SECURITY METHOD FOR ENGINEERING TOOLS AND INDUSTRIAL PRODUCTS, AND SECURITY SYSTEM
First Claim
1. A security method for engineering tools and industrial products, the security method comprising:
- a read-restriction setting step of setting read restriction on a program stored in hardware of an industrial product in response to a read restriction request to the industrial product from an engineering tool that is a read-restriction request source; and
a read requesting step of transmitting a read request for the program from an engineering tool that is a read request source to the industrial product, whereinin the read-restriction setting step, as registration individual information, unique individual information retained in the hardware of the industrial product is registered in hardware for executing the engineering tool that is a read-restriction request source, or unique individual information retained in hardware for executing the engineering tool that is the read-restriction request source is registered in the industrial product, andin the read requesting step, unique individual information retained in hardware for executing the engineering tool that is the read request source or unique individual information retained in the hardware of the industrial product is compared with the registration individual information.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention includes a read-restriction setting step of setting read restriction on a program stored in hardware of an industrial product in response to a read restriction request, and a read requesting step of transmitting a read request for the program to the industrial product from an engineering tool that is a read request source. In the read-restriction setting step unique individual information retained in the hardware of the industrial product or unique individual information retained in hardware for executing an engineering tool that is a read-restriction request source is registered as registration individual information, and in the read requesting step, unique individual information retained in hardware for executing the engineering tool that is the read request source or unique individual information retained in the hardware of the industrial product is compared with the registration individual information.
35 Citations
13 Claims
-
1. A security method for engineering tools and industrial products, the security method comprising:
-
a read-restriction setting step of setting read restriction on a program stored in hardware of an industrial product in response to a read restriction request to the industrial product from an engineering tool that is a read-restriction request source; and a read requesting step of transmitting a read request for the program from an engineering tool that is a read request source to the industrial product, wherein in the read-restriction setting step, as registration individual information, unique individual information retained in the hardware of the industrial product is registered in hardware for executing the engineering tool that is a read-restriction request source, or unique individual information retained in hardware for executing the engineering tool that is the read-restriction request source is registered in the industrial product, and in the read requesting step, unique individual information retained in hardware for executing the engineering tool that is the read request source or unique individual information retained in the hardware of the industrial product is compared with the registration individual information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A security system comprising an industrial product that includes hardware having a program stored therein and is capable of setting read restriction on the program in response to a read restriction request from an engineering tool that is a read-restriction request source,
the security system being configured to: -
register, as registration individual information, therein unique individual information retained in the hardware of the industrial product in hardware for executing the engineering tool that is a read-restriction request source, or unique individual information retained in hardware for executing the engineering tool that is the read-restriction request source in the industrial product; and compare, in response to a read request for the program from an engineering tool that is a read request source to the industrial product, unique individual information retained in hardware for executing the engineering tool that is the read request source or unique individual information retained in the hardware of the industrial product with the registration individual information.
-
Specification