CN109800553A - A kind of computer room safety management method, system and readable storage medium storing program for executing - Google Patents

A kind of computer room safety management method, system and readable storage medium storing program for executing Download PDF

Info

Publication number
CN109800553A
CN109800553A CN201811495765.1A CN201811495765A CN109800553A CN 109800553 A CN109800553 A CN 109800553A CN 201811495765 A CN201811495765 A CN 201811495765A CN 109800553 A CN109800553 A CN 109800553A
Authority
CN
China
Prior art keywords
sensor
computer room
requestor
room
permission levels
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811495765.1A
Other languages
Chinese (zh)
Other versions
CN109800553B (en
Inventor
赵垠扉
邢晓坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811495765.1A priority Critical patent/CN109800553B/en
Publication of CN109800553A publication Critical patent/CN109800553A/en
Application granted granted Critical
Publication of CN109800553B publication Critical patent/CN109800553B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Alarm Systems (AREA)

Abstract

The present invention provides a kind of computer room safety management method, system and readable storage medium storing program for executing.Wherein method, comprising: receive requestor's sending enters computer room solicited message;Judge the Permission Levels information of the requestor;If the requestor reaches the Permission Levels, switch for machine-room is opened, the requestor is allowed to enter computer room.The application can anti-illegal-inbreak person take pictures obtaining information;And the acquisition that permission can be carried out by living things feature recognition, solves the drawbacks of one card for multiple uses;By the setting of sensor, so that the safety of computer room is further ensured;And using the guide of light so that requestor is easier identification object region.According to the technical solution of the present invention, the safety that can increase computer room improves the usage experience of requestor.

