Detecting a security breach of an electronic device
First Claim
1. A security system for detecting a security breach of an enclosure of an electronic device, the security system comprising:
- a sensor assembly, including;
at least one infrared (IR) light-emitting diode (LED) that outputs IR light in a random pattern and is disposed within the enclosure of the electronic device, andan IR sensor that detects direct IR light and indirect IR light output by the at least one IR LED and outputs IR detection signals; and
a processor that performs actions to;
receive a first set of IR detection signals from the IR sensor during a first time period, wherein at least a portion of the IR detection signals change during the first time period, based, at least in part, on IR disturbances that occur in the enclosure of the electronic device during the first time period,generate a first IR profile of an interior of the enclosure using the first set of IR detection signals output by the IR sensor that uses the direct IR light and the indirect IR light and accounts for the IR disturbances that occur in the enclosure of the electronic device,store the first IR profile that accounts for the IR disturbances in a memory,receive a second set of IR detection signals during a second time period,generate a second IR profile using the second set of IR detection signals,determine whether there has been a security breach of the enclosure by comparing the first IR profile with the second IR profile; and
wherein if the first IR profile is different from the second IR profile, and if security breach of the enclosure has not taken place, update the first IR profile stored in memory in response to detecting a difference between the first IR profile and the second IR profile.
5 Assignments
0 Petitions
Accused Products
Abstract
A system and method for detecting a security breach of an electronic device are provided. The system includes a sensor assembly having at least one IR LED which outputs IR light, and an IR sensor which detects the IR light output by the IR LED and outputs corresponding IR detection signals. The system further includes a processor which generates an IR profile of an interior of the enclosure with reference to the IR detection signals output by the IR sensor. The processor determines that there has been a security breach of the enclosure at least in response to detecting IR activity in the enclosure from the IR detection signals that does not correspond to the IR profile. Output signals from a various other sensors may be used to confirm whether the security breach has occurred.
37 Citations
14 Claims
-
1. A security system for detecting a security breach of an enclosure of an electronic device, the security system comprising:
-
a sensor assembly, including; at least one infrared (IR) light-emitting diode (LED) that outputs IR light in a random pattern and is disposed within the enclosure of the electronic device, and an IR sensor that detects direct IR light and indirect IR light output by the at least one IR LED and outputs IR detection signals; and a processor that performs actions to; receive a first set of IR detection signals from the IR sensor during a first time period, wherein at least a portion of the IR detection signals change during the first time period, based, at least in part, on IR disturbances that occur in the enclosure of the electronic device during the first time period, generate a first IR profile of an interior of the enclosure using the first set of IR detection signals output by the IR sensor that uses the direct IR light and the indirect IR light and accounts for the IR disturbances that occur in the enclosure of the electronic device, store the first IR profile that accounts for the IR disturbances in a memory, receive a second set of IR detection signals during a second time period, generate a second IR profile using the second set of IR detection signals, determine whether there has been a security breach of the enclosure by comparing the first IR profile with the second IR profile; and wherein if the first IR profile is different from the second IR profile, and if security breach of the enclosure has not taken place, update the first IR profile stored in memory in response to detecting a difference between the first IR profile and the second IR profile. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for detecting a security breach of an enclosure of an electronic device, the method comprising:
-
generating infrared (IR) light by one or more IR light-emitting diodes (LEDs) disposed within the enclosure of the electronic device, wherein the IR light is output by the one or more IR LEDs in a random pattern; detecting the IR light by at least one IR sensor generating IR detection signals; receiving the IR detection signals by a processor during a first time period and generating a first IR profile of an interior of the enclosure that accounts for IR disturbances in the enclosure of the electronic device, wherein at least a portion of the IR detection signals change during the first time period, based, at least in part, on IR disturbances that occur in the enclosure of the electronic device during the first time period; storing the first IR profile in a memory; receiving the IR detection signals by the processor during a second time period and generating a second IR profile of the interior of the enclosure; comparing the first IR profile with a second IR profile to determine whether there has been a security breach of the enclosure; and wherein the processor updates the first IR profile stored in the memory in response to detecting a difference between the first IR profile and the second IR profile and the security breach of the enclosure has not been determined. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A non-transitory computer-readable storage medium having computer readable instructions stored thereupon that, when executed by a computer, cause the computer to:
-
receive infrared (IR) detection signals during a first time period from at least one IR sensor detecting IR light generated by one or more IR light emitting diodes (LEDs), wherein the one or more IR LEDs is disposed in a random location within an enclosure and wherein the IR light is generated by the one or more IR LEDs in a random pattern; generating a first IR profile of an interior of the enclosure that accounts for IR disturbances that occur in the enclosure of the electronic device during the first time period; storing the first IR profile in a memory; receiving IR detection signals during a second time period from the at least one IR sensor; generating a second IR profile of the interior of the enclosure;
comparing the first IR profile with a second IR profile to determine whether there has been a security breach of the enclosure; andupdating the first IR profile stored in the memory in response to detecting a difference between the first IR profile and the second IR profile and the security breach of the enclosure has not been determined. - View Dependent Claims (13, 14)
-
Specification