexamples (a non-exhaustive list) of the non-transitory computer-readablemedium can include the following: an electrical connection having one ormore wires, a portable computer diskette, a hard disk, a random accessmemory (RAM), a read-only memory (ROM), an erasable programmableread-only memory (EPROM or Flash memory), an optical fiber, a portablecompact disc read-only memory (CD-ROM), an optical storage device, amagnetic storage device, or any suitable combination of the foregoing.Program code embodied on a computer-readable medium may be transmittedusing any appropriate medium, including but not limited to wireless,wireline, optical fiber cable, RF, etc., or any suitable combination ofthe foregoing.

Computer program code for carrying out operations for aspects of thepresent disclosure may be written in any combination of one or moreprogramming languages. Moreover, such computer program code can executeusing a single computer system or by multiple computer systemscommunicating with one another (e.g., using a local area network (LAN),wide area network (WAN), the Internet, etc.). While various features inthe preceding are described with reference to flowchart illustrationsand/or block diagrams, a person of ordinary skill in the art willunderstand that each block of the flowchart illustrations and/or blockdiagrams, as well as combinations of blocks in the flowchartillustrations and/or block diagrams, can be implemented by computerlogic (e.g., computer program instructions, hardware logic, acombination of the two, etc.). Generally, computer program instructionsmay be provided to a processor(s) of a general-purpose computer,special-purpose computer, or other programmable data processingapparatus. Moreover, the execution of such computer program instructionsusing the processor(s) produces a machine that can carry out afunction(s) or act(s) specified in the flowchart and/or block diagramblock or blocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality and/or operation of possible implementationsof various embodiments of the present disclosure. In this regard, eachblock in the flowchart or block diagrams may represent a module, segmentor portion of code, which comprises one or more executable instructionsfor implementing the specified logical function(s). It should also benoted that, in some alternative implementations, the functions noted inthe block may occur out of the order noted in the figures. For example,two blocks shown in succession may, in fact, be executed substantiallyconcurrently, or the blocks may sometimes be executed in the reverseorder, depending upon the functionality involved. It will also be notedthat each block of the block diagrams and/or flowchart illustration, andcombinations of blocks in the block diagrams and/or flowchartillustration, can be implemented by special purpose hardware-basedsystems that perform the specified functions or acts, or combinations ofspecial purpose hardware and computer instructions.

It is to be understood that the above description is intended to beillustrative, and not restrictive. Many other implementation examplesare apparent upon reading and understanding the above description.Although the disclosure describes specific examples, it is recognizedthat the systems and methods of the disclosure are not limited to theexamples described herein but may be practiced with modifications withinthe scope of the appended claims. Accordingly, the specification anddrawings are to be regarded in an illustrative sense rather than arestrictive sense. The scope of the disclosure should, therefore, bedetermined with reference to the appended claims, along with the fullscope of equivalents to which such claims are entitled.

