Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
INTRUSION DETECTIONS WITH AMBIENT LIGHT SENSORS AND SUPER INPUT/OUTPUT CIRCUITS
Document Type and Number:
WIPO Patent Application WO/2018/143981
Kind Code:
A1
Abstract:
An example intrusion detection system for a computer includes: an ambient light sensor to detect an increase in ambient light indicative of a housing of the computer being opened; and a super input/output integrated circuit (SIO) to receive a signal from the ambient light sensor indicating that the housing of the computer has been opened.

Inventors:
SAROOR SHAHEEN (US)
NGUYEN NAM H (US)
NGUY TED T (US)
Application Number:
PCT/US2017/016021
Publication Date:
August 09, 2018
Filing Date:
February 01, 2017
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
HEWLETT PACKARD DEVELOPMENT CO (US)
International Classes:
G06F21/88; G06F21/73; G08B13/18
Domestic Patent References:
WO2015196450A12015-12-30
Foreign References:
CA2313652A12001-01-09
US6457137B12002-09-24
US20140201514A12014-07-17
US20160028404A12016-01-28
EP0892334B12003-02-19
US9453881B22016-09-27
EP2056178A12009-05-06
US20140201514A12014-07-17
EP0892334A21999-01-20
Other References:
See also references of EP 3545459A4
Attorney, Agent or Firm:
SU, Benjamin et al. (US)
Download PDF:
Claims:
CLAIMS

WHAT IS CLAIMED IS:

1 . An intrusion detection system for a computer, the system comprising: an ambient light sensor to detect an increase in ambient light indicative of a housing of the computer being opened; and

a super input/output integrated circuit (SIO) to receive a signal from the ambient light sensor indicating that the housing of the computer has been opened.

2. The intrusion detection system of claim 1 , wherein the SIO counts a multiple number of times the ambient light sensor indicates the housing of the computer has been opened during a time that the computer is powered down.

3. The intrusion detection system of claim 1 , further comprising a Real Time Clock (RTC) power rail, the ambient light sensor being powered by the RTC power rail to remain active when the computer is powered down.

4. The intrusion detection system of claim 1 , wherein the SIO is to store identification data for some components of the computer interna! to the housing.

5. The intrusion detection system of claim 4, further comprising a Basic Input Output System (BIOS) of the computer to, when the computer is booted, communicate with the SIO to determine whether the housing of the computer has been opened, the BIOS to verify continued presence of components of the computer using the identification data stored in the SIO.

6. The intrusion detection system of claim 5, the BIOS to transmit a report of any components determined to be missing or replaced based on the identification data stored in the SIO.

7. The intrusion detection system of claim 1 , further comprising a high-limit register and a low-limit register that together determine when the ambient light sensor signals the SIO that the housing of the computer has been opened.

8. The instruction detection system of claim 1 , wherein the ambient light sensor further comprises an Inter-Integrated Circuit (I2C) to interface with the SIO.

9. An intrusion detection system for a computer, the system comprising: an ambient light sensor to detect an increase in ambient light indicative of a housing of the computer being opened;

a super input/output (I/O) integrated circuit to receive a signal from the ambient light sensor indicating that the housing of the computer has been opened, wherein the SIO stores identification data for some of the components of the computer; and

a Basic Input Output System (BIOS) to communicate with the SIO when the computer is booted to determine whether the housing of the computer has been opened, the BIOS further to verify the presence of the components of the computer using the identification data stored in the SIO, in response to an indication that the housing of the computer was opened prior to the computer being booted.

10. The intrusion detection system of claim 9, the BIOS to transmit a report of any components determined to be missing or replaced based on the identification data stored in the SIO.

1 1. The intrusion detection system of claim 9, wherein the SIO counts a number of multiple times the ambient light sensor indicates the housing of the computer has been opened during a time that the computer is powered down.

12. A method for intrusion detection in a computer, the method comprising: detecting opening of a housing of the computer with an ambient light sensor internal to the housing; and,

in response to detection of an opening of the housing, electronically conducting an inventory of components of the computer internal to the housing using identification data stored in the computer that is associated with the components.

13. The method of claim 12, further comprising:

recording signals from the ambient light sensor indicative of an opening of the housing of the computer with a super Input/Output (I/O) integrated circuit; and

with a Basic Input Output System (BIOS) of the computer,

communicating with the SIO when the computer is booted to determine whether the housing of the computer has been opened;

wherein electronically conducting an inventory of components is performed by the BIOS in response to an indication that the housing of the computer was opened prior to the computer being booted.

14. The method of claim 13, further comprising transmitting a report of any components determined to be missing or replaced.

15. The method of claim 13, further comprising counting a number of multiple times the ambient light sensor indicates the housing of the computer has been opened during a time that the computer is powered down.

