CN109800553B - Machine room safety management method, system and readable storage medium - Google Patents

Machine room safety management method, system and readable storage medium Download PDF

Info

Publication number
CN109800553B
CN109800553B CN201811495765.1A CN201811495765A CN109800553B CN 109800553 B CN109800553 B CN 109800553B CN 201811495765 A CN201811495765 A CN 201811495765A CN 109800553 B CN109800553 B CN 109800553B
Authority
CN
China
Prior art keywords
sensor
machine room
requester
authority
state value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811495765.1A
Other languages
Chinese (zh)
Other versions
CN109800553A (en
Inventor
赵垠扉
邢晓坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811495765.1A priority Critical patent/CN109800553B/en
Publication of CN109800553A publication Critical patent/CN109800553A/en
Application granted granted Critical
Publication of CN109800553B publication Critical patent/CN109800553B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Alarm Systems (AREA)

Abstract

The invention provides a machine room security management method, a machine room security management system and a readable storage medium. The method comprises the following steps: receiving request information for entering a machine room sent by a requester; judging the authority level information of the requester; and if the requester reaches the permission level, starting a machine room switch device, and allowing the requester to enter a machine room. The method and the device can prevent the illegal intruder from photographing to obtain information; the authority can be acquired through biological characteristic identification, so that the defect of one card with multiple purposes is overcome; the safety of the machine room is further guaranteed by the arrangement of the sensor; and the guidance of the light is adopted, so that the requester can more easily identify the target area. By the technical scheme, the safety of the machine room can be improved, and the use experience of a requester is improved.

