[go: up one dir, main page]

WO2017019075A1 - Lock control - Google Patents

Lock control Download PDF

Info

Publication number
WO2017019075A1
WO2017019075A1 PCT/US2015/042810 US2015042810W WO2017019075A1 WO 2017019075 A1 WO2017019075 A1 WO 2017019075A1 US 2015042810 W US2015042810 W US 2015042810W WO 2017019075 A1 WO2017019075 A1 WO 2017019075A1
Authority
WO
WIPO (PCT)
Prior art keywords
lock
lid
remote management
management controller
chassis
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/US2015/042810
Other languages
French (fr)
Inventor
Eric E. CAVANNA
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hewlett Packard Enterprise Development LP
Original Assignee
Hewlett Packard Enterprise Development LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Enterprise Development LP filed Critical Hewlett Packard Enterprise Development LP
Priority to PCT/US2015/042810 priority Critical patent/WO2017019075A1/en
Publication of WO2017019075A1 publication Critical patent/WO2017019075A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • HELECTRICITY
    • H05ELECTRIC TECHNIQUES NOT OTHERWISE PROVIDED FOR
    • H05KPRINTED CIRCUITS; CASINGS OR CONSTRUCTIONAL DETAILS OF ELECTRIC APPARATUS; MANUFACTURE OF ASSEMBLAGES OF ELECTRICAL COMPONENTS
    • H05K7/00Constructional details common to different types of electric apparatus
    • H05K7/14Mounting supporting structure in casing or on frame or rack
    • H05K7/1485Servers; Data center rooms, e.g. 19-inch computer racks
    • H05K7/1498Resource management, Optimisation arrangements, e.g. configuration, identification, tracking, physical location
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals

Definitions

  • a server may include various components, such as a circuit board, a processor, memory, a storage device, a graphics card, a network adapter, fans, and the like, disposed in a chassis.
  • a lid may be placed on the chassis to form an enclosed server unit.
  • a chassis may free standing or rack- mountabie.
  • FIG. 1 is a diagram of an example computing system having electronically controllable locks, according to an implementation.
  • FIG. 2 is a diagram of an example computing system having electronically controllable locks, according to an implementation.
  • FIG. 3 is a flowchart of an example method for controlling electronically controllable locks, according to an implementation.
  • FIG. 4 is a flowchart of an example method for recording a state of electronically controllable locks, according to an implementation.
  • FIG. 5 is a flowchart of an example method for transmitting lock control options based on user privileges, according to an implementation.
  • FIG. 6 is a block diagram of an example remote management controller that includes a non-transitory, machine-readable medium encoded with instructions to control an electronically controllable lock, according to an implementation.
  • FIG. 7 is a block diagram of an example remote management controller that includes a non-transitory, machine-readable medium encoded with instructions to record a state of an electronically controllable lock, according to an implementation.
  • identical reference numbers may designate similar, but not necessarily identical, elements.
  • a server may include a number of components disposed in a chassis.
  • the components of a server may include any number of: circuit boards (e.g., main system board, expansion board), processors, memory, storage devices, input/output (I/O) cards (e.g., a network adapter), cables, sockets, interconnects, heat management devices (e.g., fans), and the like.
  • Some components may be wholly disposed within the chassis and thus be deemed internal components (e.g., a processor), and some components may be at least partially exposed to the exterior of the chassis (e.g., an I/O card or a removable storage media drive may be partially exposed so as to interface with other devices or a user).
  • Some of the aforementioned components may be mounted directly to the chassis. Other components may be mounted indirectly to the chassis, for example, by mounting to a socket on a circuit board that is mounted to the chassis or by mounting to a cartridge that is mounted to the chassis. Some components may be connected to each other, for example, by a socket, a cable, an interconnect component, or another connector.
  • the server chassis may be closed by a lid.
  • the lid may be openabie or removable so as to allow access to the components for maintenance, replacement, removal, and the like.
  • high value components may be at risk for theft.
  • removing or tampering with components at an improper time such as during a server firmware upgrade, may be harmful to the operation of the server.
  • some chassis and lids may be equipped with a lock.
  • the lid may be locked and unlocked using a key.
  • a key and lock system also may lack convenience, as sharing or delegation of chassis access is accomplished by physically sharing the key. Accordingly, a remote management controller connected to locks of a computing system according to examples described herein may be useful for providing remote control, delegation, and monitoring of access to the components of a computing system.
  • FIG. 1 is a diagram of an example computing system 100 having electronically controllable locks, according to an implementation, in some implementations, the computing system 100 may be a desktop computer, a workstation, a laptop computer, a server, a network switch, a storage array, or other like computing systems.
  • the computing system 100 may include a chassis 102 to receive at least one component, in some implementations, the at least one component may be mounted or installed into the chassis 102, either directly or indirectly.
  • the component may be deemed at least partially internal to the chassis 102 and, more generally, the computing system 100.
  • the chassis 102 may be a free-standing chassis, a rack- mountable chassis, a blade, or other types of computing system chassis.
  • Examples of the at least one component may include a processor 104, memory 106 (e.g., a dual-inline memory module), and/or a storage device 108 (e.g., a hard disk drive, a solid state drive, a hard disk drive array, a tape drive, an optical drive, a removable media drive, or the like).
  • the at least one component also may be a circuit board 1 10.
  • implementations of the computing system 100 may include different types, combinations, or quantities of circuit boards 1 10, and examples of such circuit boards 1 10 may include a main system board (e.g., a motherboard), a power backplane board, an input/output (I/O) backplane board (e.g., which may include peripheral component interconnect (PCI) slots, PCi-X slots, PCI Express slots, or the like), a peripheral interface board (e.g., which may include keyboard, mouse, and Universal Serial Bus ports, or the like), a processor board, a memory board, or an expansion card 1 12 (also referred to as an I/O card, and may include, e.g., a PCI card, PCI-X card, PCI Express card, or the like).
  • a main system board e.g., a motherboard
  • I/O input/output
  • components may include, for example, a power supply, a peripheral connector such as a Universal Serial Bus interface with a peripheral device, a thermal management device such as a fan, and/or a component-to-component connector such as a cable, a circuit board interconnect 1 14, and/or the like.
  • a peripheral connector such as a Universal Serial Bus interface with a peripheral device
  • a thermal management device such as a fan
  • a component-to-component connector such as a cable, a circuit board interconnect 1 14, and/or the like.
  • the computing system 100 may also include a remote management controller 1 18,
  • the remote management controller 1 18 may be implemented as a set of instructions encoded on a machine readable medium and executable by a processor (e.g., such as microprocessor, an application- specific integrated circuit, a field programmable gate array, and/or other hardware device suitable for retrieval and/or execution of instructions).
  • a processor e.g., such as microprocessor, an application- specific integrated circuit, a field programmable gate array, and/or other hardware device suitable for retrieval and/or execution of instructions.
  • the remote management controller 1 16 may be implemented as a hardware device comprising electronic circuitry. In some implementations, the remote management controller 1 16 may reside on a circuit board 1 10, which may be inside the chassis 102. In some
  • the remote management controller 1 16 may be a lights out management controller or the like, and may include any kind of wired or wireless network interface to provide or form part of an out-of-band network path.
  • an accessing device 150 such as a desktop computer, a workstation, a laptop computer, a server, a smartphone, a tablet computer, or the like, that is external to the chassis 102 and separate from the computing system 100, may communicate with the remote management controller 1 18 via the out-of-band network path, such that a user of the accessing device 150 can remotely manage aspects of the computing system 100, such as firmware or hardware settings, remote rebooting, remote installation, system diagnostics, and logging.
  • the user at the accessing device 150 may manage the computing system 100 during normal operation of the computing system 100, in the event of a failure of the computing system 100, or even when the computing system 100 has been powered off.
  • the remote management controller 1 16 may maintain different user profiles for different users or groups of users. Each of the user profiles may have associated user privileges, and more particularly, the user privileges may be permission to perform some or all of the remote management functions described above (e.g., managing firmware/hardware settings, remote rebooting, remote installation, system diagnostics, etc.). For example, some user profiles may be standard users and have a limited set of privileges, such as diagnostic privileges only.
  • Other user profiles may be administrators and have a full set of privileges, including privileges to alter operation of the computing system 100 (e.g., managing firmware/hardware settings).
  • the remote management controller 1 16 also may provide its remote access and management functionality and user privilege sets to the management of electronically controllable locks of the computing system 100 and
  • the computing system 100 also may include a removable lid 120 to close the chassis 102.
  • the chassis 102 may have an opening by which components inside the chassis 102 may be accessed (e.g., for removal, servicing, configuring, etc.), and the lid 120 may be affixed to the chassis 102 to close the chassis 102 and enclose the components within the chassis 102.
  • the lid 120 By virtue of closing the chassis 102 with the lid 120, at least some components inside the closed chassis 102 may be physically inaccessible until the lid 120 is removed or opened (with a possible example exception of portions of the components that are intentionally exposed to the exterior of the computing system 100, such as a port of an expansion card 1 12).
  • the lid 120 is depicted in FIG.
  • a lid state sensor 122 may be disposed on the chassis 102 (or alternatively, on the lid 120). The lid state sensor 122 may detect when the lid 120 is open or closed with respect to the chassis 102, and indicate respectively a lid open state or a lid closed state to the remote management controller 1 16.
  • the lid state sensor 122 may be a magnetic or mechanical contact switch, in some implementations, the remote management controller 1 16 may store the lid open state or lid closed state information in an event log, together with time- stamps or other applicable log information, thus creating a historical record of the lid open or closed state.
  • the remote management controller 1 18 may store such an event log in non-volatile memory of the remote management controller 1 18 or in the storage device 108.
  • the computing system 100 also may include at ieast one electronically controllable lock, and more particularly, may include an electronic lid lock 124, at ieast one an electronic component lock (e.g., 128, 128, 130, 132, 134, or 136, to be described further herein below), or both an electronic lid lock 124 and at ieast one electronic component lock.
  • the electronic locks may also be referred to as electronically controllable locks.
  • the electronic lid lock and the electronic component lock may be collectively referred to herein as "the locks.” in some implementations, the computing system 100 may include an electronic lid lock 124 to secure the lid 120 to the chassis 102.
  • the electronic lid lock 124 may be a solenoid bolt lock, a motorized rotary lock, or the like, and may be disposed or mounted in or on the chassis 102. in response to a lock or unlock signal (e.g., a digital signal, an analog signal, a voltage signal, etc.), the electronic lid lock 124 may engage a complementary catch 125 on the lid 120 to secure the lid 120 to the chassis 102 or may disengage the catch 125 to allow the lid 120 to be removed, respectively.
  • the electronic lid lock may be disposed on the lid 120 and the catch may be disposed on the chassis 102.
  • both the electronic lid lock and the catch may be disposed on the lid 120 (or alternatively, in or on the chassis 102), and engaging the electronic lid lock to the catch may prevent the lid 120 from being removed, while disengaging the electronic lid lock from the catch may allow the lid 120 to be removed.
  • Other electronic lid lock mechanisms may be suitable to secure the lid 120 to the chassis 102.
  • the computing system 100 includes an electronic component lock disposed in or on the chassis 102 to secure a component, and more particularly, to secure the component to the chassis 102.
  • an electronic component lock 128 may secure the processor 104
  • an electronic component lock 128 may secure the memory 106
  • an electronic component lock 130 may secure the storage device 108
  • an electronic component lock 132 may secure a circuit board 1 10
  • an electronic component lock 134 may secure an I/O or expansion card 1 12
  • an electronic component lock 136 may secure the circuit board interconnect 1 14. It should be understood that different implementations of the computing system 100 may include more or fewer of the electronic component locks illustrated in FIG. 1.
  • An electronic component lock may be a solenoid bolt lock, a motorized rotary lock, or the like, that engages, clamps, or physically integrates with the corresponding component in response to a lock signal, and disengages, unclamps, or disconnects from the corresponding component in response to an unlock signal.
  • the specific type of lock may depend on the size, shape, position, or other characteristic of the corresponding component that it secures, in some implementations, an electronic component lock may secure multiple components.
  • Some of the aforementioned electronic component locks may secure a corresponding component to the chassis 102 directly, for example, where the lock itself is mounted securely to the chassis 102 and the lock engages the component so as to secure the component to the chassis 102.
  • Others of the aforementioned electronic component locks may secure the corresponding component to the chassis 102 indirectly, for example, by securing the component to a socket, a cartridge, or the like, which in turn is either mounted securely to the chassis 102 or secured by another lock to the chassis 102.
