Mitsubishi Electric MELSEC iQ-R Series User Manual page 368

Process cpu module
Hide thumbs Also See for MELSEC iQ-R Series:
Table of Contents

Advertisement

If a personal computer with a security key registered is abused by an outsider, there is no way to prevent the
outflow of the program property, and thus the user needs to take adequate measures as shown below:
• Preventive measures against the theft of a personal computer (for example, wire locking)
• Management of users of the personal computer (for example, deletion of unnecessary user accounts, strict
control of login information, and implementation of fingerprint authentication)
Furthermore, if a personal computer with a security key registered has failed, the locked project data cannot
be viewed and edited. We assume no responsibility whatsoever for any damage or loss to the user and any
other individual or organization, resulting from such a situation. Therefore, the user needs to take adequate
measures as shown below:
• Import the registered security key to another personal computer.
• Export the registered security key to a file and store the file in a safe place.
Security key authentication for a CPU module
This function prevents an unauthorized execution of programs written in a CPU module.
The operations are restricted by detecting a mismatch between the security key of the program file written in a CPU module
and the security key of a CPU module.
Program file
Key A
Program file
Key A
If the security key of only one program does not match the security key of the CPU module, all the other programs in the CPU
module are not executed as well.
The security key written in the CPU module is retained even after power-off of the CPU module.
For details, refer to the following.
 GX Works3 Operating Manual
24 SECURITY FUNCTION
366
Program
execution
Key A
Program
execution
No key, or key B

Advertisement

Table of Contents
loading

Table of Contents