Description

Machine room safety management method, system and readable storage medium
Technical Field
The present invention relates to a security management method of a system, and more particularly, to a machine room security management method, system, and readable storage medium.
Background
In the era of rapid development of technologies such as big data and cloud computing, data center resources become increasingly tense, and regional renting of a machine room becomes necessary configuration under the condition that a large server cluster is not needed. In some current cloud service centers, a plurality of companies share a machine room, and corresponding partitions are arranged in the machine room to distinguish company servers. In the current machine room, there are the following defects:
1. the isolation mostly adopts a single-layer wire netting: the separation net has larger gaps, is easy to photograph and the hand can extend into the separation net easily, and can insert the media such as the network cable USB flash disk into the equipment easily, so that the risk exists.
2. The mode of adding the inner layer of fine iron wire mesh into the single-layer iron wire mesh is as follows: are subject to being photographed and do not function as effective insulation if a fire breaks out in the immediate vicinity of other company insulated areas.
3. Integral zone external cage: because all the channel areas in the enclosure are not isolated independently, personnel can go to any area without being watched and managed after entering the enclosure, and effective management and control cannot be achieved; and occupy more space and increase cost.
4. Isolation using only cabinet height: the area above the cabinet and the area below the floor are not isolated, so that a scene of entering the isolation area from the lower part of the floor or the upper part of the cabinet exists, and the electromagnetic shielding effect of the whole isolation area cannot be achieved.
5. The access control only adopts a card swiping mode: there are scenarios where different cardholders use the same card to enter the isolation area.
6. The equipment cabinet is not isolated independently according to different equipment safety standards, and risks are increased for equipment operation.
In order to prevent personnel from randomly entering and tampering data, stealing company secrets and other destructive behaviors, the independent isolation of the machine room area plays a significant role. Currently, a system for setting the machine room safety is urgent and needs no treatment.
Disclosure of Invention
In order to solve at least one technical problem, the invention provides a device management method, a device management system and a readable storage medium.
In order to achieve the purpose, the invention discloses a machine room safety management method, which comprises the following steps:
receiving request information for entering a machine room sent by a requester;
acquiring the authority level of the requester, and judging whether the authority level of the requester reaches a preset authority level;
and if the permission level of the requester reaches the preset permission level, starting a machine room switch device, and allowing the requester to enter a machine room.
In this scheme, the determining the permission status of the requester specifically includes:
obtaining a biometric of the requestor;
comparing the biological characteristics with biological characteristic information prestored in an authority database;
if the biological characteristics of the requester are matched with the biological characteristic information prestored in the authority database, the requester is judged to be a legal requester;
acquiring the authority level information of the requester;
and sending the authority level information to an access control system.
In the scheme, the machine room is provided with a first sensor and a second sensor;
monitoring state values of the first sensor and the second sensor in real time;
if the state value monitored by the first sensor reaches a preset alarm threshold value, the authority level is increased and/or an access control system of a sub-machine room in the machine room is closed, and warning information is sent to a background server;
and if the state value monitored by the second sensor reaches a preset alarm threshold value, reducing the permission level and/or opening the access control systems of the machine room and the sub-machine room, and sending warning information to the background server.
In the scheme, the first sensor is one or more of a somatosensory sensor, a pressure sensor and an infrared sensor; the second sensor is one or more of a smoke sensor, a temperature sensor and a humidity sensor.
Preferably, when the first sensor and the second sensor are N, N is a natural number greater than or equal to 2; calculating a monitoring state value of a computer room, and determining whether to trigger alarm operation according to the calculated detection state value; the monitoring state value of the computer room is specifically as follows:
Z=a 1 S 1 +a 2 S 2 +…+a N S N
wherein Z is a monitoring state value, a N The weight coefficient of the Nth sensor; s. the N For monitoring of the Nth sensorA status value.
In this scheme, after the step of turning on a machine room switching device and allowing the requester to enter the machine room if the requester reaches the permission level, the method further includes:
and turning on the path indicator lamp and the lighting lamp of the sub-machine room.
The invention discloses a machine room safety management system in a second aspect, which comprises a machine room management system and a plurality of independent sub machine rooms, wherein the independent sub machine rooms are independent spaces separated by partitions from the machine room, and each sub machine room is provided with an upper layer, a middle layer and a lower layer; this computer lab management system includes: the device management method comprises a memory, a processor and an image pickup device, wherein the memory comprises a device management method program, and the device management method program realizes the following steps when being executed by the processor:
receiving request information for entering a machine room sent by a requester;
acquiring the authority level of the requester, and judging whether the authority level of the requester reaches a preset authority level;
