CN109801408A - A kind of access control management method for computer room - Google Patents
A kind of access control management method for computer room Download PDFInfo
- Publication number
- CN109801408A CN109801408A CN201811489512.3A CN201811489512A CN109801408A CN 109801408 A CN109801408 A CN 109801408A CN 201811489512 A CN201811489512 A CN 201811489512A CN 109801408 A CN109801408 A CN 109801408A
- Authority
- CN
- China
- Prior art keywords
- claimant
- information
- mode
- permission
- access control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Alarm Systems (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of access control management method for computer room, access control management method includes: the pattern information for obtaining entrance guard management, and the pattern information includes operating mode, vacation mode, prevents mode and open mode;Enabling solicited message is obtained, and the biological information of checking request people and the authority information for comparing claimant then send door open command to access controller if the permission of claimant meets the jurisdictions mandate of present mode, otherwise refusal sends door open command.The present invention uses multi-mode management, by multistage authority distribution and verifying, is avoided that layabout's malice swarms into computer room, can record to the unlatching each time of computer room, be able to achieve and transfer gate inhibition's open record according to timing node or claimant.
Description
Technical field
The present invention relates to electrical equipment technical field, especially a kind of access control management method for computer room.
Background technique
The power equipments such as power distribution control cabinet, switchgear in existing market machine room upper, can not be right when being safeguarded
Maintenance personnel carries out authentication;And maintenance information can not timely and effectively be communicated to flexecutive.
Summary of the invention
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of access control management method for computer room, gram
The problem of taking traditional machine room entrance guard management absent-mindedness, cannot achieve subsequent retrospect, the application uses multi-mode management, is weighed by multistage
Limit distribution and verifying are avoided that layabout's malice swarms into computer room, can record to the unlatching each time of computer room, be able to achieve root
Gate inhibition's open record is transferred according to timing node or claimant.
The purpose of the present invention is achieved through the following technical solutions:
A kind of access control management method for computer room, the access control management method include:
The pattern information of entrance guard management is obtained, the pattern information includes operating mode, vacation mode, prevents mode and open mould
Formula;
Enabling solicited message, and the biological information of checking request people and the authority information for comparing claimant are obtained, is such as requested
The permission of people meets the jurisdictions mandate of present mode, then sends door open command to access controller, and otherwise refusal sends to open the door and refer to
It enables.
Preferably, the pattern information of gate inhibition is set specifically:
Operating mode, the permission for the claimant that need to open the door meet minimum jurisdictions mandate of entering;
Vacation mode, the permission for the claimant that need to open the door meet the second level and enter jurisdictions mandate;
Prevent mode, the permission for the claimant that need to open the door meets the superlative degree and enters jurisdictions mandate;
Open mode does not need the authority information of verifying enabling claimant.
Preferably, further include the method for editor and distribution request human rights limit, specifically include:
An account is distributed to each claimant that enters;
Corresponding each account distributes a permission of entering, and initially allocated permission of entering is minimum permission of entering;
It is modified by permission of administrator's account to each account.
Preferably, the biological information of checking request people, specifically includes:
By finger print information into comparison;
Verifying is compared by facial image information;
Verifying is compared by voiceprint;
By veinprint information into comparison;
Verifying is compared by iris information.
Preferably, the authority information for comparing claimant, specifically includes:
When claimant's authority information is undesirable, to claimant's display Insufficient privilege;
As claimant malicious operation gate inhibition, the biological characteristic of claimant, and remote alarms are recorded;
Enter when claimant trails, then records the biological characteristic of claimant, and be labeled as exception information, which is uploaded
To Cloud Server.
Preferably, enabling solicited message, and the biological information of checking request people and the permission for comparing claimant are obtained
The process of information, further include:
The two-dimensional barcode information of checking request people;
The dynamic password information of checking request people;
The static bar code information of checking request people;
The signature object information of checking request people.
Preferably, further include:
Record and count opening time, opening times and the unlatching claimant of access controller;
Dynamic trace back database is established, is transferred in the data in dynamic trace back database according to timing node or claimant's information
Hold.