Description:
INTRUSION DETECTIONS WITH AMBIENT LIGHT SENSORS AND SUPER

INPUT/OUTPUT CIRCUITS

BACKGROUND

[0001] In commercial and other settings, computers and computer systems may be subject to tampering. For example, a desktop computer, server or other computer system might be opened illicitly so that a valuable internal component may be removed entirely or replaced by a lesser component. This may be most likely to occur when the computer in question is not being used or is turned off in the hope that the illicit access will go undetected for some period of time.

BRIEF DESCRIPTION OF THE DRAWINGS

[0002] The accompanying drawings illustrate various

implementations of the principles described herein and are a part of the specification. The illustrated implementations are merely examples and do not limit the scope of the claims.

[0003] Fig. 1 is a block diagram of an example intrusion detection system consistent with disclosed implementations.

[0004] Fig. 2 is another block diagram of an example intrusion detection system consistent with disclosed implementations.

[0005] Fig. 3 is another block diagram of an example intrusion detection system consistent with disclosed implementations. [0006] Fig. 4 is a block diagram of an example intrusion detection system within a monitored computer consistent with disclosed

implementations.

[0007] Fig. 5 is a diagram of an example ambient light sensor system for an intrusion detection system consistent with disclosed

implementations.

[0008] Fig. 6 is a flowchart of an example method for intrusion detection in a computer system consistent with disclosed implementations.

[0009] Fig. 7 is a flowchart of another example method for intrusion detection in a computer system consistent with disclosed implementations.

[0010] Fig. 8 is a flowchart of another example method for intrusion detection in a computer system consistent with disclosed implementations.

[0011] Throughout the drawings, identical reference numbers designate similar, but not necessarily identical, elements.

DETAILED DESCRIPTION

[0012] As noted above, in various settings, computers and computer systems may be subject to tampering. For example, a desktop computer, server or other computer system might be opened illicitly so that a valuable internal component may be removed entirely or replaced by a lesser component. This may be most likely to occur when the computer in question is not being used or is turned off in the hope that the illicit access will go undetected for some period of time.

[0013] Consequently, the present specification describes, for example, an intrusion detection system for a computer that includes: an ambient light sensor to detect an increase in ambient light indicative of a housing of the computer being opened; and a super input/output integrated circuit (SIO) to receive a signal from the ambient light sensor indicating that the housing of the computer has been opened. [0014] In another example, an intrusion detection system for a computer includes: an ambient light sensor to detect an increase in ambient light indicative of a housing of the computer being opened; a super input/output (I/O) integrated circuit to receive a signal from the ambient light sensor indicating that the housing of the computer has been opened, where the S!O stores identification data for some of the components of the computer; and a Basic Input Output System (BIOS) to communicate with the SIO when the computer is booted to determine whether the housing of the computer has been opened, the BIOS further to verify the presence of the components of the computer using the identification data stored in the SIO, in response to an indication that the housing of the computer was opened prior to the computer being booted.

[0015] In another example, the present specification describes a method for intrusion detection in a computer by: detecting opening of a housing of the computer with an ambient light sensor internal to the housing; and, in response to detection of an opening of the housing, electronically conducting an inventory of components of the computer internal to the housing using identification data stored in the computer that is associated with the components.

[0016] As used herein and in the following claims, the term "super input/output integrated circuit" (SIO) refers to an integrated circuit, usually on a computer motherboard, that handles the slower and less prominent input/output devices of a computer system such as a keyboard and mouse, parallel and serial ports and the real-time clock.

[0017] As used herein and in the following claims, the term "Basic Input/Output System" (BIOS) refers to firmware and associated processing resources used to perform hardware initialization during the booting process when a computer is powered upon startup.

[0018] As used herein and in the following claims, the term "Inter- Integrated Circuit" (I2C) refers to a serial computer bus used for attaching lower-speed peripheral ICs to processors and microcontrollers in short- distance, intra-board communication. [0019] Fig. 1 is a biock diagram of an example intrusion detection system consistent with disclosed implementations. As shown in Fig. 1 , the intrusion detection system 100 includes an ambient light sensor 102 that is in communication with a super input/output integrated circuit (SIO).

[0020] The ambient light sensor 102 measures the level of ambient light. If the ambient light sensor 102 is disposed internal to a computer housing, the light reaching the sensor may be very limited. However, if the housing of the computer is opened, there will typically be a significant increase in the level of ambient light. This will be true even in a dark room if the person opening the computer housing is using a flashlight or other light source in order to see to open the housing.

[0021] By detecting any such increase in the level of ambient light, the ambient light sensor 102 can indicate when the computer housing has been opened. Consequently, the ambient light sensor 102 provides intrusion detection.

[0022] The ambient light sensor 102 may be an integrated circuit such as a single chip lux meter, measuring the intensity of light as visible to the human eye. Such devices can have a precise spectral response and strong infra-red (IR) rejection, which helps the sensor accurately meter the intensity of light as seen by the human eye regardless of the light source. It is presumed that, in the event of an intrusion into the housing, the intruder will be using some light visible to the human eye in order to work.

[0023] The strong !R rejection also helps maintain high accuracy when the sensor is mounted, for example, under dark glass for aesthetics. The ambient light sensor may 102 have a measurement capability ranging from 0,01 lux up to 83k lux without manually selecting full-scale ranges by using a built-in, full-scale setting feature.

[0024] Additionally, the ambient light sensor may have very low power consumption (e.g., 1.8μΑ) and a low power-supply voltage (e.g., 1 .6 to 3.6V). This low power requirement and a small size (e.g., 2mm x 2mm) suits the ambient light sensor well for use in an efficient and inexpensive intrusion detection system. [0025] As shown in Fig. 1 , when the ambient light sensor 102 detects an intrusion event indicated by an increase the ambient light level, the ambient light sensor 102 will signal the SIO 104. As will be described in further detail below, the SIO 104 will have power even if the computer system is generally in a powered down or turned-off state. Consequently, the SIO 104 can record intrusion events detected by the ambient light sensor 102 even when the computer or computer system being monitored is powered down.

[0026] Fig. 2 is another block diagram of an example intrusion detection system consistent with disclosed implementations. As shown in Fig. 2, an ambient light sensor 212 may include a photodiode 202 that receives ambient light through an optical filter 200. The optical filter 200 may be tuned, as described above, to admit light specifically within the range of human vision.

[0027] The photodiode 202 will output an electrical signal indicative of the level of ambient light received, as discussed above. This signal is provided to an amplifier 204 and analog-to-digital converter 206.

[0028] The ambient light sensor 212 is connected to the S!O 210 by an I2C bus. Consequently, the ambient light sensor 212 includes an I2C interface 208 to the bus connecting to the SIO 210. The I2C bus includes a clock line (SCL), a data line (SDA), and an interrupt (INT) line. The INT line connects to a General Purpose Input/Output (GPIO) input of the S!O. The address line (ADDR) of the I2C interface may be connected to ground (GND) as shown in Fig. 2.

[0029] Measurements from the ambient light sensor 212 can be either continuous or single-shot. The control and interrupt system of the I2C interface 208 with the SIO 210 features autonomous operation, allowing the main processor of the computer or system being monitored to sleep or be powered down while the sensor 212 searches for appropriate wake-up events to report via the interrupt pin (INT). The digital output from the ADC 206 is reported over the I2C compatible, two-wire serial interface of the SCL and SDA lines. [0030] Any time the computer housing is opened removed, for example, by having a cover removed, the ambient light sensor 212 detects this condition via exposure to ambient light and asserts the interrupt signal (INT) to the SIO 210. With the clock and data lines (SCL, SDA), the SIO 210 can determine different events signaled by the ambient light sensor 212. Consequently, the SIO 210 can detect and count multiple intrusion events that may occur during a period of time the computer being monitored is powered down.

[0031] As shown in Fig. 2, the ambient light sensor 212 draws power (VDD) from a Real Time Clock power rail (RTC) which is active even when the computer monitored is generally powered down. For example, the RTC may derive its power from a coin battery of the system.

[0032] Fig. 3 is another block diagram of an example intrusion detection system consistent with disclosed implementations. As shown in Fig. 3, the instruction detection system 150 includes an ambient light sensor 102 and SIO 104 as described above.

[0033] As also shown in Fig. 3, the system includes the BIOS 108 of the computer being monitored. The function of the BIOS is to initialize the computer system components upon startup until the operating system is launched and takes control of the machine.

[0034] In this example, the BIOS 106 is configured to, upon startup for example, query the SIO 104 to determine whether there were any intrusion events detected since the computer was last started. As noted above, the SIO 104 can inform the BIOS 106 whether any intrusion was detected and, if there were multiple intrusions, the number and timing of the intrusions. The BIOS 106 can then report this information to a user, as will be described in further detail below.

[0035] Thus, Fig. 3 shows an intrusion detection system 150 for a computer that includes: an ambient light sensor 102 to detect an increase in ambient light indicative of a housing of the computer being opened; a super input/output (I/O) integrated circuit 104 to receive a signal from the ambient light sensor indicating that the housing of the computer has been opened, where the S!O stores identification data for some of the components of the computer; and a Basic Input Output System (BIOS) 106 to communicate with the SIO when the computer is booted to determine whether the housing of the computer has been opened and to verify the presence of the components of the computer using the identification data stored in the SIO, in response to an indication that the housing of the computer was opened prior to the computer being booted.

[0036] Fig. 4 is a block diagram of an example intrusion detection system within a monitored computer consistent with disclosed

implementations. As shown in Fig. 4, the instruction detection system 160 includes an ambient light sensor 102 and S!O 104 as described above.

[0037] The ambient light sensor 102 may include high-limit and low- limit registers 161 to provide control over what detected light levels are considered to indicate an intrusion event as opposed to, for example, a device malfunction or other source of an erroneous signal.

[0038] As described above, when an intrusion event occurs, the ambient light sensor 102 asserts the interrupt to the SIO 104. The interrupt event conditions are controlled by the high-limit and low-limit registers 161 , as well as by a configuration register latch and fault count fields. The results of comparing the result register with the high-limit register and low-limit register are referred to as fault events. While such an event may occur when the monitored computer is powered down, upon power up the SIO 104 will be able to read the status of the interrupt which is latched into the ambient light sensor device register to determine that an intrusion event has occurred.

[0039] In this example, the SIO 104 stores component

identifications 1 10 for some components of the computer system being monitored. These components may include the components that are Iikely to be stolen or illicitly swapped out of the computer or computer system during an unauthorized intrusion. Examples include a processor, memory module, storage (both hard drive and solid state drive) and network interface components such as a WLAN, WiFi or BlueTooth module. The component identifications 1 10 may include manufacturer identification codes, device identification, serial number, revision number, date codes or other identifying information for any of the components to be monitored.

[0040] Upon startup, the BIOS 106 can access the component identifications 1 10 in the S!O 104. The BIOS 106 may only do this when the SIO 104 has recorded an intrusion event. The BIOS 106 can the query the corresponding components (shown generally at 120) which will also have stored thereon their respective component identifications 1 10. In this way, the BIOS 106 can determined whether any component is now missing or has been replaced by a different, perhaps lesser, component.

[0041] The BIOS 106 will also have access to the user interface 122 of the computer being monitored. The BIOS 106 can use the user interface 122, for example, to display a report 124 indicating the existence and/or number of intrusions detected. The report 124 may also include a listing of any components that are now missing or replaced, as determined from the component identifications 1 10.

[0042] Alternatively, the BIOS 106 may transmit the report via other means to a user or administrator. For example, the BIOS 106 may send the report by email, instant message, Simple Message Service (SMS), voicemail, text or any other communication type.

[0043] Fig. 5 is a diagram of an example ambient light sensor system for an intrusion detection system consistent with disclosed

implementations. As shown in Fig. 5, the ambient light sensor 102 is mounted on a printed circuit board (PCB) 502. Within the sensor 102 is the active sensor area 504. The active sensor area 504 will be connected, through the PCB 502 to the other components described above, for example, the amplifier and DAC shown in Fig. 2.

[0044] To avoid dust accumulating over the ambient light sensor 102 that may interfere with the calibration and light detection, the ambient light sensor 102 may be includes by a small protective cover 508 with a dark color glass window 506. The height of the optical window 506 from the ambient light sensor 102 determines the field of view of the sensor 102 and can be adjusted to meet any system requirements. [0045] Fig. 6 is a flowchart of an example method for intrusion detection in a computer system consistent with disclosed implementations. As shown in Fig. 6, a method for intrusion detection in a computer includes: detecting 802 opening of a housing of the computer with an ambient light sensor internal to the housing; and, in response to detection of an opening of the housing, electronically conducting 604 an inventory of components of the computer internal to the housing using identification data for some of components of the computer that is stored in the computer.

[0046] Fig. 7 is a flowchart of another example method for intrusion detection in a computer system consistent with disclosed implementations. As shown in Fig. 7, the method includes detecting 702 opening of a housing of the computer with an ambient light sensor internal to the housing, and counting 704 a number of times the ambient light sensor indicates the housing of the computer has been opened during a time that the computer is powered down.

[0047] Fig. 8 is a flowchart of another example method for intrusion detection in a computer system consistent with disclosed implementations. As shown in Fig. 8, the method includes, in response to booting of the computer, determining 802 with BIOS whether opening of the housing of the computer was indicated to the SIO by an ambient light sensor internal to the housing; and, in response to detection of an opening of the housing, electronically conducting 804 with the BIOS an inventory of components of the computer internal to the housing using identification data for some of components of the computer that is stored in the computer. As described above, this may include providing a report indicating any components found to be missing or replaced.

[0048] The preceding description has been presented only to illustrate and describe examples of the principles described. This description is not intended to be exhaustive or to limit these principles to any precise form disclosed. Many modifications and variations are possible in light of the above teaching.