CN111124566A - BMC user interface operation management method, equipment and readable medium - Google Patents

BMC user interface operation management method, equipment and readable medium Download PDF

Info

Publication number
CN111124566A
CN111124566A CN201911199332.6A CN201911199332A CN111124566A CN 111124566 A CN111124566 A CN 111124566A CN 201911199332 A CN201911199332 A CN 201911199332A CN 111124566 A CN111124566 A CN 111124566A
Authority
CN
China
Prior art keywords
executed
user
bmc
ongoing
response
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911199332.6A
Other languages
Chinese (zh)
Inventor
孙永博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN201911199332.6A priority Critical patent/CN111124566A/en
Publication of CN111124566A publication Critical patent/CN111124566A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a management method for BMC user interface operation, which comprises the following steps: verifying the identities of the users based on the user login interface, and connecting the users to the equipment corresponding to the request through the BMC; the BMC receives operation information of a plurality of users, compares the operation to be executed with the ongoing operation information, and judges whether the operation to be executed conflicts with the ongoing operation; and in response to the conflict between the operation to be executed and the ongoing operation, the BMC refuses to execute the operation to be executed, enables the operation to be executed to be in a waiting state, and sends prompt information to the user interface. The invention also discloses a computer device and a readable storage medium. The management method, the equipment and the medium for the BMC user interface operation prevent two or more conflict operations from being executed simultaneously by judging and processing the operation to be executed, and avoid influencing the normal working state of the equipment.

