Intrusion detection for submerged datacenters
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04B-013/02
H05K-007/20
F28D-001/02
F24F-005/00
F25D-001/02
F28D-015/00
A01K-029/00
A01K-067/033
H05K-007/14
G06F-021/55
G08B-013/24
F28D-021/00
출원번호
US-0167808
(2016-05-27)
등록번호
US-9913409
(2018-03-06)
발명자
/ 주소
Cutler, Benjamin F.
Whitaker, Norman Ashton
출원인 / 주소
Microsoft Technology Licensing, LLC
인용정보
피인용 횟수 :
1인용 특허 :
59
초록
Examples of the disclosure provide a datacenter configured for operation while submerged in water. The datacenter includes one or more physically separable modules. The datacenter also includes an intrusion detection system that has one or more intrusion detection modules.
대표청구항▼
1. A system comprising: an intrusion detection system coupled to a datacenter configured for operation while submerged in water, the datacenter comprising one or more physically separable modules, the intrusion detection system comprising one or more intrusion detection modules configured to detect
1. A system comprising: an intrusion detection system coupled to a datacenter configured for operation while submerged in water, the datacenter comprising one or more physically separable modules, the intrusion detection system comprising one or more intrusion detection modules configured to detect underwater intrusion attempts directed towards the datacenter while submerged in the water, the one or more intrusion detection modules further configured to: responsive to a detection of an intrusion into the datacenter submerged in the water, triggering an alert for network operations;broadcasting warnings into a surrounding environment;ceasing network traffic; failing over to a geo-replicated copy of the datacenter; andpermanently rendering local data of the datacenter inaccessible by flooding the datacenter submerged in the water. 2. The system of claim 1 further comprising: a power generator, coupled to at least one of the datacenter or the intrusion detection system, that generates power from the movement of the water or air. 3. The system of claim 1 further comprising: an energy storage module, coupled to the datacenter, that stores energy for use by the datacenter. 4. The system of claim 1 further comprising: a compound module comprising two or more of the following: a datacenter module, a power generator module, and a power storage module. 5. The system of claim 1, wherein the one or more intrusion detection modules further comprise one or more intrusion detection sensors. 6. The system of claim 1, wherein the one or more intrusion detection modules include at least one of a camera, an accelerometer, a vibration sensor, a magnetometer, a water pressure sensor, a hydrophone, a sonar device, or a laser. 7. The system of claim 1, wherein the one or more intrusion detection modules are coupled directly to the one or more physically separable modules of the datacenter. 8. The system of claim 1, wherein the intrusion detection system includes a perimeter barrier. 9. The system of claim 8, wherein at least a portion of the one or more intrusion detection modules is coupled to the perimeter barrier. 10. The system of claim 1, wherein the one or more intrusion detection modules include at least one of an acoustic sensor, a pressure sensor, a vibration sensor, a temperature sensor, a voltage sensor, a current sensor, or a fiber network integrity sensor. 11. In a computing environment, a method for detecting intrusion into a datacenter submerged in water, the method performed at least in part on a processor, the method comprising: receiving data from a plurality of sensors, wherein the plurality of sensors include at least one of a hydrophone or a sonar device;determining whether an anomaly is detected using the received data;responsive to a determination that the anomaly is detected, identifying the anomaly;determining whether the identified anomaly indicates an underwater intrusion;responsive to a determination that the detected anomaly is not an intrusion indication, outputting a change detection notice;responsive to a determination that the detected anomaly indicates the underwater intrusion, initiating a search for the underwater intrusion;ceasing network traffic;failing over to a geo-replicated copy of the datacenter; andpermanently rendering local data of the datacenter inaccessible by flooding the datacenter submerged in the water. 12. The method of claim 11, wherein identifying the anomaly further comprises: identifying a change in the environment by a distinct observation. 13. The method of claim 11, wherein identifying the anomaly further comprises: identifying a change in connectivity of the datacenter to a network. 14. The method of claim 11, wherein receiving the data from the plurality of sensors further comprises: receiving the data from one or more intrusion detection modules of an intrusion detection system associated with the datacenter. 15. The method of claim 11, wherein receiving the data from the plurality of sensors further comprises: receiving the data from one or more datacenter modules. 16. The method of claim 11, wherein receiving the data from the plurality of sensors further comprises: receiving the data from one or more remote facilities, including publicly accessible ocean or weather sensors or reports, or Automatic Identification System (AIS) reports. 17. In a computing environment, a method for performing protective actions upon detection of an intrusion into a datacenter submerged in water, the method performed at least in part on a processor, the method comprising one or more of: triggering an alert for network operations;broadcasting warnings into a surrounding environment;ceasing network traffic;failing over to a geo-replicated copy of the datacenter; andpermanently rendering local data of the datacenter inaccessible by flooding the datacenter submerged in the water. 18. The method of claim 17, wherein broadcasting the warnings into the surrounding environment further comprises: broadcasting the warnings into surrounding water of the datacenter using an acoustic emissions component. 19. The method of claim 17, wherein further rendering the data inaccessible further comprises: ignoring all network traffic pending receipt of a special sequence of packets.
Belady, Christian L.; Larus, James R.; Reed, Danny A.; Borgs, Christian H.; Chayes, Jennifer Tour; Lobel, Ilan; Menache, Ishai; Nazerzadeh, Hamid; Jain, Navendu, Data center system that accommodates episodic computation.
Godrich, Kfir L.; Gross, Peter; Wilson, Scott A.; Zuppan, James; Kurkjian, Christopher W.; Young, Gregory K. K.; Gmiter, Peter F., Flexible data center and methods for deployment.
Lightfoot, Fred M.; Milligan, Robert Eugene; Eade, Terry Ivan; Morchin, William Carl, Method and apparatus for ocean energy conversion, storage and transportation to shore-based distribution centers.
Fan, Xiaobo; Hennecke, Mark D.; Heath, Taliver Brooks, Method of correlating power in a data center by fitting a function to a plurality of pairs of actual power draw values and estimated power draw values determined from monitored CPU utilization of a statistical sample of computers in the data center.
Laine, Juha-Pekka J.; Blasche, Gregory P.; Bohn, Paul; Dawson, Robin Mark Adrian; Foley, Walter; Lane, Benjamin F.; McClain, Sean; Waldron, Erik L.; Smith, Stephen P., Navigation by ocean surface topography.
Janakiraman,Gopalakrishnan; Farkas,Keith Istvan; Patel,Chandrakant D.; Bash,Cullen Edwin, Supplying power to at least one electrical device based on an efficient operating point of a power supply.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.