Managing security of enclosure based on a task status and geographical location of the enclosure

    公开(公告)号:US12235634B2

    公开(公告)日:2025-02-25

    申请号:US17475706

    申请日:2021-09-15

    Abstract: Examples described herein relate to a system and method for managing the security of an edge enclosure. The edge enclosure is deployed in a mobile environment and travels between a base location and a task location to perform a task. The task is defined and configured at a chassis manager by a management device. A server in the edge enclosure processes data associated with the task. The chassis manager detects a loss of communication between the chassis manager and the management device. The chassis manager performs a security action based on task status. The task status is either ongoing or completed. The security action performed at the edge enclosure protects the data present in the server from tampering. The management device transmits alerts to the customers of the edge enclosure after the task is completed.

    Managing security of enclosure based on a task status and geographical location of the enclosure

    公开(公告)号:US11899831B2

    公开(公告)日:2024-02-13

    申请号:US17475748

    申请日:2021-09-15

    CPC classification number: G06F21/86 G06F16/23

    Abstract: Examples described herein relate to a method for managing hardware changes at an enclosure and a server. The enclosure includes a server and multiple hardware devices connected to the enclosure. A chassis manager in the enclosure is communicatively coupled to a manageability controller of the server and the multiple hardware devices. On enabling tamper detection, the manageability controller and the chassis manager monitor the hardware devices for determining changes in the hardware devices. A change in a hardware device is compared with a permissible hardware change to determine whether the change in the hardware device is unauthorized. The permissible hardware changes include changes in hardware devices that are permitted by a customer. Security actions are performed at the server and the enclosure if unauthorized changes in the hardware device are detected by the manageability controller and chassis manager.

Patent Agency Ranking