Network device and secure method

A network device, network technology, applied in the direction of program control device, computer security device, internal/peripheral computer component protection, etc.

Active Publication Date: 2019-04-23
QUANTA COMPUTER INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Encrypted Authentication File

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network device and secure method
  • Network device and secure method
  • Network device and secure method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The present disclosure can be implemented in many different forms. The representative implementations are shown in the drawings and will be described in detail here. What is disclosed here is an example or depiction of a rule of the present disclosure, and it is not limited to the broadest aspect disclosed in the depicted embodiment. Within this scope, the disclosed components and limitations, such as the abstract, the content of the invention, and the embodiments, which are not clearly stated in the claims, should not be inserted in a single or integrated manner in the sense or inference. Claims. For the purpose of the detailed description of the present invention, unless expressly abandoning a single including a plurality, and vice versa; and the term "including" means "including without limitation". In addition, similar terms, such as "approximately", "almost", "substantially", "approximately", etc., can be used herein, for example, to mean "at, close to, or near" o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided is a system and method to secure a network device such as a server. The network device has a memory storing a static credential file. A basic input output system operates a security module that gathers an IP address of the router and an IP address of the network device, via a query to a network manager when power is enabled to the network device. The gathered IP addresses are compared with stored IP addresses in the static credential file. The operating system of the network device is prevented from booting if the IP addresses do not match. In addition, a baseboard management controller is operable to receive an encrypted credential file. The encrypted credential file is decrypted and compared with the static content file. The baseboard management controller shuts down power to the network device if the credential file does not match the static content file.

Description

Technical field [0001] The invention relates to a protection system for a network device, and particularly relates to the addition of security identification before allowing the power of the network device to be turned on. Background technique [0002] The advent of the cloud of computer applications has increased the demand for off-site installations, so-called data centers, which store data for remote connection to computer device users. Such a data center typically has a very large number of racks, plus a very large number of servers installed to store and manage data. For example, a typical data center may include tens of thousands or even hundreds of thousands of devices in hundreds or thousands of racks. [0003] Each server in a typical data center stores data and allows access to data from network devices. In view of the large amount of potentially valuable data, it is necessary to avoid malicious theft of data. figure 1 A data center system 10 of the prior art is shown, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCG06F9/4406H04L63/0428H04L63/0876H04L67/06G06F21/575G06F21/51G06F21/81G06F1/26H04L63/10
Inventor 汤义光钱威宇
Owner QUANTA COMPUTER INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products