CN112231781A - Anti-theft method for edge computing server and server - Google Patents
Anti-theft method for edge computing server and server Download PDFInfo
- Publication number
- CN112231781A CN112231781A CN202011109249.8A CN202011109249A CN112231781A CN 112231781 A CN112231781 A CN 112231781A CN 202011109249 A CN202011109249 A CN 202011109249A CN 112231781 A CN112231781 A CN 112231781A
- Authority
- CN
- China
- Prior art keywords
- server
- responding
- case
- storage element
- theft
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 230000004044 response Effects 0.000 claims description 7
- 238000013475 authorization Methods 0.000 claims description 5
- 238000012544 monitoring process Methods 0.000 description 7
- 238000004590 computer program Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 230000002159 abnormal effect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Burglar Alarm Systems (AREA)
Abstract
The invention provides an anti-theft method for an edge computing server and the server, and the method comprises the following steps: arranging an anti-theft sensor at a case of the server; detecting signals of the anti-theft sensor in real time and judging whether the server case is opened or not based on the signals; responding to the opening of the server case, and judging whether the server case is authorized to be opened at this time; and responding to the unauthorized opening of the server case, marking a preset position of a storage element arranged on the server mainboard, and giving an alarm to a manager. By using the scheme of the invention, the edge computing server can be effectively prevented from being stolen under the condition of unattended operation, and the damage to the server caused by opening the server by non-working personnel can also be prevented.
Description
Technical Field
The field relates to the field of computers, and more particularly to a method and a server for preventing theft of an edge computing server.
Background
Edge Computing (Edge Computing) is relative to cloud Computing, and means that the act of collecting and analyzing data occurs in local devices and networks close to data generation, rather than having to transmit the data to a cloud with centralized Computing resources for processing. In popular terms, edge computing is decentralized or distributed cloud computing, and raw data is not returned to the cloud end, but is analyzed and processed locally.
Because the computing power needs to be transferred to local analysis and processing, the system deployment is closer to the end edge, the deployment can enable the system to be more easily contacted or close to people, the system is easily opened improperly or embezzled, and the system is delayed in service due to the fact that internal data of the system is removed or embezzled, so that the company service loss event is caused.
Currently, the common server unpacking technology only introduces local monitoring, monitors the case unpacking condition through a BIOS, and performs monitoring management. In the prior art, only storage information is stored according to the cover opening condition, and no alarm or remote notification is provided, so that the technology is not suitable for being deployed on an edge calculation scene close to a crowd end, has no obvious protection effect, and is easy to cause misjudgment actions in operation and maintenance or remote management.
Disclosure of Invention
In view of this, an object of the embodiments of the present invention is to provide a method for preventing theft of an edge computing server and a server, which can effectively prevent the edge computing server from being stolen under unattended condition and prevent a non-worker from opening the server to damage the server.
In view of the above object, an aspect of the embodiments of the present invention provides a method for preventing theft of an edge computing server, including the steps of:
arranging an anti-theft sensor at a case of the server;
detecting signals of the anti-theft sensor in real time and judging whether the server case is opened or not based on the signals;
responding to the opening of the server case, and judging whether the server case is authorized to be opened at this time;
and responding to the unauthorized opening of the server case, marking a preset position of a storage element arranged on the server mainboard, and giving an alarm to a manager.
According to an embodiment of the present invention, further comprising:
responding to the power supply of the server mainboard, and judging whether the preset bit of the storage element has a mark or not;
and responding to the mark of the preset bit of the storage element, and sending the network information where the server mainboard is located to a manager.
According to an embodiment of the present invention, further comprising:
the preset bit of the storage element is reset in response to receiving an authorization of a manager.
According to one embodiment of the invention, the network information includes an IP address of the server.
According to an embodiment of the present invention, further comprising:
responding to the power supply of the server mainboard, and judging whether the preset bit of the storage element has a mark or not;
responding to the mark of the preset bit of the storage element, and acquiring network information of the server and position information detected by a positioning device arranged on the mainboard;
and sending the network information and the position information to a preset path.
According to one embodiment of the invention, the step of arranging the anti-theft sensor at the chassis of the server comprises the following steps:
an anti-theft sensor is disposed between the chassis and the chassis cover of the server and is configured to generate an anti-theft signal based on detecting that the chassis cover is away from the chassis.
According to an embodiment of the present invention, in response to that the opening of the server chassis is not authorized this time, marking a preset bit of a storage element set on the server motherboard and issuing an alarm to a manager includes:
responding to the situation that the server case is not authorized to be opened at this time, and changing bit at a specific position in the storage element independently arranged on the mainboard from 0 to 1;
and sending alarm information to a preset path through a network of the server.
According to an embodiment of the present invention, further comprising:
and responding to the situation that the server case is not authorized to be opened at this time, and sending an alarm sound through the sound control device of the server.
According to one embodiment of the invention, the storage element comprises a read-only memory.
In another aspect of the embodiment of the invention, a server is also provided, and the server uses the method for preventing burglary.
The invention has the following beneficial technical effects: according to the anti-theft method for the edge computing server, provided by the embodiment of the invention, the anti-theft sensor is arranged at the chassis of the server; detecting signals of the anti-theft sensor in real time and judging whether the server case is opened or not based on the signals; responding to the opening of the server case, and judging whether the server case is authorized to be opened at this time; in response to the fact that the server case is not authorized to be opened at this time, the preset position of the storage element arranged on the server mainboard is marked, and an alarm is sent to a manager, so that the edge computing server can be effectively prevented from being stolen under the condition of unattended operation, and the damage to the server caused by the fact that a non-worker opens the server can also be prevented.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained by using the drawings without creative efforts.
FIG. 1 is a schematic flow chart diagram of a method of theft prevention for an edge computing server, according to one embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
In view of the above objects, a first aspect of embodiments of the present invention proposes an embodiment of a method for preventing theft of an edge computing server. Fig. 1 shows a schematic flow diagram of the method.
As shown in fig. 1, the method may include the steps of:
s1, arranging an anti-theft sensor at the chassis of the server, arranging an anti-theft sensor between the main body of the chassis of the server and the chassis cover, and generating corresponding signals by the anti-theft sensor as long as the chassis cover is taken down from the main body of the chassis;
s2, detecting signals of the anti-theft sensor in real time and judging whether the server chassis is opened or not based on the signals, wherein the signals of the anti-theft sensor can indicate that the chassis cover is not taken down and can also indicate that the chassis cover is taken down, and the current state of the chassis can be judged according to the signals of the anti-theft sensor;
s3, responding to the server case being opened, judging whether the server case being opened is authorized, adding an authority system, if the server case cover needs to be taken down by the staff to maintain the server, authorizing in the server before the server case cover is taken down to authenticate the identity, and if the authorization is passed, no relevant alarm is generated when the server case cover is taken down;
s4, responding to the unauthorized opening of the server case, marking the preset position of the storage element arranged on the server mainboard and giving an alarm to a manager, if the unauthorized opening of the server case is not authorized, the non-working personnel may destroy or steal the server case, at this time, the corresponding position of the storage element arranged on the server mainboard independently needs to be marked, which indicates that the case cover is removed under abnormal conditions, and the mark cannot be removed due to power failure, the mark is removed, the authorization is also needed when the mark is removed, and a corresponding alarm can be given to a remote monitoring personnel through the network of the server.
By the technical scheme, the edge computing server can be effectively prevented from being stolen under the condition of unattended operation, and the damage to the server caused by opening the server by non-working personnel can also be prevented.
In a preferred embodiment of the present invention, the method further comprises:
responding to the power supply of the server mainboard, and judging whether the preset bit of the storage element has a mark or not;
and responding to the mark of the preset bit of the storage element, and sending the network information where the server mainboard is located to a manager. If the server is powered off or moved, when the server mainboard is powered on again, the information of the storage element is read inside the server, whether a mark exists or not is judged to judge whether the server is abnormally uncovered last time, if the mark exists, the server is possible to be stolen, and in this case, the information of the current server is sent to a preset position through a network of the server.
In a preferred embodiment of the present invention, the method further comprises:
the preset bit of the storage element is reset in response to receiving an authorization of a manager. The manager can reset the flag to restore theft protection.
In a preferred embodiment of the invention, the network information comprises the IP address of the server.
In a preferred embodiment of the present invention, the method further comprises:
responding to the power supply of the server mainboard, and judging whether the preset bit of the storage element has a mark or not;
responding to the mark of the preset bit of the storage element, and acquiring network information of the server and position information detected by a positioning device arranged on the mainboard;
and sending the network information and the position information to a preset path. In this embodiment, a positioning device may be further disposed on the motherboard, where the positioning device may be a GPS, and when the detection of the relevant signal indicates that the server is stolen, the server may obtain a current position of the GPS and send the current position to the preset path.
In a preferred embodiment of the present invention, providing the theft prevention sensor at the chassis of the server includes:
an anti-theft sensor is disposed between the chassis and the chassis cover of the server and is configured to generate an anti-theft signal based on detecting that the chassis cover is away from the chassis.