Description

BMC user interface operation management method, equipment and readable medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method, a device, and a readable medium for managing a BMC user interface operation.
Background
The BMC (Baseboard Management Controller) provides a webUI (web user interface) for a user, realizes the display and setting of each related function, and the user can visually and conveniently check related information and perform related operations through the web user interface. The web page user interface allows different users to simultaneously perform mutually exclusive functions or operations, for example, when one user is performing a function of refreshing firmware, another user may perform operations that affect the function of refreshing firmware, such as also refreshing the same firmware, turning on and off the computer, and the like.
Because there is no prompt information, when the executed operation conflicts, the function execution fails, even the equipment works abnormally, and then the problem troubleshooting and the internal debugging are carried out, which is time-consuming and labor-consuming, and greatly affects the working efficiency.
Therefore, how to manage the operation of the BMC user interface is very important to avoid operation conflicts.
Disclosure of Invention
In view of this, an embodiment of the present invention provides a method, a device, and a medium for managing a BMC user interface operation, which prevent two or more conflicting operations from being executed simultaneously by determining and processing operations to be executed, and avoid affecting a normal operating state of the device.
Based on the above object, an aspect of the embodiments of the present invention provides a method for managing a BMC user interface operation, including the following steps: verifying the identities of the users based on the user login interface, and connecting the users to the equipment corresponding to the request through the BMC; the BMC receives operation information of a plurality of users, compares the operation to be executed with the ongoing operation information, and judges whether the operation to be executed conflicts with the ongoing operation; and in response to the conflict between the operation to be executed and the ongoing operation, the BMC refuses to execute the operation to be executed, enables the operation to be executed to be in a waiting state, and sends prompt information to the user interface.
In some embodiments, further comprising: the BMC creates a session control object, acquires user authority level information and stores the authority level information in the session control object; in response to the conflict between the operation to be executed and the ongoing operation, calling a session control object, and comparing the permissions of the user corresponding to the operation to be executed and the ongoing operation; and stopping the ongoing operation and starting to execute the operation to be executed in response to the fact that the authority of the user corresponding to the operation to be executed is higher than the authority of the user corresponding to the ongoing operation.
In some embodiments, further comprising: executing the operation to be executed in response to the operation to be executed not conflicting with the operation in progress; and in response to the fact that the authority of the user corresponding to the operation to be executed is lower than the authority of the user corresponding to the ongoing operation, the BMC refuses to execute the operation to be executed, enables the operation to be executed to be in a waiting state, and sends prompt information to the user interface.
In some embodiments, verifying the identities of the users based on the user login interface and connecting the users to the corresponding requested device via the BMC comprises: receiving the number of the equipment input by a user on a user interface; receiving an account password input by a user on a user interface; in response to the account password passing, the user is allowed to log into the operator interface and the BMC connects the user to the requesting device.
In some embodiments, further comprising: and responding to the fact that the ongoing operation is firmware refreshing, the BMC refuses the login request of other users, refuses to execute the operation to be executed, enables the operation to be executed to be in a waiting state, and sends prompt information to a user interface.
In another aspect of the embodiments of the present invention, there is also provided a computer device, including: at least one processor; and a memory storing computer instructions executable on the processor, the instructions being executable by the processor to perform the steps of: verifying the identities of the users based on the user login interface, and connecting the users to the equipment corresponding to the request through the BMC; the BMC receives operation information of a plurality of users, compares the operation to be executed with the ongoing operation information, and judges whether the operation to be executed conflicts with the ongoing operation; and in response to the conflict between the operation to be executed and the ongoing operation, the BMC refuses to execute the operation to be executed, enables the operation to be executed to be in a waiting state, and sends prompt information to the user interface.
In some embodiments, further comprising: the BMC creates a session control object, acquires user authority level information and stores the authority level information in the session control object; in response to the conflict between the operation to be executed and the ongoing operation, calling a session control object, and comparing the permissions of the user corresponding to the operation to be executed and the ongoing operation; and stopping the ongoing operation and starting to execute the operation to be executed in response to the fact that the authority of the user corresponding to the operation to be executed is higher than the authority of the user corresponding to the ongoing operation.
In some embodiments, further comprising: executing the operation to be executed in response to the operation to be executed not conflicting with the operation in progress; and in response to the fact that the authority of the user corresponding to the operation to be executed is lower than the authority of the user corresponding to the ongoing operation, the BMC refuses to execute the operation to be executed, enables the operation to be executed to be in a waiting state, and sends prompt information to the user interface.
In some embodiments, verifying the identities of the users based on the user login interface and connecting the users to the corresponding requested device via the BMC comprises: receiving the number of the equipment input by a user on a user interface; receiving an account password input by a user on a user interface; in response to the account password passing, the user is allowed to log into the operator interface and the BMC connects the user to the requesting device.
