CN113434915A - Case intrusion state detection device and method and edge server - Google Patents

Case intrusion state detection device and method and edge server Download PDF

Info

Publication number
CN113434915A
CN113434915A CN202110711408.XA CN202110711408A CN113434915A CN 113434915 A CN113434915 A CN 113434915A CN 202110711408 A CN202110711408 A CN 202110711408A CN 113434915 A CN113434915 A CN 113434915A
Authority
CN
China
Prior art keywords
state
information
unit
case
power
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110711408.XA
Other languages
Chinese (zh)
Inventor
黄炎坡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Sensetime Technology Co Ltd
Original Assignee
Shenzhen Sensetime Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Sensetime Technology Co Ltd filed Critical Shenzhen Sensetime Technology Co Ltd
Priority to CN202110711408.XA priority Critical patent/CN113434915A/en
Publication of CN113434915A publication Critical patent/CN113434915A/en
Priority to PCT/CN2021/134365 priority patent/WO2022267345A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/81Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations

Abstract

The embodiment of the disclosure provides a device and a method for detecting the intrusion state of a case and an edge server, wherein the device comprises: the switch unit, the on-off state of the said switch unit is correlated to opening the state of the chassis cover plate; the information generating unit is used for generating specified information, the specified information is reset under the condition that the information generating unit is recovered from a power-down state to a power-on state, and the reset specified information is inconsistent with the specified information before resetting; a first power supply unit for supplying power to the information generation unit through the switch unit; and the control unit is used for reading the specified information from the information generation unit and detecting the intrusion state of the case based on the read specified information.

