US 12,468,613 B2
Systems and methods for detecting hardware tampering using airflow sensors
Harikrishnan Pillai, San Jose, CA (US); Niels-Peder Mosegard Jensen, Sunnyvale, CA (US); Jeffrey C. Loo, San Jose, CA (US); and Phong Hoang Ho, Cary, NC (US)
Assigned to CISCO TECHNOLOGY, INC., San Jose, CA (US)
Filed by Cisco Technology, Inc., San Jose, CA (US)
Filed on Feb. 7, 2023, as Appl. No. 18/165,643.
Prior Publication US 2024/0264920 A1, Aug. 8, 2024
Int. Cl. G06F 11/30 (2006.01); G06F 21/86 (2013.01)
CPC G06F 11/3058 (2013.01) [G06F 21/86 (2013.01); G06F 2221/2151 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A network element, comprising:
one or more processors; and
one or more computer-readable non-transitory storage media coupled to the one or more processors and comprising instructions that, when executed by the one or more processors, cause the network element to perform operations comprising:
receiving airflow data from an airflow sensor installed inside of a hardware device;
determining an airflow value from the airflow data;
determining that the airflow value exceeds a predetermined threshold;
determining a potential tampering event associated with the hardware device;
receiving test airflow data when the hardware device is powered on and when the hardware device is powered off;
analyzing the test airflow data to determine airflow patterns when the hardware device is powered on and when the hardware device is powered off; and
determining the predetermined threshold based on the airflow patterns.