CN114117399A - Key operation control method and device and storage medium - Google Patents

Key operation control method and device and storage medium Download PDF

Info

Publication number
CN114117399A
CN114117399A CN202111407328.1A CN202111407328A CN114117399A CN 114117399 A CN114117399 A CN 114117399A CN 202111407328 A CN202111407328 A CN 202111407328A CN 114117399 A CN114117399 A CN 114117399A
Authority
CN
China
Prior art keywords
server
activation code
key operation
terminal device
valid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111407328.1A
Other languages
Chinese (zh)
Inventor
程铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Power Commercial Systems Co Ltd
Original Assignee
Inspur Power Commercial Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Power Commercial Systems Co Ltd filed Critical Inspur Power Commercial Systems Co Ltd
Priority to CN202111407328.1A priority Critical patent/CN114117399A/en
Publication of CN114117399A publication Critical patent/CN114117399A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/023Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
    • G06F3/0231Cordless keyboards

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a key operation control method and device, which are applied to a server, wherein when an authorization request for the server is obtained, an activation code is obtained from a terminal device, when the activation code sent by the terminal device is received, whether the activation code is valid is checked, and whether to respond to the key operation of the server is further determined according to the validity of the activation code. The invention determines whether to respond to the key operation of the server or not by acquiring the activation code aiming at the server from the terminal equipment and according to the validity of the activation code. Compared with the prior art that the server is directly controlled according to the key operation of the server, the safety of the server operation can be improved. The invention also discloses a computer readable storage medium.

Description

Key operation control method and device and storage medium
Technical Field
The present invention relates to the field of servers, and in particular, to a method and an apparatus for controlling key operations. The invention also relates to a computer-readable storage medium.
Background
With the rise and rapid development of services such as cloud platforms and services, distributed storage, big data and the like, the server enters a rapid development stage. However, the practical application scenarios of the server have continuously increased the demands on the security of the server product.
In the prior art, when a maintenance person performs a local operation on a server, for example, a key corresponding to an operation server may cause an unauthorized operation or an incorrect operation, for example, because the maintenance person does not accurately identify a target server, the maintenance person actually performs an operation on the unauthorized server, or erroneously operates a server that is not the target server.
Disclosure of Invention
The invention aims to provide a key operation control method and a key operation control device, which are applied to a server and can improve the safety of server operation. The invention also provides a computer readable storage medium.
In order to achieve the purpose, the invention provides the following technical scheme:
a control method of key operation is applied to a server and comprises the following steps:
when an authorization request for a server is acquired, acquiring an activation code from terminal equipment;
when the activation code sent by the terminal equipment is received, checking whether the activation code is valid;
and determining whether to respond to the key operation of the server or not according to the validity of the activation code.
Preferably, when the authorization request for the server is acquired, acquiring the activation code from the terminal device includes:
when an authorization request aiming at the server is obtained, sending a communication request to each terminal device listed in the list so as to realize communication with the terminal device;
and when the communication with the terminal equipment is realized, the activation code is acquired from the terminal equipment.
Preferably, the sending a communication request to each of the terminal devices listed in the list to implement communication with the terminal device includes: and searching each terminal device listed in the list in a wireless mode, and if the terminal device is searched, sending a communication request to the terminal device so as to establish wireless connection with the terminal device and realize communication with the terminal device.
Preferably, the checking whether the activate code is valid includes: and checking whether the activation code is legal or not and whether the activation code is in the valid period or not, if the activation code is legal and the activation code is in the valid period, the activation code is valid, and if not, the activation code is invalid.
Preferably, before obtaining the authorization request for the server, the method further includes: and importing the activation code into the terminal equipment.
Preferably, before obtaining the authorization request for the server, the method further includes:
setting the list aiming at the server, wherein the list lists the terminal equipment having control authority to the server;
and realizing communication with the listed terminal equipment, and importing the activation code into the terminal equipment.
Preferably, the determining whether to respond to the key operation of the server according to the validity of the activation code includes: and if the activation code is valid, responding to the first key operation generated by the server after the activation code is determined to be valid.
Preferably, the determining whether to respond to the key operation of the server according to the validity of the activation code includes:
if the activation code is valid, determining the type of key operation of the server;
and sending an instruction corresponding to the type of the key operation of the server to the server according to the type of the key operation of the server so as to control the server to execute corresponding actions.
A control device for key operation is applied to a server and used for executing the control method for key operation.
A computer-readable storage medium, having stored thereon a computer program which, when being executed by a processor, carries out the steps of the method of controlling key operations as set forth above.
According to the technical scheme, the key operation control method and the key operation control device are applied to the server, when the authorization request for the server is obtained, the activation code is obtained from the terminal equipment, when the activation code sent by the terminal equipment is received, whether the activation code is valid is checked, and whether the key operation of the server is responded is further determined according to the validity of the activation code.
Therefore, the control method and the control device applied to the key operation of the server of the invention determine whether to respond to the key operation of the server by acquiring the activation code aiming at the server from the terminal equipment and according to the validity of the activation code. Compared with the prior art that the server is directly controlled according to the key operation of the server, the safety of the server operation can be improved.
The invention also provides a computer readable storage medium, which can achieve the beneficial effects.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a method for controlling key operations according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for controlling key operations according to another embodiment of the present invention;
fig. 3 is a flowchart of a method for responding to a key operation of a server according to an embodiment of the present invention.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a part of the embodiment of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart of a method for controlling a key operation according to the present embodiment, where as shown in the figure, the method for controlling a key operation applied to a server includes the following steps:
s10: when an authorization request for the server is acquired, the activation code is acquired from the terminal device.
When a maintenance person needs to perform local operation on a server on site, an authorization request is initiated for the server to be operated. Thus, when an authorization request for the server is acquired, the activation code is acquired from the terminal device.
S11: and when the activation code sent by the terminal equipment is received, checking whether the activation code is valid.
S12: and determining whether to respond to the key operation of the server according to the validity of the activation code, if the activation code is valid, responding to the key operation of the server, and if the valid activation code is not received, not responding to the key operation of the server.
And determining to respond to the key operation of the server or not to respond to the key operation of the server according to the validity or invalidity of the received activation code.
The control method applied to the key operation of the server determines whether to respond to the key operation of the server or not by acquiring the activation code aiming at the server from the terminal equipment and according to the validity of the activation code. Compared with the prior art that the server is directly controlled according to the key operation of the server, the safety of the server operation can be improved.
The following describes the control method of the key operation in detail with reference to the specific embodiments. Referring to fig. 2, fig. 2 is a flowchart illustrating a method for controlling key operations according to another embodiment, where as shown in the figure, the method for controlling key operations is applied to a server, and includes the following steps:
s20: and when an authorization request aiming at the server is acquired, sending a communication request to each terminal device listed in the list so as to realize communication with the terminal device.
The list lists the individual terminal devices that have control rights to the server, i.e. when receiving the activation code sent by the terminal device in the list, it may be possible to unlock the control rights to the server keys.
When an authorization request for the server is obtained, a communication request is sent to each terminal device in the list so as to be capable of communicating with the terminal devices, and therefore the activation code is obtained and authorization for key operation of the server is obtained. In this embodiment, the communication mode with the terminal device is not limited, and for example, the communication may be implemented by establishing a wired connection with the terminal device, or the communication may be implemented by establishing a wireless connection with the terminal device.
Preferably, a wireless connection can be established with the terminal equipment to realize communication, so that the operation is more convenient in practical application. Specifically, when the authorization request for the server is acquired, each terminal device listed in the list may be searched in a wireless manner, and if the terminal device is searched, a communication request may be sent to the terminal device to establish a wireless connection with the terminal device, so as to implement communication with the terminal device. In this embodiment, a specific manner of wireless communication is not limited, and for example, the wireless communication may be wireless communication manners such as WIFI and bluetooth.
Optionally, a search duration threshold may be set, if the terminal device is turned off or is far away, the terminal device may not be searched, and if the duration of searching the terminal device exceeds the search duration threshold, the terminal device is stopped from being searched.
S21: and judging whether to realize communication with the terminal equipment. If so, the process proceeds to step S22, and if not, the process proceeds to step S20.
S22: and acquiring the activation code from the terminal equipment realizing communication.
And if the communication connection is established with the terminal equipment, acquiring the activation code from the terminal equipment with the established communication connection. And if the communication connection with the terminal equipment is not successfully established, continuously searching each terminal equipment listed in the list, and sending a communication request to each terminal equipment so as to realize communication with the terminal equipment.
S23: and checking whether the received activation code is valid. If yes, the process proceeds to step S24.
S24: and responding to the key operation of the server.
If the received activation code is valid, the control authority of the server key is unlocked, and in the field, when the key of the server is operated, the system responds to the key operation of the server. And if the valid activation code is not received, not responding to the key operation of the server. If the effective activation code is not received, the control authority of the server key cannot be unlocked, and the system cannot respond to the key operation of the server when the key of the server is operated on site.
Preferably, the checking whether the activate code is valid may include: and checking whether the activation code is legal or not and whether the activation code is in the valid period or not, if the activation code is legal and the activation code is in the valid period, the activation code is valid, and if not, the activation code is invalid.
If the received activate code is legal and the activate code is within the validity period, the activate code is valid. If the received activate code is illegal, or the activate code is not within the validity period, or the received activate code is illegal and the activate code is not within the validity period, the activate code is invalid. The activation code is provided with the effective period, so that the safety of the operation of the server can be further improved. For example, if a maintainer having a terminal device loses the terminal device used by the maintainer, if an activation code of the terminal device is valid all the time, another person may use the terminal device to unlock the control authority of the server key to operate the server, which threatens the security of the server operation. An effective period is set for the activation code, and if the activation code provided by the terminal equipment is not in the effective period, other people cannot use the terminal equipment to unlock the server key.
Further, before obtaining the authorization request for the server, the method further includes: and importing the activation code into the terminal equipment. The activation codes can be imported into the terminal equipment in advance, in practical application, the servers can be managed according to the responsibility of maintenance personnel, and the activation codes corresponding to the servers can be respectively imported into the terminal equipment used by the maintenance personnel.
Alternatively, the activation code for the server may be an activation code for the server obtained by performing an encryption operation on information data of the server.
Optionally, the activation code may be imported into the terminal device in advance through the following process, including the following steps:
s31: and setting the list aiming at the server, wherein the list lists the terminal equipment with control authority to the server.
S32: and realizing communication with the listed terminal equipment, and importing the activation code into the terminal equipment.
And setting a list aiming at the server, and importing an activation code aiming at the server to the terminal equipment for the terminal equipment which is added into the list for the first time. And for the terminal equipment which is added into the list, the communication is realized with the terminal equipment, so that the activation code is imported into the terminal equipment. In this embodiment, the communication mode with the terminal device is not limited, and for example, the communication may be implemented by establishing a wired connection with the terminal device, or the communication may be implemented by establishing a wireless connection with the terminal device.
Preferably, in this embodiment, if the activation code is valid, the first key operation generated by the server after the activation code is determined to be valid is responded. The used activation code is valid for single use, namely, if the activation code acquired from the terminal equipment is valid, one-time key operation can be allowed to be carried out on the server. If the activation code is determined to be valid, the maintenance personnel already performs key operation on the server once and the system responds to the key operation, if the key operation of the server is operated again, the system cannot respond to the key operation of the next time, and if the system wants to obtain the response, authorization needs to be obtained from the terminal equipment again. Therefore, the control method for key operation of the embodiment uses the activation code to unlock the server once, and can further improve the security of the server operation.
Further optionally, if the activation code is valid, responding to the key operation of the server may include the following processes, please refer to fig. 3, where fig. 3 is a flowchart of a method for responding to the key operation of the server in this embodiment, as shown in the figure, including the following steps:
s121: determining the type of key operation of the server.
S122: and sending an instruction corresponding to the type of the key operation of the server to the server according to the type of the key operation of the server so as to control the server to execute corresponding actions.
For example, when the key operation of the server is to power on the server, a power-on instruction is sent to the server, so as to control the server to start. And if the key operation of the server is to power off the server, sending a power-off instruction to the server so as to control the server to power off.
Further, before obtaining the authorization request for the server, the method further includes: and judging whether the control mode of the server is a global locking control mode, and if so, acquiring an authorization request aiming at the server. The control mode of the server may be preset, and if the current control mode of the server is the global locking mode, the key operation of the server is controlled by the method described above.
For example, if the current control mode of the server is the default control mode, the key operation of the server is directly responded, that is, the activation code does not need to be obtained from the terminal device for unlocking, when the server generates the key operation, the type of the key operation of the server is directly determined, and an instruction corresponding to the type of the key operation of the server is sent to the server according to the type of the key operation of the server, so that the server is controlled to execute corresponding actions.
Correspondingly, the embodiment also provides a key operation control device, which is applied to a server and used for executing the above key operation control method.
The key operation control device of the embodiment is applied to a server, acquires an activation code from a terminal device when an authorization request for the server is acquired, verifies whether the activation code is valid or not when the activation code sent by the terminal device is received, and further determines whether to respond to the key operation of the server or not according to the validity of the activation code.
Therefore, the control device applied to the key operation of the server of the embodiment determines whether to respond to the key operation of the server by acquiring the activation code for the server to the terminal equipment and according to the validity of the activation code. Compared with the prior art that the server is directly controlled according to the key operation of the server, the safety of the server operation can be improved.
Optionally, the control device for key operation in this embodiment may be integrated on a baseboard management control device of the server. The terminal device can be a terminal device carried by a worker, when the maintenance worker wants to operate the server on site, an authorization request aiming at the server is sent to the control device, the control device obtains the activation code from the terminal device according to the authorization request to check, and therefore whether the control authority of the server key is unlocked or not is determined, and whether the key operation of the server by the site maintenance worker is allowed or not is determined.
The present embodiment also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the control method of key operation as described above.
By applying the computer-readable storage medium of the embodiment, the activation code aiming at the server can be acquired from the terminal equipment, and whether to respond to the key operation of the server can be determined according to the validity of the activation code. Compared with the prior art that the server is directly controlled according to the key operation of the server, the safety of the server operation can be improved.
The detailed description of the method, the device and the storage medium for controlling the key operation provided by the invention is provided above. The principles and embodiments of the present invention are explained herein using specific examples, which are presented only to assist in understanding the method and its core concepts. It should be noted that, for those skilled in the art, it is possible to make various improvements and modifications to the present invention without departing from the principle of the present invention, and those improvements and modifications also fall within the scope of the claims of the present invention.

Claims (10)

1. A control method of key operation is applied to a server and is characterized by comprising the following steps:
when an authorization request for a server is acquired, acquiring an activation code from terminal equipment;
when the activation code sent by the terminal equipment is received, checking whether the activation code is valid;
and determining whether to respond to the key operation of the server or not according to the validity of the activation code.
2. The method for controlling key operation according to claim 1, wherein acquiring the activation code from the terminal device when acquiring the authorization request for the server comprises:
when an authorization request aiming at the server is obtained, sending a communication request to each terminal device listed in the list so as to realize communication with the terminal device;
and when the communication with the terminal equipment is realized, the activation code is acquired from the terminal equipment.
3. The key operation control method according to claim 2, wherein sending a communication request to each of the terminal devices listed to enable communication with the terminal device comprises: and searching each terminal device listed in the list in a wireless mode, and if the terminal device is searched, sending a communication request to the terminal device so as to establish wireless connection with the terminal device and realize communication with the terminal device.
4. The method for controlling key operation according to claim 1, wherein verifying whether the activation code is valid comprises: and checking whether the activation code is legal or not and whether the activation code is in the valid period or not, if the activation code is legal and the activation code is in the valid period, the activation code is valid, and if not, the activation code is invalid.
5. The key operation control method according to claim 1, further comprising, before obtaining the authorization request for the server: and importing the activation code into the terminal equipment.
6. The key operation control method according to claim 2, further comprising, before obtaining the authorization request for the server:
setting the list aiming at the server, wherein the list lists the terminal equipment having control authority to the server;
and realizing communication with the listed terminal equipment, and importing the activation code into the terminal equipment.
7. The method for controlling key operation according to any one of claims 1-6, wherein determining whether to respond to the key operation of the server according to validity of the activation code comprises: and if the activation code is valid, responding to the first key operation generated by the server after the activation code is determined to be valid.
8. The method for controlling key operation according to any one of claims 1-6, wherein determining whether to respond to the key operation of the server according to validity of the activation code comprises:
if the activation code is valid, determining the type of key operation of the server;
and sending an instruction corresponding to the type of the key operation of the server to the server according to the type of the key operation of the server so as to control the server to execute corresponding actions.
9. A key operation control device applied to a server, for executing the key operation control method according to any one of claims 1 to 8.
10. A computer-readable storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, carries out the steps of the method of controlling the operation of a key according to any one of claims 1 to 8.
CN202111407328.1A 2021-11-24 2021-11-24 Key operation control method and device and storage medium Pending CN114117399A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111407328.1A CN114117399A (en) 2021-11-24 2021-11-24 Key operation control method and device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111407328.1A CN114117399A (en) 2021-11-24 2021-11-24 Key operation control method and device and storage medium

Publications (1)

Publication Number Publication Date
CN114117399A true CN114117399A (en) 2022-03-01

Family

ID=80372360

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111407328.1A Pending CN114117399A (en) 2021-11-24 2021-11-24 Key operation control method and device and storage medium

Country Status (1)

Country Link
CN (1) CN114117399A (en)

Similar Documents

Publication Publication Date Title
CN108173822B (en) Intelligent door lock control method, intelligent door lock and computer readable storage medium
CN107180464B (en) Intelligent lock unlocking method and system using same
KR101881167B1 (en) Car control system
EP2888855B1 (en) Systems and methods for lock access management using wireless signals
US11171784B2 (en) Systems and methods for providing a secured password and authentication mechanism for programming and updating software or firmware
CN109361642B (en) Remote authorization unlocking method and system
CN107579966B (en) Control method, device and system for remotely accessing intranet and terminal equipment
EP3549895B1 (en) Elevator service request and offline authentication of the elevator service request
CN111092899B (en) Information acquisition method, device, equipment and medium
CN108737971B (en) Identity authentication method, equipment and storage medium
CN113542399B (en) Remote control method and device for vehicle, vehicle and storage medium
CN105334970A (en) Terminal application locking method and system as well as terminal
CN110727938B (en) Configuration method and device of intelligent equipment, electronic equipment and storage medium
US20150228137A1 (en) Wireless access control to a locking device
US9883402B2 (en) Method, terminal and server for processing information, and communication method and system
CN105323222A (en) Login verification method and login verification system
KR101612530B1 (en) Method and apparatus for managing security
KR20180001314A (en) Apparatus and method for emergency start
KR101436404B1 (en) User authenticating method and apparatus
CN109684791B (en) Software protection method and device
CN114117399A (en) Key operation control method and device and storage medium
CN111104655A (en) BMC login method and related device
CN113596627B (en) Authorization control method and device for power equipment, electronic equipment and storage medium
EP3272139B1 (en) Method and device for integrated usability control
CN111354109B (en) Security anti-theft monitoring system and method based on big data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination