This disclosure relates generally to computer system hardware and, more particularly, computer security hardware.
Recent IT industry trends has seen a greater use of co-location datacenters to supplant/augment client IT computer infrastructure. This has resulted in an increase in the types of people who need access to areas containing such computers in order to provide on-site service support (i.e., a variety of suppliers, contractors, etc.). Consequently, the increased access has concurrently created a heightened need for system hardware security to minimizing potential tampering events. Some computer systems employ a locked door approach, whereby the emergency power off switch is maintained behind the locked door. However, this creates a problem because, in an emergency, such computer systems cannot be shut off using the switch unless/until, an appropriate person unlocks the door.
To avoid the foregoing problem, some computer systems leave the emergency power off switch and a tag or label containing certain system identification information exposed and accessible, irrespective of whether there is a door that can be locked to prevent access to the remainder of the computer equipment. However, computer systems with a universal emergency power off (UEPO) that is exposed when their enclosure is closed and locked are susceptible to the UEPO switch being switched when the system is running, either inadvertently, or intentionally.
To prevent inadvertent switching of the UEPO switch, many computer systems include a door or cover over the switch that must be slid or flipped out of the way in order to be able to move the UEPO switch. However, such an approach does noting to prevent intentional tampering with the switch.
Intentional tampering with an exposed UEPO switch (i.e., switching it off while the system is running) creates a significant problem because it would effectively interrupt system operation in the equivalent of an “unscheduled incident repair action” (UIRA). A UIRA is a hardware event that causes a system to be rebooted in full or degraded mode. It is typically caused by a non-recoverable failure in a critical hardware function which results in the need to bring a customer's system down for repair at an unscheduled time and is perhaps the single most important Reliability, Availability and Serviceability (RAS) characteristic.
Moreover, since that type of intentional tampering with the UEPO switch would be “transparent” in that it would normally appear to be a legitimate UIRA, it would likely be treated as such, resulting in a time consuming, wasteful, and fruitless search for the cause of the failure.
Thus, there is a continuing problem with maintaining the security of an exposed UEPO switch of a computer system against tampering while allowing for legitimate access in an emergency.
One aspect of this disclosure involves a security device for a universal emergency power-off (UEPO) switch of a computer system enclosure having a door that can be locked and unlocked and provide access to computer equipment within the computer system enclosure. The door has an access opening therein, the access opening provides access to both the universal emergency power-off switch and system identification information when the door is in a closed position.
The security device includes a plate body having a first portion and a second portion opposite the first portion. The first portion has a length and width sufficient to allow it to be rigidly constrained on an interior side of the door adjacent the opening. The second portion has a length and a width defining a surface, the surface including multiple openings therethrough, dimensioned to allow for ventilation through the multiple openings while substantially filling the access opening and impeding access to the UEPO switch. The second portion also has a port through which the system identification information can be viewed when the door is in a closed position and the first portion is rigidly constrained on the interior side of the door adjacent the opening. The second portion further has a hand grip near an end of the second portion opposite the first portion. The hand grip includes surface texturing sufficient to capture and retain epithelial cells from a person who grips the hand grip.
The width of part of the second portion is less than a corresponding width of the access opening.
The plate body has a deformation region, of a thickness and material, such that, when the first portion is rigidly constrained on the interior side of the door adjacent the access opening, application of a force of less than about 45 Newtons to the hand grip, directed within a range from 0° to about 45° from a right angle to the surface in a direction of the first portion, will cause plastic deformation of the plate body within the deformation region.
Advantageously, the foregoing restricts access to the UEPO switch under normal circumstances, but allows for normal access to system identification information that is typically located near the UEPO switch, as well as direct access to the UEPO switch in an emergency when the door of the computer system enclosure is closed and locked. However, when such access occurs, either illicitly or in an emergency, the plate body will be plastically deformed and thereby evidence the occurrence. In addition, epithelial cells of the person who did so will be captured by the handle, facilitating identification of the person who accessed the switch through “contact trace DNA” (also referred to as “touch DNA” or “low-level DNA”) analysis.
The foregoing and following outlines rather generally the features and technical advantages of one or more embodiments of this disclosure in order that the following detailed description may be better understood. Additional features and advantages of this disclosure will be described hereinafter, which may form the subject of the claims of this application.
This disclosure is further described in the detailed description that follows, with reference to the drawings, in which:
This disclosure provides a technical solution to address the aforementioned problems inherent with exposed UEPO switches of computer systems.
Our technical solution improves upon current locked door approaches because it does not limit access by placing the UEPO behind the locked door.
Our technical solution also improves upon the non-secure “cover” approach used with exposed UEPO switches because it provides security and a way to identify that the switch has been accessed.
Our technical solution further optionally improves upon the non-secure “cover” approach used with exposed UEPO switches because it facilitates identification of the person who accessed the switch, through capture of epithelial cells from that person so that DNA analysis can be performed.
The UEPO switch unit 100 also includes a location 106 where system identification information, for example, a system serial number, is visibly present, for example, via a label, tag or plate.
The security device 200 includes a plate body 202 made up of a first portion 204 and a second portion 206. The first portion 204 has a length (L1) and a width (W1) that are each of a size to allow the first portion 204 to be rigidly constrained on an interior side of a door of a computer enclosure, as will be shown and described in greater detail below.
The second portion 206 also has a length (L2) and a width (W2) that collectively define a surface 208 with multiple openings 210 through it. The openings 210 are present for ventilation purposes but are sized so that an object cannot easily be passed through to manipulate the cover 102 out of the way to access the UEPO switch 108 with the security device 200 in place. Although shown as round holes arranged in a rectangular array in this example implementation, the openings 210 can be square, rectangular, hexagonal, serpentine slot(s), or even part of a screen, and can be arranged in any configuration, the important aspect being their having a size and shape that allows for ventilation while inhibiting manipulation of the cover 102 when in place, not their particular size, shape or arrangement.
In addition, as will shown in greater detail below, the width W2 is such that most of the second portion 206 will substantially, but not entirely, fill the opening in the door that can be used to access the UEPO switch and thus impedes access to the UEPO switch when present.
The second portion 206 also has a port 212 through which the location 106 for the system identification information can be viewed when the security device 200 is constrained in place on the interior of a computer system enclosure's door.
Additionally, the second portion 206 includes a hand grip 214 located at or near the end 218 of the second portion 206. As shown, the hand grip 214 is formed from, and at, the end of the second portion 206, but in other implementations, it could be a separate piece that is affixed to the second portion 206 in a horizontal, vertical or other orientation.
The plate body 202 also has a deformation region 216 such that, if the security device 200 is constrained in place on the interior of a computer system enclosure's door and the door is closed, and the hand grip 214 is moved away from the door in order by an amount sufficient to obtain access to the UEPO switch, the plate body will at least be plastically deformed (and may fracture) within the deformation region 216, thereby providing a clear indication of an attempted access.
In this regard, with many implementations, the plate body 202 will have a uniform thickness and be made of a uniform material such that it will plastically deform (possibly to the extent of being frangible) when a force of less than about 45 Newtons (approx. 10 pounds) but greater than about 11 Newtons (approx. 2.5 lbs) is applied somewhere within an angle range of between 0 degrees and about 45 degrees (+/−a few degrees) off of a perpendicular to the surface 208 (i.e., some one or more angle(s), but not necessarily all angles, within that range should work). As to the approximate force values, it should be understood that they may vary, for example, by 5-10% and are based upon use of aluminum as the material for the plate body. The use of other materials or a non-uniform thickness may result in some variance in those force amounts. For purposes of understanding the potential variance, the important aspect is that the material and thickness will be selected such that, if an average person, grips the hand grip 214 and moves the second portion 206 of the security device 200 enough to obtain access to, and switch, the UEPO switch, it will be readily identifiable through an exceeding of the plastic deformation limit of the plate body 202 within the deformation region 216.
As shown by the cross-hatching in
As will be understood from
Having described and illustrated the principles of this application by reference to one or more example embodiments, it should be apparent that the embodiment(s) may be modified in arrangement and detail without departing from the principles disclosed herein and that it is intended that the application be construed as including all such modifications and variations insofar as they come within the spirit and scope of the subject matter disclosed.