The beneficial effects of the present invention are:
The problem of present invention overcomes traditional machine room entrance guard management to relax, and cannot achieve subsequent retrospect, the application use multi-mode pipe
Reason is avoided that layabout's malice swarms into computer room, can be carried out to the unlatching each time of computer room by multistage authority distribution and verifying
Record, is able to achieve and transfers gate inhibition's open record according to timing node or claimant.
Detailed description of the invention
Fig. 1 is the flow chart of access control management method of the present invention.
Specific embodiment
Technical solution of the present invention is described in further detail with reference to the accompanying drawing, but protection scope of the present invention is not limited to
It is as described below.
Embodiment:
A kind of access control management method for computer room, please refers to shown in attached drawing 1, and the access control management method includes:
S1, the pattern information for obtaining entrance guard management, the pattern information include operating mode, vacation mode, prevent mode and open
Mode playback;
S2, enabling solicited message, and the biological information of checking request people and the authority information for comparing claimant are obtained, such as asked
The permission asked for help meets the jurisdictions mandate of present mode, then sends door open command to access controller, and otherwise refusal, which is sent, opens the door
Instruction.
Preferably, the pattern information of gate inhibition is set specifically:
Operating mode, the permission for the claimant that need to open the door meet minimum jurisdictions mandate of entering;
Vacation mode, the permission for the claimant that need to open the door meet the second level and enter jurisdictions mandate;
Prevent mode, the permission for the claimant that need to open the door meets the superlative degree and enters jurisdictions mandate;
Open mode does not need the authority information of verifying enabling claimant.
Preferably, further include the method for editor and distribution request human rights limit, specifically include:
An account is distributed to each claimant that enters;
Corresponding each account distributes a permission of entering, and initially allocated permission of entering is minimum permission of entering;
It is modified by permission of administrator's account to each account.
Preferably, the biological information of checking request people, specifically includes:
By finger print information into comparison;
Verifying is compared by facial image information;
Verifying is compared by voiceprint;
By veinprint information into comparison;
Verifying is compared by iris information.
Preferably, the authority information for comparing claimant, specifically includes:
When claimant's authority information is undesirable, to claimant's display Insufficient privilege;
As claimant malicious operation gate inhibition, the biological characteristic of claimant, and remote alarms are recorded;
Enter when claimant trails, then records the biological characteristic of claimant, and be labeled as exception information, which is uploaded
To Cloud Server.
Preferably, enabling solicited message, and the biological information of checking request people and the permission for comparing claimant are obtained
The process of information, further include:
The two-dimensional barcode information of checking request people;
The dynamic password information of checking request people;
The static bar code information of checking request people;
The signature object information of checking request people.
Preferably, further include:
Record and count opening time, opening times and the unlatching claimant of access controller;
Dynamic trace back database is established, is transferred in the data in dynamic trace back database according to timing node or claimant's information
Hold.
The present invention uses multi-mode management, by multistage authority distribution and verifying, is avoided that layabout's malice swarms into machine
Room can record the unlatching each time of computer room, be able to achieve and transfer gate inhibition's open record according to timing node or claimant.
A specific embodiment of the invention above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
Limitations on the scope of the patent of the present invention therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art
For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention
Protect range.
Claims (7)
1. a kind of access control management method for computer room, which is characterized in that the access control management method includes:
The pattern information of entrance guard management is obtained, the pattern information includes operating mode, vacation mode, prevents mode and open mould
Formula;
Enabling solicited message, and the biological information of checking request people and the authority information for comparing claimant are obtained, is such as requested
The permission of people meets the jurisdictions mandate of present mode, then sends door open command to access controller, and otherwise refusal sends to open the door and refer to
It enables.
2. a kind of access control management method for computer room according to claim 1, which is characterized in that set the mode letter of gate inhibition
Breath specifically:
Operating mode, the permission for the claimant that need to open the door meet minimum jurisdictions mandate of entering;
Vacation mode, the permission for the claimant that need to open the door meet the second level and enter jurisdictions mandate;
Prevent mode, the permission for the claimant that need to open the door meets the superlative degree and enters jurisdictions mandate;
Open mode does not need the authority information of verifying enabling claimant.
3. a kind of access control management method for computer room according to claim 1, which is characterized in that it further includes editor and divides
Method with claimant's permission, specifically includes:
An account is distributed to each claimant that enters;
Corresponding each account distributes a permission of entering, and initially allocated permission of entering is minimum permission of entering;
It is modified by permission of administrator's account to each account.
4. a kind of access control management method for computer room according to claim 1, which is characterized in that the biology of checking request people
Characteristic information specifically includes:
By finger print information into comparison;
Verifying is compared by facial image information;
Verifying is compared by voiceprint;
By veinprint information into comparison;
Verifying is compared by iris information.
5. a kind of access control management method for computer room according to claim 1, which is characterized in that compare the permission of claimant
Information specifically includes:
When claimant's authority information is undesirable, to claimant's display Insufficient privilege;
As claimant malicious operation gate inhibition, the biological characteristic of claimant, and remote alarms are recorded;
Enter when claimant trails, then records the biological characteristic of claimant, and be labeled as exception information, which is uploaded
To Cloud Server.
6. a kind of access control management method for computer room according to claim 1, which is characterized in that obtain the request letter that opens the door
Breath, and the process of the biological information of checking request people and the authority information of comparison claimant, further include:
The two-dimensional barcode information of checking request people;
The dynamic password information of checking request people;
The static bar code information of checking request people;
The signature object information of checking request people.
7. a kind of access control management method for computer room according to claim 1, which is characterized in that its further include:
Record and count opening time, opening times and the unlatching claimant of access controller;
Dynamic trace back database is established, the data content in dynamic trace back database is transferred according to timing node or claimant's information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811489512.3A CN109801408A (en) | 2018-12-06 | 2018-12-06 | A kind of access control management method for computer room |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811489512.3A CN109801408A (en) | 2018-12-06 | 2018-12-06 | A kind of access control management method for computer room |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109801408A true CN109801408A (en) | 2019-05-24 |
Family
ID=66556528
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811489512.3A Pending CN109801408A (en) | 2018-12-06 | 2018-12-06 | A kind of access control management method for computer room |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109801408A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110379058A (en) * | 2019-07-17 | 2019-10-25 | 日立楼宇技术(广州)有限公司 | A kind of access control management method, device, equipment and storage medium |
CN111612950A (en) * | 2020-05-25 | 2020-09-01 | 歌尔科技有限公司 | Intelligent lockset and unlocking authentication method and device thereof |
CN111653014A (en) * | 2020-06-12 | 2020-09-11 | 广州欧钝机电科技有限公司 | Automatic verification opening method and system for platform shielding door |
CN114067474A (en) * | 2021-11-15 | 2022-02-18 | 中国建设银行股份有限公司 | Computer room management method and device |
CN116665352A (en) * | 2023-05-30 | 2023-08-29 | 江苏日颖慧眼智能设备有限公司 | Access control method and system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007334623A (en) * | 2006-06-15 | 2007-12-27 | Toshiba Corp | Face authentication device, face authentication method, and access control device |
CN201967046U (en) * | 2011-01-16 | 2011-09-07 | 南昌阿兰德实业有限公司 | Visible monitoring anti-tailing linkage interlocking control device |
CN102568063A (en) * | 2011-12-14 | 2012-07-11 | 深圳市中联创新自控系统有限公司 | Door opening method for door control system, and door control system |
CN205654255U (en) * | 2016-04-21 | 2016-10-19 | 湖南中迪科技有限公司 | Face identification intelligence door |
CN106961576A (en) * | 2017-03-10 | 2017-07-18 | 盛视科技股份有限公司 | The anti-trailing method of video, apparatus and system |
CN107170078A (en) * | 2017-04-27 | 2017-09-15 | 胡渐佳 | Intelligent Recognition is entered tailing access control system |