  • the electronic component lock 136 circuit board interconnect 1 14 may secure two or more interconnected circuit boards 1 10 to each other.
  • Other components not shown on FIG. 1 such as a power supply, a peripheral connector, a thermal management device, or a cable, may be understood to also be securable to the chassis 102 by an electronic component lock in a manner described above.
  • the remote management controller 1 16 may be connected to the locks, in some implementations, the remote management controller 1 16 may control the locking or unlocking of each of the electronic lid lock 124 and/or the electronic component lock 126, 128, 130, 132, 134, 136 independently, by transmitting a lock or unlock signal (as described above) to individual ones of the locks.
  • the lock or unlock signal may be a digital signal, an analog signal, a voltage signal, etc., depending on the type of lock.
  • each of the locks may indicate their respective locked or unlocked state to the remote management controller 1 18.
  • the remote management controller 1 18 may poll (or query or read) the locked or unlocked state of the locks, or the locks may report their respective locked or unlocked states to the remote management controller 1 18.
  • the remote management controller 1 18 may store the locked states or unlocked states of the locks in the aforementioned event log, thus creating a historical record of the locked or unlocked states.
  • the remote management controller 1 16 may receive a lock control command from the accessing device 150 external to the chassis 102, and may control the electronic lid lock 124 or the electronic component lock 128, 128, 130, 132, 134, 138 according to the lock control command.
  • the lock control command may be a command (e.g., an Application Programming interface, or API, function call; an electronic instruction; a control signal; etc.) to lock or unlock a particular lock of the locks.
  • the lock control command may be a real-time command that the remote management controller 1 16 carries out upon receipt (or as soon as possible after receipt) from the accessing device 150.
  • the lock control command may include a time, date, or a delay to schedule when the remote management controller 1 16 will lock or unlock a particular lock of the locks.
  • the lock control command may include an event trigger that the remote management controller 1 18 waits for before locking or unlocking a particular lock of the locks.
  • the lock control command may instruct the remote management controller 1 16 to lock the electronic lid lock 124 upon detection of a lid closed state (by the lid state sensor 122) or upon a change from a lid open state to a lid closed state.
  • the lock control command may confirm whether the lock control command has been successfu!ly carried out (e.g., by polling the state of the lock identified in the lock control command and/or by polling the lid state sensor 122) and send a success or failure response to the accessing device 150 accordingly.
  • the remote management controller 1 16 also may transmit the event log (containing historical information about the lid open state, lid closed state, locked states of the locks, and/or unlocked states of the locks) to the accessing device 150, via the out-of-band network path or another wired or wireless network path.
  • the event log may be transmitted in response to an event log request from the accessing device 150.
  • the event log may be transmitted as a report or as raw data, in some implementations, the remote management controller 1 16 may send a notification (or an alert) related to a lid open state, a lid closed state, a locked state, or an unlocked state.
  • the remote management controller 1 18 may be configured to send such a notification at the moment the lid 120 is opened, if the lid 120 is left opened for a predefined period of time (e.g., 1 hour, 24 hours, or another period), at the moment a lock is opened, or if a lock is left in its unlocked state for a predefined period of time (e.g., 1 hour, 24 hours, or another period).
  • a notification may also be sent when the lid 120 is closed or a lock is set to their locked state.
  • the notification may be, for example, an email, an instant messaging service notification, a short message service notification, a multimedia message service notification, a voice or audio message, a programmatic message (e.g., an HTTP request), or the like, in some implementations, the notification may be addressed to a designated recipient (or recipients), such as an administrator or a person who oversees or audits access to the computing system 100.
  • the remote management system 1 16 may include on-board email or message sending capabilities, or may access external email or message sending services via application program interfaces of those external services.
  • the remote management controller 1 16 may administer (or apply or enforce) user privileges related to the electronic lid lock 124 or the electronic component lock 126, 128, 130, 132, 134, 136.
  • Such lock-related user privileges may be associated with the aforementioned user profiles of the remote management controller 1 16.
  • an administrator user profile may have a full set of system administration privileges as described above (e.g., managing firmware/hardware settings, etc.) and may also have full privileges to manage the locks, while a standard user profile may have limited or no privileges to manage operation of the computing system 100 or the locks.
  • administrator user profiles may have user privileges to lock or unlock the locks at any time, and accordingly, the remote management controller 1 18 may control the locks according to a lock control command from such administrator users at any time.
  • Some standard user profiles may have user privileges to lock or unlock the locks according to a schedule, such as during weekday working hours (e.g., 8:00 AM to 5:00 PM, Monday through Friday), and accordingly, the remote management controller 1 16 may control the locks according to a lock control command from such standard users only during the scheduled times and may ignore lock control commands during other times, in another example, some user profiles may have privileges to lock the locks but not unlock the locks. In another example, some user profiles may have privileges to request or access the event log.
  • some user profiles may have user privileges to create user profiles or to modify the user privileges of existing user profiles, including the schedule according to which those user profiles may lock or unlock the locks.
  • Some user profiles may have user privileges to modify the configuration of the remote management controller 1 18, such as how the event log or notifications are sent (e.g., via email, message, to the accessing device 150, etc.), the contact information of the designated recipient (e.g., email address, phone number, short message service number or address, etc.), when the event log or notifications are sent, and other lock-related rules.
  • the event log or notifications e.g., via email, message, to the accessing device 150, etc.
  • the contact information of the designated recipient e.g., email address, phone number, short message service number or address, etc.
  • the remote management controller 1 16 may send a notification to a designated recipient (e.g., in a manner similar to that described above) in response to changes in user privileges.
  • the remote management controller 1 16 may respond or react to predetermined events of the computing system 100. For example, the remote management controller 1 16 may temporarily alter (e.g., revoke or suspend) user privileges to lock or unlock the electronic lid lock 124 or the electronic component lock 126, 128, 130, 132, 134, 136 during predetermined events (or states) of the computing system 100. in some implementations, such alteration of privileges may also apply to administrator level user profiles.
  • the remote management controller 1 16 may lock the electronic lid lock 124 or the electronic component lock 126, 128, 130, 132, 134, 136 during or in response to the predetermined events, automatically or independent of a lock control command.
  • the remote management controller 1 16 also may unlock the locks after the predetermined event has completed.
  • Examples of predetermined events that may trigger temporary alteration of user privileges or locking of a lock include events where removal of a component of the computing system 100 may damage or otherwise interfere with operation of the computing system 100 (even if the component is hot-swappab!e, for example), such as during a firmware upgrade process, during a safety-critical or life-critical operation, in a high- availability system, or the like. At least some of the foregoing predetermined events also may be used as the above-described event trigger included in a lock control command received from the accessing device 150.
  • the predetermined events may be preprogrammed into the remote management controller 1 16, and the remote management controller 1 16 may monitor the computing system 100 for the events.
  • the computing system 100 (or more particularly, an operating system, an application, or the like, executing on the computing system 100) may cause the predetermined events, and the source of the predetermined event may instruct the remote management controller 1 16 to alter privileges or lock or unlock a lock.
  • a firmware update application executing on the computing system 100 may be designed to instruct the remote management controller 1 16 (e.g., via an API function call, which may differ from the lock control command API function call) to lock some or all of the locks prior to updating firmware, and then may instruct the remote management controller 1 18 to unlock those locks after the firmware update is complete.
  • the remote management controller 1 16 e.g., via an API function call, which may differ from the lock control command API function call
  • the remote management controller 1 16 may transmit options related to the above described user privileges to the accessing device 150.
  • the options transmitted may depend on the privileges of the user profile logged on to the remote management controller 1 16 through the accessing device 150.
  • the accessing device 150 may present the options to the user operating the accessing device 150, on a display for example, and at least some of the options may be selectable, in some implementations,
  • the remote management controller 1 18 may include an embedded web server that transmits the options, the event log, a present state of the lid or the locks, and other information to the accessing device 150 as a web page, JavaScript Object Notation data, Extensible Markup Language data, or the like, in some implementations, the remote management controller 1 16 may receive the lock control command from the accessing device 150 based on the transmitted options via the web page.
  • FIG. 2 is a diagram of an example computing system 200 having electronically controllable locks, according to an implementation.
  • the computing system 200 includes a chassis 202 to receive a component 204 (e.g., a processor, memory, a storage device, a circuit board, etc.) and a removable lid 208 to close the chassis 204.
  • the computing system 200 also includes an electronic lid lock 208 to secure the lid 206 to the chassis 202 and an electronic component lock 210 disposed in or on the chassis 202 to secure the component 204.
  • the computing system 200 also includes a remote management controller 212 to receive a lock control command from an accessing device 220 external to the chassis 202 and to control the electronic lid lock 208 or the electronic component lock 210 according to the lock control command.
  • the electronic lid lock 208 may be disposed in or on the chassis 202.
  • the remote management controller 212 may be included inside the chassis 202.
  • F!G. 3 is a flowchart of an example method 300 for controlling electronically controllable locks, according to an implementation.
  • Method 300 may be described below as being executed or performed by a remote management controller 1 16 of a computing system 100 described above with respect to FIG. 1 .
  • Various other remote management controllers may be used as well, such as, for example, the remote management controller 212 of FIG. 2.
  • Method 300 may be implemented in the form of executable instructions stored on a machine-readable storage medium and executed by at least one processor of the remote management controller 1 16, and/or in the form of electronic circuitry.
  • one or more blocks of method 300 may be executed substantially concurrently or in a different order than shown in FIG. 3.
  • method 300 may include more or fewer blocks than are shown in FIG. 3. In some implementations, one or more of the blocks of method 300 may, at certain times, be ongoing and/or may repeat.
  • the method 300 may begin at block 302, and continue to block 304, where a remote management controller 1 16 of a computing system (e.g., 100) may receive a lock control command via an out-of-band network transmission.
  • the lock control command may be transmitted by an accessing device (e.g., 150) and may be a command to lock or unlock an electronically controllable lock of the computing system 100.
  • the remote management controller 1 16 may control electronically controllable locks of a chassis (e.g., 102) of the computing system 100 according to the lock control command received at block 304.
  • the electronically controllable locks may include a lid lock (e.g., 124) to secure a lid (e.g., 120) to the chassis and a component lock (e.g., 126, 128, 130, 132, 134, 136) to secure a component (e.g., 104, 106, 108, 1 10, 1 12, 1 14) of the computing system to, for example, the chassis.
  • a lid lock e.g., 124
  • a component lock e.g., 126, 128, 130, 132, 134, 1366
  • a component e.g., 126, 128, 130, 132, 134, 1366
  • Method 400 may be implemented in the form of executable instructions stored on a machine-readable storage medium and executed by at least one processor of the remote management controller 1 18, and/or in the form of electronic circuitry. In some implementations of the present disclosure, one or more blocks of method 400 may be executed substantially concurrently or in a different order than shown in FIG. 4. In some
  • method 400 may include more or fewer blocks than are shown in FIG. 4. In some implementations, one or more of the blocks of method 400 may, at certain times, be ongoing and/or may repeat.
  • the method 400 may begin at block 402, and continue to block 404, where the remote management controller 1 16 of a computing system (e.g., 100) may record an open state of a lid (e.g., 120), a closed state of the lid, locked states of electronically controllable locks (e.g., 124, 126, 128, 130, 132, 134, 136), or unlocked states of the electronically controllable locks, in an event log.
  • the event log may be stored in a non-volatile memory of the remote management controller 1 16 or in a storage device available to the computing system (e.g., a hard drive, a solid state drive, a removable media drive, a networked storage, etc.).
  • the remote management controller 1 16 may generate a report based on the event log.
  • the report may be raw data from the event log (or a portion thereof) or may be a summary of the event log (or a portion thereof), and may be a data file, an email, or other type of electronic document (e.g., a
  • the remote management controller 1 16 may transmit the report generated at block 406 to an accessing device (e.g., 150) or a designated recipieni.
  • the remote management controller 1 16 may transmit the report via an out-of-band network path or another wired or wireless network path, in some implementations, the report may be transmitted in response to a report request from the accessing device or the designated recipient. In some implementations, the report may be transmitted to the accessing device or the designated recipient at scheduled times.
  • the designated recipient may be, for example, an administrator of the computing system 100 or a person who audits access to the computing system 100.
  • the method 400 may end.
  • FIG. 5 is a flowchart of an example method for transmitting lock control options based on user privileges, according to an implementation.
  • Method 500 may be described below as being executed or performed by a remote management controller 1 16 of a computing system 100 described above with respect to FIG. 1.
  • Various other remote management controllers may be used as well, such as, for example, the remote management controller 212 of FIG. 2.
  • Method 500 may be implemented in the form of executable instructions stored on a machine-readable storage medium and executed by at least one processor of the remote management controller 1 18, and/or in the form of electronic circuitry, in some implementations of the present disclosure, one or more blocks of method 500 may be executed substantially concurrently or in a different order than shown in FIG. 5.
  • method 500 may include more or fewer blocks than are shown in FIG. 5. in some implementations, one or more of the blocks of method 500 may, at certain times, be ongoing and/or may repeat.
  • the method 500 may begin at block 502, and continue to block 504, where the remote management controller 1 16 of a computing system (e.g., 100) may maintain (or store or administer) user profiles, each of the user profiles having associated user privileges.
  • the remote management controller 1 16 of a computing system e.g., 100
  • the user privileges may include privileges to lock or unlock electronically controllable locks of the computing system (and more particularly, at or during all times or according to a schedule), privileges to modify the user privileges of user profiles, or other privileges.
  • the remote management controller 1 16 may receive, from an accessing device (e.g., 150) external to the computing system, authentication data for a user profile (e.g., a user name and password, or the like). For example, a user of the accessing device may enter authentication data at the accessing device, and the accessing device may transmit the authentication data via an out-of-band network path or another wired or wireless network path to the remote management controller 1 16.
  • the remote management controller 1 16 may transmit to the accessing device, lock control options based on the user privileges associated with the user profile.
  • the remote management controller 1 16 may transmit the lock control options as a web page for display on the accessing device, and the lock control options may include options to lock at least one of the electronically controllable locks, to unlock at least one of the electronically controllable locks, to modify lock-related user privileges of user profiles, to modify configuration details of the remote management controller 1 16, or to request a report based on an event log.
  • the remote management controller 1 16 may transmit different lock control options depending on the logged on user profile. For example, if the authentication data correspond to an administrator user profile, the remote management controller 1 16 may transmit a full set of lock control options.
  • the remote management controller 1 16 may transmit a more limited set of lock control options (e.g., a lock option, but no unlock option; lock and/or unlock options only during scheduled times).
  • a more limited set of lock control options e.g., a lock option, but no unlock option; lock and/or unlock options only during scheduled times.
  • FIG. 6 is a block diagram illustrating a remote management controller 600 that includes a machine-readable medium encoded with instructions to control an electronically controllable lock, according to an implementation, in some implementations, the remote management controller 600 may serve as or form pari of the remote management controller 1 16 of FIG. 1 or the remote management controller 212 of FIG. 2. In some implementations, the remote management controller 600 may include at least one processor 602 coupled to a machine-readable medium 604.
  • the processor 602 may include a single-core processor, a multi-core processor, an application-specific integrated circuit, a field programmable gate array, and/or other hardware device suitable for retrieval and/or execution of instructions from the machine-readable medium 604 (e.g., instructions 606, 608, 610, 612) to perform functions related to various examples. Additionally or alternatively, the processor 602 may include electronic circuitry for performing the functionality described herein, including, but not limited to, the functionality of instructions 606, 608, 610, and/or 612. With respect to the executable instructions represented as boxes in FIG.
  • the remote management controller 600 may be installed or disposed in a computing system (e.g., computing system 100 or 200) and may be connected to at least one electronically controllable lock of the computing system.
  • the electronically controllable lock may include a lid lock to secure a lid to a chassis of the computing system, or a component lock to secure a component of the computing system (e.g., a processor, memory, a storage device, a circuit board, etc.) to the chassis.
  • the remote management controller 600 may communicate with an accessing device (e.g., a device that is separate from the computing system) via an out-of-band network path.
  • the machine-readable medium 604 may be any medium suitable for storing executable instructions, such as random access memory (RAM), electrically erasable programmable read-only memory (EEPRO ), flash memory, hard disk drives, optical discs, and the like.
  • the machine-readable medium 604 may be a tangible, non- transitory medium, where the term "non-transitory" does not encompass transitory propagaiing signals.
  • the machine-readable medium 604 may be encoded with a set of executable instructions 808, 608, 810, 612,
  • Instructions 606, when executed by the processor 602, may receive, from an accessing device, authentication data for a user profile (e.g., a user name and password).
  • a user profile e.g., a user name and password
  • the remote management controller 600 may store user profiles and user privileges associated with those user profiles.
  • the user privileges may include a privilege to lock an electronically controllable lock of the computing system in which the remote management controller 600 is installed or a privilege to unlock the electronically controllable lock, and the transmitted lock control options may be a lock option or an unlock option, respectively.
  • a user privilege may include privileges to lock or unlock the electronically controllable lock according to a schedule, and instructions 608 may transmit lock or unlock options if the schedule indicates the user profile is allowed to perform those operations at the present time (e.g., at the time the authentication data is received).
  • instructions 608 may transmit lock or unlock options if the schedule indicates the user profile is allowed to perform those operations at the present time (e.g., at the time the authentication data is received).
  • the user privileges may include privileges to lock or unlock particular ones of a plurality of electronically controllable locks (e.g., a lid lock 124, a processor lock 126, a memory lock 128, etc.) but not others of the electronically controllable locks, and instructions 608 may transmit lock or unlock options for each of the particular electronically controllable locks, in some implementations, the user privileges may include a privilege to alter user privileges of user profiles or configuration details of the remote management controller 1 18, and instructions 808 may transmit the configurable options for those user privileges or the remote management controller 1 16.
  • the accessing device may present the privilege-based lock control options to a user (e.g., as buttons or text on a display), and the user may make a selection from among the lock control options at the accessing device.
  • instructions 610 when executed by the processor 602, may receive a lock control command (e.g., an API function call, an electronic instruction, a control signal, etc.).
  • the lock control command may be received from the accessing device and may relate to the selection made by the user from among the lock control options.
  • the accessing device may run a script or an application to interface with the remote management controller 1 18 (e.g., without user input), and the script or application may be designed or programmed to recognize lock control options transmitted by instructions 608 and generate a lock control command in response to those lock control options.
  • Instructions 612 when executed by the processor 602, may control an electronically controllable lock of the computing system according to the received lock control command.
  • FIG. 7 is a block diagram illustrating a remote management controller 700 that includes a machine-readable medium encoded with instructions to record a state of an electronically controllable lock, according to an implementation.
  • the remote management controller 700 includes a processor 702 and a machine-readable medium 704, which may be analogous in many respects to the processor 602 and the machine-readable medium 604, respectively.
  • the machine-readable medium 704 may be encoded with a set of executable instructions 706, 708, 710, 712.
  • the processor 702 may include electronic circuitry for performing the functionality described herein, including, but not limited to, the functionality of instructions 706, 708, 710, 712.
  • the remote management controller 700 may be connected to at least one electronically controllable lock of the computing system, such as a lid lock to secure a lid to a chassis of a computing system or a component lock to secure a component of the computing system to the chassis.
  • instructions 706, when executed by the processor 702 may record, in an event log, an open state of the lid, a closed state of the lid, a locked state of the electronically controllable lock, or an unlocked state of the electronically controllable lock.
  • Instructions 708, when executed by the processor 702, may generate a report based on the event log.
  • Instructions 710, when executed by the processor 702, may transmit the report to an accessing device or a designated recipient.
  • the report may be transmitted in response to a request or on a scheduled basis.
  • Instructions 712 when executed by the processor 702, may send a notification related to the open state of the lid, the closed state of the lid, the locked state of the electronically controllable lock, the unlocked state of the electronically controllable lock, or changes in user privileges.
  • the notification may be sent in response to the lid being opened or if the lid is in an open state for a predetermined amount of time.
  • a lid lock or component locks of a computing system may be controlled remotely and programmatically.
  • control of the locks may be delegated by modifying or creating user profiles to have the appropriate user privileges for controlling the locks, and more particularly, such delegated user privileges may be altered or restricted according to a schedule.
  • the remote management controller recording lid states (open/closed) or lock states (lock/unlock) in an event log, access to the components of the computing system 100 may be audited and monitored.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Lock And Its Accessories (AREA)

Abstract

Example implementations relate to a remote management controller of a computing system that receives a lock control command from an accessing device. The remote management controller may control an electronically controllable lock of the computing system according to the lock control command. For example, the electronically controllable lock may be a lid lock to secure a lid to a chassis of the computing system or a component lock to secure a component of the computing system.

Description

LOCK CONTROL BACKGROUND
[0001 ] A server may include various components, such as a circuit board, a processor, memory, a storage device, a graphics card, a network adapter, fans, and the like, disposed in a chassis. A lid may be placed on the chassis to form an enclosed server unit. A chassis may free standing or rack- mountabie.
BR!EF DESCR!PT!ON OF THE DRAWINGS
[0002] Various examples will be described below with reference to the following figures.
[0003] FIG. 1 is a diagram of an example computing system having electronically controllable locks, according to an implementation.
[0004] FIG. 2 is a diagram of an example computing system having electronically controllable locks, according to an implementation.
[0005] FIG. 3 is a flowchart of an example method for controlling electronically controllable locks, according to an implementation.
[0006] FIG. 4 is a flowchart of an example method for recording a state of electronically controllable locks, according to an implementation.
[0007] FIG. 5 is a flowchart of an example method for transmitting lock control options based on user privileges, according to an implementation.
[0008] FIG. 6 is a block diagram of an example remote management controller that includes a non-transitory, machine-readable medium encoded with instructions to control an electronically controllable lock, according to an implementation.
[0009] FIG. 7 is a block diagram of an example remote management controller that includes a non-transitory, machine-readable medium encoded with instructions to record a state of an electronically controllable lock, according to an implementation. [0010] Throughout the drawings, identical reference numbers may designate similar, but not necessarily identical, elements.
DETASLED DESCRIPTION
[001 1 ] A server may include a number of components disposed in a chassis. For example, the components of a server may include any number of: circuit boards (e.g., main system board, expansion board), processors, memory, storage devices, input/output (I/O) cards (e.g., a network adapter), cables, sockets, interconnects, heat management devices (e.g., fans), and the like. Some components may be wholly disposed within the chassis and thus be deemed internal components (e.g., a processor), and some components may be at least partially exposed to the exterior of the chassis (e.g., an I/O card or a removable storage media drive may be partially exposed so as to interface with other devices or a user). Some of the aforementioned components, such as a circuit board for example, may be mounted directly to the chassis. Other components may be mounted indirectly to the chassis, for example, by mounting to a socket on a circuit board that is mounted to the chassis or by mounting to a cartridge that is mounted to the chassis. Some components may be connected to each other, for example, by a socket, a cable, an interconnect component, or another connector.
[0012] The server chassis may be closed by a lid. The lid may be openabie or removable so as to allow access to the components for maintenance, replacement, removal, and the like. However, high value components may be at risk for theft. Moreover, in some situations, removing or tampering with components at an improper time, such as during a server firmware upgrade, may be harmful to the operation of the server. To prevent unauthorized removal or tampering with the components, some chassis and lids may be equipped with a lock. The lid may be locked and unlocked using a key. Although such a key and lock system may prevent unauthorized access, a key may be misplaced or stolen. A key and lock system also may lack convenience, as sharing or delegation of chassis access is accomplished by physically sharing the key. Accordingly, a remote management controller connected to locks of a computing system according to examples described herein may be useful for providing remote control, delegation, and monitoring of access to the components of a computing system.
[0013] Referring now to the figures, FIG. 1 is a diagram of an example computing system 100 having electronically controllable locks, according to an implementation, in some implementations, the computing system 100 may be a desktop computer, a workstation, a laptop computer, a server, a network switch, a storage array, or other like computing systems. The computing system 100 may include a chassis 102 to receive at least one component, in some implementations, the at least one component may be mounted or installed into the chassis 102, either directly or indirectly. In some
implementations, the component may be deemed at least partially internal to the chassis 102 and, more generally, the computing system 100. In some implementations, the chassis 102 may be a free-standing chassis, a rack- mountable chassis, a blade, or other types of computing system chassis.
[0014] Examples of the at least one component may include a processor 104, memory 106 (e.g., a dual-inline memory module), and/or a storage device 108 (e.g., a hard disk drive, a solid state drive, a hard disk drive array, a tape drive, an optical drive, a removable media drive, or the like). The at least one component also may be a circuit board 1 10. Various
implementations of the computing system 100 may include different types, combinations, or quantities of circuit boards 1 10, and examples of such circuit boards 1 10 may include a main system board (e.g., a motherboard), a power backplane board, an input/output (I/O) backplane board (e.g., which may include peripheral component interconnect (PCI) slots, PCi-X slots, PCI Express slots, or the like), a peripheral interface board (e.g., which may include keyboard, mouse, and Universal Serial Bus ports, or the like), a processor board, a memory board, or an expansion card 1 12 (also referred to as an I/O card, and may include, e.g., a PCI card, PCI-X card, PCI Express card, or the like). Other examples of components may include, for example, a power supply, a peripheral connector such as a Universal Serial Bus interface with a peripheral device, a thermal management device such as a fan, and/or a component-to-component connector such as a cable, a circuit board interconnect 1 14, and/or the like.
[0015] The computing system 100 may also include a remote management controller 1 18, The remote management controller 1 18 may be implemented as a set of instructions encoded on a machine readable medium and executable by a processor (e.g., such as microprocessor, an application- specific integrated circuit, a field programmable gate array, and/or other hardware device suitable for retrieval and/or execution of instructions).
Additionally or alternatively, the remote management controller 1 16 may be implemented as a hardware device comprising electronic circuitry. In some implementations, the remote management controller 1 16 may reside on a circuit board 1 10, which may be inside the chassis 102. In some
implementations, the remote management controller 1 16 may be a lights out management controller or the like, and may include any kind of wired or wireless network interface to provide or form part of an out-of-band network path. For example, an accessing device 150, such as a desktop computer, a workstation, a laptop computer, a server, a smartphone, a tablet computer, or the like, that is external to the chassis 102 and separate from the computing system 100, may communicate with the remote management controller 1 18 via the out-of-band network path, such that a user of the accessing device 150 can remotely manage aspects of the computing system 100, such as firmware or hardware settings, remote rebooting, remote installation, system diagnostics, and logging. By virtue of communicating with the remote management controller 1 16 via the out-of-band network path, the user at the accessing device 150 may manage the computing system 100 during normal operation of the computing system 100, in the event of a failure of the computing system 100, or even when the computing system 100 has been powered off. In some implementations, the remote management controller 1 16 may maintain different user profiles for different users or groups of users. Each of the user profiles may have associated user privileges, and more particularly, the user privileges may be permission to perform some or all of the remote management functions described above (e.g., managing firmware/hardware settings, remote rebooting, remote installation, system diagnostics, etc.). For example, some user profiles may be standard users and have a limited set of privileges, such as diagnostic privileges only. Other user profiles may be administrators and have a full set of privileges, including privileges to alter operation of the computing system 100 (e.g., managing firmware/hardware settings). As will be described further herein below, the remote management controller 1 16 also may provide its remote access and management functionality and user privilege sets to the management of electronically controllable locks of the computing system 100 and
management of access to the components within the chassis 102.
[0016] The computing system 100 also may include a removable lid 120 to close the chassis 102. For example, the chassis 102 may have an opening by which components inside the chassis 102 may be accessed (e.g., for removal, servicing, configuring, etc.), and the lid 120 may be affixed to the chassis 102 to close the chassis 102 and enclose the components within the chassis 102. By virtue of closing the chassis 102 with the lid 120, at least some components inside the closed chassis 102 may be physically inaccessible until the lid 120 is removed or opened (with a possible example exception of portions of the components that are intentionally exposed to the exterior of the computing system 100, such as a port of an expansion card 1 12). The lid 120 is depicted in FIG. 1 as being removed from the chassis 102 (i.e., in an open position). In some implementations, a lid state sensor 122 may be disposed on the chassis 102 (or alternatively, on the lid 120). The lid state sensor 122 may detect when the lid 120 is open or closed with respect to the chassis 102, and indicate respectively a lid open state or a lid closed state to the remote management controller 1 16. For example, the lid state sensor 122 may be a magnetic or mechanical contact switch, in some implementations, the remote management controller 1 16 may store the lid open state or lid closed state information in an event log, together with time- stamps or other applicable log information, thus creating a historical record of the lid open or closed state. For example, the remote management controller 1 18 may store such an event log in non-volatile memory of the remote management controller 1 18 or in the storage device 108.
[0017] The computing system 100 also may include at ieast one electronically controllable lock, and more particularly, may include an electronic lid lock 124, at ieast one an electronic component lock (e.g., 128, 128, 130, 132, 134, or 136, to be described further herein below), or both an electronic lid lock 124 and at ieast one electronic component lock. The electronic locks may also be referred to as electronically controllable locks. The electronic lid lock and the electronic component lock may be collectively referred to herein as "the locks." in some implementations, the computing system 100 may include an electronic lid lock 124 to secure the lid 120 to the chassis 102. For example, the electronic lid lock 124 may be a solenoid bolt lock, a motorized rotary lock, or the like, and may be disposed or mounted in or on the chassis 102. in response to a lock or unlock signal (e.g., a digital signal, an analog signal, a voltage signal, etc.), the electronic lid lock 124 may engage a complementary catch 125 on the lid 120 to secure the lid 120 to the chassis 102 or may disengage the catch 125 to allow the lid 120 to be removed, respectively. Alternatively, in some implementations, the electronic lid lock may be disposed on the lid 120 and the catch may be disposed on the chassis 102. in yet other implementations, both the electronic lid lock and the catch may be disposed on the lid 120 (or alternatively, in or on the chassis 102), and engaging the electronic lid lock to the catch may prevent the lid 120 from being removed, while disengaging the electronic lid lock from the catch may allow the lid 120 to be removed. Other electronic lid lock mechanisms may be suitable to secure the lid 120 to the chassis 102.
[0018] in some implementations, the computing system 100 includes an electronic component lock disposed in or on the chassis 102 to secure a component, and more particularly, to secure the component to the chassis 102. For example, in the illustrated example of FIG. 1 , an electronic component lock 128 may secure the processor 104, an electronic component lock 128 may secure the memory 106, an electronic component lock 130 may secure the storage device 108, an electronic component lock 132 may secure a circuit board 1 10, an electronic component lock 134 may secure an I/O or expansion card 1 12, and an electronic component lock 136 may secure the circuit board interconnect 1 14. It should be understood that different implementations of the computing system 100 may include more or fewer of the electronic component locks illustrated in FIG. 1. An electronic component lock may be a solenoid bolt lock, a motorized rotary lock, or the like, that engages, clamps, or physically integrates with the corresponding component in response to a lock signal, and disengages, unclamps, or disconnects from the corresponding component in response to an unlock signal. The specific type of lock may depend on the size, shape, position, or other characteristic of the corresponding component that it secures, in some implementations, an electronic component lock may secure multiple components.
[0019] Some of the aforementioned electronic component locks may secure a corresponding component to the chassis 102 directly, for example, where the lock itself is mounted securely to the chassis 102 and the lock engages the component so as to secure the component to the chassis 102. Others of the aforementioned electronic component locks may secure the corresponding component to the chassis 102 indirectly, for example, by securing the component to a socket, a cartridge, or the like, which in turn is either mounted securely to the chassis 102 or secured by another lock to the chassis 102. In some implementations, the electronic component lock 136 circuit board interconnect 1 14 may secure two or more interconnected circuit boards 1 10 to each other. Other components not shown on FIG. 1 , such as a power supply, a peripheral connector, a thermal management device, or a cable, may be understood to also be securable to the chassis 102 by an electronic component lock in a manner described above.
[0020] in some implementations, the remote management controller 1 16 may be connected to the locks, in some implementations, the remote management controller 1 16 may control the locking or unlocking of each of the electronic lid lock 124 and/or the electronic component lock 126, 128, 130, 132, 134, 136 independently, by transmitting a lock or unlock signal (as described above) to individual ones of the locks. The lock or unlock signal may be a digital signal, an analog signal, a voltage signal, etc., depending on the type of lock. In some implementations, each of the locks may indicate their respective locked or unlocked state to the remote management controller 1 18. More particularly, the remote management controller 1 18 may poll (or query or read) the locked or unlocked state of the locks, or the locks may report their respective locked or unlocked states to the remote management controller 1 18. In some implementations, the remote management controller 1 18 may store the locked states or unlocked states of the locks in the aforementioned event log, thus creating a historical record of the locked or unlocked states.
[0021 ] in some implementations, the remote management controller 1 16 may receive a lock control command from the accessing device 150 external to the chassis 102, and may control the electronic lid lock 124 or the electronic component lock 128, 128, 130, 132, 134, 138 according to the lock control command. For example, the lock control command may be a command (e.g., an Application Programming interface, or API, function call; an electronic instruction; a control signal; etc.) to lock or unlock a particular lock of the locks. In some implementations, the lock control command may be a real-time command that the remote management controller 1 16 carries out upon receipt (or as soon as possible after receipt) from the accessing device 150. In some implementations, the lock control command may include a time, date, or a delay to schedule when the remote management controller 1 16 will lock or unlock a particular lock of the locks. In some implementations, the lock control command may include an event trigger that the remote management controller 1 18 waits for before locking or unlocking a particular lock of the locks. For example, the lock control command may instruct the remote management controller 1 16 to lock the electronic lid lock 124 upon detection of a lid closed state (by the lid state sensor 122) or upon a change from a lid open state to a lid closed state. In some implementations, the lock control command may confirm whether the lock control command has been successfu!ly carried out (e.g., by polling the state of the lock identified in the lock control command and/or by polling the lid state sensor 122) and send a success or failure response to the accessing device 150 accordingly.
[0022] The remote management controller 1 16 also may transmit the event log (containing historical information about the lid open state, lid closed state, locked states of the locks, and/or unlocked states of the locks) to the accessing device 150, via the out-of-band network path or another wired or wireless network path. For example, the event log may be transmitted in response to an event log request from the accessing device 150. In some implementations, the event log may be transmitted as a report or as raw data, in some implementations, the remote management controller 1 16 may send a notification (or an alert) related to a lid open state, a lid closed state, a locked state, or an unlocked state. For example, the remote management controller 1 18 may be configured to send such a notification at the moment the lid 120 is opened, if the lid 120 is left opened for a predefined period of time (e.g., 1 hour, 24 hours, or another period), at the moment a lock is opened, or if a lock is left in its unlocked state for a predefined period of time (e.g., 1 hour, 24 hours, or another period). A notification may also be sent when the lid 120 is closed or a lock is set to their locked state. The notification may be, for example, an email, an instant messaging service notification, a short message service notification, a multimedia message service notification, a voice or audio message, a programmatic message (e.g., an HTTP request), or the like, in some implementations, the notification may be addressed to a designated recipient (or recipients), such as an administrator or a person who oversees or audits access to the computing system 100. To send the notification, the remote management system 1 16 may include on-board email or message sending capabilities, or may access external email or message sending services via application program interfaces of those external services.
[0023] in some implementations, the remote management controller 1 16 may administer (or apply or enforce) user privileges related to the electronic lid lock 124 or the electronic component lock 126, 128, 130, 132, 134, 136. Such lock-related user privileges may be associated with the aforementioned user profiles of the remote management controller 1 16. For example, an administrator user profile may have a full set of system administration privileges as described above (e.g., managing firmware/hardware settings, etc.) and may also have full privileges to manage the locks, while a standard user profile may have limited or no privileges to manage operation of the computing system 100 or the locks. For example, administrator user profiles may have user privileges to lock or unlock the locks at any time, and accordingly, the remote management controller 1 18 may control the locks according to a lock control command from such administrator users at any time. Some standard user profiles may have user privileges to lock or unlock the locks according to a schedule, such as during weekday working hours (e.g., 8:00 AM to 5:00 PM, Monday through Friday), and accordingly, the remote management controller 1 16 may control the locks according to a lock control command from such standard users only during the scheduled times and may ignore lock control commands during other times, in another example, some user profiles may have privileges to lock the locks but not unlock the locks. In another example, some user profiles may have privileges to request or access the event log. in another example, some user profiles, such as administrators, may have user privileges to create user profiles or to modify the user privileges of existing user profiles, including the schedule according to which those user profiles may lock or unlock the locks. Some user profiles may have user privileges to modify the configuration of the remote management controller 1 18, such as how the event log or notifications are sent (e.g., via email, message, to the accessing device 150, etc.), the contact information of the designated recipient (e.g., email address, phone number, short message service number or address, etc.), when the event log or notifications are sent, and other lock-related rules. In some
implementations, the remote management controller 1 16 may send a notification to a designated recipient (e.g., in a manner similar to that described above) in response to changes in user privileges. [0024] In some implementations, the remote management controller 1 16 may respond or react to predetermined events of the computing system 100. For example, the remote management controller 1 16 may temporarily alter (e.g., revoke or suspend) user privileges to lock or unlock the electronic lid lock 124 or the electronic component lock 126, 128, 130, 132, 134, 136 during predetermined events (or states) of the computing system 100. in some implementations, such alteration of privileges may also apply to administrator level user profiles. In some implementations, the remote management controller 1 16 may lock the electronic lid lock 124 or the electronic component lock 126, 128, 130, 132, 134, 136 during or in response to the predetermined events, automatically or independent of a lock control command. The remote management controller 1 16 also may unlock the locks after the predetermined event has completed. Examples of predetermined events that may trigger temporary alteration of user privileges or locking of a lock include events where removal of a component of the computing system 100 may damage or otherwise interfere with operation of the computing system 100 (even if the component is hot-swappab!e, for example), such as during a firmware upgrade process, during a safety-critical or life-critical operation, in a high- availability system, or the like. At least some of the foregoing predetermined events also may be used as the above-described event trigger included in a lock control command received from the accessing device 150.
[0025] in some implementations, the predetermined events may be preprogrammed into the remote management controller 1 16, and the remote management controller 1 16 may monitor the computing system 100 for the events. In some implementations, the computing system 100 (or more particularly, an operating system, an application, or the like, executing on the computing system 100) may cause the predetermined events, and the source of the predetermined event may instruct the remote management controller 1 16 to alter privileges or lock or unlock a lock. To illustrate, a firmware update application executing on the computing system 100 may be designed to instruct the remote management controller 1 16 (e.g., via an API function call, which may differ from the lock control command API function call) to lock some or all of the locks prior to updating firmware, and then may instruct the remote management controller 1 18 to unlock those locks after the firmware update is complete.
[0026] In some implementations, the remote management controller 1 16 may transmit options related to the above described user privileges to the accessing device 150. The options transmitted may depend on the privileges of the user profile logged on to the remote management controller 1 16 through the accessing device 150. The accessing device 150 may present the options to the user operating the accessing device 150, on a display for example, and at least some of the options may be selectable, in some implementations, In some implementations, the remote management controller 1 18 may include an embedded web server that transmits the options, the event log, a present state of the lid or the locks, and other information to the accessing device 150 as a web page, JavaScript Object Notation data, Extensible Markup Language data, or the like, in some implementations, the remote management controller 1 16 may receive the lock control command from the accessing device 150 based on the transmitted options via the web page.
[0027] FIG. 2 is a diagram of an example computing system 200 having electronically controllable locks, according to an implementation. The computing system 200 includes a chassis 202 to receive a component 204 (e.g., a processor, memory, a storage device, a circuit board, etc.) and a removable lid 208 to close the chassis 204. The computing system 200 also includes an electronic lid lock 208 to secure the lid 206 to the chassis 202 and an electronic component lock 210 disposed in or on the chassis 202 to secure the component 204. The computing system 200 also includes a remote management controller 212 to receive a lock control command from an accessing device 220 external to the chassis 202 and to control the electronic lid lock 208 or the electronic component lock 210 according to the lock control command. In some implementations, the electronic lid lock 208 may be disposed in or on the chassis 202. in some implementations, the remote management controller 212 may be included inside the chassis 202.
[0028] F!G. 3 is a flowchart of an example method 300 for controlling electronically controllable locks, according to an implementation. Method 300 may be described below as being executed or performed by a remote management controller 1 16 of a computing system 100 described above with respect to FIG. 1 . Various other remote management controllers may be used as well, such as, for example, the remote management controller 212 of FIG. 2. Method 300 may be implemented in the form of executable instructions stored on a machine-readable storage medium and executed by at least one processor of the remote management controller 1 16, and/or in the form of electronic circuitry. In some implementations of the present disclosure, one or more blocks of method 300 may be executed substantially concurrently or in a different order than shown in FIG. 3. In some
implementations of the present disclosure, method 300 may include more or fewer blocks than are shown in FIG. 3. In some implementations, one or more of the blocks of method 300 may, at certain times, be ongoing and/or may repeat.
[0029] The method 300 may begin at block 302, and continue to block 304, where a remote management controller 1 16 of a computing system (e.g., 100) may receive a lock control command via an out-of-band network transmission. For example, the lock control command may be transmitted by an accessing device (e.g., 150) and may be a command to lock or unlock an electronically controllable lock of the computing system 100. At block 306, the remote management controller 1 16 may control electronically controllable locks of a chassis (e.g., 102) of the computing system 100 according to the lock control command received at block 304. In some implementations, the electronically controllable locks may include a lid lock (e.g., 124) to secure a lid (e.g., 120) to the chassis and a component lock (e.g., 126, 128, 130, 132, 134, 136) to secure a component (e.g., 104, 106, 108, 1 10, 1 12, 1 14) of the computing system to, for example, the chassis. At block 308, the method 300 may end. [0030] FIG. 4 is a flowchart of an example method for recording a state of electronically controllable locks, according to an implementation. Method 400 may be described below as being executed or performed by a remote management controller 1 16 of a computing system 100 described above with respect to FIG. 1 . Various other remote management controllers may be used as well, such as, for example, the remote management controller 212 of FIG. 2. Method 400 may be implemented in the form of executable instructions stored on a machine-readable storage medium and executed by at least one processor of the remote management controller 1 18, and/or in the form of electronic circuitry. In some implementations of the present disclosure, one or more blocks of method 400 may be executed substantially concurrently or in a different order than shown in FIG. 4. In some
implementations of the present disclosure, method 400 may include more or fewer blocks than are shown in FIG. 4. In some implementations, one or more of the blocks of method 400 may, at certain times, be ongoing and/or may repeat.
[0031 ] The method 400 may begin at block 402, and continue to block 404, where the remote management controller 1 16 of a computing system (e.g., 100) may record an open state of a lid (e.g., 120), a closed state of the lid, locked states of electronically controllable locks (e.g., 124, 126, 128, 130, 132, 134, 136), or unlocked states of the electronically controllable locks, in an event log. For example, the event log may be stored in a non-volatile memory of the remote management controller 1 16 or in a storage device available to the computing system (e.g., a hard drive, a solid state drive, a removable media drive, a networked storage, etc.). At block 406, the remote management controller 1 16 may generate a report based on the event log. For example, the report may be raw data from the event log (or a portion thereof) or may be a summary of the event log (or a portion thereof), and may be a data file, an email, or other type of electronic document (e.g., a
JavaScript Object Notation file or Extensible Markup Language file). At block 408, the remote management controller 1 16 may transmit the report generated at block 406 to an accessing device (e.g., 150) or a designated recipieni. For example, the remote management controller 1 16 may transmit the report via an out-of-band network path or another wired or wireless network path, in some implementations, the report may be transmitted in response to a report request from the accessing device or the designated recipient. In some implementations, the report may be transmitted to the accessing device or the designated recipient at scheduled times. The designated recipient may be, for example, an administrator of the computing system 100 or a person who audits access to the computing system 100. At block 410, the method 400 may end.
[0032] FIG. 5 is a flowchart of an example method for transmitting lock control options based on user privileges, according to an implementation. Method 500 may be described below as being executed or performed by a remote management controller 1 16 of a computing system 100 described above with respect to FIG. 1. Various other remote management controllers may be used as well, such as, for example, the remote management controller 212 of FIG. 2. Method 500 may be implemented in the form of executable instructions stored on a machine-readable storage medium and executed by at least one processor of the remote management controller 1 18, and/or in the form of electronic circuitry, in some implementations of the present disclosure, one or more blocks of method 500 may be executed substantially concurrently or in a different order than shown in FIG. 5. In some implementations of the present disclosure, method 500 may include more or fewer blocks than are shown in FIG. 5. in some implementations, one or more of the blocks of method 500 may, at certain times, be ongoing and/or may repeat.
[0033] The method 500 may begin at block 502, and continue to block 504, where the remote management controller 1 16 of a computing system (e.g., 100) may maintain (or store or administer) user profiles, each of the user profiles having associated user privileges. For example, as described above with respect to FIG. 1 , some user profiles may have more of less user privileges than other user profiles. In some implementations, the user privileges may include privileges to lock or unlock electronically controllable locks of the computing system (and more particularly, at or during all times or according to a schedule), privileges to modify the user privileges of user profiles, or other privileges. At block 506, the remote management controller 1 16 may receive, from an accessing device (e.g., 150) external to the computing system, authentication data for a user profile (e.g., a user name and password, or the like). For example, a user of the accessing device may enter authentication data at the accessing device, and the accessing device may transmit the authentication data via an out-of-band network path or another wired or wireless network path to the remote management controller 1 16. At block 508, the remote management controller 1 16 may transmit to the accessing device, lock control options based on the user privileges associated with the user profile. In some implementations, the remote management controller 1 16 may transmit the lock control options as a web page for display on the accessing device, and the lock control options may include options to lock at least one of the electronically controllable locks, to unlock at least one of the electronically controllable locks, to modify lock-related user privileges of user profiles, to modify configuration details of the remote management controller 1 16, or to request a report based on an event log. The remote management controller 1 16 may transmit different lock control options depending on the logged on user profile. For example, if the authentication data correspond to an administrator user profile, the remote management controller 1 16 may transmit a full set of lock control options. On the other hand, if the authentication data correspond to a standard or lower level user profile, the remote management controller 1 16 may transmit a more limited set of lock control options (e.g., a lock option, but no unlock option; lock and/or unlock options only during scheduled times). At block 510, the method 500 may end.
[0034] FIG. 6 is a block diagram illustrating a remote management controller 600 that includes a machine-readable medium encoded with instructions to control an electronically controllable lock, according to an implementation, in some implementations, the remote management controller 600 may serve as or form pari of the remote management controller 1 16 of FIG. 1 or the remote management controller 212 of FIG. 2. In some implementations, the remote management controller 600 may include at least one processor 602 coupled to a machine-readable medium 604. The processor 602 may include a single-core processor, a multi-core processor, an application-specific integrated circuit, a field programmable gate array, and/or other hardware device suitable for retrieval and/or execution of instructions from the machine-readable medium 604 (e.g., instructions 606, 608, 610, 612) to perform functions related to various examples. Additionally or alternatively, the processor 602 may include electronic circuitry for performing the functionality described herein, including, but not limited to, the functionality of instructions 606, 608, 610, and/or 612. With respect to the executable instructions represented as boxes in FIG. 6, it should be understood that part or all of the executable instructions and/or electronic circuits included within one box may, in alternate implementations, be included in a different box shown in the figures or in a different box not shown, in some implementations, the remote management controller 600 may be installed or disposed in a computing system (e.g., computing system 100 or 200) and may be connected to at least one electronically controllable lock of the computing system. For example, the electronically controllable lock may include a lid lock to secure a lid to a chassis of the computing system, or a component lock to secure a component of the computing system (e.g., a processor, memory, a storage device, a circuit board, etc.) to the chassis. In some implementations, the remote management controller 600 may communicate with an accessing device (e.g., a device that is separate from the computing system) via an out-of-band network path.
[0035] The machine-readable medium 604 may be any medium suitable for storing executable instructions, such as random access memory (RAM), electrically erasable programmable read-only memory (EEPRO ), flash memory, hard disk drives, optical discs, and the like. In some example implementations, the machine-readable medium 604 may be a tangible, non- transitory medium, where the term "non-transitory" does not encompass transitory propagaiing signals. As described further herein below, the machine-readable medium 604 may be encoded with a set of executable instructions 808, 608, 810, 612,
[0036] Instructions 606, when executed by the processor 602, may receive, from an accessing device, authentication data for a user profile (e.g., a user name and password). In some implementations, the remote management controller 600 may store user profiles and user privileges associated with those user profiles.
[0037] Instructions 608, when executed by the processor 602, may transmit, to the accessing device, lock control options based on user privileges associated with the user profile (e.g., the user profile associated with the authentication data received by instructions 606). For example, the user privileges may include a privilege to lock an electronically controllable lock of the computing system in which the remote management controller 600 is installed or a privilege to unlock the electronically controllable lock, and the transmitted lock control options may be a lock option or an unlock option, respectively. In some instances, a user privilege may include privileges to lock or unlock the electronically controllable lock according to a schedule, and instructions 608 may transmit lock or unlock options if the schedule indicates the user profile is allowed to perform those operations at the present time (e.g., at the time the authentication data is received). In some
implementations, the user privileges may include privileges to lock or unlock particular ones of a plurality of electronically controllable locks (e.g., a lid lock 124, a processor lock 126, a memory lock 128, etc.) but not others of the electronically controllable locks, and instructions 608 may transmit lock or unlock options for each of the particular electronically controllable locks, in some implementations, the user privileges may include a privilege to alter user privileges of user profiles or configuration details of the remote management controller 1 18, and instructions 808 may transmit the configurable options for those user privileges or the remote management controller 1 16. In some implementations, the accessing device may present the privilege-based lock control options to a user (e.g., as buttons or text on a display), and the user may make a selection from among the lock control options at the accessing device.
[0038] instructions 610, when executed by the processor 602, may receive a lock control command (e.g., an API function call, an electronic instruction, a control signal, etc.). For example, the lock control command may be received from the accessing device and may relate to the selection made by the user from among the lock control options. As another example, the accessing device may run a script or an application to interface with the remote management controller 1 18 (e.g., without user input), and the script or application may be designed or programmed to recognize lock control options transmitted by instructions 608 and generate a lock control command in response to those lock control options. Instructions 612, when executed by the processor 602, may control an electronically controllable lock of the computing system according to the received lock control command.
[0039] FIG. 7 is a block diagram illustrating a remote management controller 700 that includes a machine-readable medium encoded with instructions to record a state of an electronically controllable lock, according to an implementation. The remote management controller 700 includes a processor 702 and a machine-readable medium 704, which may be analogous in many respects to the processor 602 and the machine-readable medium 604, respectively. The machine-readable medium 704 may be encoded with a set of executable instructions 706, 708, 710, 712. Additionally or alternatively, the processor 702 may include electronic circuitry for performing the functionality described herein, including, but not limited to, the functionality of instructions 706, 708, 710, 712. Similar to the remote management controller 600, the remote management controller 700 may be connected to at least one electronically controllable lock of the computing system, such as a lid lock to secure a lid to a chassis of a computing system or a component lock to secure a component of the computing system to the chassis. [0040] instructions 706, when executed by the processor 702, may record, in an event log, an open state of the lid, a closed state of the lid, a locked state of the electronically controllable lock, or an unlocked state of the electronically controllable lock. Instructions 708, when executed by the processor 702, may generate a report based on the event log. Instructions 710, when executed by the processor 702, may transmit the report to an accessing device or a designated recipient. For example, the report may be transmitted in response to a request or on a scheduled basis. Instructions 712, when executed by the processor 702, may send a notification related to the open state of the lid, the closed state of the lid, the locked state of the electronically controllable lock, the unlocked state of the electronically controllable lock, or changes in user privileges. For example, the notification may be sent in response to the lid being opened or if the lid is in an open state for a predetermined amount of time.
[0041 ] in view of the foregoing description, it can be appreciated that a lid lock or component locks of a computing system, and thus access to components of the computing system, may be controlled remotely and programmatically. Moreover, control of the locks may be delegated by modifying or creating user profiles to have the appropriate user privileges for controlling the locks, and more particularly, such delegated user privileges may be altered or restricted according to a schedule. Furthermore, by virtue of the remote management controller recording lid states (open/closed) or lock states (lock/unlock) in an event log, access to the components of the computing system 100 may be audited and monitored.
[0042] In the foregoing description, numerous details are set forth to provide an understanding of the subject matter disclosed herein. However, implementation may be practiced without some or all of these details. Other implementations may include modifications and variations from the details discussed above. It is intended that the following claims cover such modifications and variations.

