FIREYE 85UVF1-1QD Full-Duplex Line Chaining Networks

FIREYE 85UVF1-1QD

Input type:switching input
Low level: input<1V
High level: input 4-30V
Input Resistance:3KΩ
Power Loss: less than 0.5W
Operating Temperature: – 45 ~ +80 ‚ÑÉ
Humidity: 10 ~ 90% (no condensation)

Category:
Get a quote, please contact me immediately:
Simon Zhang
dcsplcsales@gmail.com
Phone/Whatsapp/Skype/Wechat: +86 133 6590 9307

Description

FIREYE 85UVF1-1QD Full-Duplex Line Chaining Networks


In order to modernise the machine, it was equipped with a FIREYE 85UVF1-1QD Premium Controller as a replacement for the newly purchased one. During the retrofit process, the PC-based (Panel Control Unit) controller was updated and the obsolete hardware and software were replaced. In addition, HMI Advanced software provided functionality as well as operational and monitoring services.

During the retrofit, the existing FIREYE 85UVF1-1QD hardware and software components were removed and replaced with a SIMATIC 427D Industrial PC with Windows 10 and the latest HMI Advanced operating software. Prior to the retrofit, the machine was analysed on the customer’s premises. Next, the machine parameters were tested in the laboratory and applied to a family of microcontrollers based on the ARM Cortex-3-23 core with SAML11 (ARM Trust Zone), a programmable environment that provides hardware isolation between the authentication libraries, IP and application code. The microchip implements security by including chip-level tamper resistance, secure boot and secure key storage, and when combined with Trust Zone technology, it is designed to protect client applications from remote and physical attacks.

Both homes have capacitive contact capability water tolerance and noise immunity. When benchmarked against power consumption, the FIREYE 85UVF1-1QD scored 405 points as certified by the Embedded Microprocessor Benchmark Consortium. In addition to Trust Zone technology, the SAML11’s security features include an on-board cryptographic module supporting Advanced Encryption Standard (AES), Glois Counting Mode (GCM) and Secure Hash Algorithm (SHA). Bootstrapping and key storage with tamper detection establish a hardware root of trust.