Description

A kind of computer room safety management method, system and readable storage medium storing program for executing
Technical field
The present invention relates to a kind of method for managing security of system, more particularly to a kind of computer room safety management method, being System and readable storage medium storing program for executing.
Background technique
The epoch of the technology high-speeds such as big data, cloud computing development, data center resource become more nervous, are not needing greatly In the case where type server cluster, machine room area rents the configuration that necessitates.In current certain cloud service centers, there are multiple Company shares the case where computer room, and the differentiation that corresponding partition carries out corporate server is arranged in computer room.In current computer room In, there is following defect:
1, isolation mostly uses single layer wire netting: separation net gap is larger, is easily photographed and hand is easy to put in, it is easy to will The media such as cable USB flash disk are inserted directly into equipment, and there are risks.
2, single layer wire netting adds internal layer thin wire gauze mode: being easily photographed, and if other neighbouring company's area of isolation are sent out It lights a fire calamity, cannot play the role of being effectively isolated.
3, inclosure outside overall region: since individually isolation, personnel do not enter in inclosure internal all passage areas Behind portion, any region can be gone in the case where unattended, can not accomplish effectively to manage;And bigger space can be occupied, Increase cost.
4, only with the isolation of cabinet height: cabinet area above and underfloor regions are not done and are isolated, and exist from floor In addition the scene for entering isolated area above lower section or cabinet is also unable to reach the effect of entire area of isolation electromagnetic shielding.
5, gate inhibition is only with the mode swiped the card: there are different holders to enter the scene of area of isolation using the same card.
6, do not accomplish the independent isolation for doing cabinet according to distinct device safety standard, increase risk to equipment operation.
Personnel arbitrarily enter altered data in order to prevent, steal the destructions such as Company Confidential, machine room area independent isolating Effect it is very important.Be arranged at present a kind of computer room safety system be urgently can not to.
Summary of the invention
In order to solve at least one above-mentioned technical problem, the invention proposes a kind of device management methods, system and readable Storage medium.
To achieve the goals above, the invention discloses a kind of computer room safety management methods, comprising:
Receive requestor's sending enters computer room solicited message;
The Permission Levels of the requestor are obtained, and judge whether the Permission Levels of the requestor reach default access etc. Grade;
If the Permission Levels of the requestor reach the default access grade, switch for machine-room is opened, allows institute It states requestor and enters computer room.
In the present solution, the permission situation of the judgement requestor specifically:
Obtain the biological characteristic of the requestor;
The biological characteristic is compared with the biological information being pre-stored in rights database;
If the biometric information matches being pre-stored in the biological characteristic and rights database of the requestor, are judged as Legitimate request person;
Obtain the Permission Levels information of the requestor;
The Permission Levels information is sent to access control system.
In the present solution, computer room is provided with first sensor and second sensor;
The state value of first sensor and second sensor described in real-time monitoring;
If the state value of first sensor monitoring reaches preset alarm threshold value, Permission Levels are turned up and/or close machine The access control system of room neutron computer room, and warning message is sent to background server;
If the state value of second sensor monitoring reaches preset alarm threshold value, reduces Permission Levels and/or open machine The access control system in room and handset room, and warning message is sent to background server.
In the present solution, the first sensor is one of body-sensing sensor, pressure sensor, infrared sensor or several Kind;The second sensor is one or more of smoke sensor device, temperature sensor, humidity sensor.
Preferably, when the first sensor and second sensor are N, N is the natural number more than or equal to 2;Computer floor Monitoring state value, according to the detecting state value of the calculating, it is determined whether triggering alarm operation;The monitoring of the computer floor State value specifically:
Z=a1S1+a2S2+…+aNSN
Wherein, Z is monitoring state value, aNFor the weight coefficient of n-th sensor;SNFor the monitoring state of n-th sensor Value.
If opening switch for machine-room in the present solution, reaching the Permission Levels in the requestor, allow institute Requestor is stated to enter after computer room step, further includes:
Open the houselights of path indicator light and handset room.
Second aspect of the present invention discloses a kind of computer room safety management system, the system comprises computer room management system and solely Vertical handset room, the independent handset room quantity are independent skies multiple, that the independent handset room is separated out for computer room by partition Between, wherein each handset room has three layers of upper, middle and lower;The computer room management system includes: memory, processor and photographic device, described It include device management method program in memory, it is described to be based on realizing such as when device management method program is executed by the processor Lower step:
Receive requestor's sending enters computer room solicited message;
The Permission Levels of the requestor are obtained, and judge whether the Permission Levels of the requestor reach default access etc. Grade;
If the Permission Levels of the requestor reach the default access grade, switch for machine-room is opened, allows institute It states requestor and enters computer room.
In the present solution, the permission situation of the judgement requestor specifically:
Obtain the biological characteristic of the requestor;
The biological characteristic is compared with the biological information being pre-stored in rights database;
If the biometric information matches being pre-stored in the biological characteristic and rights database of the requestor, are judged as Legitimate request person;
Obtain the Permission Levels information of the requestor;
The Permission Levels information is sent to access control system.
