Computing systems may include a system board with a number of socket connectors to couple module boards to the system board. The module boards can be hot-pluggable transceiver modules used for network data communications. The system board may be behind a faceplate.
Non-limiting examples of the present disclosure are described in the following description, read with reference to the figures attached hereto and do not limit the scope of the claims. In the figures, identical and similar structures, elements or parts thereof that appear in more than one figure are generally labeled with the same or similar references in the figures in which they appear. Dimensions of components and features illustrated in the figures are chosen primarily for convenience and clarity of presentation and are not necessarily to scale. Referring to the attached figures:
In the following detailed description, reference is made to the accompanying drawings which form a part hereof, and in which is depicted by way of illustration specific examples in which the present disclosure may be practiced. It is to be understood that other examples may be utilized and structural or logical changes may be made without departing from the scope of the present disclosure.
Managing access to electronic modules in computing systems is important in certain situations. Many electronic modules can be easily installed and hot-plugged, but the computing system may be vulnerable to non-secure electronic modules being connected to the computing system. For example, the access controls may restrict operation or functionality of the electronic module and/or manage removal of the physical module. Therefore, providing a managed method to access electronic modules using authorization provides an option for secure control of the electronic module.
A security device to control access to an electronic module is provided herein. The security device includes a lock mechanism and a control mechanism. The lock mechanism is associated with an electronic module. The control mechanism is communicatively coupled to the lock mechanism and the electronic module. The control mechanism uses an authorization mechanism to determine when to activate the lock mechanism and when to inactivate the lock mechanism.
As used herein, the term “access” refers to enabling or disabling communication and/or functionality between an electronic module and a system board or other electronic modules. For example, the device may be physically or communicatively locked or unlocked.
As used herein, the phrase “electronic module” refers to a physical subcomponent of an electronic system with multiple subcomponents, such as a server module, a storage module, and/or a networking module.
An example of the control mechanism 140 of the security device 100 is illustrated to include a control panel 240 and a module board 244 communicatively connected to a control logic 282. The control logic 282 may be present on the system board 280 or on another system board via a network interface on the system board 280. For example, the system board 280 may include the control logic 282 that communicates with the control mechanism 140. A control panel board is located under the control panel 240. The control panel board is electrically coupled to the system board 280, via a blind mate connector (not shown in
The module board 244 uses an authorization mechanism 245 to obtain data to determine the lock mechanism's 120 state and when to change the state. The authorization mechanism 245 may include a sensor and/or a button. For example, the authorization mechanism 245 includes at least one authorization device selected from the biometric sensor 246 and the contactless tag reader 247. The authorization mechanism 245 may be initiated using the access request button 222 the biometric sensors 246, and/or the contactless tag reader 247.
The security device 100 may also include an access mechanism 230 programmed to communicate with the control mechanism 140 and to provide authorization data to the control mechanism 140. For example, the access mechanism 230 may be a contactless tag 232, such as an RFID or NFC tag. The contactless tag 232, for example, may communicate with the contactless tag reader 247 on the electronic module 210. An example access mechanism 230 is illustrated as a key fob 231 that includes not only the contactless tag 232, but also includes indicators, such as light-emitting diodes (LED) 233, 234; a control button 235, and a programming device interface 236.
The key fob 231 may be used to securely lock and unlock the electronic module 210. For example, when a key fob 231 is used as the initiator, the key fob 231 is placed in proximity to the electronic module 210 to allow the contactless tag 232 to initiate communication with the contactless tag reader 247 on the electronic module 210. Alternatively, the electronic module 210 may be the initiator, and the electronic module's 210 contactless tag reader 247 reads the contactless tag 232 of the key fob 231. For example, electronic module 210 may initiate locking and unlocking through the access request button 222 that activates the contactless tag reader 247 or a higher level management mechanism. The access request button 222 allows another level of identification, in addition to the key fob's 231 proximity to the electronic module 210, to identify and remove a specific electronic module 210.
When a key fob 231 is used, the distance and actual proximity of the key fob 231 and the electronic module 210 will depend on the particular security device 100 and contactless tag 232 technology. Multiple electronic modules 210 may be adjacent to one another and the same key fob 231 may be used for one, two, or all of the electronic modules 210 depending on the settings and the type of key fob 231. For example, a key fob 231 using NFC technology may be able to distinguish one electronic module from another, while RFID may not be able to distinguish the electronic modules in close proximity. In examples where a key fob 231 with RFID is used, the access request button 222 allows specific electronic modules 210 to be identified, removed, installed, or to be operational, where multiple electronic modules may be authorized by the key fob 231.
The key fob 231 and electronic module 210 establish a dedicated and secured communication channel by exchanging information. In an example, the key fob's 231 contactless reader 247 reads the contactless tag 232 of the electronic module 210. The key fob 231 may be pre-programmed with unique identifiers (UID), such as, a UID of the key fob 231 and the UID associated with the electronic module 210. For example, the UID may be public key. The key fob 231 provides a fob public key to the electronic module 210 and requests acknowledgement from the electronic module 210. Similarly, the electronic module 210 may be pre-programmed with UIDs, such as, a UID of the electronic module 210 and the UID associated with the key fob 231. The electronic module 210 provides a module public key to the key fob 231 and requests acknowledgement from the key fob 231. After the key fob 231 and the electronic module 210 exchange their public keys and acknowledgements, each decrypts with its own private key, to establish a dedicated and secured communication channel therebetween.
After the dedicated and secure communication channel is established, the UID indicators 248, 233 on the electronic module 210 and the key fob 231 may blink. The lock/unlock indicators 249, 234 may also be blinking the same color as each other. For example, the indicators 234, 249 are amber for lock and green for unlock. Depressing the lock/unlock button (e.g., control button 235) once on the key fob 231 will lock the electronic module 210 if it was unlocked or will unlock the electronic module 210 if it was locked. The lock/unlock indicators 234, 248 may then illuminate to indicate the appropriate lock or unlock state of the electronic module 210.
The control mechanism 140 is communicatively connected to the lock mechanism 120 and the electronic module 210 to control movement of the lock mechanism 120 between a locked state and an unlocked state. The control mechanism 140 includes a control panel board 541 coupled to the electronic module 210 and a module board 244 electrically connected to the system board 280 to manage communication between the electronic module 210 and the system board 210. The control panel board 541 is where the access request button 222, the indicators 248, 249 and the biometric sensor 246 are electrically coupled to. The control panel board 541 may include logic to consolidate the signals to and from the access request button 222, the indicators 248, 249, the biometric sensor 246, and the tag/reader. The control panel board 541 is attached below the control panel 240.
The programming device interface 236 connects to an interface connector to charge the rechargeable power source 1238 of the key fob 231 and/or transmit data to program or adjust settings of the key fob 231 via the key fob control logic chip 1239. The rechargeable power source 1238 powers the key fob when it is not connected to an interface connector. The rechargeable power source 1238 may be a rechargeable battery that is charged through the programming device interface 236. The key fob control logic chip 1239 interfaces with the secure programming station control logic via the interface connector 1273. The key fob control logic chip 1239 programs the key fob 231 and enables settings and/or adjustments to be made to the key fob 231 to control access to at least one electronic module 210.
The key fob 231 may be programmed with authorization data for electronic modules 210 using the secure programming and charging station 1270, for example located on a programming station bench in a production factory. The secure programming and charging station 1270 may include a secure programming station control logic, such as, a programming control logic chip 1271 that is connected to a tag writer and antennae 1272 or an interface connector 1273, e.g., a USB connector port. The secure programming and charging station 1270 may be used in multiple ways. For example, the key fob 231 may be placed in proximity to a corresponding contactless tag writer of a secure programming and charging station 1270 to program the contactless tag 232 of the key fob 231 when using a contactless tag writer and antennae 1272. Similarly, when using an interface connector, the contactless tag 232 and/or control logic chip 1239 may be programmed by plugging the programming device interface 236 into the interface connector 1273, e.g., USB connector. Verification that a fully charged and programmed key fob 231 is correctly programmed may be accomplished by the tag reader 1237 and the antennae 1272.
In block 1304, an authorization of the request is obtained using a control mechanism communicatively connected to the lock mechanism that provides access to the electronic module. The authorization of the request may include confirming the request is properly linked to the electronic module and the request contains credentials associated with the electronic module. The credential may be obtained from an authorization mechanism, such as, a biometric sensor and/or a contactless tag reader.
In block 1306, the request is initiated after authorization is received. The request may include engaging or releasing a physical lock, such as the secure lock pin. The request may also control access to the electronic module by enabling or disabling operation of the electronic module using software or firmware methods. Before authorization and/or initiating the request, the method may also verify the status of the electronic module and/or the secured lock. For example, the method may verify that the secured lock is actuated when a request to remove the electronic module is identified. Similarly, the method may verify that secured lock is not actuated when a request to lock is received. Additional verifications may also be executed prior to authorization and/or initiation of the request.
Although the flow diagram of
The present disclosure has been described using non-limiting detailed descriptions of examples thereof and is not intended to limit the scope of the present disclosure. It should be understood that features and/or operations described with respect to one example may be used with other examples and that not all examples of the present disclosure have all of the features and/or operations illustrated in a particular figure or described with respect to one of the examples. Variations of examples described will occur to persons of the art. Furthermore, the terms “comprise,” “include,” “have” and their conjugates, shall mean, when used in the present disclosure and/or claims, “including but not necessarily limited to.”
It is noted that some of the above described examples may include structure, acts or details of structures and acts that may not be essential to the present disclosure and are intended to be examples. Structure and acts described herein are replaceable by equivalents, which perform the same function, even if the structure or acts are different, as known in the art. Therefore, the scope of the present disclosure is limited only by the elements and limitations as used in the claims.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2016/040473 | 6/30/2016 | WO | 00 |