In a preferred embodiment of the present invention, in response to that the opening of the server chassis is not authorized this time, marking a preset bit of a storage element set on the server motherboard and issuing an alarm to a manager includes:
responding to the situation that the server case is not authorized to be opened at this time, and changing bit at a specific position in the storage element independently arranged on the mainboard from 0 to 1;
and sending alarm information to a preset path through a network of the server. The memory element is a memory that can be restored without loss of data due to power failure, such as a Read Only Memory (ROM).
In a preferred embodiment of the present invention, the method further comprises:
and responding to the situation that the server case is not authorized to be opened at this time, and sending an alarm sound through the sound control device of the server. When the case is opened under abnormal conditions, on one hand, the case sends an alarm to a manager through a network, on the other hand, a voice control alarm can be set on the server, and a certain warning effect can be achieved if the case is illegally damaged or stolen.
In a preferred embodiment of the invention, the memory element comprises a read-only memory.
The method of the invention generally needs to be provided with three parts, the first part is a software part, the case cover opening of the remote monitoring case needs to be realized, the method can be adapted to various platform systems through the software package design, the remote monitoring and alarming functions can be carried out through the cover opening event, and the method can be operated on the background program of the system, does not influence the normal use of the system and can not be found. The second part is a firmware part, the cover opening event monitoring, the event positioning and storing back and the event delivery are started, and the firmware judges and integrates the information collected by the lower layer hardware so that the upper layer software can perform countermeasure solution aiming at the event. The third part is a hardware part, and a concealed positioning device is arranged on the mainboard of the anti-theft sensor which is reasonably designed between the case and the case cover.
In view of the above object, a second aspect of the embodiments of the present invention provides a server, which uses the above method for preventing theft.
The technical scheme of the invention makes stronger protection supplement on the edge computing platform, and the main reason is that the protection function of the chassis on the current server is not perfect, the server is generally applied to a data center, when the edge computing server is developed in the future, the computing power is transferred to the side end, when the system is deployed at the edge end, the system is easy to invade by people, under the condition, the invention can provide more protection encryption and chassis monitoring on background management, and can further perfect the integral security architecture technology of the edge computing server.
By the technical scheme, the edge computing server can be effectively prevented from being stolen under the condition of unattended operation, and the damage to the server caused by opening the server by non-working personnel can also be prevented.
It should be noted that, as will be understood by those skilled in the art, all or part of the processes in the methods of the above embodiments may be implemented by instructing relevant hardware through a computer program, and the above programs may be stored in a computer-readable storage medium, and when executed, the programs may include the processes of the embodiments of the methods as described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like. The embodiments of the computer program may achieve the same or similar effects as any of the above-described method embodiments.
Furthermore, the method disclosed according to an embodiment of the present invention may also be implemented as a computer program executed by a CPU, and the computer program may be stored in a computer-readable storage medium. The computer program, when executed by the CPU, performs the above-described functions defined in the method disclosed in the embodiments of the present invention.
The embodiments described above, particularly any "preferred" embodiments, are possible examples of implementations and are presented merely to clearly understand the principles of the invention. Many variations and modifications may be made to the above-described embodiments without departing from the spirit and principles of the technology described herein. All such modifications are intended to be included within the scope of this disclosure and protected by the following claims.
Claims (10)
1. An edge computing server anti-theft method is characterized by comprising the following steps:
arranging an anti-theft sensor at a case of the server;
detecting signals of the anti-theft sensor in real time and judging whether the server case is opened or not based on the signals;
responding to the opening of the server case, and judging whether the server case is authorized to be opened at this time;
and responding to the situation that the server case is not authorized to be opened at this time, marking preset bits of the storage elements arranged on the server mainboard and giving an alarm to a manager.
2. The method of claim 1, further comprising:
responding to the power supply of the server mainboard, and judging whether a mark exists in a preset bit of the storage element;
and responding to the mark of the preset bit of the storage element, and sending the network information where the server mainboard is located to a manager.
3. The method of claim 2, further comprising:
resetting a preset bit of the storage element in response to receiving an authorization of a manager.
4. The method of claim 2, wherein the network information comprises an IP address of the server.
5. The method of claim 1, further comprising:
responding to the power supply of the server mainboard, and judging whether a mark exists in a preset bit of the storage element;
responding to the mark of the preset bit of the storage element, and acquiring network information of the server and position information detected by a positioning device arranged on the mainboard;
and sending the network information and the position information to a preset path.
6. The method of claim 1, wherein providing an anti-theft sensor at a chassis of a server comprises:
an anti-theft sensor is disposed between a chassis and a chassis cover of the server and is configured to generate an anti-theft signal based on detecting that the chassis cover is away from the chassis.
7. The method of claim 1, wherein in response to the current unauthorized opening of the server chassis, marking the preset bits of the storage elements provided on the server motherboard and alerting a manager comprises:
responding to the situation that the server case is not authorized to be opened at this time, and changing bit at a specific position in the storage element independently arranged on the mainboard from 0 to 1;
and sending alarm information to a preset path through the network of the server.
8. The method of claim 1, further comprising:
and responding to the situation that the server case is not authorized to be opened at this time, and sending an alarm sound through the voice control device of the server.
9. The method of claim 1, wherein the storage element comprises a read-only memory.
10. A server that is protected against theft using the method of claims 1-9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011109249.8A CN112231781A (en) | 2020-10-16 | 2020-10-16 | Anti-theft method for edge computing server and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011109249.8A CN112231781A (en) | 2020-10-16 | 2020-10-16 | Anti-theft method for edge computing server and server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112231781A true CN112231781A (en) | 2021-01-15 |
Family
ID=74118411
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011109249.8A Withdrawn CN112231781A (en) | 2020-10-16 | 2020-10-16 | Anti-theft method for edge computing server and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112231781A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113127297A (en) * | 2021-03-30 | 2021-07-16 | 山东英信计算机技术有限公司 | Server cover opening detection method and server |
CN113434915A (en) * | 2021-06-25 | 2021-09-24 | 深圳市商汤科技有限公司 | Case intrusion state detection device and method and edge server |
CN113895396A (en) * | 2021-10-22 | 2022-01-07 | 广西中科曙光云计算有限公司 | Vehicle anti-theft system and method based on cloud side end |
CN114338166A (en) * | 2021-12-29 | 2022-04-12 | 支付宝(杭州)信息技术有限公司 | Edge device risk processing method, device, equipment and cloud server |
-
2020
- 2020-10-16 CN CN202011109249.8A patent/CN112231781A/en not_active Withdrawn
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113127297A (en) * | 2021-03-30 | 2021-07-16 | 山东英信计算机技术有限公司 | Server cover opening detection method and server |
CN113434915A (en) * | 2021-06-25 | 2021-09-24 | 深圳市商汤科技有限公司 | Case intrusion state detection device and method and edge server |
CN113895396A (en) * | 2021-10-22 | 2022-01-07 | 广西中科曙光云计算有限公司 | Vehicle anti-theft system and method based on cloud side end |
CN114338166A (en) * | 2021-12-29 | 2022-04-12 | 支付宝(杭州)信息技术有限公司 | Edge device risk processing method, device, equipment and cloud server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112231781A (en) | Anti-theft method for edge computing server and server | |
CN108632276B (en) | Computer network information safety system | |
US6310550B1 (en) | Security system | |
US9465755B2 (en) | Security parameter zeroization | |
US8006101B2 (en) | Radio transceiver or other encryption device having secure tamper-detection module | |
US7986225B1 (en) | Pluggable security device | |
US5748084A (en) | Device security system | |
US10360161B2 (en) | Cable lock with confidential data protection | |
US20020188866A1 (en) | Method and apparatus for protecting a device connected to a newtwork | |
JP2001028080A (en) | System and method for prevention against cash cassette theft | |
CN103370717A (en) | Always-available embedded theft reaction subsystem | |
US20220327249A1 (en) | Systems and methods for chassis intrusion detection | |
US11488453B1 (en) | Intrusion detection systems and methods | |
US8732860B2 (en) | System and method for securing data to be protected of a piece of equipment | |
CN110956722A (en) | Method, equipment and storage medium for alarming abnormity of intelligent lock | |
CN113852633A (en) | Method for generating implementation case for information security assessment | |
US20170272457A1 (en) | Importance-level calculation device, output device, and recording medium in which computer program is stored | |
CN101848117A (en) | Illegal external connection monitoring method and system thereof | |
US10721253B2 (en) | Power circuitry for security circuitry | |
US11895155B2 (en) | Resilient self-detection of malicious exfiltration of sensitive data | |
CN110784448A (en) | Equipment safety protection method, device, system and computer readable storage medium | |
CN109325346A (en) | A kind of intrusion detection method based on linux system | |
CN116110153A (en) | Intelligent lock anti-theft and early warning method, intelligent lock, electronic equipment and medium | |
CN109145587A (en) | A kind of data Anti-theft method, apparatus, terminal and readable medium | |
CN112154437A (en) | Method and intrusion manager for handling intrusions of electronic devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20210115 |
|
WW01 | Invention patent application withdrawn after publication |