CN115134766A - Short message-based machine room safety management method, system, medium and equipment - Google Patents
Short message-based machine room safety management method, system, medium and equipment Download PDFInfo
- Publication number
- CN115134766A CN115134766A CN202210550426.9A CN202210550426A CN115134766A CN 115134766 A CN115134766 A CN 115134766A CN 202210550426 A CN202210550426 A CN 202210550426A CN 115134766 A CN115134766 A CN 115134766A
- Authority
- CN
- China
- Prior art keywords
- verification
- mobile phone
- machine room
- user
- short message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract description 35
- 238000012795 verification Methods 0.000 claims abstract description 105
- 230000002159 abnormal effect Effects 0.000 claims description 11
- 238000000034 method Methods 0.000 abstract description 15
- 238000004519 manufacturing process Methods 0.000 description 8
- 230000009286 beneficial effect Effects 0.000 description 4
- 230000004888 barrier function Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000011022 operating instruction Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C17/00—Arrangements for transmitting signals characterised by the use of a wireless electrical link
- G08C17/02—Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C2201/00—Transmission systems of control signals via wireless link
- G08C2201/10—Power supply of remote control devices
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C2201/00—Transmission systems of control signals via wireless link
- G08C2201/40—Remote control systems using repeaters, converters, gateways
- G08C2201/42—Transmitting or receiving remote control signals via a network
Abstract
The invention belongs to the field of machine room safety control, and particularly relates to a machine room safety management method, a system, a medium and equipment based on short messages. The method comprises the following steps: step 1, according to an account signal and identity information of a user, performing identity authentication on the user to generate an authentication result; step 2, when the verification result is that the verification is passed, regularly sending verification information to the user side; and 3, controlling the machine room equipment according to a control instruction sent by the user side in a short message mode, wherein the control instruction comprises the verification information. According to the invention, the direct on-off control of the power supply and the network of the equipment in the machine room can be remotely carried out at the first time through the short message, and when major accidents (fire, serious network attack and the like) occur, the system can directly cut off the power supply and the network of the equipment, thereby gaining precious time for rescuing the major accidents and maximally protecting the safety of the equipment and the network.
Description
Technical Field
The invention belongs to the field of machine room safety control, and particularly relates to a method, a system, a medium and equipment for machine room safety management based on short messages.
Background
The machine room is usually a data center or a place where important equipment is stored, and therefore, the security of the machine room is a region where importance is attached to each enterprise or company. At the present stage, the operations such as the security of the machine room and the equipment are required to be checked one by one through the manual control switch, time is consumed, and the operation cannot be immediately and rapidly responded to the machine room when major accidents happen, so that the safety of the machine room has a certain problem.
Disclosure of Invention
The invention aims to provide a method, a system, a medium and equipment for managing the safety of a machine room based on short messages.
The technical scheme for solving the technical problems is as follows: a computer room safety management method based on short messages comprises the following steps:
step 1, according to an account signal and identity information of a user, performing identity authentication on the user to generate an authentication result;
step 2, when the verification result is that the verification is passed, regularly sending verification information to the user side;
and 3, controlling the machine room equipment according to a control instruction sent by the user side in a short message mode, wherein the control instruction comprises the verification information.
The invention has the beneficial effects that: in order to guarantee various work of safe production of the information machine room, management personnel can remotely and directly control the power supply and the network of equipment in the machine room through short messages at the first time, and when major accidents (fire, serious network attack and the like) occur, the system can directly cut off the power supply and the network of the equipment, thereby gaining precious time for rescuing the major accidents and maximally protecting the safety of the equipment and the network.
On the basis of the technical scheme, the invention can be further improved as follows.
Further, the account signal includes a user name and a password, and the identity information includes a mobile phone card IMSI and a mobile phone terminal IMSI, then step 1 specifically includes:
and carrying out authentication verification on the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI of the user, generating a safety verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI pass the authentication verification, and generating an abnormal verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI do not pass the authentication verification.
Further, the step 3 specifically comprises:
and acquiring the control instruction sent by the user side, analyzing and checking verification information in the control instruction, and if the verification information passes the check, controlling the machine room equipment according to the control instruction sent by the user side.
Further, the step 3 further comprises:
and if the verification information does not pass the verification, generating abnormal information.
Another technical solution of the present invention for solving the above technical problems is as follows: a computer room safety management system based on short messages comprises:
the identity authentication module is used for authenticating the identity of the user according to the account number signal and the identity information of the user to generate an authentication result;
the verification module is used for sending verification information to the user side at regular time when the verification result is that the verification is passed;
and the control module is used for controlling the machine room equipment according to a control instruction sent by the user side in a short message mode, wherein the control instruction comprises the verification information.
The invention has the beneficial effects that: in order to guarantee various work of safe production of the information machine room, management personnel can remotely and directly control the power supply and the network of the equipment of the machine room through short messages in the first time, and when major accidents (fire, serious network attack and the like) occur, the system can directly cut off the power supply and the network of the equipment, thereby gaining precious time for rescuing the major accidents and maximally protecting the safety of the equipment and the network.
Further, the account signal includes a user name and a password, the identity information includes a mobile phone card IMSI and a mobile phone terminal IMSI, and the identity authentication module is specifically configured to:
and carrying out authentication verification on the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI of the user, generating a safety verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI pass the authentication verification, and generating an abnormal verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI do not pass the authentication verification.
Further, the control module is specifically configured to:
and acquiring the control instruction sent by the user side, analyzing and checking verification information in the control instruction, and if the verification information passes the check, controlling the machine room equipment according to the control instruction sent by the user side.
Further, the control module is further specifically configured to:
and if the verification information does not pass the verification, generating abnormal information.
Another technical solution of the present invention for solving the above technical problems is as follows: a storage medium, wherein the storage medium stores instructions, and when a computer reads the instructions, the computer is enabled to execute the method for managing the security of the computer room based on the short message according to any one of the above items.
The invention has the beneficial effects that: in order to guarantee various work of safe production of the information machine room, management personnel can remotely and directly control the power supply and the network of equipment in the machine room through short messages at the first time, and when major accidents (fire, serious network attack and the like) occur, the system can directly cut off the power supply and the network of the equipment, thereby gaining precious time for rescuing the major accidents and maximally protecting the safety of the equipment and the network.
Another technical solution of the present invention for solving the above technical problems is as follows: an electronic device includes the storage medium and a processor executing instructions in the storage medium.
The invention has the beneficial effects that: in order to guarantee various work of safe production of the information machine room, management personnel can remotely and directly control the power supply and the network of the equipment of the machine room through short messages in the first time, and when major accidents (fire, serious network attack and the like) occur, the system can directly cut off the power supply and the network of the equipment, thereby gaining precious time for rescuing the major accidents and maximally protecting the safety of the equipment and the network.
Drawings
Fig. 1 is a flowchart provided in an embodiment of a method for managing security of a machine room based on short messages according to the present invention;
fig. 2 is a structural framework diagram provided in an embodiment of a short message-based machine room security management system of the present invention.
Detailed Description
The principles and features of this invention are described below in conjunction with examples which are set forth to illustrate, but are not to be construed to limit the scope of the invention.
As shown in fig. 1, a method for managing security of a computer room based on short messages includes:
step 1, according to an account signal and identity information of a user, performing identity authentication on the user to generate an authentication result;
step 2, when the verification result is that the verification is passed, regularly sending verification information to the user side;
and 3, controlling the machine room equipment according to a control instruction sent by the user side in a short message mode, wherein the control instruction comprises the verification information.
In some possible implementation modes, in order to guarantee various work of safe production of the information machine room, management personnel can remotely and directly control the power supply and the network of equipment in the machine room through short messages at the first time, and when major accidents (fire, serious network attack and the like) occur, the system can directly cut off the power supply and the network of the equipment, thereby gaining precious time for rescuing the major accidents and maximally protecting the safety of the equipment and the network.
It should be noted that, the specific process of performing identity verification on the account at the user end in step 1 can be understood with reference to embodiment 1.
In embodiment 1, when logging in a mobile phone client, the system performs simultaneous verification of four conditions, namely a mobile phone number, a password, a mobile phone card IMSI, and a mobile phone terminal IMEI, and only if the conditions are met, the system can enter the client.
The specific procedures of step 2 and step 3 can be understood with reference to example 2.
In embodiment 2, the short message module responsible for sending the verification information sends a dynamic verification code to the control center every 30 minutes, and the following four conditions must be satisfied when executing the operation instruction: the dynamic verification code, the mobile phone number, the operation instruction and other ciphertext information are matched, and the equipment can be controlled to be turned on or turned off at the same time.
The machine room can have the following three safety characteristics by the invention:
firstly, safety protection of system management personnel: generally, the control end only performs login authentication and operation through a user name and a password, and if the user data is lost due to network attack, the control system completely loses the key. The safety management system for controlling equipment in the machine room based on the short message sends an operation instruction on a mobile phone client, and not only user name (mobile phone number) and password verification is required when the mobile phone client is logged in, but also authentication verification is carried out on the IMSI (international mobile subscriber identity) of a mobile phone card of the mobile phone terminal and the IMEI (international mobile equipment identity) of the mobile phone terminal by the system. The login can be performed only if the four conditions are met.
Secondly, safety protection of the operation instruction: the system automatically generates a verification code every 30 minutes and sends the verification code to the mobile phone client of the manager, the mobile phone client automatically adds the dynamic verification code in the time period when executing an operation command, the control platform firstly analyzes and verifies the message after receiving the execution message, confirms that the sender is the mobile phone manager, and then processes the message command.
Thirdly, operating safety protection of the instruction channel: the operation instruction is sent through the short message channel, the control is not carried out in a network direct connection mode, the control risk brought by network safety is greatly reduced, and the short message channel control mode directly forms a safety barrier.
Through the points, when a major accident or attack occurs to the machine room, a system administrator can directly cut off the power supply and the network of the corresponding equipment through the mobile phone terminal, and comprehensively and stereoscopically verifies the operating instruction and the operator of the system, so that the safe and stable operation of the information machine room environment is ensured through a multidimensional safety means.
Secondly, the invention can also have other security schemes on this basis:
firstly, login information leakage:
after the password for system login is leaked, other illegal persons cannot log in by using the mobile phone of the illegal persons, because the login key only has the password, and also has authentication verification of the IMSI (International Mobile subscriber identity) of the mobile phone card and the IMEI (International Mobile Equipment identity) of the mobile phone terminal.
Secondly, the mobile phone terminal is lost:
the administrator carelessly loses the mobile phone terminal, and as long as the mobile phone card is lost, the user name and the password are immediately invalid because the IMSI number of the mobile phone card is invalid. Therefore, even if the mobile phone terminal is lost, the mobile phone terminal cannot log in the system.
Thirdly, short message interception:
after the short message for sending the command is intercepted, the short message cannot be analyzed, because the short message is the encrypted ciphertext, and the correct device control command cannot be obtained even if the short message is intercepted.
Fourthly, controlling a central database:
the attack on the control center database obtains the information of the database, and the mode has no method for controlling the equipment. The control equipment can only send out a short message instruction through the mobile phone terminal, different dynamic verification codes can be generated at different time points by the same operation, and the short message instruction of the control equipment carries the dynamic verification codes. The mobile phone terminal is only a single machine, only has a sending and receiving mode, does not store any instruction data, and all instructions are dynamic and unique. Therefore, the information of the database is acquired, and the device cannot be operated.
Preferably, in any of the above embodiments, the account signal includes a user name and a password, and the identity information includes a mobile phone card IMSI and a mobile phone terminal IMSI, where the step 1 specifically is:
and carrying out authentication verification on the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI of the user, generating a safety verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI pass the authentication verification, and generating an abnormal verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI do not pass the authentication verification.
Preferably, in any of the above embodiments, the step 3 specifically is:
and acquiring the control instruction sent by the user side, analyzing and checking verification information in the control instruction, and if the verification information passes the check, controlling the machine room equipment according to the control instruction sent by the user side.
Preferably, in any of the above embodiments, the step 3 specifically is:
and if the verification information does not pass the verification, generating abnormal information.
As shown in fig. 2, a computer room security management system based on short messages includes:
the identity authentication module 100 is configured to authenticate an identity of a user according to an account signal and identity information of the user, and generate an authentication result;
the verification module 200 is configured to send verification information to the user side at regular time when the verification result is that verification passes;
the control module 300 is configured to control the machine room device according to a control instruction sent by the user terminal in a short message manner, where the control instruction includes the verification information.
In some possible implementation modes, in order to guarantee various work of safe production of the information machine room, management personnel can remotely and directly control the power supply and the network of equipment in the machine room through short messages at the first time, and when major accidents (fire, serious network attack and the like) occur, the system can directly cut off the power supply and the network of the equipment, thereby gaining precious time for rescuing the major accidents and maximally protecting the safety of the equipment and the network.