We claim:
 1. An Energy Reduction Maintenance Setting (ERMS) key,comprising: a data connector configured to communicatively couple to adata port of a target device; an illumination device for providing avisual indication to users; an actuator mechanism having a basepositional state and, when actuated, an actuated positional state;actuator monitoring logic configured to perform an operation comprising:upon detecting the actuator mechanism has moved from the base positionalstate to the actuated positional state, generating and transmitting afirst data message to the target device through the data connectorinstructing the target device to enter a protected mode; and uponreceiving a second data message from the target device over the dataconnector acknowledging that the target device has successfully enteredthe protected mode, causing the illumination device to illuminate andprovide the visual indication; and a power source for supplying power tothe illumination device and actuator monitoring logic.
 2. The ERMS keyof claim 1, further comprising: a first lock attachment mechanismcomprising a first hole through which a shackle of a lock can pass; asecond lock attachment mechanism comprising a second hole through whichthe shackle of the lock can pass, wherein the first lock attachmentmechanism is coupled to the actuator mechanism such that the first lockattachment mechanism moves as the actuator mechanism transitions fromthe base positional state to the actuated positional state, and whereinthe first hole of the first lock attachment mechanism aligns with thesecond hole of the second lock attachment mechanism when the actuatormechanism is in the actuated positional state.
 3. The ERMS key of claim1, wherein the actuator mechanism comprises a rotary device and whereinactuating the actuator mechanism comprises rotating the actuatormechanism from the base positional state to the actuated positionalstate.
 4. The ERMS key of claim 1, wherein the actuator mechanismcomprises a spring-based mechanism that, each time the spring-basedmechanism is actuated by pressing the spring-based mechanism, thespring-based mechanism transitions between the base positional state andthe actuated positional state.
 5. The ERMS key of claim 1, wherein theillumination device comprises a light-emitting diode.
 6. The ERMS key ofclaim 1, further comprising one or more electrical contacts positionedsuch that the one or more electrical contacts close when the actuatormechanism is in the actuated positional state, and wherein detecting theactuator mechanism has moved from the base positional state to theactuated positional state is performed based on a determination that theone or more electrical contacts have closed.
 7. The ERMS key of claim 1,wherein the operation further comprises: upon detecting the actuatormechanism has moved from the actuated positional state to the basepositional state, generating and transmitting a third data message tothe target device through the data connector instructing the targetdevice to exit the protected mode; and upon receiving a fourth datamessage from the target device over the data connector acknowledgingthat the target device has successfully exited the protected mode,causing the illumination device to deactivate.
 8. A method, comprising:upon detecting an actuator mechanism of an Energy Reduction MaintenanceSetting (ERMS) key has moved from a base positional state to an actuatedpositional state, generating and transmitting a first data message to atarget device, through a data connector of the ERMS key, instructing thetarget device to enter a protected mode; and upon receiving a seconddata message from the target device over the data connectoracknowledging that the target device has successfully entered theprotected mode, causing an illumination device of the ERMS key toilluminate.
 9. The method of claim 8, the ERMS key further comprising: afirst lock attachment mechanism comprising a first hole through which ashackle of a lock can pass; a second lock attachment mechanismcomprising a second hole through which the shackle of the lock can pass,wherein the first lock attachment mechanism is coupled to the actuatormechanism such that the first lock attachment mechanism moves as theactuator mechanism transitions from the base positional state to theactuated positional state, and wherein the first hole of the first lockattachment mechanism aligns with the second hole of the second lockattachment mechanism when the actuator mechanism is in the actuatedpositional state.
 10. The method of claim 8, wherein the actuatormechanism comprises a rotary device and wherein actuating the actuatormechanism comprises rotating the actuator mechanism from the basepositional state to the actuated positional state.
 11. The method ofclaim 8, wherein the actuator mechanism comprises a spring-basedmechanism that, each time the spring-based mechanism is actuated bypressing the spring-based mechanism, the spring-based mechanismtransitions between the base positional state and the actuatedpositional state.
 12. The method of claim 8, wherein the illuminationdevice comprises a light-emitting diode.
 13. The method of claim 8, theERMS key further comprising one or more electrical contacts positionedsuch that the one or more electrical contacts close when the actuatormechanism is in the actuated positional state, and wherein detecting theactuator mechanism has moved from the base positional state to theactuated positional state is performed based on a determination that theone or more electrical contacts have closed.
 14. The method of claim 8,further comprising: upon detecting the actuator mechanism has moved fromthe actuated positional state to the base positional state, generatingand transmitting a third data message to the target device through thedata connector instructing the target device to exit the protected mode;and upon receiving a fourth data message from the target device over thedata connector acknowledging that the target device has successfullyexited the protected mode, causing the illumination device todeactivate.
 15. A trip unit or protective relay, for use with anovercurrent protective device, comprising: a data port configured toaccept a data connector of an Energy Reduction Maintenance Setting(ERMS) key; and computer logic configured to perform an operation,comprising: receiving a first data message from an ERMS key currentlyconnected to the data port, the first data message instructing the tripunit to enter a protected mode; performing an operation to place thetrip unit in the protected mode; and upon confirming that the trip unitis operating in the protected mode, generating and transmitting a seconddata message acknowledging that the trip unit is successfully operatingin the protected mode.
 16. The trip unit of claim 15, the operationfurther comprising: receiving a third data message from the ERMS keycurrently connected to the data port, the third data message instructingthe trip unit to exit the protected mode; performing an operation toreturn the trip unit to a normal operating mode; and upon confirmingthat the trip unit is operating in the normal operating mode, generatingand transmitting a fourth data message acknowledging that the trip unitis successfully operating in the normal operating mode.
 17. The tripunit of claim 16, wherein the ERMS key further comprises a rotaryactuator mechanism whereby the rotary actuator mechanism can be rotatedbetween a base positional state to and an actuated positional state,wherein logic within the ERMS key is configured to generate and transmitthe first data message responsive to determining that the rotaryactuator message has been rotated from the base positional state to theactuated positional state, and wherein the logic within the ERMS key isconfigured to generate and transmit the third data message responsive todetermining that the rotary actuator message has been rotated from theactuated positional state to the base positional state.
 18. The tripunit of claim 17, wherein the ERMS key further comprises: a first lockattachment mechanism comprising a first hole through which a shackle ofa lock can pass; a second lock attachment mechanism comprising a secondhole through which the shackle of the lock can pass, wherein the firstlock attachment mechanism is coupled to the rotary actuator mechanismsuch that the first lock attachment mechanism moves as the rotaryactuator mechanism transitions from the base positional state to theactuated positional state, and wherein the first hole of the first lockattachment mechanism aligns with the second hole of the second lockattachment mechanism when the rotary actuator mechanism is in theactuated positional state.
 19. The trip unit of claim 15, wherein theERMS key further comprises an illumination device for providing a visualindication to users, and wherein logic within the ERMS key is configuredto, upon receiving the second data message from the target deviceacknowledging that the trip unit has successfully entered the protectedmode, cause the illumination device to illuminate and provide the visualindication
 20. The trip unit of claim 19, wherein the ERMS key furthercomprises one or more electrical contacts positioned such that the oneor more electrical contacts close when the rotary actuator mechanism isin the actuated positional state, and wherein logic within the ERMS keyis configured to detect that the rotary actuator mechanism has movedfrom the base positional state to the actuated positional state based ona determination that the one or more electrical contacts have closed.