Description

Case intrusion state detection device and method and edge server
Technical Field
The disclosure relates to the technical field of case intrusion detection, in particular to a case intrusion state detection device and method and an edge server.
Background
With the rise of edge computing, the application of edge servers is more and more extensive. The deployment scenes of the edge servers are diversified, and the case intrusion risk is higher than that of the traditional server, so that case intrusion detection is necessary. The conventional intrusion detection method for the chassis is generally implemented based on a control Unit such as a Baseboard Management Controller (BMC) chip or a Micro Controller Unit (MCU), and a power supply module is required to supply power to the control Unit. When the input power line of the power supply module is pulled out, the control unit does not work, and the intrusion detection mechanism fails.
Disclosure of Invention
The disclosure provides a device and a method for detecting an intrusion state of a case and an edge server.
In a first aspect, the present disclosure provides a device for detecting an intrusion state of a chassis, the device comprising: the switch unit, the on-off state of the said switch unit is correlated to opening the state of the chassis cover plate; the information generating unit is used for generating specified information, the specified information is reset under the condition that the information generating unit is recovered from a power-down state to a power-on state, and the reset specified information is inconsistent with the specified information before resetting; a first power supply unit for supplying power to the information generation unit through the switch unit; and the control unit is used for reading the specified information from the information generation unit and detecting the intrusion state of the case based on the read specified information.
In some embodiments, the control unit is to: under a normal working state, detecting the intrusion state of the case based on the current switch state of the switch unit; and under the condition that the current switch state of the switch unit indicates that the case is not in the invaded state currently, detecting the invasion state of the case based on the read specified information.
In some embodiments, the control unit is to: and in the power-on process, detecting the intrusion state of the case based on the read specified information.
In some embodiments, the control unit is to: and determining that the case is in the invaded state when the read specified information is inconsistent with the specified information before resetting.
In some embodiments, the information generating unit is a real-time clock chip, the specific information is real-time, and the real-time clock chip is configured to: generating real-time based on initial time acquired at power-on, the initial time being preset based on current time, and the initial time being set to a time inconsistent with the current time in a case where the information generating unit is restored from a power-off state to a power-on state.
In some embodiments, the control unit is to: and under the condition that the read real-time is inconsistent with the current time, determining that the case is in the invaded state.
In some embodiments, the initial time is set to 0 in a case where the information generating unit is restored from a power-down state to a power-up state; the control unit is used for: and under the condition that the read numerical value corresponding to the year in the real-time is less than the current year, determining that the case is in the invaded state.
In some embodiments, the control unit is further configured to: and under the condition that the switch unit is in an off state currently, determining that the case is in an invaded state currently.
In some embodiments, the control unit is further configured to: under the condition that the case is determined to be in the invaded state, jumping to a safe login interface after power is on to obtain the designated information input by the user through the safe login interface; and controlling the case to start under the condition that the input specified information is legal.
In some embodiments, the control unit is further configured to: under the condition that the case is determined to be in the invaded state, jumping to a safe login interface after power is on to acquire verification information input by a user through the safe login interface; and controlling the case to start under the condition that the verification information is legal.
In some embodiments, the control unit is further configured to: after controlling the chassis to start, sending initial information to the information generating unit so that the information generating unit generates the specified information based on the initial information.
In some embodiments, the control unit is a central processing unit, the first power supply unit is a real-time clock battery, the information generation unit is a real-time clock chip, and the specified information is last two digits of year information of the current real-time.
In some embodiments, the negative electrode of the rtc battery is grounded, the positive electrode of the rtc battery is connected to the power pin of the rtc chip through the switch unit, and is connected to the interrupt pin of the cpu through the switch unit, the power pin of the rtc chip is further connected to the system power supply of the chassis, and the I2C interface of the cpu is connected to the memory unit of the rtc chip, and is configured to read the specific information from the memory unit.
In some embodiments, during normal operation of the chassis, or during power-up of the chassis and in the event that it has been determined that the chassis has not been in an intruded state prior to power-up, it is determined whether the chassis is currently in an intruded state based on the level detected by the interrupt pin.
In some embodiments, in the case where the cabinet cover is opened, the switch unit is turned off, the interrupt pin detects a low level, and the cpu determines that the cabinet is currently in an intruded state.
In some embodiments, when the chassis cover is closed, the switch unit is closed, the interrupt pin detects a high level, and the cpu determines that the chassis is not currently in an intruded state.
In some embodiments, in the process of powering on the chassis, the central processing unit determines that the chassis was in an intruded state before powering on, when detecting that the last two bits of the year information are smaller than a preset value.
In some embodiments, in the process of powering on the chassis, the central processing unit determines that the chassis is not in an intruded state before powering on, when the last two detected year information bits are greater than or equal to a preset value.
In some embodiments, the apparatus further comprises: and the first diode is used for conducting the electric energy provided by the first power supply unit to the information generation unit in a single direction.
In some embodiments, the apparatus further comprises: and the second power supply unit is used for supplying power to the information generation unit, and the switch unit and the second power supply unit are positioned on different power supply branches.
In some embodiments, the apparatus further comprises: and the second diode is used for conducting the electric energy provided by the second power supply unit to the information generation unit in a single direction.
In a second aspect, the present disclosure provides an edge server, comprising: a chassis; the case cover plate is matched with the case; and the chassis intrusion state detection device according to any one of the embodiments of the present disclosure.
In a third aspect, the present disclosure provides a method for detecting an intrusion state of a chassis, which is applied to a control unit in an apparatus according to any embodiment of the present disclosure, and the method includes: reading the specification information from the information generating unit; and detecting the intrusion state of the case based on the read specified information.
In some embodiments, the detecting the intrusion state of the chassis based on the read specified information includes: under a normal working state, detecting the intrusion state of the case based on the current switch state of the switch unit, and under the condition that the current switch state of the switch unit indicates that the case is not in the intruded state currently, detecting the intrusion state of the case based on the read specified information; and/or detecting the intrusion state of the case based on the read specified information in the power-on process.
In some embodiments, the detecting the intrusion state of the chassis based on the read specified information includes: and determining that the case is in the invaded state when the read specified information is inconsistent with the specified information before resetting.
In some embodiments, the information generating unit is a real-time clock chip, the specific information is a real-time, the real-time is generated based on an initial time obtained when the real-time clock chip is powered on, the initial time is preset based on a current time, and the initial time is set to a time inconsistent with the current time when the information generating unit is restored from a power-off state to a power-on state.
In some embodiments, the detecting the intrusion state of the chassis based on the read specified information includes: and under the condition that the read real-time is inconsistent with the current time, determining that the case is in the invaded state.
In some embodiments, the initial time is set to 0 in a case where the information generating unit is restored from a power-down state to a power-up state; the intrusion state of the case is detected based on the read specified information, and the intrusion state detection method comprises the following steps: and under the condition that the read numerical value corresponding to the year in the real-time is less than the current year, determining that the case is in the invaded state.
In some embodiments, the method further comprises: and under the condition that the switch unit is in an off state currently, determining that the case is in an invaded state currently.
In some embodiments, the method further comprises: under the condition that the case is determined to be in the invaded state, jumping to a safe login interface after power is on to obtain the designated information input by the user through the safe login interface; and controlling the case to start under the condition that the input specified information is legal.
In some embodiments, the method further comprises: under the condition that the case is determined to be in the invaded state, jumping to a safe login interface after power is on to acquire verification information input by a user through the safe login interface; and controlling the case to start under the condition that the verification information is legal.
In some embodiments, the method further comprises: after controlling the chassis to start, sending initial information to the information generating unit so that the information generating unit generates the specified information based on the initial information.
In some embodiments, the control unit is a central processing unit, the first power supply unit is a real-time clock battery, the information generation unit is a real-time clock chip, and the specified information is last two digits of year information of the current real-time.
In some embodiments, the detecting the intrusion state of the chassis based on the read specified information includes: and in the normal working process of the case or the power-on process of the case and under the condition that the case is determined not to be in the invaded state before being powered on, determining whether the case is currently in the invaded state or not based on the level detected by the interrupt pin.
In some embodiments, in the case where the cabinet cover is opened, the switch unit is turned off, the interrupt pin detects a low level, and the cpu determines that the cabinet is currently in an intruded state.
In some embodiments, when the chassis cover is closed, the switch unit is closed, the interrupt pin detects a high level, and the cpu determines that the chassis is not currently in an intruded state.
In some embodiments, in the process of powering on the chassis, the central processing unit determines that the chassis was in an intruded state before powering on, when detecting that the last two bits of the year information are smaller than a preset value.
In some embodiments, in the process of powering on the chassis, the central processing unit determines that the chassis is not in an intruded state before powering on, when the last two detected year information bits are greater than or equal to a preset value.
In a fourth aspect, the present disclosure provides a device for detecting an intrusion status of a chassis, which is applied to a control unit in the device according to any one of the embodiments of the present disclosure, and the device includes: a reading module for reading the designation information from the information generating unit; and the detection module is used for detecting the intrusion state of the case based on the read specified information.
In a fifth aspect, the present disclosure provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of any of the embodiments.
In a sixth aspect, the present disclosure provides a computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the method of any of the embodiments when executing the program.
The first power supply unit of the embodiment of the present disclosure supplies power to the information generating unit through the switch unit, and the switch state of the switch unit is related to the open state of the chassis cover. As long as the case cover plate is opened, the switch unit is opened, so that a power supply branch between the first power supply unit and the information generation unit is disconnected, the information generation unit is powered off, and the designated information generated by the information generation unit is reset. Therefore, when the power supply of the enclosure intrusion state detection device is disconnected, as long as the enclosure is in the intruded state, the specific information read by the control unit after the system is powered on is the specific information after the reset, and if the enclosure is not in the intruded state, the specific information read by the control unit after the system is powered on is the specific information before the reset. In this way, it can be determined whether the chassis has not been in an intruded state in the event that the system is powered off.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the principles of the disclosure.
Fig. 1A and 1B are schematic diagrams of a device for detecting an intrusion state of a chassis in the related art, respectively.
Fig. 2A and fig. 2B are respectively block diagrams of a chassis intrusion state detection apparatus according to an embodiment of the present disclosure.
Fig. 3 is a circuit diagram of a chassis intrusion status detection apparatus according to an embodiment of the present disclosure.
Fig. 4 is a circuit diagram of a device for detecting an intrusion state of a chassis according to another embodiment of the present disclosure.
Fig. 5 is a flowchart of chassis intrusion status detection in a normal operation process according to an embodiment of the present disclosure.
Fig. 6 is a flowchart of chassis intrusion status detection during power-up according to an embodiment of the present disclosure.
Fig. 7 is a schematic diagram of an edge server of an embodiment of the disclosure.
Fig. 8 is a flowchart of a chassis intrusion status detection method according to an embodiment of the present disclosure.
Fig. 9 is a block diagram of a chassis intrusion status detection apparatus according to an embodiment of the present disclosure.
Fig. 10 is a schematic structural diagram of a computer device according to an embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items. In addition, the term "at least one" herein means any one of a plurality or any combination of at least two of a plurality.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present disclosure. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
In order to make the technical solutions in the embodiments of the present disclosure better understood and make the above objects, features and advantages of the embodiments of the present disclosure more comprehensible, the technical solutions in the embodiments of the present disclosure are described in further detail below with reference to the accompanying drawings.
The case intrusion is used for detecting the case being illegally opened. Referring to fig. 1A and 1B, a conventional chassis intrusion detection device generally includes a BMC chip-based detection device and an MCU-based detection device. S1 and S2 in the figure represent switches, R1 and R2 represent pull-up resistors, and V1 and V2 represent voltages output by a power supply respectively, wherein V1 is used for supplying power to the BMC chip, and V2 is used for supplying power to a Central Processing Unit (CPU) of the chassis. V3 represents the voltage of the supercapacitor output.
The detection device based on the BMC chip is composed of a switch S1 and a power-on circuit, wherein the power-on circuit comprises the BMC chip and a pull-up resistor R1. Under the condition that the chassis cover plate is in a closed state, the switch S1 is closed, the level of an input signal of the BMC chip is pulled low, and therefore the BMC chip determines that the chassis is not in an invaded state currently; when the chassis cover is in the open state, the switch S1 is turned off, and the level of the input signal of the BMC chip is pulled high by the pull-up resistor R1, so that the BMC chip determines that the chassis is currently in the intruded state. According to the scheme, the power supply is required to supply power to the BMC chip, the BMC chip does not work under the condition that the power supply does not supply power to the BMC chip, and the intrusion detection mechanism fails.
The intrusion detection mechanism of the detection device based on the MCU is similar to that of the detection device based on the BMC chip, and the difference is that the BMC chip is replaced by the MCU, and because the energy consumption of the MCU is lower than that of the BMC chip, the super capacitor can be used as a power supply. Before the electric quantity in the super capacitor is exhausted, the MCU can obtain a stable power supply source to prevent the intrusion detection mechanism from being invalid. However, the super capacitor used in this solution is expensive, and when the super capacitor is exhausted, the intrusion detection mechanism still fails.
In addition, in the detection device based on the BMC chip, the power supply branch between the power supply and the CPU may need to be disconnected in order to save power. However, the intrusion detection mechanism fails when the power supply does not supply power to the BMC chip, and therefore, the BMC chip independent of the CPU needs to be used, the power supply generally outputs two paths of power supply voltages, one path of power supply voltage is used for supplying power to the BMC chip, and in a normal state, as long as the power line of the power supply is not disconnected, the power supply voltage can be always output to the BMC chip; the other path is used for supplying power to the CPU, and the power supply voltage of the other path can stop supplying power to the CPU when the CPU does not work. Similarly, in the detection device based on the MCU, the MCU independent of the CPU is needed, the super capacitor outputs the power supply voltage to supply power for the MCU, and the power supply outputs the voltage to supply power for the CPU. The two schemes need to adopt extra control units such as a BMC chip or an MCU and the like, so that the cost is high.
Based on this, the embodiment of the present disclosure provides an apparatus for detecting an intrusion state of a chassis, referring to fig. 2A, the apparatus includes:
the switch unit 201, the on-off state of the switch unit 201 is correlated with the open state of the chassis cover plate;
