CN112231781A - Anti-theft method for edge computing server and server - Google Patents

Anti-theft method for edge computing server and server Download PDF

Info

Publication number
CN112231781A
CN112231781A CN202011109249.8A CN202011109249A CN112231781A CN 112231781 A CN112231781 A CN 112231781A CN 202011109249 A CN202011109249 A CN 202011109249A CN 112231781 A CN112231781 A CN 112231781A
Authority
CN
China
Prior art keywords
server
responding
case
storage element
theft
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202011109249.8A
Other languages
Chinese (zh)
Inventor
杨志民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202011109249.8A priority Critical patent/CN112231781A/en
Publication of CN112231781A publication Critical patent/CN112231781A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The invention provides an anti-theft method for an edge computing server and the server, and the method comprises the following steps: arranging an anti-theft sensor at a case of the server; detecting signals of the anti-theft sensor in real time and judging whether the server case is opened or not based on the signals; responding to the opening of the server case, and judging whether the server case is authorized to be opened at this time; and responding to the unauthorized opening of the server case, marking a preset position of a storage element arranged on the server mainboard, and giving an alarm to a manager. By using the scheme of the invention, the edge computing server can be effectively prevented from being stolen under the condition of unattended operation, and the damage to the server caused by opening the server by non-working personnel can also be prevented.