Number | Name | Date | Kind |
---|---|---|---|
2224551 | Roeder | Dec 1940 | A |
2438094 | Petrullo | Mar 1948 | A |
2771521 | Cressman et al. | Jan 1956 | A |
3059069 | Sedley | Oct 1962 | A |
3093412 | Gore et al. | Jun 1963 | A |
3257517 | Sedley | Jun 1966 | A |
3497646 | Pollak | Feb 1970 | A |
3560673 | Schweitzer et al. | Feb 1971 | A |
3569645 | Lea | Mar 1971 | A |
3833781 | Rumpf | Sep 1974 | A |
3852692 | Moorman | Dec 1974 | A |
3906176 | Carlson | Sep 1975 | A |
3918459 | Horn | Nov 1975 | A |
3988724 | Anderson | Oct 1976 | A |
4431893 | Levie | Feb 1984 | A |
4538142 | Hamilton et al. | Aug 1985 | A |
4601011 | Grynberg | Jul 1986 | A |
4737776 | Wireman | Apr 1988 | A |
5520424 | Hapke et al. | May 1996 | A |
5771002 | Creek et al. | Jun 1998 | A |
5938472 | Yeun et al. | Aug 1999 | A |
6252187 | Dannenberg | Jun 2001 | B1 |
6929479 | Bellows et al. | Aug 2005 | B2 |
7825793 | Spillman et al. | Nov 2010 | B1 |
8902318 | Haddad et al. | Dec 2014 | B1 |
8902570 | Cosley et al. | Dec 2014 | B2 |
9147068 | Haddad et al. | Sep 2015 | B1 |
20020021205 | Schweitzer | Feb 2002 | A1 |
20020128769 | DerGhazarian et al. | Sep 2002 | A1 |
20040011408 | Campbell | Jan 2004 | A1 |
20040132559 | Bellows et al. | Jul 2004 | A1 |
20070089433 | McDonnell et al. | Apr 2007 | A1 |
20080224835 | Noest | Sep 2008 | A1 |
20100288260 | Castelli et al. | Nov 2010 | A1 |
20130343162 | Spychalski et al. | Dec 2013 | A1 |
20140230885 | Fyson et al. | Aug 2014 | A1 |
20150286817 | Haddad et al. | Oct 2015 | A1 |
20150288882 | Haddad et al. | Oct 2015 | A1 |
Number | Date | Country |
---|---|---|
47148 | Feb 1951 | CA |
547259 | Oct 1957 | CA |
845787 | Jun 1970 | CA |
996657 | Sep 1976 | CA |
1019369 | Oct 1977 | CA |
1187141 | May 1985 | CA |
2225628 | Jun 1999 | CA |
2258378 | Jun 2000 | CA |
2625786 | Sep 2008 | CA |
2642864 | Sep 2004 | CN |
2648990 | Nov 2004 | CN |
10127884 | Oct 2008 | CN |
201191437 | Feb 2009 | CN |
2402713 | Aug 1974 | DE |
3276776 D1 | Aug 1987 | DE |
82311 | Jun 1983 | EP |
1525519 | Apr 2005 | EP |
1004159 | Mar 2008 | EP |
1526619 | Jan 2009 | EP |
1604689 | Jan 1972 | FR |
2217237 | Sep 1974 | FR |
2217237 | Nov 1976 | FR |
1400177 | Jul 1975 | GB |
2114791 | Aug 1983 | GB |
2263012 | Oct 1990 | GB |
2266799 | Nov 1993 | GB |
2384993 | May 2004 | GB |
49112217 | Oct 1974 | JP |
4741081 | May 2011 | JP |
9418649 | Aug 1994 | WO |
9623947 | Aug 1996 | WO |
9903180 | Jan 1999 | WO |
03019779 | Mar 2003 | WO |
2004008012 | May 2004 | WO |
2013041871 | Mar 2013 | WO |
2015157208 | Oct 2015 | WO |