In the present solution, computer room is provided with first sensor and second sensor;
The state value of first sensor and second sensor described in real-time monitoring;
If the state value of first sensor monitoring reaches preset alarm threshold value, Permission Levels are turned up and/or close machine The access control system of room neutron computer room, and warning message is sent to background server;
If the state value of second sensor monitoring reaches preset alarm threshold value, reduces Permission Levels and/or open machine The access control system in room and handset room, and warning message is sent to background server;
The first sensor is one or more of body-sensing sensor, pressure sensor, infrared sensor;Described Two sensors are one or more of smoke sensor device, temperature sensor, humidity sensor.
Third aspect present invention discloses a kind of computer readable storage medium, wraps in the computer readable storage medium Computer room safety management method program is included, when the computer room safety management method program is executed by processor, realizes such as above-mentioned one The step of kind computer room safety management method.
A kind of computer room safety management method, system and readable storage medium storing program for executing disclosed by the invention are requested by judgement The permission of person determines the entrance region of computer room according to Permission Levels, ensure that the confidentiality of computer room, the present invention can also prevent non- Method invader take pictures obtaining information;And the acquisition that permission can be carried out by living things feature recognition, it is more to solve a card The drawbacks of using;By the setting of sensor, so that the safety of computer room is further ensured;And made using the guide of light The person of calling request is easier identification object region.According to the technical solution of the present invention, the safety of computer room can be increased, improve request The usage experience of person.
Additional aspect and advantage of the invention will provide in following description section, will partially become from the following description Obviously, or practice through the invention is recognized.
Detailed description of the invention
Fig. 1 shows a kind of flow diagram of computer room safety management method provided in an embodiment of the present invention;
Fig. 2 shows the structural schematic diagrams of computer room of the present invention.
Specific embodiment
To better understand the objects, features and advantages of the present invention, with reference to the accompanying drawing and specific real Applying mode, the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application Feature in example and embodiment can be combined with each other.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, still, the present invention may be used also To be implemented using other than the one described here other modes, therefore, protection scope of the present invention is not by described below Specific embodiment limitation.
In the present invention, the computer room is individual room, wherein multiple handset rooms can be provided by partition, often A sub- computer room memory is placed with different server apparatus etc..For example, there are multiple handset room areas in the computer room of a cluster Domain, each handset room are used to store the server apparatus of different company, and the IT maintenance personnel of different company can enter by authorization The operations such as the copy of information are carried out in corresponding handset room.Each handset room is both provided with access control system, the access control system It can be connected with computer room management system, and can be by the control of background server.
Fig. 1 shows a kind of flow diagram of computer room safety management method provided in an embodiment of the present invention.Such as Fig. 1 institute Show, the invention discloses a kind of computer room safety management methods, comprising:
S102, receive requestor's sending enters computer room solicited message;
S104, obtains the Permission Levels of the requestor, and judges whether the Permission Levels of the requestor reach default Permission Levels;
S106 opens switch for machine-room if the Permission Levels of the requestor reach the default access grade, permits Perhaps the described requestor enters computer room.
It should be noted that computer room is provided with computer room safety management system, be provided with background server, for manage into Enter the permission of the requestor of computer room, and is stored with the journal files such as in and out records.Gate inhibition system is provided at the doorway of computer room System then needs to carry out the verifying of permission when request needs to enter computer room.Authority information is pre-stored in background server, example Such as, it is pre-stored with the access authority of 3 grades, the region that the representative of higher grade can pass in and out is more, and high-grade representative can be into Enter in the anyon computer room in computer room, middle grade represents in the non-core handset room being able to enter in computer room, and inferior grade represents energy Enough enter in the specified handset room of computer room, each Permission Levels and requestor have the relationship mapped one by one.
According to embodiments of the present invention, the permission situation of the judgement requestor specifically:
Obtain the biological characteristic of the requestor;
The biological characteristic is compared with the biological information being pre-stored in rights database;
If the biometric information matches being pre-stored in the biological characteristic and rights database of the requestor, are judged as Legitimate request person;
Obtain the Permission Levels information of the requestor;
The Permission Levels information is sent to access control system.
It should be noted that the biological characteristic is pupil, face, the fingerprint characteristic of requestor.Those skilled in the art It should be understood that the present invention is not limited to above-mentioned biological characteristic, any knowledge another characteristic that is able to carry out each falls within the present invention Protection scope in.
According to embodiments of the present invention, computer room is provided with first sensor and second sensor;
The state value of first sensor and second sensor described in real-time monitoring;
If the state value of first sensor monitoring reaches preset alarm threshold value, Permission Levels are turned up and/or close machine The access control system of room neutron computer room, and warning message is sent to background server;