In some embodiments, in response to the ongoing operation being a firmware refresh, the BMC rejects the login request of the other user, rejects execution of the operation to be executed, puts the operation to be executed in a waiting state, and sends a prompt message to the user interface.
In a further aspect of the embodiments of the present invention, a computer-readable storage medium is also provided, in which a computer program for implementing the above method steps is stored when the computer program is executed by a processor.
The invention has the following beneficial technical effects: by judging and processing the operation to be executed, the situation that two or more kinds of conflict operations are executed simultaneously is prevented, and the influence on the normal working state of the equipment is avoided.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained by using the drawings without creative efforts.
Fig. 1 is a schematic diagram of an embodiment of a BMC user interface operation management method provided in the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used for distinguishing two entities with the same name but different names or different parameters, and it should be noted that "first" and "second" are merely for convenience of description and should not be construed as limitations of the embodiments of the present invention, and they are not described in any more detail in the following embodiments.
In view of the foregoing, a first aspect of the embodiments of the present invention provides an embodiment of a method for managing a BMC user interface operation. Fig. 1 is a schematic diagram illustrating an embodiment of a BMC user interface operation management method according to the present invention. As shown in fig. 1, the embodiment of the present invention includes the following steps:
s1, verifying the identities of the users based on the user login interface, and connecting the users to the equipment corresponding to the request through the BMC;
s2, the BMC receives operation information of a plurality of users, compares the operation to be executed with the ongoing operation information, and judges whether the operation to be executed conflicts with the ongoing operation; and
and S3, in response to the conflict between the operation to be executed and the ongoing operation, the BMC refuses to execute the operation to be executed, enables the operation to be executed to be in a waiting state, and sends prompt information to the user interface.
In this embodiment, a User may monitor and operate the device through a webUI, where the webUI refers to a web product Interface design (Website User Interface), and the design range includes common Website designs (e.g., e-commerce websites, social networking websites), network software designs (e.g., mailboxes, Saas products), and the like. In the embodiment, the web page interface is provided for the user by the BMC to display and set various related functions, and the user can visually and conveniently view related information and perform related function setting or operation by using the web page interface. The BMC performs linear processing on different operation requests of each user, sequentially responds to different operations of each user according to the sequence of received requests, and queues the user operations according to time to process. When the operation to be executed conflicts with the ongoing operation, the BMC refuses to execute the operation to be executed, reminds the webUI interface, and pops up a dialog box to remind a user that the operation to be executed is in a waiting state.
In some embodiments of the invention, further comprising: the BMC creates a session control object, acquires user authority level information and stores the authority level information in the session control object; in response to the conflict between the operation to be executed and the ongoing operation, calling a session control object, and comparing the permissions of the user corresponding to the operation to be executed and the ongoing operation; and stopping the ongoing operation and starting to execute the operation to be executed in response to the fact that the authority of the user corresponding to the operation to be executed is higher than the authority of the user corresponding to the ongoing operation.
In this embodiment, the BMC may create a Session control object Session for each accessed user, where the Session has user permission level information, and may terminate access of a low-permission user by deleting a Session with a low permission. In some cases, the user with high authority can be allowed to interrupt the operation which is performed by the user with low authority according to the authority level of the user. In some cases, the execution can be performed according to the time sequence of the operations performed by the users in the same level, and the user who performs the operations first in the users in the same level can select to cancel the cancellation of the login state of the user in the latter and send a prompt, so that the influence on the functions being executed by the user is avoided, and the influence on the equipment in the normal working state is further prevented.
In some embodiments of the invention, further comprising: executing the operation to be executed in response to the operation to be executed not conflicting with the operation in progress; and in response to the fact that the authority of the user corresponding to the operation to be executed is lower than the authority of the user corresponding to the ongoing operation, the BMC refuses to execute the operation to be executed, enables the operation to be executed to be in a waiting state, and sends prompt information to the user interface.
In some embodiments of the present invention, verifying the identities of the plurality of users based on the user login interface and connecting the plurality of users to the corresponding requested device via the BMC comprises: receiving the number of the equipment input by a user on a user interface; receiving an account password input by a user on a user interface; in response to the account password passing, the user is allowed to log into the operator interface and the BMC connects the user to the requesting device.
In some embodiments of the invention, the method further comprises: and responding to the fact that the ongoing operation is firmware refreshing, the BMC refuses the login request of other users, refuses to execute the operation to be executed, enables the operation to be executed to be in a waiting state, and sends prompt information to a user interface. When a user executes firmware refreshing, the BMC can shield login access of a new user, enable the logged-in user to be in a waiting state and cannot execute other operations, so that the firmware refreshing operation is protected from being disturbed, interruption of firmware refreshing caused by conflict operations is prevented, and equipment in work is prevented from being influenced.
It should be particularly noted that, the steps in the embodiments of the management method for BMC user interface operation described above may be intersected, replaced, added, or deleted, and therefore, the management method for BMC user interface operation based on these reasonable permutation and combination transformations shall also belong to the scope of the present invention, and shall not limit the scope of the present invention to the embodiments.
In view of the above object, a second aspect of the embodiments of the present invention provides a computer device, including: at least one processor; and a memory storing computer instructions executable on the processor, the instructions being executable by the processor to perform the steps of: s1, verifying the identities of the users based on the user login interface, and connecting the users to the equipment corresponding to the request through the BMC; s2, the BMC receives operation information of a plurality of users, compares the operation to be executed with the ongoing operation information, and judges whether the operation to be executed conflicts with the ongoing operation; and S3, responding to the conflict between the operation to be executed and the ongoing operation, the BMC refuses to execute the operation to be executed, enables the operation to be executed to be in a waiting state, and sends prompt information to the user interface.
In some embodiments, the steps further comprise: the BMC creates a session control object, acquires user authority level information and stores the authority level information in the session control object; in response to the conflict between the operation to be executed and the ongoing operation, calling a session control object, and comparing the permissions of the user corresponding to the operation to be executed and the ongoing operation; and stopping the ongoing operation and starting to execute the operation to be executed in response to the fact that the authority of the user corresponding to the operation to be executed is higher than the authority of the user corresponding to the ongoing operation.
In some embodiments, the steps further comprise: executing the operation to be executed in response to the operation to be executed not conflicting with the operation in progress; and in response to the fact that the authority of the user corresponding to the operation to be executed is lower than the authority of the user corresponding to the ongoing operation, the BMC refuses to execute the operation to be executed, enables the operation to be executed to be in a waiting state, and sends prompt information to the user interface.
In some embodiments, verifying the identities of the users based on the user login interface and connecting the users to the corresponding requested device via the BMC comprises: receiving the number of the equipment input by a user on a user interface; receiving an account password input by a user on a user interface; in response to the account password passing, the user is allowed to log into the operator interface and the BMC connects the user to the requesting device.
The invention also provides a computer readable storage medium storing a computer program which, when executed by a processor, performs the method as above.
Finally, it should be noted that, as one of ordinary skill in the art can appreciate that all or part of the processes of the methods of the above embodiments can be implemented by a computer program to instruct related hardware to implement the method of the ALS algorithm. The storage medium of the program may be a magnetic disk, an optical disk, a Read Only Memory (ROM), a Random Access Memory (RAM), or the like. The embodiments of the computer program may achieve the same or similar effects as any of the above-described method embodiments.
Furthermore, the methods disclosed according to embodiments of the present invention may also be implemented as a computer program executed by a processor, which may be stored in a computer-readable storage medium. Which when executed by a processor performs the above-described functions defined in the methods disclosed in embodiments of the invention.
Further, the above method steps and system elements may also be implemented using a controller and a computer readable storage medium for storing a computer program for causing the controller to implement the functions of the above steps or elements.
Further, it should be appreciated that the computer-readable storage media (e.g., memory) herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. By way of example, and not limitation, nonvolatile memory can include Read Only Memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which can act as external cache memory. By way of example and not limitation, RAM is available in a variety of forms such as synchronous RAM (DRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The storage devices of the disclosed aspects are intended to comprise, without being limited to, these and other suitable types of memory.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as software or hardware depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments of the present invention.
The various illustrative logical blocks, modules, and circuits described in connection with the disclosure herein may be implemented or performed with the following components designed to perform the functions herein: a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination of these components. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP, and/or any other such configuration.
The steps of a method or algorithm described in connection with the disclosure herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.
In one or more exemplary designs, the functions may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy disk, blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
The foregoing is an exemplary embodiment of the present disclosure, but it should be noted that various changes and modifications could be made herein without departing from the scope of the present disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. Furthermore, although elements of the disclosed embodiments of the invention may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
It should be understood that, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The numbers of the embodiments disclosed in the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, and the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, of embodiments of the invention is limited to these examples; within the idea of an embodiment of the invention, also technical features in the above embodiment or in different embodiments may be combined and there are many other variations of the different aspects of the embodiments of the invention as described above, which are not provided in detail for the sake of brevity. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the embodiments of the present invention are intended to be included within the scope of the embodiments of the present invention.