Description

Anti-theft method for edge computing server and server
Technical Field
The field relates to the field of computers, and more particularly to a method and a server for preventing theft of an edge computing server.
Background
Edge Computing (Edge Computing) is relative to cloud Computing, and means that the act of collecting and analyzing data occurs in local devices and networks close to data generation, rather than having to transmit the data to a cloud with centralized Computing resources for processing. In popular terms, edge computing is decentralized or distributed cloud computing, and raw data is not returned to the cloud end, but is analyzed and processed locally.
Because the computing power needs to be transferred to local analysis and processing, the system deployment is closer to the end edge, the deployment can enable the system to be more easily contacted or close to people, the system is easily opened improperly or embezzled, and the system is delayed in service due to the fact that internal data of the system is removed or embezzled, so that the company service loss event is caused.
Currently, the common server unpacking technology only introduces local monitoring, monitors the case unpacking condition through a BIOS, and performs monitoring management. In the prior art, only storage information is stored according to the cover opening condition, and no alarm or remote notification is provided, so that the technology is not suitable for being deployed on an edge calculation scene close to a crowd end, has no obvious protection effect, and is easy to cause misjudgment actions in operation and maintenance or remote management.
Disclosure of Invention
In view of this, an object of the embodiments of the present invention is to provide a method for preventing theft of an edge computing server and a server, which can effectively prevent the edge computing server from being stolen under unattended condition and prevent a non-worker from opening the server to damage the server.
In view of the above object, an aspect of the embodiments of the present invention provides a method for preventing theft of an edge computing server, including the steps of:
arranging an anti-theft sensor at a case of the server;
detecting signals of the anti-theft sensor in real time and judging whether the server case is opened or not based on the signals;
responding to the opening of the server case, and judging whether the server case is authorized to be opened at this time;
and responding to the unauthorized opening of the server case, marking a preset position of a storage element arranged on the server mainboard, and giving an alarm to a manager.
According to an embodiment of the present invention, further comprising:
responding to the power supply of the server mainboard, and judging whether the preset bit of the storage element has a mark or not;
and responding to the mark of the preset bit of the storage element, and sending the network information where the server mainboard is located to a manager.
According to an embodiment of the present invention, further comprising:
the preset bit of the storage element is reset in response to receiving an authorization of a manager.
According to one embodiment of the invention, the network information includes an IP address of the server.
According to an embodiment of the present invention, further comprising:
responding to the power supply of the server mainboard, and judging whether the preset bit of the storage element has a mark or not;
responding to the mark of the preset bit of the storage element, and acquiring network information of the server and position information detected by a positioning device arranged on the mainboard;
and sending the network information and the position information to a preset path.
According to one embodiment of the invention, the step of arranging the anti-theft sensor at the chassis of the server comprises the following steps:
an anti-theft sensor is disposed between the chassis and the chassis cover of the server and is configured to generate an anti-theft signal based on detecting that the chassis cover is away from the chassis.
According to an embodiment of the present invention, in response to that the opening of the server chassis is not authorized this time, marking a preset bit of a storage element set on the server motherboard and issuing an alarm to a manager includes:
responding to the situation that the server case is not authorized to be opened at this time, and changing bit at a specific position in the storage element independently arranged on the mainboard from 0 to 1;
and sending alarm information to a preset path through a network of the server.
According to an embodiment of the present invention, further comprising:
and responding to the situation that the server case is not authorized to be opened at this time, and sending an alarm sound through the sound control device of the server.
According to one embodiment of the invention, the storage element comprises a read-only memory.
In another aspect of the embodiment of the invention, a server is also provided, and the server uses the method for preventing burglary.
The invention has the following beneficial technical effects: according to the anti-theft method for the edge computing server, provided by the embodiment of the invention, the anti-theft sensor is arranged at the chassis of the server; detecting signals of the anti-theft sensor in real time and judging whether the server case is opened or not based on the signals; responding to the opening of the server case, and judging whether the server case is authorized to be opened at this time; in response to the fact that the server case is not authorized to be opened at this time, the preset position of the storage element arranged on the server mainboard is marked, and an alarm is sent to a manager, so that the edge computing server can be effectively prevented from being stolen under the condition of unattended operation, and the damage to the server caused by the fact that a non-worker opens the server can also be prevented.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained by using the drawings without creative efforts.
FIG. 1 is a schematic flow chart diagram of a method of theft prevention for an edge computing server, according to one embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
In view of the above objects, a first aspect of embodiments of the present invention proposes an embodiment of a method for preventing theft of an edge computing server. Fig. 1 shows a schematic flow diagram of the method.
As shown in fig. 1, the method may include the steps of:
s1, arranging an anti-theft sensor at the chassis of the server, arranging an anti-theft sensor between the main body of the chassis of the server and the chassis cover, and generating corresponding signals by the anti-theft sensor as long as the chassis cover is taken down from the main body of the chassis;
s2, detecting signals of the anti-theft sensor in real time and judging whether the server chassis is opened or not based on the signals, wherein the signals of the anti-theft sensor can indicate that the chassis cover is not taken down and can also indicate that the chassis cover is taken down, and the current state of the chassis can be judged according to the signals of the anti-theft sensor;
s3, responding to the server case being opened, judging whether the server case being opened is authorized, adding an authority system, if the server case cover needs to be taken down by the staff to maintain the server, authorizing in the server before the server case cover is taken down to authenticate the identity, and if the authorization is passed, no relevant alarm is generated when the server case cover is taken down;
s4, responding to the unauthorized opening of the server case, marking the preset position of the storage element arranged on the server mainboard and giving an alarm to a manager, if the unauthorized opening of the server case is not authorized, the non-working personnel may destroy or steal the server case, at this time, the corresponding position of the storage element arranged on the server mainboard independently needs to be marked, which indicates that the case cover is removed under abnormal conditions, and the mark cannot be removed due to power failure, the mark is removed, the authorization is also needed when the mark is removed, and a corresponding alarm can be given to a remote monitoring personnel through the network of the server.
By the technical scheme, the edge computing server can be effectively prevented from being stolen under the condition of unattended operation, and the damage to the server caused by opening the server by non-working personnel can also be prevented.
In a preferred embodiment of the present invention, the method further comprises:
responding to the power supply of the server mainboard, and judging whether the preset bit of the storage element has a mark or not;
and responding to the mark of the preset bit of the storage element, and sending the network information where the server mainboard is located to a manager. If the server is powered off or moved, when the server mainboard is powered on again, the information of the storage element is read inside the server, whether a mark exists or not is judged to judge whether the server is abnormally uncovered last time, if the mark exists, the server is possible to be stolen, and in this case, the information of the current server is sent to a preset position through a network of the server.
In a preferred embodiment of the present invention, the method further comprises:
the preset bit of the storage element is reset in response to receiving an authorization of a manager. The manager can reset the flag to restore theft protection.
In a preferred embodiment of the invention, the network information comprises the IP address of the server.
In a preferred embodiment of the present invention, the method further comprises:
responding to the power supply of the server mainboard, and judging whether the preset bit of the storage element has a mark or not;
responding to the mark of the preset bit of the storage element, and acquiring network information of the server and position information detected by a positioning device arranged on the mainboard;
and sending the network information and the position information to a preset path. In this embodiment, a positioning device may be further disposed on the motherboard, where the positioning device may be a GPS, and when the detection of the relevant signal indicates that the server is stolen, the server may obtain a current position of the GPS and send the current position to the preset path.
In a preferred embodiment of the present invention, providing the theft prevention sensor at the chassis of the server includes:
an anti-theft sensor is disposed between the chassis and the chassis cover of the server and is configured to generate an anti-theft signal based on detecting that the chassis cover is away from the chassis.
In a preferred embodiment of the present invention, in response to that the opening of the server chassis is not authorized this time, marking a preset bit of a storage element set on the server motherboard and issuing an alarm to a manager includes:
responding to the situation that the server case is not authorized to be opened at this time, and changing bit at a specific position in the storage element independently arranged on the mainboard from 0 to 1;
and sending alarm information to a preset path through a network of the server. The memory element is a memory that can be restored without loss of data due to power failure, such as a Read Only Memory (ROM).
In a preferred embodiment of the present invention, the method further comprises:
and responding to the situation that the server case is not authorized to be opened at this time, and sending an alarm sound through the sound control device of the server. When the case is opened under abnormal conditions, on one hand, the case sends an alarm to a manager through a network, on the other hand, a voice control alarm can be set on the server, and a certain warning effect can be achieved if the case is illegally damaged or stolen.
In a preferred embodiment of the invention, the memory element comprises a read-only memory.
The method of the invention generally needs to be provided with three parts, the first part is a software part, the case cover opening of the remote monitoring case needs to be realized, the method can be adapted to various platform systems through the software package design, the remote monitoring and alarming functions can be carried out through the cover opening event, and the method can be operated on the background program of the system, does not influence the normal use of the system and can not be found. The second part is a firmware part, the cover opening event monitoring, the event positioning and storing back and the event delivery are started, and the firmware judges and integrates the information collected by the lower layer hardware so that the upper layer software can perform countermeasure solution aiming at the event. The third part is a hardware part, and a concealed positioning device is arranged on the mainboard of the anti-theft sensor which is reasonably designed between the case and the case cover.
In view of the above object, a second aspect of the embodiments of the present invention provides a server, which uses the above method for preventing theft.
The technical scheme of the invention makes stronger protection supplement on the edge computing platform, and the main reason is that the protection function of the chassis on the current server is not perfect, the server is generally applied to a data center, when the edge computing server is developed in the future, the computing power is transferred to the side end, when the system is deployed at the edge end, the system is easy to invade by people, under the condition, the invention can provide more protection encryption and chassis monitoring on background management, and can further perfect the integral security architecture technology of the edge computing server.
By the technical scheme, the edge computing server can be effectively prevented from being stolen under the condition of unattended operation, and the damage to the server caused by opening the server by non-working personnel can also be prevented.
It should be noted that, as will be understood by those skilled in the art, all or part of the processes in the methods of the above embodiments may be implemented by instructing relevant hardware through a computer program, and the above programs may be stored in a computer-readable storage medium, and when executed, the programs may include the processes of the embodiments of the methods as described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like. The embodiments of the computer program may achieve the same or similar effects as any of the above-described method embodiments.
Furthermore, the method disclosed according to an embodiment of the present invention may also be implemented as a computer program executed by a CPU, and the computer program may be stored in a computer-readable storage medium. The computer program, when executed by the CPU, performs the above-described functions defined in the method disclosed in the embodiments of the present invention.
The embodiments described above, particularly any "preferred" embodiments, are possible examples of implementations and are presented merely to clearly understand the principles of the invention. Many variations and modifications may be made to the above-described embodiments without departing from the spirit and principles of the technology described herein. All such modifications are intended to be included within the scope of this disclosure and protected by the following claims.

Claims (10)

1. An edge computing server anti-theft method is characterized by comprising the following steps:
arranging an anti-theft sensor at a case of the server;
detecting signals of the anti-theft sensor in real time and judging whether the server case is opened or not based on the signals;
responding to the opening of the server case, and judging whether the server case is authorized to be opened at this time;
and responding to the situation that the server case is not authorized to be opened at this time, marking preset bits of the storage elements arranged on the server mainboard and giving an alarm to a manager.
2. The method of claim 1, further comprising:
responding to the power supply of the server mainboard, and judging whether a mark exists in a preset bit of the storage element;
and responding to the mark of the preset bit of the storage element, and sending the network information where the server mainboard is located to a manager.
3. The method of claim 2, further comprising:
resetting a preset bit of the storage element in response to receiving an authorization of a manager.
4. The method of claim 2, wherein the network information comprises an IP address of the server.
5. The method of claim 1, further comprising:
responding to the power supply of the server mainboard, and judging whether a mark exists in a preset bit of the storage element;
responding to the mark of the preset bit of the storage element, and acquiring network information of the server and position information detected by a positioning device arranged on the mainboard;
and sending the network information and the position information to a preset path.
6. The method of claim 1, wherein providing an anti-theft sensor at a chassis of a server comprises:
an anti-theft sensor is disposed between a chassis and a chassis cover of the server and is configured to generate an anti-theft signal based on detecting that the chassis cover is away from the chassis.
7. The method of claim 1, wherein in response to the current unauthorized opening of the server chassis, marking the preset bits of the storage elements provided on the server motherboard and alerting a manager comprises:
responding to the situation that the server case is not authorized to be opened at this time, and changing bit at a specific position in the storage element independently arranged on the mainboard from 0 to 1;
and sending alarm information to a preset path through the network of the server.
8. The method of claim 1, further comprising:
and responding to the situation that the server case is not authorized to be opened at this time, and sending an alarm sound through the voice control device of the server.
9. The method of claim 1, wherein the storage element comprises a read-only memory.
10. A server that is protected against theft using the method of claims 1-9.
CN202011109249.8A 2020-10-16 2020-10-16 Anti-theft method for edge computing server and server Withdrawn CN112231781A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011109249.8A CN112231781A (en) 2020-10-16 2020-10-16 Anti-theft method for edge computing server and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011109249.8A CN112231781A (en) 2020-10-16 2020-10-16 Anti-theft method for edge computing server and server

Publications (1)

Publication Number Publication Date
CN112231781A true CN112231781A (en) 2021-01-15

Family

ID=74118411

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011109249.8A Withdrawn CN112231781A (en) 2020-10-16 2020-10-16 Anti-theft method for edge computing server and server

Country Status (1)

Country Link
CN (1) CN112231781A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113127297A (en) * 2021-03-30 2021-07-16 山东英信计算机技术有限公司 Server cover opening detection method and server
CN113434915A (en) * 2021-06-25 2021-09-24 深圳市商汤科技有限公司 Case intrusion state detection device and method and edge server
CN113895396A (en) * 2021-10-22 2022-01-07 广西中科曙光云计算有限公司 Vehicle anti-theft system and method based on cloud side end
CN114338166A (en) * 2021-12-29 2022-04-12 支付宝(杭州)信息技术有限公司 Edge device risk processing method, device, equipment and cloud server

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113127297A (en) * 2021-03-30 2021-07-16 山东英信计算机技术有限公司 Server cover opening detection method and server
CN113434915A (en) * 2021-06-25 2021-09-24 深圳市商汤科技有限公司 Case intrusion state detection device and method and edge server
CN113895396A (en) * 2021-10-22 2022-01-07 广西中科曙光云计算有限公司 Vehicle anti-theft system and method based on cloud side end
CN114338166A (en) * 2021-12-29 2022-04-12 支付宝(杭州)信息技术有限公司 Edge device risk processing method, device, equipment and cloud server

Similar Documents

Publication Publication Date Title
CN112231781A (en) Anti-theft method for edge computing server and server
CN108632276B (en) Computer network information safety system
US6310550B1 (en) Security system
US9465755B2 (en) Security parameter zeroization
US8006101B2 (en) Radio transceiver or other encryption device having secure tamper-detection module
US7986225B1 (en) Pluggable security device
US5748084A (en) Device security system
US10360161B2 (en) Cable lock with confidential data protection
US20020188866A1 (en) Method and apparatus for protecting a device connected to a newtwork
JP2001028080A (en) System and method for prevention against cash cassette theft
CN103370717A (en) Always-available embedded theft reaction subsystem
US20220327249A1 (en) Systems and methods for chassis intrusion detection
US11488453B1 (en) Intrusion detection systems and methods
US8732860B2 (en) System and method for securing data to be protected of a piece of equipment
CN110956722A (en) Method, equipment and storage medium for alarming abnormity of intelligent lock
CN113852633A (en) Method for generating implementation case for information security assessment
US20170272457A1 (en) Importance-level calculation device, output device, and recording medium in which computer program is stored
CN101848117A (en) Illegal external connection monitoring method and system thereof
US10721253B2 (en) Power circuitry for security circuitry
US11895155B2 (en) Resilient self-detection of malicious exfiltration of sensitive data
CN110784448A (en) Equipment safety protection method, device, system and computer readable storage medium
CN109325346A (en) A kind of intrusion detection method based on linux system
CN116110153A (en) Intelligent lock anti-theft and early warning method, intelligent lock, electronic equipment and medium
CN109145587A (en) A kind of data Anti-theft method, apparatus, terminal and readable medium
CN112154437A (en) Method and intrusion manager for handling intrusions of electronic devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20210115

WW01 Invention patent application withdrawn after publication