Claims

We claim:
1 . A system comprising:
a chassis to receive a component;
a removable lid to close the chassis;
an electronic lid lock to secure the lid to the chassis:
an electronic component lock disposed in or on the chassis to secure the component; and
a remote management controller to:
receive a lock control command from an accessing device external to the chassis, and
control the electronic lid lock or the electronic component lock according to the lock control command.
2. The system of claim 1 , further comprising a lid state sensor to indicate a lid open state or a lid closed state to the remote management controller, wherein the electronic lid lock and the electronic component lock are to indicate their respective locked or unlocked states to the remote management controller.
3. The system of claim 1 , wherein the component includes a processor, memory, a storage device, a peripheral connector, a cable, a circuit board, a circuit board interconnect, or an expansion card.
4. The system of claim 2, wherein
the remote management controller is to store in an event log information including lid open state, lid closed state, locked states, or unlocked states, and is to transmit the event log to the accessing device, and the remote management controller is to send a notification related to a lid open state, a lid closed state, a locked state, or an unlocked state.
5. The system of claim 4, wherein the notification is an email, an instant messaging service notification, a short message service notification, or a multimedia messaging service notification addressed to a designated recipient.
8. The system of claim 1 , wherein the remote management controller is to administer user privileges related to the electronic lid lock or the electronic component lock, and is to send a notification to a designated recipient in response to changes in user privileges.
7. The system of claim 1 , wherein the remote management controller is to temporarily alter user privileges to lock or unlock the electronic lid lock or the electronic component lock during predetermined events of the system,
or is to lock the electronic lid lock or the electronic component lock in response to predetermined events of the system.
8. A method comprising:
receiving, by a remote management controller of a computing system, a lock control command via an out-of-band network transmission; and
controlling, by the remote management controller, electronically controllable locks of a chassis of the computing system according to the received lock control command, the electronically controllable locks including a lid lock to secure a lid to the chassis and a component lock to secure a component of the computing system.
9. The method of claim 8, further comprising:
recording, by the remote management controller, an open state of the lid, a closed state of the lid, locked states of the electronically controllable locks, or unlocked states of the electronically controllable locks, in an event log;
generating, by the remote management controller, a report based on the event log; and transmitting, by the remote management controller, the report to an accessing device or a designated recipient.
10. The method of claim 8, further comprising:
maintaining user profiles by the remote management controller, each of the user profiles having associated user privileges;
receiving, by the remote management controller from an accessing device externa! to the computing system, authentication data for a user profile; and
transmitting, by the remote management controller to the accessing device, lock control options based on the user privileges associated with the user profile.
1 1. The method of claim 10, wherein the lock control options include options to lock at least one of the electronically controllable locks, to unlock at least one of the electronically controllable locks, to modify lock-related user privileges of user profiles, or to request a report based on an event log.
12. The method of claim 10, wherein the user privileges include privileges to lock or unlock the electronically controllable locks according to a schedule, or privileges to modify the user privileges of user profiles.
13. A non-transitory machine readable medium, storing instructions executable by a processor of a remote management controller for a computing system, the non-transitory machine readable medium comprising: instructions to receive, from an accessing device, authentication data for a user profile;
instructions to transmit, to the accessing device, lock control options based on user privileges associated with the user profile;
instructions to receive a lock control command; and
instructions to control an electronically controilabie lock of the computing system according to the received lock control command, wherein the user privileges include a privilege to lock or unlock the electronically controllable lock according to a schedule.
14. The non-transitory machine readable medium of claim 13, the electronically controllable lock includes a lid lock to secure a lid to a chassis of the computing system, or a component lock to secure a component of the computing system to the chassis.
15. The non-transitory machine readable medium of claim 14, further comprising:
instructions to record, in an event log, an open state of the lid, a closed state of the lid, a locked state of the electronically controllable lock, or an unlocked state of the electronically controllable lock;
instructions to generate a report based on the event log;
instructions to transmit the report to the accessing device or a designated recipient; and
instructions to send a notification related to the open state of the lid, the closed state of the lid, the locked state of the electronically controllable lock, the unlocked state of the electronically controllable lock, or changes in user privileges.
PCT/US2015/042810 2015-07-30 2015-07-30 Lock control Ceased WO2017019075A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/US2015/042810 WO2017019075A1 (en) 2015-07-30 2015-07-30 Lock control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2015/042810 WO2017019075A1 (en) 2015-07-30 2015-07-30 Lock control

Publications (1)

Publication Number Publication Date
WO2017019075A1 true WO2017019075A1 (en) 2017-02-02

Family

ID=57884947

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2015/042810 Ceased WO2017019075A1 (en) 2015-07-30 2015-07-30 Lock control

Country Status (1)

Country Link
WO (1) WO2017019075A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108986287A (en) * 2018-09-03 2018-12-11 杭州租呗科技有限公司 A kind of universal lock set with GPS and control circuit function

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6529382B2 (en) * 1998-12-25 2003-03-04 Nec Corporation Electronic computer with a file bay cover including an electronic lock and method of controlling the same
US20080271122A1 (en) * 2007-04-27 2008-10-30 John Edward Nolan Granulated hardware resource protection in an electronic system
US20100141379A1 (en) * 2008-12-05 2010-06-10 Tucker Peter T Modular Rack Controllers for Patching Systems
US20100237987A1 (en) * 2009-03-18 2010-09-23 Barzacanos Constantine A Computer program controlled security mechanism
US20140146459A1 (en) * 2012-07-30 2014-05-29 Methode Electronics, Inc. Data center equipment cabinet information center

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6529382B2 (en) * 1998-12-25 2003-03-04 Nec Corporation Electronic computer with a file bay cover including an electronic lock and method of controlling the same
US20080271122A1 (en) * 2007-04-27 2008-10-30 John Edward Nolan Granulated hardware resource protection in an electronic system
US20100141379A1 (en) * 2008-12-05 2010-06-10 Tucker Peter T Modular Rack Controllers for Patching Systems
US20100237987A1 (en) * 2009-03-18 2010-09-23 Barzacanos Constantine A Computer program controlled security mechanism
US20140146459A1 (en) * 2012-07-30 2014-05-29 Methode Electronics, Inc. Data center equipment cabinet information center

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108986287A (en) * 2018-09-03 2018-12-11 杭州租呗科技有限公司 A kind of universal lock set with GPS and control circuit function

Similar Documents

Publication Publication Date Title
US9355278B2 (en) Server chassis physical security enforcement
EP3447676A1 (en) Locking mechanism of a module of a data center
US20200394342A1 (en) System and method for administering physical security access to components of a process control system
JP2021522616A (en) External device protection device and protection system
US20150338894A1 (en) Uninterruptible power supply communication
CN107950002A (en) System and method for secure password management of industrial equipment
US12487889B2 (en) Data backup device
EP3788566B1 (en) Service kiosk device provisioning
US20210287197A1 (en) Configurable correctional facility computer kiosk systems and methods for portable electronic device access and management
WO2020212051A1 (en) Industrial automation device comprising a monitoring unit for checking and monitoring the integrity state of the industrial automation device
WO2017196319A1 (en) Electronic device access control
CN116802634A (en) Ransomware mitigation system and method for mitigating ransomware attacks
HK1209886A1 (en) Main control panel for electronic lock and control circuit, system and method of the electronic lock
CN117170471A (en) High stability industrial computer
US20140088760A1 (en) Computer connected cash drawer status and control
WO2017019075A1 (en) Lock control
US11740670B2 (en) Systems and methods for automated battery replacement
US20210404216A1 (en) Security system having an electronic lock to control access to electronic devices
BR102016013149A2 (en) BLUETOOTH CELL PHONE ACCESS CONTROL SYSTEM
EP3322131A1 (en) Central switch device
EP4639540A2 (en) Data backup device
EP3416264A1 (en) Uninterruptible power supply communication
CN120449217B (en) Security control system and method for storage equipment
CN112559986B (en) System for protecting equipment
CN108985114A (en) A kind of machine box for server monitoring system and method with dual safety mechanism

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15899865

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15899865

Country of ref document: EP

Kind code of ref document: A1