CN107313660A (en) * | 2017-07-07 | 2017-11-03 | 安徽德诺科技股份公司 | The method for unlocking of intelligent lock system and smart lock |
CN207352684U (en) * | 2017-10-16 | 2018-05-11 | 海南电网有限责任公司昌江供电局 | Five prevention unlocking key box security management and control systems |
-
2018
- 2018-12-06 CN CN201811489512.3A patent/CN109801408A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007334623A (en) * | 2006-06-15 | 2007-12-27 | Toshiba Corp | Face authentication device, face authentication method, and access control device |
CN201967046U (en) * | 2011-01-16 | 2011-09-07 | 南昌阿兰德实业有限公司 | Visible monitoring anti-tailing linkage interlocking control device |
CN102568063A (en) * | 2011-12-14 | 2012-07-11 | 深圳市中联创新自控系统有限公司 | Door opening method for door control system, and door control system |
CN205654255U (en) * | 2016-04-21 | 2016-10-19 | 湖南中迪科技有限公司 | Face identification intelligence door |
CN106961576A (en) * | 2017-03-10 | 2017-07-18 | 盛视科技股份有限公司 | The anti-trailing method of video, apparatus and system |
CN107170078A (en) * | 2017-04-27 | 2017-09-15 | 胡渐佳 | Intelligent Recognition is entered tailing access control system |
CN107313660A (en) * | 2017-07-07 | 2017-11-03 | 安徽德诺科技股份公司 | The method for unlocking of intelligent lock system and smart lock |
CN207352684U (en) * | 2017-10-16 | 2018-05-11 | 海南电网有限责任公司昌江供电局 | Five prevention unlocking key box security management and control systems |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110379058A (en) * | 2019-07-17 | 2019-10-25 | 日立楼宇技术(广州)有限公司 | A kind of access control management method, device, equipment and storage medium |
WO2021008395A1 (en) * | 2019-07-17 | 2021-01-21 | 日立楼宇技术(广州)有限公司 | Access control management method and apparatus, device and storage medium |
CN111612950A (en) * | 2020-05-25 | 2020-09-01 | 歌尔科技有限公司 | Intelligent lockset and unlocking authentication method and device thereof |
CN111653014A (en) * | 2020-06-12 | 2020-09-11 | 广州欧钝机电科技有限公司 | Automatic verification opening method and system for platform shielding door |
CN114067474A (en) * | 2021-11-15 | 2022-02-18 | 中国建设银行股份有限公司 | Computer room management method and device |
CN116665352A (en) * | 2023-05-30 | 2023-08-29 | 江苏日颖慧眼智能设备有限公司 | Access control method and system |
CN116665352B (en) * | 2023-05-30 | 2024-01-30 | 江苏日颖慧眼智能设备有限公司 | Access control method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109801408A (en) | A kind of access control management method for computer room | |
CN101534300B (en) | System protection framework combining multi-access control mechanism and method thereof | |
CN107483434A (en) | The management system and method for a kind of movable storage device | |
CN108540449A (en) | Management-control method and system, the computer storage media of intelligent seal | |
CN104392723A (en) | Sharing instrument platform management method based on voiceprint recognition technology | |
CN110535895A (en) | A kind of machine room monitoring system based on technology of Internet of things | |
CN106447187A (en) | Intelligent seal management system based on short-distance wireless communication and control method | |
CN106296936A (en) | Community management system based on cloud platform | |
CN106815503A (en) | A kind of operating system method for managing user right and system | |
US20200098208A1 (en) | Security control device, security control method, security system and storage medium | |
Reegu et al. | Interoperability challenges in healthcare blockchain system-a systematic review | |
CN107358122A (en) | The access management method and system of a kind of data storage | |
CN204465588U (en) | A kind of host monitor based on server architecture and auditing system | |
CN106067201A (en) | Access control management method for clean area | |
CN109102600A (en) | Cell access permission management method and system | |
CN1075695C (en) | Fireproof wall system | |
CN105975836A (en) | Management method for signature and authority authentication equipment | |
CN105893376A (en) | Database access supervision method | |
CN112199700A (en) | Safety management method and system for MES data system | |
CN106534115A (en) | Electronic medical record system design based on domestic cipher algorithm and method | |
CN103456064A (en) | Palm vein entrance guard control system | |
CN110246250A (en) | A kind of laboratory safety access management system | |
CN205581754U (en) | Server machine case based on biological characteristics recognition function | |
CN109194672A (en) | A kind of network intrusions warning system and method based on man machine language's interaction | |
CN104318180A (en) | System security permission treatment state machine model based on intelligent terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190524 |