and if the permission level of the requester reaches the preset permission level, starting a machine room switch device, and allowing the requester to enter a machine room.
In this scheme, the determining the permission status of the requester specifically includes:
obtaining a biometric of the requestor;
comparing the biological characteristics with biological characteristic information prestored in an authority database;
if the biological characteristics of the requester are matched with the biological characteristic information prestored in the authority database, the requester is judged to be a legal requester;
acquiring the authority level information of the requester;
and sending the authority level information to an access control system.
In the scheme, the machine room is provided with a first sensor and a second sensor;
monitoring state values of the first sensor and the second sensor in real time;
if the state value monitored by the first sensor reaches a preset alarm threshold value, the authority level is increased and/or an access control system of a sub-machine room in the machine room is closed, and warning information is sent to a background server;
if the state value monitored by the second sensor reaches a preset alarm threshold value, the permission level is reduced and/or access control systems of the machine room and the sub-machine room are opened, and warning information is sent to the background server;
the first sensor is one or more of a somatosensory sensor, a pressure sensor and an infrared sensor; the second sensor is one or more of a smoke sensor, a temperature sensor and a humidity sensor.
A third aspect of the present invention discloses a computer-readable storage medium, where the computer-readable storage medium includes a computer room security management method program, and when the computer room security management method program is executed by a processor, the steps of the computer room security management method are implemented.
By the machine room safety management method, the machine room safety management system and the readable storage medium, the confidentiality of the machine room is ensured by judging the authority of a requester and determining the access area of the machine room according to the authority level, and an illegal intruder can be prevented from taking pictures to obtain information; the authority can be acquired through biological feature identification, and the defect that one card has multiple purposes is overcome; the safety of the machine room is further guaranteed by the arrangement of the sensor; and the guidance of the light is adopted, so that the requester can more easily identify the target area. By the technical scheme, the safety of the machine room can be improved, and the use experience of a requester is improved.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
Fig. 1 is a schematic flow chart illustrating a method for managing machine room security according to an embodiment of the present invention;
fig. 2 shows a schematic structural diagram of the machine room of the present invention.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited by the specific embodiments disclosed below.
In the invention, the machine room is an independent room, wherein a plurality of sub machine rooms can be arranged through partition, and different server equipment and the like are stored in each sub machine room. For example, in a machine room of a cluster, there are a plurality of sub-machine room areas, each sub-machine room is used to store server devices of different companies, and IT maintenance personnel of different companies may enter the corresponding sub-machine room through authorization to perform operations such as copying of information. Every sub-computer lab all is provided with access control system, access control system can be connected with computer lab management system to can receive backend server's management and control.
Fig. 1 shows a flowchart of a method for managing machine room security according to an embodiment of the present invention. As shown in fig. 1, the present invention discloses a machine room security management method, which comprises:
s102, receiving request information for entering a machine room sent by a requester;
s104, acquiring the authority level of the requester, and judging whether the authority level of the requester reaches a preset authority level;
and S106, if the permission level of the requester reaches the preset permission level, starting a machine room switch device, and allowing the requester to enter a machine room.
It should be noted that the computer room is provided with a computer room security management system, which is provided with a background server for managing the authority of the requester who enters the computer room and storing log files such as entry and exit records. An access control system is arranged at the door of the machine room, and when a request needs to enter the machine room, permission verification needs to be carried out. The authority information is prestored in the background server, for example, access authorities of 3 levels are prestored, the higher the level is, the more areas can pass through, the higher the level is, the lower the level is, each authority level has a one-to-one mapping relationship with the requester.
According to the embodiment of the present invention, the determining the permission status of the requester specifically includes:
obtaining a biometric characteristic of the requester;
comparing the biological characteristics with biological characteristic information prestored in an authority database;
if the biological characteristics of the requester are matched with the biological characteristic information prestored in the authority database, the requester is judged to be a legal requester;
acquiring the authority level information of the requester;
and sending the authority level information to an access control system.
The biometric features are pupil, face, and fingerprint features of the requester. It will be appreciated by those skilled in the art that the present invention is not limited to the above-described biometric features, and any feature that can be identified falls within the scope of the present invention.
According to the embodiment of the invention, the machine room is provided with a first sensor and a second sensor;
monitoring state values of the first sensor and the second sensor in real time;
if the state value monitored by the first sensor reaches a preset alarm threshold value, the authority level is increased and/or an access control system of a sub-machine room in the machine room is closed, and warning information is sent to a background server;
