Control device monitoring system and monitoring method for control device
A technology of control device and monitoring system, applied in hardware monitoring, computer security device, instrument, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 Embodiment approach
[0039] (constitute)
[0040] figure 1 It is a configuration diagram of the PLC monitoring system according to the first embodiment.
[0041] The PLC monitoring system 10 as a control device monitoring system has: PLC1 (1a, 1b) as a control device, a development PC (hereinafter, simply referred to as PC2) as a management device, HUB (equipment) 3, PI / O (Process Input / Output: device) 4 and control object 5.
[0042] Regarding PLC1 and PC2, details will be described later.
[0043] In the PLC monitoring system 10, PLC1a, 1b which becomes duplex structure is connected to HUB3 via the field network (field network) 7. Here, as will be described later, HUB3 performs filtering, network relay, and the like. The filtering here refers to a function that does not allow passage of PI / O4 of a frame transmitted from PLC1 on the slave side described later, and permits passage of PI / O4 of a frame transmitted from PLC1 on the master side described below. In addition, the relay of the netwo...
no. 2 Embodiment approach
[0200] So far, in the first embodiment, it has been assumed that the slave is infected with a virus during software update, and a case where the master is infected with a virus during operation will be described below.
[0201] In the first embodiment, the case where the slave is infected with a virus is limited, but if there is a means for PC2 and PLC1 to communicate while PLC1 is running, even when the software is not being updated, there may be cases where the master / slave via PC2 Square the possibility of PLC1 infection of these two systems.
[0202] As described in the first embodiment, since both the master and the slave have a means of verifying the program operation of the other system, if there is a program different from the user program 112 of the other system, the PLC monitors System 1 is able to detect anomalies.
[0203] In the event that the master is infected with a virus, it is the slave that verifies / tests that the master is infected with a virus. However, ...
no. 3 Embodiment approach
[0229] The case where the HUB3 is connected to the dual system in which the PLC1 is two has been described so far, but it can be verified by the PLC1 also in other cases.
[0230] Figure 14 It is a figure which shows the flow of information in the PLC monitoring system which concerns on 3rd Embodiment.
[0231] about Figure 14 In the PLC monitoring system 10a, in the triple system with three PLC1 (1A, 1B, 1C), without HUB3, directly connect PI / O4 and each of PLC1 (1A, 1B, 1C) for communication. In addition, in Figure 14 in, right with figure 1 The same constituent elements are assigned the same symbols and descriptions thereof are omitted.
[0232] Similar to the first embodiment, a state in which PC2 is infected with a virus and downloaded to PLC1A will be described as an example (device infected with the virus is shown with dots).
[0233] When the control command is valid, the judgment method when PI / O4 outputs to the control object 5 mainly considers the following ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 