If the state value of second sensor monitoring reaches preset alarm threshold value, reduces Permission Levels and/or open machine The access control system in room and handset room, and warning message is sent to background server.
It should be noted that the first sensor is one of body-sensing sensor, pressure sensor, infrared sensor Or it is several;The second sensor is one or more of smoke sensor device, temperature sensor, humidity sensor.This field Technical staff is any to be able to carry out carry out environmental monitoring it should be understood that the present invention is not limited to above-mentioned sensor type Sensor each fall in protection scope of the present invention.
Body-sensing sensor is the movement that can monitor human body or animal, judges that someone enters computer room by movement;Pressure Sensor is arranged on the door of computer room or is set to ground intralamellar part, judges whether that someone enters computer room by detecting pressure value; The infrared spectroscopy that infrared sensor is issued by detection human body or animal, judges whether that someone enters in computer room.Smoke sensor device For detecting the smoke-like state value inside computer room;Temperature sensor is used to detect the temperature value in computer room;Humidity sensor is used for Detect the air humidity in computer room.Smoke sensor device, temperature sensor, humidity sensor can be arranged not according to actual needs Same handset room or other passageways position.For example, smoke sensor device, temperature sensor, wet is arranged in each handset room Sensor is spent, wherein temperature sensor is additionally arranged in the host storing compartment in handset room, preferably to carry out host temperature Real-time detection.Body-sensing sensor, pressure sensor and infrared sensor are set in the necessary passageway of computer room, and in computer room Floor lower part and ceiling aerated area in be also provided with corresponding sensor, can be more preferable by these sensors of setting Carry out computer room in personnel monitoring.
It should be noted that if the state value of first sensor monitoring reaches preset alarm threshold value, then permission etc. is turned up Grade and/or the access control system for closing computer room neutron computer room, and warning message is sent to background server.For example, infrared sensor Monitor that someone enters in computer room, but access control system does not receive any disengaging instruction and information at this time, then is judged as The illegal invasion, needs height-adjusting system security level at this time, the access control system in the handset room in computer room is closed, and send report Alert information is to background server, to remind staff to have the illegal invasion.
It should be noted that if the state value of second sensor monitoring reaches preset alarm threshold value, then permission etc. is reduced Grade and/or the access control system for opening computer room and handset room, and warning message is sent to background server.For example, smoke sensor device It detects that the smog value in computer room has reached preset threshold value, then judges that fire has occurred in computer room, need to reduce system at this time Security level opens the access control system of computer room and handset room, so that staff enters processing emergency.By to sensor The judgement of testing result determines different Permission Levels, and computer room can be made safer, has reached the function of automation alarm Energy.
Preferably, when the first sensor and second sensor are N, N is the natural number more than or equal to 2;Computer floor Monitoring state value, according to the detecting state value of the calculating, it is determined whether triggering alarm operation;The monitoring of the computer floor State value specifically:
Z=a1S1+a2S2+…+aNSN
Wherein, Z is monitoring state value, aNFor the weight coefficient of n-th sensor;SNFor the monitoring state of n-th sensor Value.The weight coefficient of each sensor and the threshold value of state value can be arranged in those skilled in the art according to actual requirement, for example, the One sensor and second sensor are 3, respectively 1 first sensor: infrared sensor;2 second sensors: smog passes Sensor, temperature sensor;Its weight coefficient is respectively 0.4,0.3,0.3, and the threshold value of state value is 1000, and representative is greater than or equal to When 1000, then alarm can be triggered, and send warning message to background server.In this step, the value of each sensor is passed through Normalized keeps the standard of its monitor value consistent, is conducive to calculate monitoring state value.
If opening switch for machine-room in the present solution, reaching the Permission Levels in the requestor, allow institute Requestor is stated to enter after computer room step, further includes:
Open the houselights of path indicator light and handset room.
It should be noted that path indicator light is arranged on road in computer room, and setting is shone inside each handset room Bright lamp light.Reach the Permission Levels in requestor, then opens switch for machine-room, the requestor is allowed to enter computer room, machine Path indicator light in room is then opened, and instruction requestor enters in defined handset room.
Fig. 2 shows the structural schematic diagrams of computer room of the present invention.
As shown in Fig. 2, computer room according to longitudinally divided for three regions, wherein A is smallpox ventilation zone;B is computer room area Domain, for storing the servers such as host;C is bottom floor and electrostatic floor area of isolation.Bottom floor to electrostatic floor (height About 1 meter): only with steel pipe plus the isolation method of wire netting.Electrostatic floor is to enclosure top (about 2.3 meters of height): inside and outside use The mode of bilayer isolation, outermost layer use steel pipe add wire netting module, and internal layer is close to outer layer wire netting using aluminium sheet, and internal layer makes Shooting photo is carried out with the personnel that aluminium sheet can prevent other from entering computer room, is to the company in each independent handset room in this way It is advantageous, be conducive to the safety in each company's handset room.Enclosure top is to top floor height: only with steel pipe plus wire netting Isolation method removes link routing (including forceful electric power cable trough, bus duct, optical fiber gantry, cable gantry, the fire main on basis Equal shared regions) at outside aperture, guarantee spatially sufficiently independent, and be conducive to area of isolation and radiate.It should be noted that computer room In each handset room it is independent of one another in space, each handset room uses wire netting to be separated in longitudinal space, That is all realizing partition in tri- regions A, B, C.In this way, effectively illegal invasion person can be avoided to pass through day Enter in handset room in flower ventilation zone or bottom floor and electrostatic floor area of isolation, increases the safety of computer room.Its In, cold and hot channel can also do independent isolating door, and install independent (fingerprint/face recognition) access control system;Cold passage installation Fire skylight;Important service cabinet, storage tape pool cabinet, transmission cabinets, the separately installed coded lock of core network cabinet and camera shooting Head is more advantageous to the items safety of computer room in this way.