and if the state value monitored by the second sensor reaches a preset alarm threshold value, reducing the permission level and/or opening the access control systems of the machine room and the sub-machine room, and sending warning information to the background server.
It should be noted that the first sensor is one or more of a motion sensor, a pressure sensor and an infrared sensor; the second sensor is one or more of a smoke sensor, a temperature sensor and a humidity sensor. It should be understood by those skilled in the art that the present invention is not limited to the types of sensors described above, and any sensor capable of performing environmental monitoring is within the scope of the present invention.
The motion sensor can monitor the motion of a human body or an animal, and judges that a person enters the machine room through the motion; the pressure sensor is arranged on a door of the machine room or in the floor, and whether a person enters the machine room or not is judged by detecting a pressure value; the infrared sensor judges whether a person enters the machine room or not by detecting infrared spectrums emitted by the human body or the animal. The smoke sensor is used for detecting a smoke state value in the machine room; the temperature sensor is used for detecting the temperature value in the machine room; the humidity sensor is used for detecting the air humidity in the machine room. The smoke sensor, the temperature sensor and the humidity sensor can be arranged in different sub-machine rooms or other passage positions according to actual requirements. For example, a smoke sensor, a temperature sensor and a humidity sensor are arranged in each sub-machine room, wherein the temperature sensor is also arranged in a main machine storage cabinet of the sub-machine room, so that the real-time detection of the temperature of the main machine can be better carried out. Sensor, pressure sensor and infrared sensor are felt to the must setting up in the passageway of computer lab to also set up corresponding sensor in the floor lower part of computer lab and ceiling ventilation area, through these sensors that set up, the monitoring of personnel in the computer lab that carries on that can be better.
It should be noted that, if the state value monitored by the first sensor reaches a preset alarm threshold, the permission level is increased and/or the access control system of the sub-machine room in the machine room is closed, and a warning message is sent to the background server. For example, the infrared sensor monitors that a person enters the machine room, but the access control system does not receive any access instruction and information at the moment, the entrance control system judges that the person invades, the security level of the system needs to be increased at the moment, the access control system of the sub-machine room in the machine room is closed, and alarm information is sent to the background server to remind a worker that the person invades.
It should be noted that, if the state value monitored by the second sensor reaches the preset alarm threshold, the permission level is reduced and/or the access control systems of the machine room and the sub-machine room are opened, and a warning message is sent to the background server. For example, when the smoke sensor detects that the smoke value in the machine room reaches a preset threshold value, a fire disaster occurs in the machine room, the system safety level needs to be reduced, and the access control systems of the machine room and the sub-machine rooms are opened, so that the working personnel can enter and deal with emergency situations. Different permission levels are determined by judging the detection result of the sensor, so that the machine room is safer, and the automatic alarm function is achieved.
Preferably, when the first sensor and the second sensor are N, N is a natural number greater than or equal to 2; calculating a monitoring state value of a computer room, and determining whether to trigger alarm operation according to the calculated detection state value; the monitoring state value of the computer room is specifically as follows:
Z=a 1 S 1 +a 2 S 2 +…+a N S N
wherein Z is a monitoring state value, a N The weight coefficient of the Nth sensor; s N The monitoring state value of the Nth sensor. The skilled person can set the weight coefficient and the threshold value of the state value of each sensor according to practical requirements, for example, the number of the first sensor and the second sensor is 3, and the number of the first sensor is 1: an infrared sensor; 2 second sensors: smoke sensors, temperature sensors; the weight coefficients are 0.4, 0.3 and 0.3 respectively, the threshold value of the state value is 1000, when the value is greater than or equal to 1000, an alarm is triggered, and alarm information is sent to the background server. In this step, the value of each sensor is normalized to make the standard of the monitoring value consistent, which is beneficial to calculating the monitoring state value.
In this scheme, after the step of turning on a machine room switching device and allowing the requester to enter the machine room if the requester reaches the permission level, the method further includes:
and turning on the path indicating lamp and the lighting lamp of the sub machine room.
It should be noted that, a path indicating lamp is provided on a road in the machine room, and an illumination lamp is provided inside each sub machine room. And when the requester reaches the permission level, the switching device of the machine room is started, the requester is allowed to enter the machine room, and the path indicating lamp in the machine room is started to indicate the requester to enter a specified sub-machine room.
Fig. 2 shows a schematic structural diagram of the machine room of the present invention.
