Mitsubishi Electric MELSEC iQ-R-R00CPU User Manual page 321

Melsec iq-r series cpu module application user's manual
Table of Contents

Advertisement

If a personal computer with a security key registered is abused by an outsider, there is no way to prevent the
outflow of the program property, and thus the user needs to take adequate measures as shown below:
• Preventive measures against the theft of a personal computer (for example, wire locking)
• Management of users of the personal computer (for example, deletion of unnecessary user accounts, strict
control of login information, and implementation of fingerprint authentication)
Furthermore, if a personal computer with a security key registered has failed, the locked project data cannot
be viewed and edited. We assume no responsibility whatsoever for any damage or loss to the user and any
other individual or organization, resulting from such a situation. Therefore, the user needs to take adequate
measures as shown below:
• Import the registered security key to another personal computer.
• Export the registered security key to a file and store the file in a safe place.
The following information in the CPU module can be deleted by selecting [Online]  [User Authentication] 
[Initialization of all PLC Data].
• User management information set with user authentication function (user authentication function returns to
disabled status)
• Security key
• All program memory, data memory files
• All files in file storage areas in device/label memory
• Safety CPU safety operation mode status (returns to TEST MODE)
17 SECURITY FUNCTION
17
319

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents