Unlock instant, AI-driven research and patent intelligence for your innovation.

Control device monitoring system and monitoring method for control device

A technology of control device and monitoring system, applied in hardware monitoring, computer security device, instrument, etc.

Inactive Publication Date: 2014-09-17
HITACHI LTD
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Here, if the development PC is infected with a virus, the virus on the development PC may be downloaded to the PLC when the user program is downloaded.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control device monitoring system and monitoring method for control device
  • Control device monitoring system and monitoring method for control device
  • Control device monitoring system and monitoring method for control device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 Embodiment approach

[0039] (constitute)

[0040] figure 1 It is a configuration diagram of the PLC monitoring system according to the first embodiment.

[0041] The PLC monitoring system 10 as a control device monitoring system has: PLC1 (1a, 1b) as a control device, a development PC (hereinafter, simply referred to as PC2) as a management device, HUB (equipment) 3, PI / O (Process Input / Output: device) 4 and control object 5.

[0042] Regarding PLC1 and PC2, details will be described later.

[0043] In the PLC monitoring system 10, PLC1a, 1b which becomes duplex structure is connected to HUB3 via the field network (field network) 7. Here, as will be described later, HUB3 performs filtering, network relay, and the like. The filtering here refers to a function that does not allow passage of PI / O4 of a frame transmitted from PLC1 on the slave side described later, and permits passage of PI / O4 of a frame transmitted from PLC1 on the master side described below. In addition, the relay of the netwo...

no. 2 Embodiment approach

[0200] So far, in the first embodiment, it has been assumed that the slave is infected with a virus during software update, and a case where the master is infected with a virus during operation will be described below.

[0201] In the first embodiment, the case where the slave is infected with a virus is limited, but if there is a means for PC2 and PLC1 to communicate while PLC1 is running, even when the software is not being updated, there may be cases where the master / slave via PC2 Square the possibility of PLC1 infection of these two systems.

[0202] As described in the first embodiment, since both the master and the slave have a means of verifying the program operation of the other system, if there is a program different from the user program 112 of the other system, the PLC monitors System 1 is able to detect anomalies.

[0203] In the event that the master is infected with a virus, it is the slave that verifies / tests that the master is infected with a virus. However, ...

no. 3 Embodiment approach

[0229] The case where the HUB3 is connected to the dual system in which the PLC1 is two has been described so far, but it can be verified by the PLC1 also in other cases.

[0230] Figure 14 It is a figure which shows the flow of information in the PLC monitoring system which concerns on 3rd Embodiment.

[0231] about Figure 14 In the PLC monitoring system 10a, in the triple system with three PLC1 (1A, 1B, 1C), without HUB3, directly connect PI / O4 and each of PLC1 (1A, 1B, 1C) for communication. In addition, in Figure 14 in, right with figure 1 The same constituent elements are assigned the same symbols and descriptions thereof are omitted.

[0232] Similar to the first embodiment, a state in which PC2 is infected with a virus and downloaded to PLC1A will be described as an example (device infected with the virus is shown with dots).

[0233] When the control command is valid, the judgment method when PI / O4 outputs to the control object 5 mainly considers the following ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention is a PLC monitoring system (10) which monitors the operational state of a plurality of PLCs (1) which control an object to be controlled (5) in order to monitor the operational state of the PLCs (1), wherein the system is characterized in that a PLC (1b), from a PLC (1a) other than itself, acquires a control command which has been output from a user program which is being executed at the PLC (1a), and on the basis of the acquired control command, generates verification-use data. Then, the PLC (1b), using the verification-use data, verifies whether or not the transmission source PLC (1a) for the control command has been infected by a virus, or transmits the verification-use data to a PC (2) so that, by way of the PC (2) displaying the verification-use data upon a display device, the user performs verification of the infection of the PLC (1a) with the virus.

Description

technical field [0001] The present invention relates to a control device monitoring system and a control device monitoring method for monitoring the action of the control device. Background technique [0002] Malicious software such as computer viruses (hereinafter referred to as viruses) has been a threat to general personal computers (hereinafter referred to as PC (Personal Computer)). As a representative of such viruses, Trojan horses and the like are known. These viruses intrude into computers through various paths such as external media such as FD (Flexible Disk), e-mails, and Web sites on the Internet, and illegally steal information, rewrite information, and the like. As mentioned above, although the threat of such a virus has been recognized only in conventional PCs, in recent years, cases of infection have also been reported in programmable logic controllers (hereinafter referred to as PLC (programmable logic controller)). . For example, stuxnet or the like invad...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F11/00G06F11/30G06F21/55
CPCG06F21/552G06F2221/2101G06F21/56G06F2221/2105
Inventor 寺江尚清水胜人益子直也
Owner HITACHI LTD