the information generating unit 202 is configured to generate specific information, and the specific information is reset when the information generating unit 202 is recovered from a power-down state to a power-on state, where the specific information after being reset is inconsistent with the specific information before being reset;
a first power supply unit 203 for supplying power to the information generation unit 202 via the switch unit 201;
and a control unit 204, configured to read the specific information from the information generating unit 202, and detect an intrusion state of the chassis based on the read specific information.
In some embodiments, in the case where the cabinet cover is in the open state, the switching state of the switching unit 201 is the off state; when the cabinet cover is in the closed state, the opening and closing state of the opening and closing unit 201 is the closed state.
As an implementation manner, the switch unit 201 is a trigger switch, the trigger switch is disposed on the chassis, the trigger switch is provided with a trigger portion in trigger fit with the chassis cover plate, when the chassis cover plate is in an open state, the trigger portion is separated from the chassis cover plate, so that the switch unit 201 is in an off state; when the chassis cover is in the closed state, the trigger portion is in trigger fit with the chassis cover, so that the switch unit 201 is in the closed state. In an exemplary embodiment, the trigger switch is a push button switch and the trigger is a push button. When the case cover plate is in a closed state, the button is pressed down to close the button switch; when the case cover is in an open state, the button pops up to turn off the button switch. It is well known to those skilled in the art that the switch unit 201 may be implemented by a switch other than a push button switch, and the present disclosure is not limited thereto.
The specifying information generated by the information generating unit 202 may be static information, that is, the specifying information remains unchanged as long as it is not reset. The designation information may include, but is not limited to, one or a combination of at least two of numbers, letters, chinese characters, symbols, and the like. Alternatively, the specification information generated by the information generating unit 202 may be dynamic information, that is, may change from case to case. For example, the designation information may change with time. In some embodiments, the specified information is time information, which may include some or all of the year, month, day, hour, minute, second.
In some embodiments, the information generating unit 202 may accumulate the time on the basis of some initial time, thereby obtaining the real-time. The initial time may be set by the user on the information generating unit or received from the control unit 204. Alternatively, the control unit 204 may read the current time and transmit the current time as the initial time to the information generating unit 202. After receiving the initial time, the information generating unit 202 starts timing, and superimposes the timing time on the initial time to obtain dynamic specific information at different times. For example, the current time is 21-05-28-11-33-25, where "21", "05", "28", "11", "33", and "25" respectively indicate year, month, day, hour, minute, and second, the information generating unit 202 counts 1 minute later and specifies the information as 21-05-28-11-34-25.
The designation information is reset in a case where the information generating unit is restored from the power-down state to the power-up state. For example, assuming that the designation information is the letter "HELLO", it may be reset to any number, letter, chinese character, symbol, or combination thereof, such as "AAAAA", "ABCD", "1234", as long as it is different from the designation information "HELLO" before the reset. For another example, assuming that the designated information is real time, the time information may be reset to 00-00-00-00-00-00, or 99-99-99-99-99-99, etc.
In some embodiments, the information generating unit 202 may be implemented by a Real Time Clock (RTC) chip, for example, an RTC chip with a model number DS 3231. Since the energy consumption of the RTC chip is low, the first power supply unit 203 with low power can be used to supply power to the RTC chip, for example, the first power supply unit 203 is an RTC battery.
The first power supply unit of the embodiment of the present disclosure supplies power to the information generating unit through the switch unit, and the switch state of the switch unit is related to the open state of the chassis cover. As long as the case cover plate is opened, the switch unit is opened, so that a power supply branch between the first power supply unit and the information generation unit is disconnected, the information generation unit is powered off, and the designated information generated by the information generation unit is reset. Therefore, when the power supply of the enclosure intrusion state detection device is disconnected, as long as the enclosure is in the intruded state, the specific information read by the control unit after the system is powered on is the specific information after the reset, and if the enclosure is not in the intruded state, the specific information read by the control unit after the system is powered on is the specific information before the reset. In this way, it can be determined whether the chassis has not been in an intruded state in the event that the system is powered off.
Since the intrusion event in the power down situation can be detected, a CPU may be used as the control unit 204, and thus, an additional BMC chip or MCU is not required to be used as the control unit 204. The control unit 204 may determine that the chassis has been in an intruded state when the read specifying information is inconsistent with the specifying information before the reset; and determining that the chassis is not in the invaded state when the read specified information is consistent with the specified information before resetting.
When the time is used as the designated information, the CPU may acquire the real-time through the internal clock, and may also transmit the current time to the RTC chip, and the RTC chip may perform timing based on the current time transmitted by the CPU to acquire the real-time. And resetting the real-time recorded in the RTC chip under the condition that the RTC chip is powered off. The CPU can inquire the real-time recorded in the RTC chip, and if the inquired real-time is inconsistent with the real-time acquired by the CPU through the internal clock, the chassis is determined to be in an invaded state. In some embodiments, only the information representing the year in the real-time or only the last two bits of the real-time may be queried, and the queried information may be compared with the corresponding information in the real-time acquired by the CPU through the internal clock. By comparing the year information or the last two bits of the year information, the influence caused by the timing error of the RTC chip can be reduced, and the accuracy of the comparison result is improved.
For example, the real time is 21-05-28-11-33-25, and only "21" may be queried and compared with information indicating the last two digits of the year in the real time acquired by the CPU through the internal clock. In the event that the RTC chip is powered down, the real time will be reset to 0. Therefore, when the inquired information is smaller than the corresponding information in the real-time acquired by the CPU through the internal clock, the chassis is determined to be in the invaded state.
Those skilled in the art will appreciate that the above-described embodiments are merely illustrative. The intrusion detection can also be performed by querying and comparing other information (for example, information indicating a month or information indicating a date) in the real-time, and the principle of performing intrusion detection based on other information is similar to that of performing intrusion detection based on year information, and is not described herein again.
Referring to fig. 2B, in addition to detecting the intrusion state of the chassis according to the designation information, the control unit 204 may detect the intrusion state of the chassis based on the switching state of the switching unit 201. For example, in the case where it is detected that the switch unit 201 is in the off state, it is determined that the enclosure is in the invaded state; in the case where it is detected that the switch unit 201 is in the closed state, it is determined that the enclosure is not in the invaded state. Because the detection efficiency of detecting the intrusion state based on the switch state of the switch unit 201 is high, under the condition that the system normally works, the intrusion state can be detected based on the switch state of the switch unit 201, and under the condition that the switch unit 201 is in the closed state, the intrusion state is detected based on the specified information, so that the problem that under the normal power-on state, the real-time performance of detecting the intrusion state based on the specified information is insufficient is solved. In the system power-on process, because the intrusion state before the system power-on cannot be determined based on the switch state of the switch unit, the intrusion state before the system power-on can be directly detected based on the designated information in the system power-on process. And after the system is powered on, carrying out intrusion state detection based on a detection mode under a normal working condition.
In some embodiments, the system further includes a second power supply unit 205 configured to supply power to the information generating unit 202, and the switch unit 201 is located on a different power supply branch from the second power supply unit 205. The supply voltage of the second power supply unit 205 may be lower than the supply voltage of the first power supply unit 203. In some cases, the power supply branch where the first power supply unit 203 is located may be disconnected, and power may be supplied only through the power supply branch where the second power supply unit 205 is located, so as to reduce power consumption. In the normal state, the second power supply unit 205 may always maintain the power supply state as long as the power supply line of the second power supply unit 205 is not disconnected.
