Unlock instant, AI-driven research and patent intelligence for your innovation.

Network device and its protection method

A network device and network technology, applied in the direction of program control device, computer security device, internal/peripheral computer component protection, etc.

Active Publication Date: 2021-07-13
QUANTA COMPUTER INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Encrypted Authentication File

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network device and its protection method
  • Network device and its protection method
  • Network device and its protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The present disclosure can be embodied in many different forms. Representative implementations are shown in the drawings and described in detail herein. What is disclosed here is an example or depiction of the principles of the present disclosure and is not intended to be limited to the broadest aspect disclosed by the depicted embodiment. Within this scope, the disclosed components and limitations, such as in the abstract, summary of the invention, and embodiments, which are not explicitly stated in the claims, should not be inserted singly or integrally in a sense or inference. Claims. For the purpose of the detailed description of the present invention, unless expressly disclaims that the single includes the plural, and vice versa; and the term "comprising" means "including without limitation". Furthermore, similar terms, such as "about", "almost", "substantially", "approximately", etc., may be used herein, for example, to mean "at, close to, or in the vicinity of"...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A security system and method for a network device (eg, a server). The network device has a memory, and the memory stores a static authentication file. A basic input output system (BIOS) operates a security module. When the network device is powered on, the security module collects an IP address of the router and an IP address of the network device through a query to a network administrator. Compare the collected Internet Protocol addresses with the Internet Protocol addresses stored in the static authentication file. If the Internet Protocol addresses do not match, the operating system of the network device is not started. Additionally, a baseboard management controller may be operable to receive an encrypted authentication file. The encrypted authentication file is decrypted, and the encrypted authentication file is compared with the static content file. If the decrypted authentication file does not match the static content file, the baseboard management controller turns off the power of the network device.

Description

technical field [0001] The invention relates to a protection system of a network device, and particularly relates to adding security identification before allowing the network device to be powered on. Background technique [0002] The advent of the cloud for computer applications has increased the need for off-site installations, so-called data centers, to store data for remote connection to computer device users. Such data centers typically have a very large number of racks, plus a very large number of servers installed to store and manage data. For example, a typical data center may include tens or even hundreds of thousands of devices in hundreds or thousands of racks. [0003] Each server in a typical data center stores data and allows access to data from networked devices. In view of the large amount of potentially valuable data, malicious theft of data needs to be avoided. figure 1 A prior art data center system 10 is shown comprising a plurality of servers 12 in ra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCG06F9/4406H04L63/0428H04L63/0876H04L67/06G06F21/575G06F21/51G06F21/81G06F1/26H04L63/10
Inventor 汤义光钱威宇
Owner QUANTA COMPUTER INC