Claims (10)

1. A management method for BMC user interface operation is characterized by comprising the following steps:
verifying the identities of a plurality of users based on a user login interface, and connecting the users to equipment corresponding to requests through a BMC;
the BMC receives the operation information of the users, compares the operation to be executed with the ongoing operation information, and judges whether the operation to be executed conflicts with the ongoing operation; and
and in response to the conflict between the operation to be executed and the ongoing operation, the BMC refuses to execute the operation to be executed, enables the operation to be executed to be in a waiting state, and sends prompt information to a user interface.
2. The method of claim 1, further comprising:
the BMC creates a session control object, acquires the user permission level information and stores the permission level information in the session control object;
in response to the conflict between the operation to be executed and the ongoing operation, calling the session control object, and comparing the authority of the user corresponding to the operation to be executed and the ongoing operation;
and in response to the fact that the authority of the user corresponding to the operation to be executed is higher than the authority of the user corresponding to the ongoing operation, stopping the ongoing operation and starting to execute the operation to be executed.
3. The method of claim 2, further comprising:
in response to the operation to be performed not conflicting with the ongoing operation, performing an operation to be performed;
and in response to that the authority of the user corresponding to the operation to be executed is lower than the authority of the user corresponding to the ongoing operation, the BMC refuses to execute the operation to be executed, enables the operation to be executed to be in a waiting state, and sends prompt information to a user interface.
4. The method of claim 1, wherein verifying the identities of the users based on the user login interface and connecting the users to the corresponding requested device via the BMC comprises:
receiving the number of the equipment input by the user on a user interface;
receiving an account password input by the user on the user interface;
in response to the account password passing, allowing the user to log in to an operator interface and the BMC connecting the user to the requested device.
5. The method of claim 1, further comprising: and in response to the fact that the ongoing operation is firmware refreshing, the BMC rejects the login requests of other users, rejects the execution of the operation to be executed, enables the operation to be executed to be in a waiting state, and sends prompt information to a user interface.
6. A computer device, comprising:
at least one processor; and
a memory storing computer instructions executable on the processor, the instructions when executed by the processor implementing the steps of:
verifying the identities of a plurality of users based on a user login interface, and connecting the users to equipment corresponding to requests through a BMC;
the BMC receives the operation information of the users, compares the operation to be executed with the ongoing operation information, and judges whether the operation to be executed conflicts with the ongoing operation; and
and in response to the conflict between the operation to be executed and the ongoing operation, the BMC refuses to execute the operation to be executed, enables the operation to be executed to be in a waiting state, and sends prompt information to a user interface.
7. The computer device of claim 6, wherein the steps further comprise:
the BMC creates a session control object, acquires the user permission level information and stores the permission level information in the session control object;
in response to the conflict between the operation to be executed and the ongoing operation, calling the session control object, and comparing the authority of the user corresponding to the operation to be executed and the ongoing operation;
and in response to the fact that the authority of the user corresponding to the operation to be executed is higher than the authority of the user corresponding to the ongoing operation, stopping the ongoing operation and starting to execute the operation to be executed.
8. The computer device of claim 7, wherein the steps further comprise:
in response to the operation to be performed not conflicting with the ongoing operation, performing an operation to be performed;
and in response to that the authority of the user corresponding to the operation to be executed is lower than the authority of the user corresponding to the ongoing operation, the BMC refuses to execute the operation to be executed, enables the operation to be executed to be in a waiting state, and sends prompt information to a user interface.
9. The computer device of claim 6, wherein verifying the identities of the users based on the user login interface and connecting the users to the corresponding requesting device via the BMC comprises:
receiving the number of the equipment input by the user on a user interface;
receiving an account password input by the user on the user interface;
in response to the account password passing, allowing the user to log in to an operator interface and the BMC connecting the user to the requested device.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 5.
CN201911199332.6A 2019-11-29 2019-11-29 BMC user interface operation management method, equipment and readable medium Pending CN111124566A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911199332.6A CN111124566A (en) 2019-11-29 2019-11-29 BMC user interface operation management method, equipment and readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911199332.6A CN111124566A (en) 2019-11-29 2019-11-29 BMC user interface operation management method, equipment and readable medium

Publications (1)

Publication Number Publication Date
CN111124566A true CN111124566A (en) 2020-05-08

Family

ID=70497060

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911199332.6A Pending CN111124566A (en) 2019-11-29 2019-11-29 BMC user interface operation management method, equipment and readable medium

Country Status (1)

Country Link
CN (1) CN111124566A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111611042A (en) * 2020-05-22 2020-09-01 京东方科技集团股份有限公司 Method and device for processing equipment state change and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102567099A (en) * 2011-12-30 2012-07-11 百度在线网络技术(北京)有限公司 Method, device and equipment used for controlling operation object
CN105992071A (en) * 2015-03-02 2016-10-05 中兴通讯股份有限公司 Service presentation method and device
CN107368356A (en) * 2016-05-12 2017-11-21 阿里巴巴集团控股有限公司 A kind of service request processing method and device
CN108255589A (en) * 2017-08-29 2018-07-06 平安科技(深圳)有限公司 Method for scheduling task and server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102567099A (en) * 2011-12-30 2012-07-11 百度在线网络技术(北京)有限公司 Method, device and equipment used for controlling operation object
CN105992071A (en) * 2015-03-02 2016-10-05 中兴通讯股份有限公司 Service presentation method and device
CN107368356A (en) * 2016-05-12 2017-11-21 阿里巴巴集团控股有限公司 A kind of service request processing method and device
CN108255589A (en) * 2017-08-29 2018-07-06 平安科技(深圳)有限公司 Method for scheduling task and server

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111611042A (en) * 2020-05-22 2020-09-01 京东方科技集团股份有限公司 Method and device for processing equipment state change and computer readable storage medium
WO2021232992A1 (en) * 2020-05-22 2021-11-25 京东方科技集团股份有限公司 Processing method for device change of state, apparatus, and non-transitory computer readable storage medium
US11822935B2 (en) 2020-05-22 2023-11-21 Boe Technology Group Co., Ltd. Processing method and apparatus of device status change and non-transitory computer-readable storage medium

Similar Documents

Publication Publication Date Title
US8590052B2 (en) Enabling granular discretionary access control for data stored in a cloud computing environment
KR102403480B1 (en) Device policy manager
US9639678B2 (en) Identity risk score generation and implementation
JP7030133B2 (en) Systems and methods of role-based computer security configuration
WO2019200784A1 (en) Method for web crawler, terminal, and storage medium
US10911494B2 (en) Methods and systems for providing security to iot devices operating in an environment
KR20140090188A (en) Techniques to apply and share remote policies on mobile devices
US11507696B2 (en) Restricting plug-in application recipes
CN108255542B (en) Serial port and parallel port control method and device of virtual machine
CN104639650A (en) Fine granularity distributive interface access control method and device
US20220188431A1 (en) Api access to security-sensitive computing system
US9027155B2 (en) System for governing the disclosure of restricted data
CN111124566A (en) BMC user interface operation management method, equipment and readable medium
CN116438778A (en) Persistent source value of assumed alternate identity
WO2021098213A1 (en) Trusted state monitoring method, device, and medium
CN111176932B (en) Method and device for recording abnormal event log and readable medium
US20230124113A1 (en) Method and system for identifying suspicious code contribution to a source code repository
CN111858538B (en) Method, device, equipment and medium for configuring BeeGFS quota by cluster
CA3162822A1 (en) System and method for controlling access to project data and to computing resources therefor
CN111222156B (en) Method, device and equipment for operating system safety protection and readable medium
CN111130976B (en) Method, equipment and medium for configuring virtual local area network of white box switch
CN113312669A (en) Password synchronization method, device and storage medium
CN111125678A (en) Method, device and medium for managing Option ROM loading
US20230214533A1 (en) Computer-implemented systems and methods for application identification and authentication
US20240064148A1 (en) System and method for managing privileged account access

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200508