In some embodiments, the control unit 204 is further configured to jump to a secure login interface after powering on to obtain the specified information input by the user through the secure login interface, if it is determined that the chassis is in the invaded state; and controlling the case to start under the condition that the input specified information is legal. In the case where the specification information generated by the information generation unit is static information, the specification information may be stored in the control unit 204 in advance. If the designated information input by the user through the secure login interface is the same as the designated information, the control unit 204 determines that the input information is legal. In the case where the specification information generated by the information generating unit is dynamic information, if the specification information input by the user through the secure login interface is identical to the current time, the control unit 204 determines that the input specification information is legal. The control unit 204 may control the chassis to start up in case the inputted specification information is legal, otherwise the control unit 204 rejects the chassis start-up.
In some embodiments, the control unit 204 is further configured to jump to a secure login interface after powering on to obtain authentication information input by a user through the secure login interface when it is determined that the chassis is in the invaded state; and controlling the case to start under the condition that the verification information is legal. Wherein the verification information may include, but is not limited to, at least one of: fingerprint information, face information, account password information, voice information and verification code information. Taking account password information as an example, if the account information input by the user through the secure login interface is matched with the password information, determining that the input verification information is legal, otherwise, determining that the input verification information is illegal.
After controlling the chassis to start, the control unit 204 may send reference information to the information generating unit 202, so that the information generating unit 202 generates the specifying information based on the reference information. In this way, it is possible to cause the information generating unit 202 to regenerate correct specification information after startup, thereby continuing intrusion state detection.
The circuit diagrams of the device are shown in fig. 3 and 4, respectively. Wherein, S3 represents the switch unit 201, the RTC chip is used as the information generating unit 202, BAT represents the first power supply unit 203, which may be an RTC battery, the CPU is used as the control unit 204, and the CPU and the RTC chip are connected via I2The interface C performs communication, the CPU detects the on-off state of the switch S3 through an interrupt pin, STANDBY represents the second power supply unit 205, and VBAT is a power supply pin of the RTC chip. D1 and D2 denote diodes, respectively, D1 is for unidirectionally conducting the power supplied from the first power supply unit 203 to the information generating unit 202, and D2 is for unidirectionally conducting the power supplied from the second power supply unit 205 to the information generating unit 202. At least one of D1 and D2 may also be eliminated for cost savings. Since the edge server and the miniaturized device have only a single power supply, the power supply of fig. 3The illustrated embodiments are more targeted at edge servers and miniaturized devices.
The intrusion detection principle of the present disclosure will be explained below by taking the circuit diagram shown in fig. 4 as an example. In the figure, the control unit is a CPU, the first power supply unit is an RTC battery, the information generation unit is an RTC chip, and the specified information is the last two digits of the year information of the current real time (which may have a small error with the actual time). The negative pole of the RTC battery is grounded, the positive pole of the RTC battery is connected with the power pin of the RTC chip through the switch unit and is connected with the interrupt pin of the CPU through the switch unit, the power pin of the RTC chip is also connected with the system power supply (STANDBY power supply) of the case, and the I of the CPU is2And the C interface is connected with the storage unit of the RTC chip and is used for reading the last two bits of the year information from the storage unit.
And after the RTC battery and the STANDBY power supply are combined, the VBAT power supply pin of the RTC chip is supplied with power. The voltage of the RTC battery after passing through the switch S3 is transmitted to an interrupt pin of the CPU, when the switch S3 is disconnected, the voltage is at a low level, the CPU is triggered to interrupt, the CPU records and reports an intrusion event, and a safety protection mechanism is executed. When the switch S3 is closed, the RTC battery is active and the CPU interrupt pin is not triggered. Under the condition that the STANDBY power supply supplies power, the VBAT power supply of the RTC chip is normal; in the case where the STANDBY power supply is not supplying power, whether the VBAT power supply is normal depends on whether switch S3 is closed or open. If the switch S3 is closed, the VBAT power supply of the RTC chip is normal, and if the switch S3 is disconnected, the VBAT power supply of the RTC chip is powered down. When the VBAT pin of the RTC chip does not supply power, the RTC chip can not work normally. After power supply is restarted, two digits after the year of the real-time of the RTC chip are recovered to 00, and then real-time calculation is restarted. I of CPU2I of RTC chip connected with C interface2And the C interface is used for acquiring RTC time. When the CPU inquires that the last two digits of the year in the time information recorded in the RTC chip are smaller than the last two digits of the current year (such as 21), recording and reporting the intrusion event, and executing a safety protection mechanism.
Fig. 5 is a flowchart of intrusion detection of the chassis during normal operation.
In step 501, the CPU detects that the chassis is in a normal operating state.
In step 502, the CPU detects an intrusion state of the enclosure based on a current switch state of the switch unit. After the interrupt is triggered, the CPU executes step 503, otherwise, returns to step 501. Meanwhile, the CPU periodically inquires the real-time of the RTC chip, when two digits after the year of the real-time of the RTC chip are less than 21, the abnormality is detected, the step 503 is executed, otherwise, the step 501 is returned.
In step 503, the CPU records and reports the intrusion event and executes a security mechanism.
Fig. 6 is a flowchart of chassis intrusion detection during system power-on. And in the process of powering on (from a power-off state to normal operation of the system), the CPU detects the intrusion state of the case based on the read specified information.
In step 601, the system is powered on, and the CPU loads the FLASH file first.
In step 602, the CPU initializes a DDR (Double Data Rate Dynamic Random Access Memory) interface and a GPIO (General Purpose Input/Output) interface.
In step 603, the CPU determines the level of the interrupt pin, and if the level is high, step 604 is executed, otherwise step 606 is executed.
In step 604, the CPU initializes I2C interface, and acquires the real time of the RTC chip, and then executes step 605.
In step 605, the CPU determines whether the last two digits of the RTC real-time are less than 21, if yes, step 606 is executed, otherwise, step 610 is executed.
In step 606, the CPU initializes other interfaces, records and reports intrusion events, executes a security protection mechanism, and proceeds to step 607.
In step 607, enter a secure login interface, obtain an anti-intrusion account and a password through the secure login interface, and enter step 608.
In step 608, the CPU verifies that the anti-intrusion account and password are correct, and if so, proceeds to step 609, otherwise, returns to step 607.
In step 609, the correct RTC real time is set and step 611 is entered.
In step 610, the system initializes other functional interfaces and proceeds to step 611.
In step 611, the system starts up normally.
The system is under the normal power supply scene, and the anti-intrusion warning mechanism is effective. When the power supply is pulled out by an intruder, the shell is removed, and the switch S3 is manually pressed to be closed, so that the traditional intrusion detection mechanism fails, the system can still be normally started after being electrified again, and the system is easy to illegally analyze the working principle of the system by the intruder. The intrusion detection mechanism disclosed by the invention has the advantages that after the power line is pulled out, as long as the shell is detached to enable the switch to be in an off state for any time, the two digits after the year of the real-time of the RTC become default values, namely from 00. At this time, even if the power is turned on again and the intruder manually presses the switch to close the switch, two digits after the year of the real-time of the RTC are still less than 21, the system can still record and report the intrusion event and execute a safety protection mechanism.
The present disclosure can achieve the following effects:
(1) no additional BMC chip or MCU is used to implement the intrusion detection mechanism.
(2) In the situation of unplugging the power line, the intrusion detection mechanism is still effective, and a super capacitor is not required to be added for the intrusion detection mechanism.
As shown in fig. 7, an embodiment of the present disclosure further provides an edge server, including:
a chassis 701;
a chassis cover plate 702 that is fitted to the chassis 701; and
the device for detecting an intrusion state of a chassis (not shown in the figures) according to any of the above embodiments.
The information generating unit 202, the first power supply unit 203, and the control unit 204 in the device for detecting the intrusion state of the enclosure may be disposed in the enclosure 701, and the switch unit 201 may be disposed on the enclosure.
The embodiment of the apparatus for detecting an intrusion state of a chassis in an edge server is described in detail in the foregoing embodiment of the apparatus for detecting an intrusion state of a chassis, and will not be described herein again.
As shown in fig. 8, an embodiment of the present disclosure further provides a chassis intrusion state detection method, which is applied to a control unit in the chassis intrusion state detection apparatus according to any of the foregoing embodiments, where the method includes:
step 801: reading the specification information from the information generating unit;
step 802: and detecting the intrusion state of the case based on the read specified information.
In some embodiments, the detecting the intrusion state of the chassis based on the read specified information includes: under a normal working state, detecting the intrusion state of the case based on the current switch state of the switch unit; and under the condition that the current switch state of the switch unit indicates that the case is not in the invaded state currently, detecting the invasion state of the case based on the read specified information.
In some embodiments, the detecting the intrusion state of the chassis based on the read specified information includes: and in the power-on process, detecting the intrusion state of the case based on the read specified information.
In some embodiments, the detecting the intrusion state of the chassis based on the read specified information includes: and determining that the case is in the invaded state when the read specified information is inconsistent with the specified information before resetting.
In some embodiments, the information generating unit is an RTC chip, the specific information is real time, the RTC chip is configured to generate real time based on initial time obtained at power-on, the initial time is preset based on current time, and the initial time is set to time inconsistent with the current time when the information generating unit is restored from a power-off state to a power-on state. The intrusion state of the case is detected based on the read specified information, and the intrusion state detection method comprises the following steps: and under the condition that the read real-time is inconsistent with the current time, determining that the case is in the invaded state.
In some embodiments, the initial time is set to 0 in a case where the information generating unit is restored from a power-down state to a power-up state; the intrusion state of the case is detected based on the read specified information, and the intrusion state detection method comprises the following steps: and under the condition that the read numerical value corresponding to the year in the real-time is less than the current year, determining that the case is in the invaded state.
In some embodiments, the method further comprises: and under the condition that the switch unit is in an off state currently, determining that the case is in an invaded state currently.
In some embodiments, the method further comprises: under the condition that the case is determined to be in the invaded state, jumping to a safe login interface after power is on to obtain the designated information input by the user through the safe login interface; and controlling the case to start under the condition that the input specified information is legal.
In some embodiments, the method further comprises: under the condition that the case is determined to be in the invaded state, jumping to a safe login interface after power is on to acquire verification information input by a user through the safe login interface; and controlling the case to start under the condition that the verification information is legal.
In some embodiments, the method further comprises: after controlling the chassis to start, sending initial information to the information generating unit so that the information generating unit generates the specified information based on the initial information.
It will be understood by those skilled in the art that in the method of the present invention, the order of writing the steps does not imply a strict order of execution and any limitations on the implementation, and the specific order of execution of the steps should be determined by their function and possible inherent logic.
As shown in fig. 9, an embodiment of the present disclosure further provides a device for detecting an intrusion state of a chassis, which is applied to a control unit in the device for detecting an intrusion state of a chassis according to any of the above embodiments, where the device includes:
a reading module 901 for reading the designation information from the information generating unit;
and the detection module 902 is configured to detect an intrusion state of the chassis based on the read specified information.
In some embodiments, functions of or modules included in the apparatus provided in the embodiments of the present disclosure may be used to execute the method described in the above method embodiments, and specific implementation thereof may refer to the description of the above method embodiments, and for brevity, will not be described again here.
Embodiments of the present specification also provide a computer device, which at least includes a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the method according to any of the foregoing embodiments when executing the program.
Fig. 10 is a more specific hardware structure diagram of a computing device provided in an embodiment of the present specification, where the device may include: a processor 1001, a memory 1002, an input/output interface 1003, a communication interface 1004, and a bus 1005. Wherein the processor 1001, the memory 1002, the input/output interface 1003 and the communication interface 1004 realize communication connections with each other inside the apparatus through a bus 1005.
The processor 1001 may be implemented by a general-purpose CPU (Central Processing Unit), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits, and is configured to execute related programs to implement the technical solutions provided in the embodiments of the present specification. The processor 1001 may further include a graphic card, which may be an Nvidia titan X graphic card or a 1080Ti graphic card, etc.
The Memory 1002 may be implemented in the form of a ROM (Read Only Memory), a RAM (Random Access Memory), a static storage device, a dynamic storage device, or the like. The memory 1002 may store an operating system and other application programs, and when the technical solution provided by the embodiments of the present specification is implemented by software or firmware, the relevant program codes are stored in the memory 1002 and called to be executed by the processor 1001.
The input/output interface 1003 is used for connecting an input/output module to realize information input and output. The i/o module may be configured as a component in a device (not shown) or may be external to the device to provide a corresponding function. The input devices may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and the output devices may include a display, a speaker, a vibrator, an indicator light, etc.
The communication interface 1004 is used for connecting a communication module (not shown in the figure) to realize the communication interaction between the device and other devices. The communication module can realize communication in a wired mode (such as USB, network cable and the like) and also can realize communication in a wireless mode (such as mobile network, WIFI, Bluetooth and the like).
Bus 1005 includes a pathway to transfer information between various components of the device, such as processor 1001, memory 1002, input/output interface 1003, and communication interface 1004.
It should be noted that although the above-mentioned device only shows the processor 1001, the memory 1002, the input/output interface 1003, the communication interface 1004 and the bus 1005, in a specific implementation, the device may also include other components necessary for normal operation. In addition, those skilled in the art will appreciate that the above-described apparatus may also include only those components necessary to implement the embodiments of the present description, and not necessarily all of the components shown in the figures.
The embodiments of the present disclosure also provide a computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements the method of any of the foregoing embodiments.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
From the above description of the embodiments, it is clear to those skilled in the art that the embodiments of the present disclosure can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the embodiments of the present specification may be essentially or partially implemented in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments of the present specification.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the apparatus embodiment, since it is substantially similar to the method embodiment, it is relatively simple to describe, and reference may be made to some descriptions of the method embodiment for relevant points. The above-described apparatus embodiments are merely illustrative, and the modules described as separate components may or may not be physically separate, and the functions of the modules may be implemented in one or more software and/or hardware when implementing the embodiments of the present disclosure. And part or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The foregoing is only a specific embodiment of the embodiments of the present disclosure, and it should be noted that, for those skilled in the art, a plurality of modifications and decorations can be made without departing from the principle of the embodiments of the present disclosure, and these modifications and decorations should also be regarded as the protection scope of the embodiments of the present disclosure.

Claims (20)

1. An apparatus for detecting intrusion status in a device cabinet, the apparatus comprising:
the switch unit, the on-off state of the said switch unit is correlated to opening the state of the chassis cover plate;
the information generating unit is used for generating specified information, the specified information is reset under the condition that the information generating unit is recovered from a power-down state to a power-on state, and the reset specified information is inconsistent with the specified information before resetting;
a first power supply unit for supplying power to the information generation unit through the switch unit;
and the control unit is used for reading the specified information from the information generation unit and detecting the intrusion state of the case based on the read specified information.
2. The apparatus of claim 1, wherein the control unit is configured to:
under a normal working state, detecting the intrusion state of the case based on the current switch state of the switch unit;
and under the condition that the current switch state of the switch unit indicates that the case is not in the invaded state currently, detecting the invasion state of the case based on the read specified information.
3. The apparatus according to claim 1 or 2, wherein the control unit is configured to:
and in the power-on process, detecting the intrusion state of the case based on the read specified information.
4. The apparatus according to any one of claims 1-3, wherein the control unit is configured to:
and determining that the case is in the invaded state when the read specified information is inconsistent with the specified information before resetting.
5. The apparatus according to any one of claims 1 to 4, wherein the information generating unit is a real-time clock chip, the specific information is real-time, and the real-time clock chip is configured to:
generating real-time based on initial time acquired at power-on, the initial time being preset based on current time, and the initial time being set to a time inconsistent with the current time in a case where the information generating unit is restored from a power-off state to a power-on state.
6. The apparatus of claim 5, wherein the control unit is configured to:
and under the condition that the read real-time is inconsistent with the current time, determining that the case is in the invaded state.
7. The apparatus according to claim 5 or 6, wherein in a case where the information generating unit is restored from a power-down state to a power-up state, the initial time is set to 0; the control unit is used for:
and under the condition that the read numerical value corresponding to the year in the real-time is less than the current year, determining that the case is in the invaded state.
8. The apparatus according to any of claims 1-7, wherein the control unit is further configured to:
and under the condition that the switch unit is in an off state currently, determining that the case is in an invaded state currently.
9. The apparatus according to any one of claims 1-8, wherein the control unit is further configured to:
under the condition that the case is determined to be in the invaded state, jumping to a safe login interface after power is on to obtain the designated information input by the user through the safe login interface;
and controlling the case to start under the condition that the input specified information is legal.
10. The apparatus according to any one of claims 1-9, wherein the control unit is further configured to:
under the condition that the case is determined to be in the invaded state, jumping to a safe login interface after power is on to acquire verification information input by a user through the safe login interface;
and controlling the case to start under the condition that the verification information is legal.
11. The apparatus according to claim 9 or 10, wherein the control unit is further configured to:
after controlling the chassis to start, sending initial information to the information generating unit so that the information generating unit generates the specified information based on the initial information.
12. The device according to any one of claims 1 to 11, wherein the control unit is a central processing unit, the first power supply unit is a real-time clock battery, the information generation unit is a real-time clock chip, and the specified information is the last two digits of the year information of the current real-time;
the negative electrode of the real-time clock battery is grounded, and the positive electrode of the real-time clock battery is connected with a power pin of the real-time clock chip through the switch unit and is connected with an interrupt pin of the central processing unit through the switch unit;
the power pin of the real-time clock chip is also connected with a system power supply of the case;
i of the central processing unit2And the interface C is connected with the storage unit of the real-time clock chip and is used for reading the specified information from the storage unit.
13. The apparatus of claim 12, wherein during normal operation of the chassis, or during power-up of the chassis and in a case where it is determined that the chassis has not been in an intruded state before power-up, determining whether the chassis is currently in an intruded state based on the level detected by the interrupt pin;
when the cover plate of the case is opened, the switch unit is switched off, the interrupt pin detects a low level, and the central processing unit determines that the case is in an invaded state currently; under the condition that the case cover plate is closed, the switch unit is closed, the interrupt pin detects a high level, and the central processing unit determines that the case is not in an invaded state currently.
14. The apparatus according to claim 12 or 13, wherein during the power-up of the chassis, the cpu determines that the chassis has been in the hacked state before the power-up when detecting that the last two bits of the year information are smaller than a preset value, and determines that the chassis has not been in the hacked state before the power-up when detecting that the last two bits of the year information are greater than or equal to the preset value.
15. The apparatus of any of claims 1-14, further comprising:
the first diode is used for conducting the electric energy provided by the first power supply unit to the information generation unit in a single direction; and/or
The second diode is used for conducting the electric energy provided by the second power supply unit to the information generation unit in a single direction; and/or
And the second power supply unit is used for supplying power to the information generation unit, and the switch unit and the second power supply unit are positioned on different power supply branches.
16. An edge server, comprising:
a chassis;
the case cover plate is matched with the case; and
the apparatus of any one of claims 1 to 15 for detecting an intrusion state of a chassis.
17. A method for detecting an intrusion state of a chassis, applied to a control unit in the apparatus according to any one of claims 1 to 15, the method comprising:
reading the specification information from the information generating unit;
and detecting the intrusion state of the case based on the read specified information.
18. The method of claim 17, wherein the detecting the intrusion state of the chassis based on the read specified information comprises:
under a normal working state, detecting the intrusion state of the case based on the current switch state of the switch unit, and under the condition that the current switch state of the switch unit indicates that the case is not in the intruded state currently, detecting the intrusion state of the case based on the read specified information; and/or
And in the power-on process, detecting the intrusion state of the case based on the read specified information.
19. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method of any one of claims 17 to 18.
20. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any of claims 17-18 when executing the program.
CN202110711408.XA 2021-06-25 2021-06-25 Case intrusion state detection device and method and edge server Pending CN113434915A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110711408.XA CN113434915A (en) 2021-06-25 2021-06-25 Case intrusion state detection device and method and edge server
PCT/CN2021/134365 WO2022267345A1 (en) 2021-06-25 2021-11-30 Chassis intrusion state detection device and method, and edge server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110711408.XA CN113434915A (en) 2021-06-25 2021-06-25 Case intrusion state detection device and method and edge server

Publications (1)

Publication Number Publication Date
CN113434915A true CN113434915A (en) 2021-09-24

Family

ID=77754411

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110711408.XA Pending CN113434915A (en) 2021-06-25 2021-06-25 Case intrusion state detection device and method and edge server

Country Status (2)

Country Link
CN (1) CN113434915A (en)
WO (1) WO2022267345A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022267345A1 (en) * 2021-06-25 2022-12-29 深圳市商汤科技有限公司 Chassis intrusion state detection device and method, and edge server
CN116467705A (en) * 2023-01-16 2023-07-21 中科可控信息产业有限公司 Full-time monitoring system and server for preventing server from invading

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6289456B1 (en) * 1998-08-19 2001-09-11 Compaq Information Technologies, Inc. Hood intrusion and loss of AC power detection with automatic time stamp
CN104268467B (en) * 2014-09-15 2018-05-25 福建联迪商用设备有限公司 The method of electronic equipment anti-intrusion and the electronic equipment of anti-intrusion
CN104268466B (en) * 2014-09-15 2019-01-01 福建联迪商用设备有限公司 The method of the electronic equipment and electronic equipment anti-intrusion of anti-intrusion
CN110569679A (en) * 2019-10-08 2019-12-13 福建实达电脑设备有限公司 Cover-detaching self-destruction circuit for terminal and control method thereof
CN111722960A (en) * 2020-05-29 2020-09-29 苏州浪潮智能科技有限公司 Starting method, system, equipment and medium under CMOS information abnormity
CN113434915A (en) * 2021-06-25 2021-09-24 深圳市商汤科技有限公司 Case intrusion state detection device and method and edge server

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022267345A1 (en) * 2021-06-25 2022-12-29 深圳市商汤科技有限公司 Chassis intrusion state detection device and method, and edge server
CN116467705A (en) * 2023-01-16 2023-07-21 中科可控信息产业有限公司 Full-time monitoring system and server for preventing server from invading
CN116467705B (en) * 2023-01-16 2024-03-19 中科可控信息产业有限公司 Full-time monitoring system and server for preventing server from invading

Also Published As

Publication number Publication date
WO2022267345A1 (en) 2022-12-29

Similar Documents

Publication Publication Date Title
EP3355223B1 (en) Unlock method and mobile terminal
CN107566650B (en) Unlocking control method and related product
US20180203986A1 (en) Fingerprint Recognition Method and Apparatus, and Touchscreen Terminal
CN113434915A (en) Case intrusion state detection device and method and edge server
US8909952B2 (en) Power supply apparatus of computer system and method for controlling power sequence thereof
CN108132401A (en) Charge abnormal detection method, device, storage medium and mobile terminal
CN110502377B (en) Restarting test method based on CPLD
CN105022955A (en) Locking method and mobile terminal of application program
CN110569573A (en) Fault confirmation and communication method based on programmable logic device
CN113608930B (en) System chip and electronic device
CN113672306B (en) Server component self-checking abnormity recovery method, device, system and medium
CN105573209A (en) Function module monitoring and resetting method in vehicle electronic system
CN107918569B (en) Method and device for monitoring RTC chip power-down and crystal oscillator vibration-stopping
CN104915269A (en) Mobile terminal time and date information setting method and apparatus and mobile terminal
CN113806828B (en) Cover opening protection device and method
CN114077395A (en) Protection against undesirable content changes in DRAM during standby mode
CN114205801A (en) Equipment retrieving method and device and related equipment
CN110781146A (en) Event storage method, power terminal and computer-readable storage medium
CN111626223A (en) Equipment state detection method and device, electronic equipment and medium
CN111552655A (en) Method and equipment compatible with PogoPin, Y-cable and USB
KR20210045768A (en) Electronic device including power management integrated circuit and method for recovering abnormal state of the electronic device
CN109710495A (en) A kind of information processing method and electronic equipment
US20070174604A1 (en) System and method for calculating an average startup time of a computer
CN112531808A (en) Battery protection method and device based on mobile terminal
CN116093885B (en) Low-voltage protection method and device applied to model airplane electronic speed regulator

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40051328

Country of ref document: HK