A kind of access control management method for computer roomTechnical field
The present invention relates to electrical equipment technical field, especially a kind of access control management method for computer room.
Background technique
The power equipments such as power distribution control cabinet, switchgear in existing market machine room upper, can not be right when being safeguardedMaintenance personnel carries out authentication;And maintenance information can not timely and effectively be communicated to flexecutive.
Summary of the invention
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of access control management method for computer room, gramThe problem of taking traditional machine room entrance guard management absent-mindedness, cannot achieve subsequent retrospect, the application uses multi-mode management, is weighed by multistageLimit distribution and verifying are avoided that layabout's malice swarms into computer room, can record to the unlatching each time of computer room, be able to achieve rootGate inhibition's open record is transferred according to timing node or claimant.
The purpose of the present invention is achieved through the following technical solutions:
A kind of access control management method for computer room, the access control management method include:
The pattern information of entrance guard management is obtained, the pattern information includes operating mode, vacation mode, prevents mode and open mouldFormula;
Enabling solicited message, and the biological information of checking request people and the authority information for comparing claimant are obtained, is such as requestedThe permission of people meets the jurisdictions mandate of present mode, then sends door open command to access controller, and otherwise refusal sends to open the door and refer toIt enables.
Preferably, the pattern information of gate inhibition is set specifically:
Operating mode, the permission for the claimant that need to open the door meet minimum jurisdictions mandate of entering;
Vacation mode, the permission for the claimant that need to open the door meet the second level and enter jurisdictions mandate;
Prevent mode, the permission for the claimant that need to open the door meets the superlative degree and enters jurisdictions mandate;
Open mode does not need the authority information of verifying enabling claimant.
Preferably, further include the method for editor and distribution request human rights limit, specifically include:
An account is distributed to each claimant that enters;
Corresponding each account distributes a permission of entering, and initially allocated permission of entering is minimum permission of entering;
It is modified by permission of administrator's account to each account.
Preferably, the biological information of checking request people, specifically includes:
By finger print information into comparison;
Verifying is compared by facial image information;
Verifying is compared by voiceprint;
By veinprint information into comparison;
Verifying is compared by iris information.
Preferably, the authority information for comparing claimant, specifically includes:
When claimant's authority information is undesirable, to claimant's display Insufficient privilege;
As claimant malicious operation gate inhibition, the biological characteristic of claimant, and remote alarms are recorded;
Enter when claimant trails, then records the biological characteristic of claimant, and be labeled as exception information, which is uploadedTo Cloud Server.
Preferably, enabling solicited message, and the biological information of checking request people and the permission for comparing claimant are obtainedThe process of information, further include:
The two-dimensional barcode information of checking request people;
The dynamic password information of checking request people;
The static bar code information of checking request people;
The signature object information of checking request people.
Preferably, further include:
Record and count opening time, opening times and the unlatching claimant of access controller;
Dynamic trace back database is established, is transferred in the data in dynamic trace back database according to timing node or claimant's informationHold.
The beneficial effects of the present invention are:
The problem of present invention overcomes traditional machine room entrance guard management to relax, and cannot achieve subsequent retrospect, the application use multi-mode pipeReason is avoided that layabout's malice swarms into computer room, can be carried out to the unlatching each time of computer room by multistage authority distribution and verifyingRecord, is able to achieve and transfers gate inhibition's open record according to timing node or claimant.
Detailed description of the invention
Fig. 1 is the flow chart of access control management method of the present invention.
Specific embodiment
Technical solution of the present invention is described in further detail with reference to the accompanying drawing, but protection scope of the present invention is not limited toIt is as described below.
Embodiment:
A kind of access control management method for computer room, please refers to shown in attached drawing 1, and the access control management method includes:
S1, the pattern information for obtaining entrance guard management, the pattern information include operating mode, vacation mode, prevent mode and openMode playback;
S2, enabling solicited message, and the biological information of checking request people and the authority information for comparing claimant are obtained, such as askedThe permission asked for help meets the jurisdictions mandate of present mode, then sends door open command to access controller, and otherwise refusal, which is sent, opens the doorInstruction.
Preferably, the pattern information of gate inhibition is set specifically:
Operating mode, the permission for the claimant that need to open the door meet minimum jurisdictions mandate of entering;
Vacation mode, the permission for the claimant that need to open the door meet the second level and enter jurisdictions mandate;
Prevent mode, the permission for the claimant that need to open the door meets the superlative degree and enters jurisdictions mandate;
Open mode does not need the authority information of verifying enabling claimant.
Preferably, further include the method for editor and distribution request human rights limit, specifically include:
An account is distributed to each claimant that enters;
Corresponding each account distributes a permission of entering, and initially allocated permission of entering is minimum permission of entering;
It is modified by permission of administrator's account to each account.
Preferably, the biological information of checking request people, specifically includes:
By finger print information into comparison;
Verifying is compared by facial image information;
Verifying is compared by voiceprint;
By veinprint information into comparison;
Verifying is compared by iris information.
Preferably, the authority information for comparing claimant, specifically includes:
When claimant's authority information is undesirable, to claimant's display Insufficient privilege;
As claimant malicious operation gate inhibition, the biological characteristic of claimant, and remote alarms are recorded;
Enter when claimant trails, then records the biological characteristic of claimant, and be labeled as exception information, which is uploadedTo Cloud Server.
Preferably, enabling solicited message, and the biological information of checking request people and the permission for comparing claimant are obtainedThe process of information, further include:
The two-dimensional barcode information of checking request people;
The dynamic password information of checking request people;
The static bar code information of checking request people;
The signature object information of checking request people.
Preferably, further include:
Record and count opening time, opening times and the unlatching claimant of access controller;
Dynamic trace back database is established, is transferred in the data in dynamic trace back database according to timing node or claimant's informationHold.
The present invention uses multi-mode management, by multistage authority distribution and verifying, is avoided that layabout's malice swarms into machineRoom can record the unlatching each time of computer room, be able to achieve and transfer gate inhibition's open record according to timing node or claimant.
A specific embodiment of the invention above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneouslyLimitations on the scope of the patent of the present invention therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the artFor, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the inventionProtect range.