Wire netting adding aluminium plate: it effectively prevent taking pictures;Avoid separation net is outer transmission medium is connected equipment;Have centainly to fire Buffer action;Aluminium sheet has guiding role to thermal current, forms stack effect, increases area of isolation radiating efficiency.Bottom floor To all installing separation net between the floor of top: realizing completely enclosed, prevent unauthorized personnel to enter region, form electromagnetic shielding Space.It does independent isolating door in cold and hot channel: effectively controllers can enter and leave region, increase escape route quantity.Important cabinet Install electronic password lock additional: common cabinet physical locks are substantially that a key can open all cabinets, install electronic password lock additional and are Important service cabinet provides more guarantees.Fire skylight: it on the one hand prevents from entering cold passage above cabinet, on the other hand Reduce the loss of cooling capacity.
Second aspect of the present invention discloses a kind of computer room safety management system, the system comprises computer room management system and solely Vertical handset room, the independent handset room quantity are independent skies multiple, that the independent handset room is separated out for computer room by partition Between, wherein each handset room has three layers of upper, middle and lower;The computer room management system includes: memory, processor and photographic device, described It include device management method program in memory, it is described to be based on realizing such as when device management method program is executed by the processor Lower step:
Receive requestor's sending enters computer room solicited message;
The Permission Levels of the requestor are obtained, and judge whether the Permission Levels of the requestor reach default access etc. Grade;
If the Permission Levels of the requestor reach the default access grade, switch for machine-room is opened, allows institute It states requestor and enters computer room.
It should be noted that computer room is provided with computer room safety management system, be provided with background server, for manage into Enter the permission of the requestor of computer room, and is stored with the journal files such as in and out records.Gate inhibition system is provided at the doorway of computer room System then needs to carry out the verifying of permission when request needs to enter computer room.Authority information is pre-stored in background server, example Such as, be pre-stored with the access authority of 3 grades, the region that the representative of higher grade can pass in and out is more, each Permission Levels with ask The person of asking has the relationship mapped one by one.
In the present solution, the permission situation of the judgement requestor specifically:
Obtain the biological characteristic of the requestor;
The biological characteristic is compared with the biological information being pre-stored in rights database;
If the biometric information matches being pre-stored in the biological characteristic and rights database of the requestor, are judged as Legitimate request person;
Obtain the Permission Levels information of the requestor;
The Permission Levels information is sent to access control system.
It should be noted that the biological characteristic is pupil, face, the fingerprint characteristic of requestor.Those skilled in the art It should be understood that the present invention is not limited to above-mentioned biological characteristic, any knowledge another characteristic that is able to carry out each falls within the present invention Protection scope in.
In the present solution, computer room is provided with first sensor and second sensor;
The state value of first sensor and second sensor described in real-time monitoring;
If the state value of first sensor monitoring reaches preset alarm threshold value, Permission Levels are turned up and/or close machine The access control system of room neutron computer room, and warning message is sent to background server;
If the state value of second sensor monitoring reaches preset alarm threshold value, reduces Permission Levels and/or open machine The access control system in room and handset room, and warning message is sent to background server.
It should be noted that the first sensor is one of body-sensing sensor, pressure sensor, infrared sensor Or it is several;The second sensor is one or more of smoke sensor device, temperature sensor, humidity sensor.
Body-sensing sensor is the movement that can monitor human body or animal, judges that someone enters computer room by movement;Pressure Sensor is arranged on the door of computer room or is set to ground intralamellar part, judges whether that someone enters computer room by detecting pressure value; The infrared spectroscopy that infrared sensor is issued by detection human body or animal, judges whether that someone enters in computer room.Smoke sensor device For detecting the smoke-like state value inside computer room;Temperature sensor is used to detect the temperature value in computer room;Humidity sensor is used for Detect the air humidity in computer room.Smoke sensor device, temperature sensor, humidity sensor can be arranged not according to actual needs Same handset room or other passageways position.For example, smoke sensor device, temperature sensor, wet is arranged in each handset room Sensor is spent, wherein temperature sensor is additionally arranged in the host storing compartment in handset room, preferably to carry out host temperature Real-time detection.Body-sensing sensor, pressure sensor and infrared sensor are set in the necessary passageway of computer room, and in computer room Floor lower part and ceiling aerated area in be also provided with corresponding sensor, can be more preferable by these sensors of setting Carry out computer room in personnel monitoring.
It should be noted that if the state value of first sensor monitoring reaches preset alarm threshold value, then permission etc. is turned up Grade and/or the access control system for closing computer room neutron computer room, and warning message is sent to background server.For example, infrared sensor Monitor that someone enters in computer room, but access control system does not receive any disengaging instruction and information at this time, then is judged as The illegal invasion, needs height-adjusting system security level at this time, the access control system in the handset room in computer room is closed, and send report Alert information is to background server, to remind staff to have the illegal invasion.
It should be noted that if the state value of second sensor monitoring reaches preset alarm threshold value, then permission etc. is reduced Grade and/or the access control system for opening computer room and handset room, and warning message is sent to background server.For example, smoke sensor device It detects that the smog value in computer room has reached preset threshold value, then judges that fire has occurred in computer room, need to reduce system at this time Security level opens the access control system of computer room and handset room, so that staff enters processing emergency.By to sensor The judgement of testing result determines different Permission Levels, and computer room can be made safer, has reached the function of automation alarm Energy.
Preferably, when the first sensor and second sensor are N, N is the natural number more than or equal to 2;Computer floor Monitoring state value, according to the detecting state value of the calculating, it is determined whether triggering alarm operation;The monitoring of the computer floor State value specifically:
Z=a1S1+a2S2+…+aNSN
Wherein, Z is monitoring state value, aNFor the weight coefficient of n-th sensor;SNFor the monitoring state of n-th sensor Value.The weight coefficient of each sensor and the threshold value of state value can be arranged in those skilled in the art according to actual requirement, for example, the One sensor and second sensor are 3, respectively 1 first sensor: infrared sensor;2 second sensors: smog passes Sensor, temperature sensor;Its weight coefficient is respectively 0.4,0.3,0.3, and the threshold value of state value is 1000, and representative is greater than or equal to When 1000, then alarm can be triggered, and send warning message to background server.In this step, the value of each sensor is passed through Normalized keeps the standard of its monitor value consistent, is conducive to calculate monitoring state value.
If opening switch for machine-room in the present solution, reaching the Permission Levels in the requestor, allow institute Requestor is stated to enter after computer room step, further includes:
Open the houselights of path indicator light and handset room.
It should be noted that path indicator light is arranged on road in computer room, and setting is shone inside each handset room Bright lamp light.Reach the Permission Levels in requestor, then opens switch for machine-room, the requestor is allowed to enter computer room, machine Path indicator light in room is then opened, and instruction requestor enters in defined handset room.
Third aspect present invention discloses a kind of computer readable storage medium, wraps in the computer readable storage medium Computer room safety management method program is included, when the computer room safety management method program is executed by processor, realizes such as above-mentioned one The step of kind computer room safety management method.
A kind of computer room safety management method, system and readable storage medium storing program for executing disclosed by the invention are requested by judgement The permission of person determines the entrance region of computer room according to Permission Levels, ensure that the confidentiality of computer room, the present invention can also prevent non- Method invader take pictures obtaining information;And the acquisition that permission can be carried out by living things feature recognition, it is more to solve a card The drawbacks of using;By the setting of sensor, so that the safety of computer room is further ensured;And made using the guide of light The person of calling request is easier identification object region.According to the technical solution of the present invention, the safety of computer room can be increased, improve request The usage experience of person.
In several embodiments provided herein, it should be understood that disclosed device and method can pass through it Its mode is realized.Apparatus embodiments described above are merely indicative, for example, the division of the unit, only A kind of logical function partition, there may be another division manner in actual implementation, such as: multiple units or components can combine, or It is desirably integrated into another system, or some features can be ignored or not executed.In addition, shown or discussed each composition portion Mutual coupling or direct-coupling or communication connection is divided to can be through some interfaces, the INDIRECT COUPLING of equipment or unit Or communication connection, it can be electrical, mechanical or other forms.
Above-mentioned unit as illustrated by the separation member, which can be or may not be, to be physically separated, aobvious as unit The component shown can be or may not be physical unit;Both it can be located in one place, and may be distributed over multiple network lists In member;Some or all of units can be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
In addition, each functional unit in various embodiments of the present invention can be fully integrated in one processing unit, it can also To be each unit individually as a unit, can also be integrated in one unit with two or more units;It is above-mentioned Integrated unit both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above method embodiment can pass through The relevant hardware of program instruction is completed, and program above-mentioned can store in computer-readable storage medium, which exists When execution, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes: movable storage device, read-only deposits Reservoir (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or The various media that can store program code such as CD.
If alternatively, the above-mentioned integrated unit of the present invention is realized in the form of software function module and as independent product When selling or using, it also can store in a computer readable storage medium.Based on this understanding, the present invention is implemented Substantially the part that contributes to existing technology can be embodied in the form of software products the technical solution of example in other words, The computer software product is stored in a storage medium, including some instructions are used so that computer equipment (can be with It is personal computer, server or network equipment etc.) execute all or part of each embodiment the method for the present invention. And storage medium above-mentioned includes: that movable storage device, ROM, RAM, magnetic or disk etc. are various can store program code Medium.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.

Claims (10)

1. a kind of computer room safety management method characterized by comprising
Receive requestor's sending enters computer room solicited message;
The Permission Levels of the requestor are obtained, and judge whether the Permission Levels of the requestor reach default access grade;
If the Permission Levels of the requestor reach the default access grade, switch for machine-room is opened, is asked described in permission The person of asking enters computer room.
2. a kind of computer room safety management method according to claim 1, which is characterized in that the judgement requestor's Permission situation specifically:
Obtain the biological characteristic of the requestor;
The biological characteristic is compared with the biological information being pre-stored in rights database;
If the biometric information matches being pre-stored in the biological characteristic and rights database of the requestor, are judged as legal Requestor;
Obtain the Permission Levels information of the requestor;
The Permission Levels information is sent to access control system.
3. a kind of computer room safety management method according to claim 1, which is characterized in that computer room is provided with first sensor And second sensor;
The state value of first sensor and second sensor described in real-time monitoring;
If the state value of first sensor monitoring reaches preset alarm threshold value, Permission Levels are turned up and/or close in computer room The access control system in handset room, and warning message is sent to background server;
If second sensor monitoring state value reach preset alarm threshold value, reduce Permission Levels and/or open computer room and The access control system in handset room, and warning message is sent to background server.
4. a kind of computer room safety management method according to claim 3, which is characterized in that
The first sensor is one or more of body-sensing sensor, pressure sensor, infrared sensor;Described second passes Sensor is one or more of smoke sensor device, temperature sensor, humidity sensor.
5. a kind of computer room safety management method according to claim 3, which is characterized in that the first sensor and second When sensor is N, N is the natural number more than or equal to 2;The monitoring state value of computer floor, according to the monitoring state of calculating Value, it is determined whether triggering alarm operation;The monitoring state value of the computer floor specifically:
Z=a1S1+a2S2+…+aNSN
Wherein, Z is monitoring state value, aNFor the weight coefficient of n-th sensor;SNFor the monitoring state value of n-th sensor.
6. a kind of computer room safety management method according to claim 1, which is characterized in that if being reached in the requestor To the Permission Levels, then switch for machine-room is opened, the requestor is allowed to enter after computer room step, further includes:
Open the houselights of path indicator light and handset room.
7. a kind of computer room safety management system, which is characterized in that the system comprises computer room management system and independent handset room, institutes Stating independent handset room quantity is separate spaces multiple, that the independent handset room is separated out for computer room by partition, wherein each Handset room has three layers of upper, middle and lower;The computer room management system includes: memory, processor and photographic device, is wrapped in the memory Device management method program is included, described to be based on realizing following steps when device management method program is executed by the processor:
Receive requestor's sending enters computer room solicited message;
The Permission Levels of the requestor are obtained, and judge whether the Permission Levels of the requestor reach default access grade;
If the Permission Levels of the requestor reach the default access grade, switch for machine-room is opened, is asked described in permission The person of asking enters computer room.
8. a kind of equipment management system according to claim 7, which is characterized in that the permission of the judgement requestor Situation specifically:
Obtain the biological characteristic of the requestor;
The biological characteristic is compared with the biological information being pre-stored in rights database;
If the biometric information matches being pre-stored in the biological characteristic and rights database of the requestor, are judged as legal Requestor;
Obtain the Permission Levels information of the requestor;
The Permission Levels information is sent to access control system.
9. a kind of equipment management system according to claim 7, which is characterized in that
Computer room is provided with first sensor and second sensor;
The state value of first sensor and second sensor described in real-time monitoring;
If the state value of first sensor monitoring reaches preset alarm threshold value, Permission Levels are turned up and/or close in computer room The access control system in handset room, and warning message is sent to background server;
If second sensor monitoring state value reach preset alarm threshold value, reduce Permission Levels and/or open computer room and The access control system in handset room, and warning message is sent to background server;
The first sensor is one or more of body-sensing sensor, pressure sensor, infrared sensor;Described second passes Sensor is one or more of smoke sensor device, temperature sensor, humidity sensor.
10. a kind of computer readable storage medium, which is characterized in that include computer room safety in the computer readable storage medium Management method program when the computer room safety management method program is executed by processor, is realized as any in claim 1 to 6 A kind of the step of computer room safety management method described in item.
CN201811495765.1A 2018-12-07 2018-12-07 Machine room safety management method, system and readable storage medium Active CN109800553B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811495765.1A CN109800553B (en) 2018-12-07 2018-12-07 Machine room safety management method, system and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811495765.1A CN109800553B (en) 2018-12-07 2018-12-07 Machine room safety management method, system and readable storage medium

Publications (2)

Publication Number Publication Date
CN109800553A true CN109800553A (en) 2019-05-24
CN109800553B CN109800553B (en) 2022-08-30

Family

ID=66556547

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811495765.1A Active CN109800553B (en) 2018-12-07 2018-12-07 Machine room safety management method, system and readable storage medium

Country Status (1)

Country Link
CN (1) CN109800553B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110675537A (en) * 2019-10-31 2020-01-10 深圳市智莱科技股份有限公司 Method and system for access control management of restricted area
CN112365643A (en) * 2020-11-16 2021-02-12 深圳市天彦通信股份有限公司 Access area authority management method and related device
CN113763616A (en) * 2021-08-20 2021-12-07 太原市高远时代科技有限公司 Multi-sensor-based non-inductive safe outdoor case access control system and method
CN113917857A (en) * 2020-07-08 2022-01-11 中云数据科技发展(深圳)有限公司 Control method and control system for machine room partition cage
CN115223284A (en) * 2022-08-22 2022-10-21 广东维信智联科技有限公司 Management and control method and platform capable of improving authentication accuracy

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101446821A (en) * 2008-12-22 2009-06-03 山西省电力公司临汾供电分公司 Machine room security monitoring management system
CN103927807A (en) * 2014-04-29 2014-07-16 国家电网公司 Method and device for adjusting safety levels of access control systems of computer rooms
US20170294063A1 (en) * 2016-04-11 2017-10-12 Global Tel*Link Corp. Access prevention and control for security systems
CN107909680A (en) * 2017-09-22 2018-04-13 中核第四研究设计工程有限公司 Regulatory area entrance personnel safety inspection method and system
CN207283086U (en) * 2017-09-21 2018-04-27 南京轨道交通系统工程有限公司 A kind of track traffic computer room comprehensive wiring mechanism
CN108171837A (en) * 2017-12-27 2018-06-15 合肥美的智能科技有限公司 Access control system and its control method
CN108333994A (en) * 2018-03-10 2018-07-27 潍坊学院 A kind of security protection system and equipment for the server rooms CISC

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101446821A (en) * 2008-12-22 2009-06-03 山西省电力公司临汾供电分公司 Machine room security monitoring management system
CN103927807A (en) * 2014-04-29 2014-07-16 国家电网公司 Method and device for adjusting safety levels of access control systems of computer rooms
US20170294063A1 (en) * 2016-04-11 2017-10-12 Global Tel*Link Corp. Access prevention and control for security systems
CN207283086U (en) * 2017-09-21 2018-04-27 南京轨道交通系统工程有限公司 A kind of track traffic computer room comprehensive wiring mechanism
CN107909680A (en) * 2017-09-22 2018-04-13 中核第四研究设计工程有限公司 Regulatory area entrance personnel safety inspection method and system
CN108171837A (en) * 2017-12-27 2018-06-15 合肥美的智能科技有限公司 Access control system and its control method
CN108333994A (en) * 2018-03-10 2018-07-27 潍坊学院 A kind of security protection system and equipment for the server rooms CISC

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
HAMZA SALIH ERDEN等: "Optimization of Enclosed Aisle Data Centers With Induced CRAH Bypass", 《IEEE TRANSACTIONS ON COMPONENTS, PACKAGING AND MANUFACTURING TECHNOLOGY》 *
牛琳: "通信机房防静电通风地板建设优化及应用研究", 《电信技术》 *
邓志强: "浅谈等级保护中机房建设和管理", 《科技信息》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110675537A (en) * 2019-10-31 2020-01-10 深圳市智莱科技股份有限公司 Method and system for access control management of restricted area
CN113917857A (en) * 2020-07-08 2022-01-11 中云数据科技发展(深圳)有限公司 Control method and control system for machine room partition cage
CN113917857B (en) * 2020-07-08 2023-07-25 周雅娟 Control method and control system for machine room cage
CN112365643A (en) * 2020-11-16 2021-02-12 深圳市天彦通信股份有限公司 Access area authority management method and related device
CN113763616A (en) * 2021-08-20 2021-12-07 太原市高远时代科技有限公司 Multi-sensor-based non-inductive safe outdoor case access control system and method
CN115223284A (en) * 2022-08-22 2022-10-21 广东维信智联科技有限公司 Management and control method and platform capable of improving authentication accuracy

Also Published As

Publication number Publication date
CN109800553B (en) 2022-08-30

Similar Documents

Publication Publication Date Title
CN109800553A (en) A kind of computer room safety management method, system and readable storage medium storing program for executing
CN205594742U (en) Access control system and floodgate machine
CN109544728B (en) Regional population management and control system and method
CN208521198U (en) Transformer room system
CN110246074A (en) A kind of community security protection management system and method based on multidimensional acquisition
CN208014044U (en) Intelligent entrance guard with face identification functions
CN206039532U (en) Computer USB peripheral hardware safety discernment filter
CN108305361A (en) A kind of safe community intelligent management platform system
CN106296936A (en) Community management system based on cloud platform
CN110471356A (en) A kind of building system based on BIM 3D interaction technique
AU2014370501A1 (en) An integrated access control and identity management system
CN104008592B (en) Electrostatic Control entrance guard management system and method
CN109215191A (en) Nobody a kind of intelligent access control system and its working method on duty
CN206672171U (en) Floating population management system with early warning function
CN211349040U (en) Equipment management cabinet system
CN104916025B (en) A kind of gating device
CN209357110U (en) A kind of radioactive source managing and control system
CN110427008A (en) A kind of intelligent building system
CN203386306U (en) Device and system for protecting self-service terminal
CN111815873B (en) High-safety locker management method and system
CN206097229U (en) Pig farm access control system
WO2021157987A1 (en) Complex building management platform system, complex building management method using same, and computer program for same
CN113674468A (en) Safety management system based on financial place business library
CN111009058B (en) Station entering and exiting monitoring system and method suitable for data center
CN114663838A (en) Safety protection method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant