Unlock instant, AI-driven research and patent intelligence for your innovation.

Intrusion detection device and method used when processor is not powered on

A technology of intrusion detection and processor, applied in faulty hardware testing methods, error detection/correction, electrical digital data processing, etc., can solve security concerns, inconvenient products, etc., and achieve the effect of simple circuit structure

Active Publication Date: 2020-11-17
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Based on AMD's current architecture, since there is no dedicated INTRUDER pin like Intel, it can only be detected when the system is powered on (S5 state) if only relying on the BMC. If the system is not powered on (G3 state), the product will be shipped If the upper cover is opened during the process, there will be safety concerns, or it will be inconvenient to sort out product problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection device and method used when processor is not powered on
  • Intrusion detection device and method used when processor is not powered on
  • Intrusion detection device and method used when processor is not powered on

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] Embodiment 1 of the present invention is an intrusion detection device used when the processor is not powered on. It uses a peak hold circuit to detect whether it has been intruded, and detects GPIO to confirm after the system is powered on. Because the power supply used before the system is powered on is a button battery, and the button battery has little power, so it is better to choose a resistor with a larger resistance value to keep the current smaller to maintain the battery life, and a capacitor with a larger value to use It can be charged to Vc within the opening time. Such as figure 1 A schematic diagram of an intrusion detection device used when the processor is not powered on is given; the upper cover of the processor is connected to the micro switch, and also includes a baseboard management controller and a detection circuit; the backup power supply of the processor is respectively connected to the baseboard management controller and a detection circuit; th...

Embodiment 2

[0033] Based on the intrusion detection device used when the processor is not powered on provided in Embodiment 1 of the present invention, Embodiment 2 of the present invention also proposes an intrusion detection method used when the processor is not powered on. Such as image 3 A road map of an intrusion detection method used when the processor is not powered on in Embodiment 2 of the present invention is given.

[0034]In step S301, the baseboard management controller acquires the level output by the detection circuit.

[0035] In step S302, it is judged whether the level received by the baseboard management controller is high level or low level, if it is high level, then execute step S303, and if it is low level, then execute step S304.

[0036] In step S303, when the level received by the baseboard management controller is a high level, it is judged that the detection circuit is disconnected, the switch module is closed, and the upper cover of the processor is in a clos...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an intrusion detection device and method used when a processor is not powered on, and the device comprises a processor upper cover which is connected with a microswitch, and also comprises a substrate management controller and a detection circuit. A standby power supply of the processor is respectively connected with the substrate management controller and the detection circuit; the detection circuit is used for controlling the opening or closing of the switch module in the detection circuit according to the level when the processor upper cover is opened or closed; the baseboard management controller is further connected with the output end of the detection circuit and judges whether the server is invaded or not by receiving the output level of the detection circuit.Based on the intrusion detection device, the invention further provides an intrusion detection method used when the processor is not powered on, and intrusion detection is achieved when the processoris not powered on through a simple circuit structure. According to the intrusion detection device, when the upper cover of the processor is opened and closed, the potential of the capacitor is kept unchanged, and the situation that the processor is intruded is avoided.

Description

technical field [0001] The invention belongs to the technical field of processor detection, in particular to an intrusion detection device and method used when the processor is not powered on. Background technique [0002] At present, home motherboards or server motherboards have an intrusion detection mechanism for security. If someone opens the cover, it can be detected, which can ensure the security of the system and facilitate tracking of whether it has been opened by someone in the event of an error. . At present, intrusion detection is accomplished by using micro switches (Micro Switch) with general-purpose input / output (GPIO, General-purpose input / output) and resistors. [0003] Generally speaking, the intrusion detection will notify the BMC. On the Intel platform, it will also be connected to the INTRUDER_N pin dedicated to the South Bridge, or some boards are connected to the INTRUDER_N pin of the Super I / O. Sometimes the pin is also called Case_Open. , that is, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F11/22
CPCG06F21/554G06F11/2236G06F11/2273
Inventor 邱勝頌
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD