CN115134766A - Short message-based machine room safety management method, system, medium and equipment - Google Patents

Short message-based machine room safety management method, system, medium and equipment Download PDF

Info

Publication number
CN115134766A
CN115134766A CN202210550426.9A CN202210550426A CN115134766A CN 115134766 A CN115134766 A CN 115134766A CN 202210550426 A CN202210550426 A CN 202210550426A CN 115134766 A CN115134766 A CN 115134766A
Authority
CN
China
Prior art keywords
verification
mobile phone
machine room
user
short message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210550426.9A
Other languages
Chinese (zh)
Inventor
巩倩倩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Huarong Xingji Electronic Technology Development Co ltd
Original Assignee
Beijing Huarong Xingji Electronic Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Huarong Xingji Electronic Technology Development Co ltd filed Critical Beijing Huarong Xingji Electronic Technology Development Co ltd
Priority to CN202210550426.9A priority Critical patent/CN115134766A/en
Publication of CN115134766A publication Critical patent/CN115134766A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C2201/00Transmission systems of control signals via wireless link
    • G08C2201/10Power supply of remote control devices
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C2201/00Transmission systems of control signals via wireless link
    • G08C2201/40Remote control systems using repeaters, converters, gateways
    • G08C2201/42Transmitting or receiving remote control signals via a network

Abstract

The invention belongs to the field of machine room safety control, and particularly relates to a machine room safety management method, a system, a medium and equipment based on short messages. The method comprises the following steps: step 1, according to an account signal and identity information of a user, performing identity authentication on the user to generate an authentication result; step 2, when the verification result is that the verification is passed, regularly sending verification information to the user side; and 3, controlling the machine room equipment according to a control instruction sent by the user side in a short message mode, wherein the control instruction comprises the verification information. According to the invention, the direct on-off control of the power supply and the network of the equipment in the machine room can be remotely carried out at the first time through the short message, and when major accidents (fire, serious network attack and the like) occur, the system can directly cut off the power supply and the network of the equipment, thereby gaining precious time for rescuing the major accidents and maximally protecting the safety of the equipment and the network.

Description

Short message-based machine room safety management method, system, medium and equipment
Technical Field
The invention belongs to the field of machine room safety control, and particularly relates to a method, a system, a medium and equipment for machine room safety management based on short messages.
Background
The machine room is usually a data center or a place where important equipment is stored, and therefore, the security of the machine room is a region where importance is attached to each enterprise or company. At the present stage, the operations such as the security of the machine room and the equipment are required to be checked one by one through the manual control switch, time is consumed, and the operation cannot be immediately and rapidly responded to the machine room when major accidents happen, so that the safety of the machine room has a certain problem.
Disclosure of Invention
The invention aims to provide a method, a system, a medium and equipment for managing the safety of a machine room based on short messages.
The technical scheme for solving the technical problems is as follows: a computer room safety management method based on short messages comprises the following steps:
step 1, according to an account signal and identity information of a user, performing identity authentication on the user to generate an authentication result;
step 2, when the verification result is that the verification is passed, regularly sending verification information to the user side;
and 3, controlling the machine room equipment according to a control instruction sent by the user side in a short message mode, wherein the control instruction comprises the verification information.
The invention has the beneficial effects that: in order to guarantee various work of safe production of the information machine room, management personnel can remotely and directly control the power supply and the network of equipment in the machine room through short messages at the first time, and when major accidents (fire, serious network attack and the like) occur, the system can directly cut off the power supply and the network of the equipment, thereby gaining precious time for rescuing the major accidents and maximally protecting the safety of the equipment and the network.
On the basis of the technical scheme, the invention can be further improved as follows.
Further, the account signal includes a user name and a password, and the identity information includes a mobile phone card IMSI and a mobile phone terminal IMSI, then step 1 specifically includes:
and carrying out authentication verification on the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI of the user, generating a safety verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI pass the authentication verification, and generating an abnormal verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI do not pass the authentication verification.
Further, the step 3 specifically comprises:
and acquiring the control instruction sent by the user side, analyzing and checking verification information in the control instruction, and if the verification information passes the check, controlling the machine room equipment according to the control instruction sent by the user side.
Further, the step 3 further comprises:
and if the verification information does not pass the verification, generating abnormal information.
Another technical solution of the present invention for solving the above technical problems is as follows: a computer room safety management system based on short messages comprises:
the identity authentication module is used for authenticating the identity of the user according to the account number signal and the identity information of the user to generate an authentication result;
the verification module is used for sending verification information to the user side at regular time when the verification result is that the verification is passed;
and the control module is used for controlling the machine room equipment according to a control instruction sent by the user side in a short message mode, wherein the control instruction comprises the verification information.
The invention has the beneficial effects that: in order to guarantee various work of safe production of the information machine room, management personnel can remotely and directly control the power supply and the network of the equipment of the machine room through short messages in the first time, and when major accidents (fire, serious network attack and the like) occur, the system can directly cut off the power supply and the network of the equipment, thereby gaining precious time for rescuing the major accidents and maximally protecting the safety of the equipment and the network.
Further, the account signal includes a user name and a password, the identity information includes a mobile phone card IMSI and a mobile phone terminal IMSI, and the identity authentication module is specifically configured to:
and carrying out authentication verification on the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI of the user, generating a safety verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI pass the authentication verification, and generating an abnormal verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI do not pass the authentication verification.
Further, the control module is specifically configured to:
and acquiring the control instruction sent by the user side, analyzing and checking verification information in the control instruction, and if the verification information passes the check, controlling the machine room equipment according to the control instruction sent by the user side.
Further, the control module is further specifically configured to:
and if the verification information does not pass the verification, generating abnormal information.
Another technical solution of the present invention for solving the above technical problems is as follows: a storage medium, wherein the storage medium stores instructions, and when a computer reads the instructions, the computer is enabled to execute the method for managing the security of the computer room based on the short message according to any one of the above items.
The invention has the beneficial effects that: in order to guarantee various work of safe production of the information machine room, management personnel can remotely and directly control the power supply and the network of equipment in the machine room through short messages at the first time, and when major accidents (fire, serious network attack and the like) occur, the system can directly cut off the power supply and the network of the equipment, thereby gaining precious time for rescuing the major accidents and maximally protecting the safety of the equipment and the network.
Another technical solution of the present invention for solving the above technical problems is as follows: an electronic device includes the storage medium and a processor executing instructions in the storage medium.
The invention has the beneficial effects that: in order to guarantee various work of safe production of the information machine room, management personnel can remotely and directly control the power supply and the network of the equipment of the machine room through short messages in the first time, and when major accidents (fire, serious network attack and the like) occur, the system can directly cut off the power supply and the network of the equipment, thereby gaining precious time for rescuing the major accidents and maximally protecting the safety of the equipment and the network.
Drawings
Fig. 1 is a flowchart provided in an embodiment of a method for managing security of a machine room based on short messages according to the present invention;
fig. 2 is a structural framework diagram provided in an embodiment of a short message-based machine room security management system of the present invention.
Detailed Description
The principles and features of this invention are described below in conjunction with examples which are set forth to illustrate, but are not to be construed to limit the scope of the invention.
As shown in fig. 1, a method for managing security of a computer room based on short messages includes:
step 1, according to an account signal and identity information of a user, performing identity authentication on the user to generate an authentication result;
step 2, when the verification result is that the verification is passed, regularly sending verification information to the user side;
and 3, controlling the machine room equipment according to a control instruction sent by the user side in a short message mode, wherein the control instruction comprises the verification information.
In some possible implementation modes, in order to guarantee various work of safe production of the information machine room, management personnel can remotely and directly control the power supply and the network of equipment in the machine room through short messages at the first time, and when major accidents (fire, serious network attack and the like) occur, the system can directly cut off the power supply and the network of the equipment, thereby gaining precious time for rescuing the major accidents and maximally protecting the safety of the equipment and the network.
It should be noted that, the specific process of performing identity verification on the account at the user end in step 1 can be understood with reference to embodiment 1.
In embodiment 1, when logging in a mobile phone client, the system performs simultaneous verification of four conditions, namely a mobile phone number, a password, a mobile phone card IMSI, and a mobile phone terminal IMEI, and only if the conditions are met, the system can enter the client.
The specific procedures of step 2 and step 3 can be understood with reference to example 2.
In embodiment 2, the short message module responsible for sending the verification information sends a dynamic verification code to the control center every 30 minutes, and the following four conditions must be satisfied when executing the operation instruction: the dynamic verification code, the mobile phone number, the operation instruction and other ciphertext information are matched, and the equipment can be controlled to be turned on or turned off at the same time.
The machine room can have the following three safety characteristics by the invention:
firstly, safety protection of system management personnel: generally, the control end only performs login authentication and operation through a user name and a password, and if the user data is lost due to network attack, the control system completely loses the key. The safety management system for controlling equipment in the machine room based on the short message sends an operation instruction on a mobile phone client, and not only user name (mobile phone number) and password verification is required when the mobile phone client is logged in, but also authentication verification is carried out on the IMSI (international mobile subscriber identity) of a mobile phone card of the mobile phone terminal and the IMEI (international mobile equipment identity) of the mobile phone terminal by the system. The login can be performed only if the four conditions are met.
Secondly, safety protection of the operation instruction: the system automatically generates a verification code every 30 minutes and sends the verification code to the mobile phone client of the manager, the mobile phone client automatically adds the dynamic verification code in the time period when executing an operation command, the control platform firstly analyzes and verifies the message after receiving the execution message, confirms that the sender is the mobile phone manager, and then processes the message command.
Thirdly, operating safety protection of the instruction channel: the operation instruction is sent through the short message channel, the control is not carried out in a network direct connection mode, the control risk brought by network safety is greatly reduced, and the short message channel control mode directly forms a safety barrier.
Through the points, when a major accident or attack occurs to the machine room, a system administrator can directly cut off the power supply and the network of the corresponding equipment through the mobile phone terminal, and comprehensively and stereoscopically verifies the operating instruction and the operator of the system, so that the safe and stable operation of the information machine room environment is ensured through a multidimensional safety means.
Secondly, the invention can also have other security schemes on this basis:
firstly, login information leakage:
after the password for system login is leaked, other illegal persons cannot log in by using the mobile phone of the illegal persons, because the login key only has the password, and also has authentication verification of the IMSI (International Mobile subscriber identity) of the mobile phone card and the IMEI (International Mobile Equipment identity) of the mobile phone terminal.
Secondly, the mobile phone terminal is lost:
the administrator carelessly loses the mobile phone terminal, and as long as the mobile phone card is lost, the user name and the password are immediately invalid because the IMSI number of the mobile phone card is invalid. Therefore, even if the mobile phone terminal is lost, the mobile phone terminal cannot log in the system.
Thirdly, short message interception:
after the short message for sending the command is intercepted, the short message cannot be analyzed, because the short message is the encrypted ciphertext, and the correct device control command cannot be obtained even if the short message is intercepted.
Fourthly, controlling a central database:
the attack on the control center database obtains the information of the database, and the mode has no method for controlling the equipment. The control equipment can only send out a short message instruction through the mobile phone terminal, different dynamic verification codes can be generated at different time points by the same operation, and the short message instruction of the control equipment carries the dynamic verification codes. The mobile phone terminal is only a single machine, only has a sending and receiving mode, does not store any instruction data, and all instructions are dynamic and unique. Therefore, the information of the database is acquired, and the device cannot be operated.
Preferably, in any of the above embodiments, the account signal includes a user name and a password, and the identity information includes a mobile phone card IMSI and a mobile phone terminal IMSI, where the step 1 specifically is:
and carrying out authentication verification on the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI of the user, generating a safety verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI pass the authentication verification, and generating an abnormal verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI do not pass the authentication verification.
Preferably, in any of the above embodiments, the step 3 specifically is:
and acquiring the control instruction sent by the user side, analyzing and checking verification information in the control instruction, and if the verification information passes the check, controlling the machine room equipment according to the control instruction sent by the user side.
Preferably, in any of the above embodiments, the step 3 specifically is:
and if the verification information does not pass the verification, generating abnormal information.
As shown in fig. 2, a computer room security management system based on short messages includes:
the identity authentication module 100 is configured to authenticate an identity of a user according to an account signal and identity information of the user, and generate an authentication result;
the verification module 200 is configured to send verification information to the user side at regular time when the verification result is that verification passes;
the control module 300 is configured to control the machine room device according to a control instruction sent by the user terminal in a short message manner, where the control instruction includes the verification information.
In some possible implementation modes, in order to guarantee various work of safe production of the information machine room, management personnel can remotely and directly control the power supply and the network of equipment in the machine room through short messages at the first time, and when major accidents (fire, serious network attack and the like) occur, the system can directly cut off the power supply and the network of the equipment, thereby gaining precious time for rescuing the major accidents and maximally protecting the safety of the equipment and the network.
It should be noted that the identity verification module 100 includes a mobile phone client management sub-module, the verification module 200 includes a short message sending and receiving sub-module, and the control module 300 includes a control center sub-module and an equipment switch control sub-module.
The mobile phone client management submodule comprises: the module can manage equipment in a machine room, an administrator can check the current power supply and the network switching state of each equipment in real time, and when major accidents happen, the administrator sends corresponding instructions by using the system as required. Description of the drawings: the message instruction is transmitted in a short message mode.
User login: the user inputs an account number and a password to log in. The account is a mobile phone number used by the mobile phone and is bound with mobile phone card information (IMSI) and mobile phone information (IMEI), the information is verified when the account is logged in, and the login can be performed after the verification is passed. The user can modify the initial password after logging in successfully.
And displaying the equipment state in real time: after login is successful, the on-off state of the main equipment can be seen in real time, and the states of the equipment can be inquired and displayed; the channel can be added and deleted, and the name can be modified by self.
The operation instruction is sent to the short message receiving module in a short message mode. And after receiving a feedback prompt of successful execution operation, displaying a corresponding state by the equipment state icon.
The generation form of the operation instruction is as follows: the verification code + the execution code + the mobile phone number + the other in the validity period, when the message is sent to the control center, various identification information needs to be verified before the message is confirmed to be correct, and then the instruction can be executed.
System logging: all operation logs of the account on the mobile phone client, for example: login name, login mobile phone, login time, operation time, which device to operate, operation content, and the like.
The operation instruction compiling module: and the operation of each button corresponds to a short message instruction, and the short message instruction translation comparison table is stored, and is added, deleted, modified and checked.
The short message receiving and sending sub-module: receiving a message instruction sent by a mobile phone client management module, and transmitting the message instruction to a control center module; and message instructions such as verification, feedback and the like sent by the control center can be received and sent to the mobile phone client management module, so that the communication between the mobile phone client management module and the control center module in a short message mode is realized.
And receiving the short message sent by the mobile phone client, and transmitting the message to the control center.
And receiving the information given by the control center and sending the information to the mobile phone client in a short message mode.
A control center submodule: verifying whether the received message is sent by the administrator mobile phone; translating the received short message instruction message and converting the received short message instruction message into an operation instruction of a control switch; and after the switch operation is finished, feeding back an operation result message to the short message transceiving module.
And establishing an administrator identity database (a mobile phone number, binding information, an account password and the like), and inputting determined administrator information in advance so as to compare the administrator information with the identity database when an execution command is received and confirm the source reliability of the message.
And the short message sending module sends the dynamic verification code to the mobile phone client of the manager at regular time, the dynamic verification code in the time period is added to the head of the message when the mobile phone client executes the command, the control platform checks the message after receiving the execution message, confirms that the sender is the mobile phone manager, processes the message command, and pops up a corresponding error reply if the message command is not received.
And transmitting the command operation to a switch management module, and executing the command by the switch management module to control certain equipment.
After the switch management module successfully executes the command, the verification module generates a feedback message of 'successful execution' and sends the feedback message to the short message receiving and sending module, and the short message receiving and sending module sends the message to the administrator mobile phone client which sends the command.
The device switch control submodule comprises: and receiving the information of the control center, starting up the equipment switch control system, and opening or closing the relays of the corresponding equipment to realize the control of the on-off states of the equipment power supply and the network.
And after receiving an execution command of the control center, starting up the equipment switch control system.
And controlling to open and close the relay of the corresponding equipment.
The relay receives the opening and closing instruction to cut off power and supply power.
And the relay transmits the operated switching value signal to an equipment switching value acquisition server.
And the equipment switching value acquisition server transmits the switched state after operation to the control center.
And the control center feeds back the execution result of the on-off state of the equipment to the mobile phone client.
Preferably, in any embodiment above, the account signal includes a user name and a password, and the identity information includes a mobile phone card IMSI and a mobile phone terminal IMSI, then the identity authentication module 100 is specifically configured to:
and carrying out authentication verification on the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI of the user, generating a safety verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI pass the authentication verification, and generating an abnormal verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI do not pass the authentication verification.
Preferably, in any of the above embodiments, the control module 300 is specifically configured to:
and acquiring the control instruction sent by the user side, analyzing and checking verification information in the control instruction, and if the verification information passes the check, controlling the machine room equipment according to the control instruction sent by the user side.
Another technical solution of the present invention for solving the above technical problems is as follows: a storage medium, wherein the storage medium stores instructions, and when a computer reads the instructions, the computer executes the computer-room security management method based on short messages according to any one of the above items.
In some possible implementation modes, in order to guarantee various work of safe production of the information machine room, a manager can remotely and directly control the power supply and the network of equipment in the machine room through short messages in the first time, and when major accidents (fire, serious network attack and the like) occur, the system can directly cut off the power supply and the network of the equipment, thereby gaining precious time for rescuing the major accidents and maximally protecting the safety of the equipment and the network.
Another technical solution of the present invention for solving the above technical problems is as follows: an electronic device includes the storage medium and a processor executing instructions in the storage medium.
In some possible implementation modes, in order to guarantee various work of safe production of the information machine room, management personnel can remotely and directly control the power supply and the network of equipment in the machine room through short messages at the first time, and when major accidents (fire, serious network attack and the like) occur, the system can directly cut off the power supply and the network of the equipment, thereby gaining precious time for rescuing the major accidents and maximally protecting the safety of the equipment and the network.
The reader should understand that in the description of this specification, reference to the description of the terms "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described method embodiments are merely illustrative, and for example, the division of steps into only one type of logical functional division may be implemented in practice in other ways, for example, multiple steps may be combined or integrated into another step, or some features may be omitted, or not implemented.
The above method, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention essentially or partially contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
While the invention has been described with reference to specific embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A computer room safety management method based on short messages is characterized by comprising the following steps:
step 1, according to an account signal and identity information of a user, performing identity authentication on the user to generate an authentication result;
step 2, when the verification result is that the verification is passed, regularly sending verification information to the user side;
and 3, controlling the equipment in the machine room according to a control instruction sent by the user side in a short message mode, wherein the control instruction comprises the verification information.
2. The short message-based machine room security management method according to claim 1, wherein the account signal includes a user name and a password, and the identity information includes a mobile phone card IMSI and a mobile phone terminal IMSI, and then the step 1 specifically includes:
and carrying out authentication verification on the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI of the user, generating a safety verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI pass the authentication verification, and generating an abnormal verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI do not pass the authentication verification.
3. The short message-based machine room security management method according to claim 2, wherein the step 3 specifically comprises:
and acquiring the control instruction sent by the user side, analyzing and checking verification information in the control instruction, and if the verification information passes the check, controlling the machine room equipment according to the control instruction sent by the user side.
4. The short message-based machine room security management method according to claim 3, wherein the step 3 further comprises:
and if the verification information does not pass the verification, generating abnormal information.
5. A computer room safety management system based on short messages is characterized by comprising:
the identity authentication module is used for authenticating the identity of the user according to the account number signal and the identity information of the user to generate an authentication result;
the verification module is used for sending verification information to the user side at regular time when the verification result is that the verification is passed;
and the control module is used for controlling the machine room equipment according to a control instruction sent by the user side in a short message mode, wherein the control instruction comprises the verification information.
6. The short message-based machine room security management system according to claim 5, wherein the account signal includes a user name and a password, the identity information includes a mobile phone card IMSI and a mobile phone terminal IMSI, and the identity verification module is specifically configured to:
and carrying out authentication verification on the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI of the user, generating a safety verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI pass the authentication verification, and generating an abnormal verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI do not pass the authentication verification.
7. The short message-based machine room security management system according to claim 6, wherein the control module is specifically configured to:
and acquiring the control instruction sent by the user side, analyzing and checking verification information in the control instruction, and if the verification information passes the check, controlling the machine room equipment according to the control instruction sent by the user side.
8. The short message-based machine room security management system according to claim 7, wherein the control module is further specifically configured to:
and if the verification information does not pass the verification, generating abnormal information.
9. A medium, wherein instructions are stored in the medium, and when the instructions are read by a computer, the computer is caused to execute a short message-based room security management method according to any one of claims 1 to 4.
10. A device comprising the storage medium of claim 9, a processor to execute instructions within the storage medium.
CN202210550426.9A 2022-05-18 2022-05-18 Short message-based machine room safety management method, system, medium and equipment Pending CN115134766A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210550426.9A CN115134766A (en) 2022-05-18 2022-05-18 Short message-based machine room safety management method, system, medium and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210550426.9A CN115134766A (en) 2022-05-18 2022-05-18 Short message-based machine room safety management method, system, medium and equipment

Publications (1)

Publication Number Publication Date
CN115134766A true CN115134766A (en) 2022-09-30

Family

ID=83376101

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210550426.9A Pending CN115134766A (en) 2022-05-18 2022-05-18 Short message-based machine room safety management method, system, medium and equipment

Country Status (1)

Country Link
CN (1) CN115134766A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101482987A (en) * 2009-01-19 2009-07-15 苏州工业园区新海宜电信发展股份有限公司 Central control and management method for outdoor communication machine room door based on communication network
CN103458407A (en) * 2013-07-29 2013-12-18 北京盛世光明软件股份有限公司 Internet account number login management system and method based on short message
CN105703921A (en) * 2014-11-24 2016-06-22 甘肃省科学技术情报研究所 Device and method of remotely controlling server by using mobile phone short message
CN106790267A (en) * 2017-02-13 2017-05-31 郑州云海信息技术有限公司 A kind of method and apparatus of access server operating system
CN107786573A (en) * 2017-11-09 2018-03-09 张昭 A kind of data verification system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101482987A (en) * 2009-01-19 2009-07-15 苏州工业园区新海宜电信发展股份有限公司 Central control and management method for outdoor communication machine room door based on communication network
CN103458407A (en) * 2013-07-29 2013-12-18 北京盛世光明软件股份有限公司 Internet account number login management system and method based on short message
CN105703921A (en) * 2014-11-24 2016-06-22 甘肃省科学技术情报研究所 Device and method of remotely controlling server by using mobile phone short message
CN106790267A (en) * 2017-02-13 2017-05-31 郑州云海信息技术有限公司 A kind of method and apparatus of access server operating system
CN107786573A (en) * 2017-11-09 2018-03-09 张昭 A kind of data verification system

Similar Documents

Publication Publication Date Title
EP2579220A1 (en) Entrance guard control method and system thereof
CN110011848B (en) Mobile operation and maintenance auditing system
CN104636682A (en) Password management system and method based on hardware device
CN110213247A (en) A kind of method and system improving pushed information safety
CN102546240B (en) Network communication method, network communicating system and network communication device
CN102957701A (en) Method and system for verifying telnet server brute force attack prevention
CN113674455A (en) Intelligent door lock remote control method, device, system, equipment and storage medium
CN106911744A (en) The management method and managing device of a kind of image file
US11068579B2 (en) Method and system of performing an authorization mechanism between a service terminal system and a helpdesk system
CN114139176A (en) Industrial internet core data protection method and system based on state secret
CN115134766A (en) Short message-based machine room safety management method, system, medium and equipment
CN105391741A (en) Access device safety control method, device and system
CN115840937B (en) Control method and device and electronic equipment
CN116346423A (en) Client data multiple encryption system and method in intelligent Internet of things energy system
CN105491118B (en) A kind of avionics Ethernet data loading system
CN112738103B (en) Information verification method and device and electronic equipment
KR20190098863A (en) System of collecting manufacturing facilities data and controlling the manufacturing facilities using iot communication with smart phone
CN113704061A (en) Secret-related computer protection system
CN112084485A (en) Data acquisition method, device, equipment and computer storage medium
CN108123957B (en) Multi-mode authentication method and device for logging in virtual private network server
US9053301B2 (en) Method for logging in to computer, information processing apparatus and computer-readable information recording medium
CN110807181A (en) Method, device and system for logging in and verifying database in enterprise
CN112699396B (en) Information security method, device, system and storage medium of instant communication software
CN110650057A (en) Method and system for configuring equipment through portable mobile terminal
CN115865529B (en) Control method and device of embedded communication bus, terminal equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220930

RJ01 Rejection of invention patent application after publication