It should be noted that the identity verification module 100 includes a mobile phone client management sub-module, the verification module 200 includes a short message sending and receiving sub-module, and the control module 300 includes a control center sub-module and an equipment switch control sub-module.
The mobile phone client management submodule comprises: the module can manage equipment in a machine room, an administrator can check the current power supply and the network switching state of each equipment in real time, and when major accidents happen, the administrator sends corresponding instructions by using the system as required. Description of the drawings: the message instruction is transmitted in a short message mode.
User login: the user inputs an account number and a password to log in. The account is a mobile phone number used by the mobile phone and is bound with mobile phone card information (IMSI) and mobile phone information (IMEI), the information is verified when the account is logged in, and the login can be performed after the verification is passed. The user can modify the initial password after logging in successfully.
And displaying the equipment state in real time: after login is successful, the on-off state of the main equipment can be seen in real time, and the states of the equipment can be inquired and displayed; the channel can be added and deleted, and the name can be modified by self.
The operation instruction is sent to the short message receiving module in a short message mode. And after receiving a feedback prompt of successful execution operation, displaying a corresponding state by the equipment state icon.
The generation form of the operation instruction is as follows: the verification code + the execution code + the mobile phone number + the other in the validity period, when the message is sent to the control center, various identification information needs to be verified before the message is confirmed to be correct, and then the instruction can be executed.
System logging: all operation logs of the account on the mobile phone client, for example: login name, login mobile phone, login time, operation time, which device to operate, operation content, and the like.
The operation instruction compiling module: and the operation of each button corresponds to a short message instruction, and the short message instruction translation comparison table is stored, and is added, deleted, modified and checked.
The short message receiving and sending sub-module: receiving a message instruction sent by a mobile phone client management module, and transmitting the message instruction to a control center module; and message instructions such as verification, feedback and the like sent by the control center can be received and sent to the mobile phone client management module, so that the communication between the mobile phone client management module and the control center module in a short message mode is realized.
And receiving the short message sent by the mobile phone client, and transmitting the message to the control center.
And receiving the information given by the control center and sending the information to the mobile phone client in a short message mode.
A control center submodule: verifying whether the received message is sent by the administrator mobile phone; translating the received short message instruction message and converting the received short message instruction message into an operation instruction of a control switch; and after the switch operation is finished, feeding back an operation result message to the short message transceiving module.
And establishing an administrator identity database (a mobile phone number, binding information, an account password and the like), and inputting determined administrator information in advance so as to compare the administrator information with the identity database when an execution command is received and confirm the source reliability of the message.
And the short message sending module sends the dynamic verification code to the mobile phone client of the manager at regular time, the dynamic verification code in the time period is added to the head of the message when the mobile phone client executes the command, the control platform checks the message after receiving the execution message, confirms that the sender is the mobile phone manager, processes the message command, and pops up a corresponding error reply if the message command is not received.
And transmitting the command operation to a switch management module, and executing the command by the switch management module to control certain equipment.
After the switch management module successfully executes the command, the verification module generates a feedback message of 'successful execution' and sends the feedback message to the short message receiving and sending module, and the short message receiving and sending module sends the message to the administrator mobile phone client which sends the command.
The device switch control submodule comprises: and receiving the information of the control center, starting up the equipment switch control system, and opening or closing the relays of the corresponding equipment to realize the control of the on-off states of the equipment power supply and the network.
And after receiving an execution command of the control center, starting up the equipment switch control system.
And controlling to open and close the relay of the corresponding equipment.
The relay receives the opening and closing instruction to cut off power and supply power.
And the relay transmits the operated switching value signal to an equipment switching value acquisition server.
And the equipment switching value acquisition server transmits the switched state after operation to the control center.
And the control center feeds back the execution result of the on-off state of the equipment to the mobile phone client.
Preferably, in any embodiment above, the account signal includes a user name and a password, and the identity information includes a mobile phone card IMSI and a mobile phone terminal IMSI, then the identity authentication module 100 is specifically configured to:
and carrying out authentication verification on the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI of the user, generating a safety verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI pass the authentication verification, and generating an abnormal verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI do not pass the authentication verification.
Preferably, in any of the above embodiments, the control module 300 is specifically configured to:
and acquiring the control instruction sent by the user side, analyzing and checking verification information in the control instruction, and if the verification information passes the check, controlling the machine room equipment according to the control instruction sent by the user side.
Another technical solution of the present invention for solving the above technical problems is as follows: a storage medium, wherein the storage medium stores instructions, and when a computer reads the instructions, the computer executes the computer-room security management method based on short messages according to any one of the above items.
In some possible implementation modes, in order to guarantee various work of safe production of the information machine room, a manager can remotely and directly control the power supply and the network of equipment in the machine room through short messages in the first time, and when major accidents (fire, serious network attack and the like) occur, the system can directly cut off the power supply and the network of the equipment, thereby gaining precious time for rescuing the major accidents and maximally protecting the safety of the equipment and the network.
Another technical solution of the present invention for solving the above technical problems is as follows: an electronic device includes the storage medium and a processor executing instructions in the storage medium.
In some possible implementation modes, in order to guarantee various work of safe production of the information machine room, management personnel can remotely and directly control the power supply and the network of equipment in the machine room through short messages at the first time, and when major accidents (fire, serious network attack and the like) occur, the system can directly cut off the power supply and the network of the equipment, thereby gaining precious time for rescuing the major accidents and maximally protecting the safety of the equipment and the network.
The reader should understand that in the description of this specification, reference to the description of the terms "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described method embodiments are merely illustrative, and for example, the division of steps into only one type of logical functional division may be implemented in practice in other ways, for example, multiple steps may be combined or integrated into another step, or some features may be omitted, or not implemented.
The above method, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention essentially or partially contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
While the invention has been described with reference to specific embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. A computer room safety management method based on short messages is characterized by comprising the following steps:
step 1, according to an account signal and identity information of a user, performing identity authentication on the user to generate an authentication result;
step 2, when the verification result is that the verification is passed, regularly sending verification information to the user side;
and 3, controlling the equipment in the machine room according to a control instruction sent by the user side in a short message mode, wherein the control instruction comprises the verification information.
2. The short message-based machine room security management method according to claim 1, wherein the account signal includes a user name and a password, and the identity information includes a mobile phone card IMSI and a mobile phone terminal IMSI, and then the step 1 specifically includes:
and carrying out authentication verification on the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI of the user, generating a safety verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI pass the authentication verification, and generating an abnormal verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI do not pass the authentication verification.
3. The short message-based machine room security management method according to claim 2, wherein the step 3 specifically comprises:
and acquiring the control instruction sent by the user side, analyzing and checking verification information in the control instruction, and if the verification information passes the check, controlling the machine room equipment according to the control instruction sent by the user side.
4. The short message-based machine room security management method according to claim 3, wherein the step 3 further comprises:
and if the verification information does not pass the verification, generating abnormal information.
5. A computer room safety management system based on short messages is characterized by comprising:
the identity authentication module is used for authenticating the identity of the user according to the account number signal and the identity information of the user to generate an authentication result;
the verification module is used for sending verification information to the user side at regular time when the verification result is that the verification is passed;
and the control module is used for controlling the machine room equipment according to a control instruction sent by the user side in a short message mode, wherein the control instruction comprises the verification information.
6. The short message-based machine room security management system according to claim 5, wherein the account signal includes a user name and a password, the identity information includes a mobile phone card IMSI and a mobile phone terminal IMSI, and the identity verification module is specifically configured to:
and carrying out authentication verification on the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI of the user, generating a safety verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI pass the authentication verification, and generating an abnormal verification result if the user name, the password, the mobile phone card IMSI and the mobile phone terminal IMSI do not pass the authentication verification.
7. The short message-based machine room security management system according to claim 6, wherein the control module is specifically configured to:
and acquiring the control instruction sent by the user side, analyzing and checking verification information in the control instruction, and if the verification information passes the check, controlling the machine room equipment according to the control instruction sent by the user side.
8. The short message-based machine room security management system according to claim 7, wherein the control module is further specifically configured to:
and if the verification information does not pass the verification, generating abnormal information.
9. A medium, wherein instructions are stored in the medium, and when the instructions are read by a computer, the computer is caused to execute a short message-based room security management method according to any one of claims 1 to 4.
10. A device comprising the storage medium of claim 9, a processor to execute instructions within the storage medium.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210550426.9A CN115134766A (en) | 2022-05-18 | 2022-05-18 | Short message-based machine room safety management method, system, medium and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210550426.9A CN115134766A (en) | 2022-05-18 | 2022-05-18 | Short message-based machine room safety management method, system, medium and equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115134766A true CN115134766A (en) | 2022-09-30 |
Family
ID=83376101
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210550426.9A Pending CN115134766A (en) | 2022-05-18 | 2022-05-18 | Short message-based machine room safety management method, system, medium and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115134766A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101482987A (en) * | 2009-01-19 | 2009-07-15 | 苏州工业园区新海宜电信发展股份有限公司 | Central control and management method for outdoor communication machine room door based on communication network |
CN103458407A (en) * | 2013-07-29 | 2013-12-18 | 北京盛世光明软件股份有限公司 | Internet account number login management system and method based on short message |
CN105703921A (en) * | 2014-11-24 | 2016-06-22 | 甘肃省科学技术情报研究所 | Device and method of remotely controlling server by using mobile phone short message |
CN106790267A (en) * | 2017-02-13 | 2017-05-31 | 郑州云海信息技术有限公司 | A kind of method and apparatus of access server operating system |
CN107786573A (en) * | 2017-11-09 | 2018-03-09 | 张昭 | A kind of data verification system |
-
2022
- 2022-05-18 CN CN202210550426.9A patent/CN115134766A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101482987A (en) * | 2009-01-19 | 2009-07-15 | 苏州工业园区新海宜电信发展股份有限公司 | Central control and management method for outdoor communication machine room door based on communication network |
CN103458407A (en) * | 2013-07-29 | 2013-12-18 | 北京盛世光明软件股份有限公司 | Internet account number login management system and method based on short message |
CN105703921A (en) * | 2014-11-24 | 2016-06-22 | 甘肃省科学技术情报研究所 | Device and method of remotely controlling server by using mobile phone short message |
CN106790267A (en) * | 2017-02-13 | 2017-05-31 | 郑州云海信息技术有限公司 | A kind of method and apparatus of access server operating system |
CN107786573A (en) * | 2017-11-09 | 2018-03-09 | 张昭 | A kind of data verification system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2579220A1 (en) | Entrance guard control method and system thereof | |
CN110011848B (en) | Mobile operation and maintenance auditing system | |
CN104636682A (en) | Password management system and method based on hardware device | |
CN110213247A (en) | A kind of method and system improving pushed information safety | |
CN102546240B (en) | Network communication method, network communicating system and network communication device | |
CN102957701A (en) | Method and system for verifying telnet server brute force attack prevention | |
CN113674455A (en) | Intelligent door lock remote control method, device, system, equipment and storage medium | |
CN106911744A (en) | The management method and managing device of a kind of image file | |
US11068579B2 (en) | Method and system of performing an authorization mechanism between a service terminal system and a helpdesk system | |
CN114139176A (en) | Industrial internet core data protection method and system based on state secret | |
CN115134766A (en) | Short message-based machine room safety management method, system, medium and equipment | |
CN105391741A (en) | Access device safety control method, device and system | |
CN115840937B (en) | Control method and device and electronic equipment | |
CN116346423A (en) | Client data multiple encryption system and method in intelligent Internet of things energy system | |
CN105491118B (en) | A kind of avionics Ethernet data loading system | |
CN112738103B (en) | Information verification method and device and electronic equipment | |
KR20190098863A (en) | System of collecting manufacturing facilities data and controlling the manufacturing facilities using iot communication with smart phone | |
CN113704061A (en) | Secret-related computer protection system | |
CN112084485A (en) | Data acquisition method, device, equipment and computer storage medium | |
CN108123957B (en) | Multi-mode authentication method and device for logging in virtual private network server | |
US9053301B2 (en) | Method for logging in to computer, information processing apparatus and computer-readable information recording medium | |
CN110807181A (en) | Method, device and system for logging in and verifying database in enterprise | |
CN112699396B (en) | Information security method, device, system and storage medium of instant communication software | |
CN110650057A (en) | Method and system for configuring equipment through portable mobile terminal | |
CN115865529B (en) | Control method and device of embedded communication bus, terminal equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20220930 |
|
RJ01 | Rejection of invention patent application after publication |