As shown in fig. 2, the machine room is divided into three areas according to the longitudinal direction, wherein a is a ceiling ventilation area; b is a machine room area used for storing servers such as a host and the like; and C is a bottom floor and electrostatic floor isolation area. Bottom floor to electrostatic floor (height about 1 meter): only the isolation mode of steel pipes and iron wire nets is adopted. Electrostatic floor to top of cabinet (height about 2.3 m): adopt the mode of inside and outside bilayer isolation, outmost use with steel pipe with iron wire screen module, the inlayer uses aluminum plate to hug closely outer wire screen, and the inlayer uses aluminum plate can prevent that other personnel that get into the computer lab from taking the photo, is every independent sub-computer lab like this the company is favorable, is favorable to the safety of every company's sub-computer lab. Rack top to top floor height: the isolation mode of steel pipes and iron wire nets is only adopted, holes are formed in the positions of basic link routes (including sharing areas such as strong current cable grooves, bus ducts, optical fiber bridges, net wire bridges and fire fighting pipelines), sufficient independence on space is guaranteed, and heat dissipation of the isolation areas is facilitated. It should be noted that each sub-machine room in the machine room is independent in space, and each sub-machine room is partitioned in the longitudinal space by using a wire mesh, that is, the partition is realized in A, B, C three areas. By adopting the mode, illegal intruders can be effectively prevented from entering the sub-machine room through the ceiling ventilation area or the bottom floor and electrostatic floor isolation area, and the safety of the machine room is improved. Wherein, the cold and hot channel can also be used as an independent isolation door and is provided with an independent (fingerprint/face identification) access control system; the cold channel is provided with a fire-fighting skylight; the key business cabinet, the storage tape library cabinet, the transmission cabinet and the core network cabinet are independently provided with the coded lock and the camera, so that the safety of the machine room is better facilitated.
Adding an aluminum plate to the iron wire net: the photographing is effectively prevented; the transmission medium is prevented from being connected with equipment outside the isolation network; has certain isolation function to fire; the aluminum plate has a guiding function on hot air flow, a chimney effect is formed, and the heat dissipation efficiency of the isolation area is increased. And (3) all installing isolation nets between the bottom floor slab and the top floor slab: the complete sealing is realized, unauthorized persons are prevented from entering the area, and an electromagnetic shielding space is formed. The cold and hot channels are used as independent isolation doors: can effectively control personnel to enter and exit the area and increase the number of escape passages. The important equipment cabinet is additionally provided with an electronic coded lock: the physical lock of the common cabinet can be used for opening all cabinets by one key basically, and the additional arrangement of the electronic coded lock provides more guarantee for the cabinet with important services. Fire control skylight: on one hand, the cold channel is prevented from entering from the upper part of the cabinet, and on the other hand, the loss of cold energy is reduced.
The invention discloses a machine room safety management system in a second aspect, which comprises a machine room management system and a plurality of independent sub machine rooms, wherein the independent sub machine rooms are independent spaces separated by partitions from the machine room, and each sub machine room is provided with an upper layer, a middle layer and a lower layer; this computer lab management system includes: a memory, a processor and an imaging apparatus, wherein the memory includes a device management method program, and the device management method program when executed by the processor implements the steps of:
receiving request information for entering a machine room sent by a requester;
acquiring the authority level of the requester, and judging whether the authority level of the requester reaches a preset authority level;
and if the permission level of the requester reaches the preset permission level, starting a machine room switch device, and allowing the requester to enter a machine room.
It should be noted that the machine room is provided with a machine room security management system, which is provided with a background server for managing the authority of the requester entering the machine room and storing log files such as entry and exit records. An access control system is arranged at the door of the machine room, and when a request needs to enter the machine room, permission verification needs to be carried out. The authority information is pre-stored in the background server, for example, access authorities of 3 levels are pre-stored, the higher the level is, the more areas can be accessed, and each authority level has a one-to-one mapping relationship with the requester.
In this scheme, the determining the permission status of the requester specifically includes:
obtaining a biometric of the requestor;
comparing the biological characteristics with biological characteristic information prestored in an authority database;
if the biological characteristics of the requester are matched with the biological characteristic information prestored in the authority database, the requester is judged to be a legal requester;
acquiring the authority level information of the requester;
and sending the authority level information to an access control system.
The biometric features are pupil, face, and fingerprint features of the requester. It will be appreciated by those skilled in the art that the present invention is not limited to the above-described biometric features, and any feature that can be identified falls within the scope of the present invention.
In the scheme, the machine room is provided with a first sensor and a second sensor;
monitoring state values of the first sensor and the second sensor in real time;
if the state value monitored by the first sensor reaches a preset alarm threshold value, the authority level is increased and/or an access control system of a sub-computer room in the computer room is closed, and warning information is sent to a background server;
and if the state value monitored by the second sensor reaches a preset alarm threshold value, reducing the permission level and/or opening the access control systems of the machine room and the sub-machine room, and sending warning information to the background server.
It should be noted that the first sensor is one or more of a motion sensor, a pressure sensor and an infrared sensor; the second sensor is one or more of a smoke sensor, a temperature sensor and a humidity sensor.
The motion sensor can monitor the motion of a human body or an animal, and judges that a person enters the machine room through the motion; the pressure sensor is arranged on a door of the machine room or in the floor, and whether a person enters the machine room or not is judged by detecting a pressure value; the infrared sensor judges whether a person enters the machine room or not by detecting infrared spectrums emitted by the human body or the animal. The smoke sensor is used for detecting a smoke state value in the machine room; the temperature sensor is used for detecting the temperature value in the machine room; the humidity sensor is used for detecting the air humidity in the machine room. The smoke sensor, the temperature sensor and the humidity sensor can be arranged in different sub-machine rooms or other passage positions according to actual requirements. For example, a smoke sensor, a temperature sensor and a humidity sensor are arranged in each sub-machine room, wherein the temperature sensor is also arranged in a main machine storage cabinet of the sub-machine room, so that the real-time detection of the temperature of the main machine can be better carried out. Sensor, pressure sensor and infrared sensor are felt to the must setting up in the passageway of computer lab to also set up corresponding sensor in the floor lower part of computer lab and ceiling ventilation area, through these sensors that set up, the monitoring of personnel in the computer lab that carries on that can be better.
It should be noted that, if the state value monitored by the first sensor reaches a preset alarm threshold, the permission level is increased and/or the access control system of the sub-machine room in the machine room is closed, and a warning message is sent to the background server. For example, the infrared sensor monitors that a person enters the machine room, but the access control system does not receive any access instruction and information at the moment, the entrance control system judges that the person invades, the security level of the system needs to be increased at the moment, the access control system of the sub machine room in the machine room is closed, and alarm information is sent to the background server to remind a worker that the person invades.
It should be noted that, if the state value monitored by the second sensor reaches the preset alarm threshold, the permission level is reduced and/or the access control systems of the machine room and the sub-machine room are opened, and a warning message is sent to the background server. For example, if the smoke sensor detects that the smoke value in the machine room reaches a preset threshold value, it is determined that a fire disaster occurs in the machine room, and at this moment, the system safety level needs to be reduced, and the access control systems of the machine room and the sub-machine room are opened, so that the working personnel can enter and handle emergency situations. Different permission levels are determined by judging the detection result of the sensor, so that the machine room is safer, and the automatic alarm function is achieved.
Preferably, when the first sensor and the second sensor are N, N is a natural number greater than or equal to 2; calculating a monitoring state value of a computer room, and determining whether to trigger alarm operation according to the calculated detection state value; the monitoring state value of the computer room is specifically as follows:
Z=a 1 S 1 +a 2 S 2 +…+a N S N
wherein Z is a monitoring state value, a N The weight coefficient of the Nth sensor; s N The monitoring state value of the Nth sensor. The skilled person can set the weight coefficient and the threshold value of the state value of each sensor according to practical requirements, for example, the number of the first sensor and the second sensor is 3, and the number of the first sensor is 1: an infrared sensor; 2 second sensors: smoke sensors, temperature sensors; the weight coefficients are 0.4, 0.3 and 0.3 respectively, the threshold value of the state value is 1000, when the value is greater than or equal to 1000, an alarm is triggered, and alarm information is sent to the background server. In the step, the value of each sensor is normalized, so that the standard of the monitoring value is consistent, and the calculation of the monitoring state value is facilitated.
In this scheme, after the step of turning on a machine room switching device and allowing the requester to enter the machine room if the requester reaches the permission level, the method further includes:
and turning on the path indicating lamp and the lighting lamp of the sub machine room.
It should be noted that, a path indicating lamp is provided on a road in the machine room, and an illumination lamp is provided inside each sub machine room. And when the requester reaches the permission level, a machine room switching device is started to allow the requester to enter the machine room, and a path indicator lamp in the machine room is started to indicate the requester to enter a specified sub-machine room.
A third aspect of the present invention discloses a computer-readable storage medium, where the computer-readable storage medium includes a computer room security management method program, and when the computer room security management method program is executed by a processor, the steps of the computer room security management method are implemented.
By the machine room safety management method, the machine room safety management system and the readable storage medium, the access area of the machine room is determined according to the authority level by judging the authority of the requester, so that the confidentiality of the machine room is ensured, and an illegal invader can be prevented from taking pictures to acquire information; the authority can be acquired through biological feature identification, and the defect that one card has multiple purposes is overcome; the safety of the machine room is further guaranteed by the arrangement of the sensor; and the guidance of the light is adopted, so that the requester can more easily identify the target area. By the technical scheme, the safety of the machine room can be improved, and the use experience of a requester is improved.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units; can be located in one place or distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit may be implemented in the form of hardware, or in the form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (6)

1. A method for machine room security management, comprising:
receiving request information for entering a machine room sent by a requester;
acquiring the authority level of the requester, and judging whether the authority level of the requester reaches a preset authority level;
if the permission level of the requester reaches the preset permission level, starting a machine room switch device, and allowing the requester to enter a machine room;
the machine room is provided with a first sensor and a second sensor;
monitoring state values of the first sensor and the second sensor in real time;
if the state value monitored by the first sensor reaches a preset alarm threshold value, the authority level is increased and/or an access control system of a sub-machine room in the machine room is closed, and warning information is sent to a background server;
if the state value monitored by the second sensor reaches a preset alarm threshold value, the permission level is reduced and/or access control systems of the machine room and the sub-machine room are opened, and warning information is sent to the background server;
when the first sensor and the second sensor are N, N is a natural number more than or equal to 2; calculating a monitoring state value of a computer room, and determining whether to trigger an alarm operation according to the calculated monitoring state value; the monitoring state value of the computer room is specifically as follows:
Z=a 1 S 1 +a 2 S 2 +…+a N S N
wherein Z is a monitoring state value, a N The weight coefficient of the Nth sensor; s N The monitoring state value of the Nth sensor;
the first sensor is one or more of a somatosensory sensor, a pressure sensor and an infrared sensor; the second sensor is one or more of a smoke sensor, a temperature sensor and a humidity sensor;
the computer lab is according to vertical three regions of dividing, includes in proper order from bottom to top: bottom floor to electrostatic floor area: adopting an isolation mode of adding a steel pipe and an iron wire mesh; machine room area from electrostatic floor to top of cabinet: an inner-layer and outer-layer isolation mode is adopted, the steel pipe and the wire mesh are used as the outermost layer, and the aluminum plate is used as the inner layer to be tightly attached to the wire mesh; ceiling vent area from cabinet top to top floor: an isolation mode of adding a steel pipe and an iron wire mesh is adopted.
2. The method according to claim 1, wherein the determining the authority status of the requester specifically comprises:
obtaining a biometric of the requestor;
comparing the biological characteristics with biological characteristic information prestored in an authority database;
if the biological characteristics of the requester are matched with the biological characteristic information prestored in the authority database, the requester is judged to be a legal requester;
acquiring authority level information of the requester;
and sending the authority level information to an access control system.
3. The machine room security management method according to claim 1, wherein after the step of turning on a machine room switch device to allow the requester to enter the machine room if the requester reaches the permission level, the method further comprises:
and turning on the path indicating lamp and the lighting lamp of the sub machine room.
4. A machine room safety management system is characterized by comprising a machine room management system and a plurality of independent sub machine rooms, wherein the independent sub machine rooms are independent spaces separated by machine rooms through partitions, and each sub machine room is provided with an upper layer, a middle layer and a lower layer; this computer lab management system includes: the device management method comprises a memory, a processor and an image pickup device, wherein the memory comprises a device management method program, and the device management method program realizes the following steps when being executed by the processor:
receiving request information for entering a machine room sent by a requester;
acquiring the authority level of the requester, and judging whether the authority level of the requester reaches a preset authority level;
if the permission level of the requester reaches the preset permission level, starting a machine room switching device, and allowing the requester to enter a machine room;
the machine room is provided with a first sensor and a second sensor;
monitoring state values of the first sensor and the second sensor in real time;
if the state value monitored by the first sensor reaches a preset alarm threshold value, the authority level is increased and/or an access control system of a sub-computer room in the computer room is closed, and warning information is sent to a background server;
if the state value monitored by the second sensor reaches a preset alarm threshold value, the permission level is reduced and/or access control systems of the machine room and the sub-machine room are opened, and warning information is sent to the background server;
when the first sensor and the second sensor are N, N is a natural number more than or equal to 2; calculating a monitoring state value of a computer room, and determining whether to trigger an alarm operation according to the calculated monitoring state value; the monitoring state value of the computer room is specifically as follows:
Z=a 1 S 1 +a 2 S 2 +…+a N S N
wherein Z is a monitoring state value, a N The weight coefficient of the Nth sensor; s. the N The monitoring state value of the Nth sensor;
the first sensor is one or more of a somatosensory sensor, a pressure sensor and an infrared sensor; the second sensor is one or more of a smoke sensor, a temperature sensor and a humidity sensor;
the upper, middle and lower three layers comprise: ceiling ventilation area of cabinet top to top floor: adopting an isolation mode of adding a steel pipe and an iron wire mesh; machine room area from electrostatic floor to top of cabinet: an inner-layer and outer-layer isolation mode is adopted, the steel pipe and the wire mesh are used as the outermost layer, and the aluminum plate is used as the inner layer to be tightly attached to the wire mesh; bottom floor to electrostatic floor area: an isolation mode of adding a steel pipe and an iron wire mesh is adopted.
5. The machine room security management system according to claim 4, wherein the determining the authority condition of the requester is specifically:
obtaining a biometric of the requestor;
comparing the biological characteristics with biological characteristic information prestored in an authority database;
if the biological characteristics of the requester are matched with the biological characteristic information prestored in the authority database, the requester is judged to be a legal requester;
acquiring authority level information of the requester;
and sending the authority level information to an access control system.
6. A computer-readable storage medium, comprising a computer room security management method program, which when executed by a processor, implements the steps of a computer room security management method according to any one of claims 1 to 3.
CN201811495765.1A 2018-12-07 2018-12-07 Machine room safety management method, system and readable storage medium Active CN109800553B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811495765.1A CN109800553B (en) 2018-12-07 2018-12-07 Machine room safety management method, system and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811495765.1A CN109800553B (en) 2018-12-07 2018-12-07 Machine room safety management method, system and readable storage medium

Publications (2)

Publication Number Publication Date
CN109800553A CN109800553A (en) 2019-05-24
CN109800553B true CN109800553B (en) 2022-08-30

Family

ID=66556547

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811495765.1A Active CN109800553B (en) 2018-12-07 2018-12-07 Machine room safety management method, system and readable storage medium

Country Status (1)

Country Link
CN (1) CN109800553B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110675537A (en) * 2019-10-31 2020-01-10 深圳市智莱科技股份有限公司 Method and system for access control management of restricted area
CN113917857B (en) * 2020-07-08 2023-07-25 周雅娟 Control method and control system for machine room cage
CN112365643A (en) * 2020-11-16 2021-02-12 深圳市天彦通信股份有限公司 Access area authority management method and related device
CN113763616B (en) * 2021-08-20 2023-03-28 太原市高远时代科技有限公司 Multi-sensor-based non-inductive safe outdoor case access control system and method
CN115223284A (en) * 2022-08-22 2022-10-21 广东维信智联科技有限公司 Management and control method and platform capable of improving authentication accuracy

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN207283086U (en) * 2017-09-21 2018-04-27 南京轨道交通系统工程有限公司 A kind of track traffic computer room comprehensive wiring mechanism
CN108333994A (en) * 2018-03-10 2018-07-27 潍坊学院 A kind of security protection system and equipment for the server rooms CISC

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101446821A (en) * 2008-12-22 2009-06-03 山西省电力公司临汾供电分公司 Machine room security monitoring management system
CN103927807B (en) * 2014-04-29 2016-08-31 国网冀北电力有限公司廊坊供电公司 The control method of safe class of gate control system and device for many machine rooms
US20170294063A1 (en) * 2016-04-11 2017-10-12 Global Tel*Link Corp. Access prevention and control for security systems
CN107909680A (en) * 2017-09-22 2018-04-13 中核第四研究设计工程有限公司 Regulatory area entrance personnel safety inspection method and system
CN108171837A (en) * 2017-12-27 2018-06-15 合肥美的智能科技有限公司 Access control system and its control method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN207283086U (en) * 2017-09-21 2018-04-27 南京轨道交通系统工程有限公司 A kind of track traffic computer room comprehensive wiring mechanism
CN108333994A (en) * 2018-03-10 2018-07-27 潍坊学院 A kind of security protection system and equipment for the server rooms CISC

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Optimization of Enclosed Aisle Data Centers With Induced CRAH Bypass;Hamza Salih Erden等;《IEEE Transactions on Components, Packaging and Manufacturing Technology》;20171025;第7卷(第12期);全文 *
浅谈等级保护中机房建设和管理;邓志强;《科技信息》;20120625;第2012卷(第18期);全文 *
通信机房防静电通风地板建设优化及应用研究;牛琳;《电信技术》;20171124;第2017卷(第9期);全文 *

Also Published As

Publication number Publication date
CN109800553A (en) 2019-05-24

Similar Documents

Publication Publication Date Title
CN109800553B (en) Machine room safety management method, system and readable storage medium
US11645904B2 (en) Drone-augmented emergency response services
CN105551177B (en) Physical and logical threat analysis in access control systems using BIM
US10614687B2 (en) Active intruder mitigation system and method
KR102030509B1 (en) Safety management method, apparatus and computer-readable medium for old building using fire risk assessment result
KR101841882B1 (en) Unmanned Crime Prevention System and Method
KR20160109516A (en) Rescue object grasp system and method
KR20220058297A (en) Integrated security system for apartment complexes based on artificial intelligence image analysis
CN111127824A (en) Early warning method, device and system
US10977915B2 (en) Active intruder mitigation system and method
KR101951361B1 (en) Method for managing crime prevention and disaster prevention using artificial intelligence
KR20130104582A (en) A control system for in and out based on scenario and method thereof
CN117912186A (en) Intelligent security linkage early warning system based on big data service
CN115880631A (en) Power distribution station fault identification system, method and medium
WO2019224116A2 (en) Fire alarm system integration
CN110427008A (en) A kind of intelligent building system
WO2021157987A1 (en) Complex building management platform system, complex building management method using same, and computer program for same
JP2019212020A (en) Evacuation guide server, evacuation guide system and evacuation guide method
KR20190075296A (en) Building control system through detection of dangerous behavior pattern
CN113225529A (en) Wisdom district monitored control system
US8077033B2 (en) Disaster vulnerability assessment in buildings
CN112383589A (en) Data processing method and device for management system in mobile test vehicle
CN218214227U (en) Intelligent management system based on smart community
Berberova et al. Risk-informed security system. The use of surveillance cameras for the particularly hazardous facilities safety
WO2011061767A1 (en) Smart security-supervision system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant