[go: up one dir, main page]

CN111371752A - Remote monitoring method, device, equipment and medium for server - Google Patents

Remote monitoring method, device, equipment and medium for server Download PDF

Info

Publication number
CN111371752A
CN111371752A CN202010110964.7A CN202010110964A CN111371752A CN 111371752 A CN111371752 A CN 111371752A CN 202010110964 A CN202010110964 A CN 202010110964A CN 111371752 A CN111371752 A CN 111371752A
Authority
CN
China
Prior art keywords
client
server
request information
information
remote monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010110964.7A
Other languages
Chinese (zh)
Inventor
冯英华
赵永亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202010110964.7A priority Critical patent/CN111371752A/en
Publication of CN111371752A publication Critical patent/CN111371752A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

本发明公开了一种服务器的远程监控方法,包括:与客户端建立连接,判断是否接收到客户端发送的用于与服务器建立远程访问连接并进行操控的请求信息;如果接收到,则根据预先存储的各客户端对应的权限信息,判断所述请求信息是否符合权限要求;如果不符合,则阻止客户端访问服务器。由此可见,通过判断客户端提出的请求信息是否符合远程访问服务器的权限要求,从而确保只有符合权限要求的请求信息才能正常远程操控服务器,避免了出现越权的情况;保证了远程访问和操控服务器过程的安全性和稳定性,能够更好地满足用户的需求。此外,本发明所提供的一种服务器的远程监控装置、设备及存储介质与上述方法对应。

Figure 202010110964

The invention discloses a remote monitoring method for a server, comprising: establishing a connection with a client, judging whether the request information sent by the client for establishing a remote access connection with the server and performing control is received; The stored permission information corresponding to each client is used to determine whether the request information meets the permission requirements; if not, the client is prevented from accessing the server. It can be seen that by judging whether the request information proposed by the client meets the permission requirements of the remote access server, it is ensured that only the request information that meets the permission requirements can remotely control the server normally, avoiding the situation of unauthorized access; ensuring remote access and control of the server The safety and stability of the process can better meet the needs of users. In addition, a remote monitoring device, device and storage medium for a server provided by the present invention correspond to the above method.

Figure 202010110964

Description

一种服务器的远程监控方法、装置、设备及介质A remote monitoring method, device, equipment and medium for a server

技术领域technical field

本发明涉及服务器访问技术领域,特别是涉及一种服务器的远程监控方法、装置、设备及介质。The present invention relates to the technical field of server access, in particular to a remote monitoring method, device, device and medium for a server.

背景技术Background technique

随着计算机技术的迅猛发展,对服务器的各项性能的要求也越来越严格。BMC是应用于服务器主板上的基板管理控制器,通过这块远程管理卡,管理员可以远程连接服务器,通过浏览器就可以实现对服务器的监控,查看处理器、电源、风扇等关键部件的健康状况,如电压、风扇转速、温度等等,及时了解服务器工作状况,对风险进行预估。为降低服务器管理难度和管理成本,目前常对服务器进行远程监控。With the rapid development of computer technology, the requirements for the performance of servers are becoming more and more strict. BMC is a baseboard management controller applied to the server motherboard. Through this remote management card, administrators can connect to the server remotely, monitor the server through a browser, and check the health of key components such as processors, power supplies, and fans. Status, such as voltage, fan speed, temperature, etc., to know the working status of the server in time, and estimate the risk. In order to reduce the difficulty and cost of server management, remote monitoring of servers is often performed at present.

现有技术中,为实现远程监控服务器的各项工作状态,通过登录访问客户端,然后与应用于服务器主板上的BMC建立通讯连接。让管理员可以不必身处机房,远程就可以实现对服务器进行全面的操控,包括BIOS设置、配置阵列等芯片级别的操作,对于服务器的操控就好像操控本地计算机,直观便捷。In the prior art, in order to realize remote monitoring of various working states of the server, the client is accessed by logging in, and then a communication connection is established with the BMC applied to the server motherboard. It allows administrators to control the server remotely without being in the computer room, including chip-level operations such as BIOS settings and configuration arrays. The control of the server is like controlling the local computer, which is intuitive and convenient.

但是,按照现有技术中的远程监控方法允许任何访客进行访问和操作,容易导致越权操控服务器的情况,降低了对服务器进行远程监控的安全性,用户体验感差。因此,提供一种能够根据用户的访问权限,对服务器进行远程监控的方法成为当前亟待解决的问题。However, according to the remote monitoring method in the prior art, any visitor is allowed to access and operate, which may easily lead to unauthorized manipulation of the server, reduce the security of remote monitoring of the server, and cause poor user experience. Therefore, it is an urgent problem to provide a method for remotely monitoring the server according to the user's access authority.

发明内容SUMMARY OF THE INVENTION

本发明的目的是提供一种服务器的远程监控方法、装置、设备及介质。能够实现客户端在于服务器建立远程访问连接之前,将判断客户端提出的请求信息是否符合远程访问服务器的权限要求,从而确保只有符合权限要求的请求信息才能正常远程操控服务器,避免了出现越权的情况;保证了远程访问和操控服务器过程的安全性和稳定性,能够更好地满足用户的需求。The purpose of the present invention is to provide a remote monitoring method, device, device and medium for a server. It can realize that before the server establishes a remote access connection, the client will judge whether the request information from the client meets the permission requirements of the remote access server, so as to ensure that only the request information that meets the permission requirements can remotely control the server normally, avoiding the situation of unauthorized access. ; Ensure the security and stability of the remote access and control server process, and can better meet the needs of users.

为解决上述技术问题,本发明提供一种服务器的远程监控方法,包括:In order to solve the above-mentioned technical problems, the present invention provides a remote monitoring method for a server, including:

与各客户端建立连接,判断是否接收到所述客户端发送的用于与服务器建立远程访问连接并进行操控的请求信息;Establishing a connection with each client, and judging whether the request information sent by the client for establishing a remote access connection with the server and performing manipulation is received;

如果接收到,则根据预先存储的各客户端对应的权限信息,判断所述请求信息是否符合权限要求;If received, according to the pre-stored permission information corresponding to each client, determine whether the request information meets the permission requirements;

如果不符合,则阻止所述客户端访问所述服务器。If not, the client is blocked from accessing the server.

优选地,所述根据预先存储的各客户端对应的权限信息,判断所述请求信息是否符合权限要求具体包括:Preferably, according to the pre-stored permission information corresponding to each client, determining whether the request information meets the permission requirements specifically includes:

获取所述请求信息中包含的客户端IP及访问任务信息;Obtain the client IP and access task information contained in the request information;

根据所述权限信息,判断所述客户端IP是否具有所述访问任务信息对应的访问权限;According to the permission information, determine whether the client IP has the access permission corresponding to the access task information;

如果是,则说明所述请求信息符合所述权限要求;If yes, it means that the request information meets the permission requirements;

如果否,则说明所述请求信息不符合所述权限要求。If not, it means that the request information does not meet the permission requirement.

优选地,所述客户端具体为KVM客户端。Preferably, the client is specifically a KVM client.

优选地,所述请求信息具体为通过HTTPS算法加密后的加密信息。Preferably, the request information is specifically encrypted information encrypted by the HTTPS algorithm.

优选地,还包括:Preferably, it also includes:

根据接收到的更新信息,添加或删除所述权限信息。According to the received update information, the permission information is added or deleted.

优选地,还包括:Preferably, it also includes:

当所述请求信息不符合所述权限要求时,向发出所述请求信息的客户端发送用于表示请求失败的反馈信息。When the request information does not meet the permission requirement, send feedback information indicating that the request fails to the client that sent the request information.

优选地,还包括:Preferably, it also includes:

记录所述各客户端发送的请求信息中不符合所述权限要求的次数;Record the number of times that the request information sent by each client does not meet the permission requirement;

当所述次数达到预设的告警次数时,生成异常信息以进行告警提示。When the number of times reaches a preset number of alarms, abnormal information is generated to give an alarm prompt.

为解决上述技术问题,本发明还提供一种服务器的远程监控装置,包括:In order to solve the above technical problems, the present invention also provides a remote monitoring device for a server, including:

第一判断模块,用于与客户端建立连接,判断是否接收到所述客户端发送的用于与服务器建立远程访问连接并进行操控的请求信息;如果接收到,则进入第二判断模块;The first judgment module is used to establish a connection with the client, and judge whether to receive the request information sent by the client to establish a remote access connection with the server and perform manipulation; if received, enter the second judgment module;

第二判断模块,用于根据预先存储的各客户端对应的权限信息,判断所述请求信息是否符合权限要求;如果不符合,则进入阻止访问模块;The second judgment module is configured to judge whether the request information meets the authority requirement according to the pre-stored authority information corresponding to each client; if it does not meet the authority requirement, enter the blocking access module;

阻止访问模块,用于阻止所述客户端访问所述服务器。An access blocking module, configured to prevent the client from accessing the server.

为解决上述技术问题,本发明还提供一种服务器的远程监控设备,包括存储器,用于存储计算机程序;In order to solve the above technical problems, the present invention also provides a remote monitoring device for a server, including a memory for storing computer programs;

处理器,用于执行所述计算机程序时实现如上述任一项所述的服务器的远程监控方法的步骤。The processor is configured to implement the steps of the remote monitoring method for a server according to any one of the above when executing the computer program.

为解决上述技术问题,本发明还提供一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现如上述任一项所述的服务器的远程监控方法的步骤。In order to solve the above technical problems, the present invention also provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the server described in any of the above is implemented The steps of the remote monitoring method.

本发明所提供的一种服务器的远程监控方法,包括:与客户端建立连接,判断是否接收到客户端发送的用于与服务器建立远程访问连接并进行操控的请求信息;如果接收到,则根据预先存储的各客户端对应的权限信息,判断所述请求信息是否符合权限要求;如果不符合,则阻止客户端访问服务器。由此可见,客户端在于服务器建立远程访问连接之前,将判断客户端提出的请求信息是否符合远程访问服务器的权限要求,从而确保只有符合权限要求的请求信息才能正常远程操控服务器,避免了出现越权的情况;保证了远程访问和操控服务器过程的安全性和稳定性,能够更好地满足用户的需求。A remote monitoring method for a server provided by the present invention includes: establishing a connection with a client, and judging whether the request information sent by the client for establishing a remote access connection with the server and performing control is received; if received, according to The pre-stored permission information corresponding to each client is used to determine whether the request information meets the permission requirements; if not, the client is prevented from accessing the server. It can be seen that before the server establishes a remote access connection, the client will judge whether the request information from the client meets the permission requirements of the remote access server, so as to ensure that only the request information that meets the permission requirements can remotely control the server normally, avoiding the occurrence of unauthorized access. It ensures the security and stability of the remote access and control server process, and can better meet the needs of users.

此外,本发明所提供的一种服务器的远程监控装置、设备及存储介质与上述方法对应,具有同样的有益效果。In addition, the remote monitoring device, device and storage medium of a server provided by the present invention correspond to the above method and have the same beneficial effects.

附图说明Description of drawings

为了更清楚地说明本发明实施例,下面将对实施例中所需要使用的附图做简单的介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to explain the embodiments of the present invention more clearly, the following will briefly introduce the accompanying drawings that need to be used in the embodiments. Obviously, the accompanying drawings in the following description are only some embodiments of the present invention, which are not relevant to ordinary skills in the art. As far as personnel are concerned, other drawings can also be obtained from these drawings on the premise of no creative work.

图1为本发明实施例提供的一种服务器的远程监控方法的流程图;1 is a flowchart of a remote monitoring method for a server provided by an embodiment of the present invention;

图2为本发明实施例提供的另一种服务器的远程监控方法的流程图;2 is a flowchart of another remote monitoring method for a server provided by an embodiment of the present invention;

图3为本发明实施例提供的一种服务器的远程监控装置的结构图;3 is a structural diagram of a remote monitoring device for a server according to an embodiment of the present invention;

图4为本发明实施例提供的一种服务器的远程监控设备的结构图。FIG. 4 is a structural diagram of a remote monitoring device for a server according to an embodiment of the present invention.

具体实施方式Detailed ways

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下,所获得的所有其他实施例,都属于本发明保护范围。The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work fall within the protection scope of the present invention.

本发明的核心是提供一种服务器的远程监控方法、装置、设备及介质。能够实现客户端在于服务器建立远程访问连接之前,将判断客户端提出的请求信息是否符合远程访问服务器的权限要求,从而确保只有符合权限要求的请求信息才能正常远程操控服务器,避免了出现越权的情况;保证了远程访问和操控服务器过程的安全性和稳定性,能够更好地满足用户的需求。The core of the present invention is to provide a remote monitoring method, device, device and medium for a server. It can realize that before the server establishes a remote access connection, the client will judge whether the request information from the client meets the permission requirements of the remote access server, so as to ensure that only the request information that meets the permission requirements can remotely control the server normally, avoiding the situation of unauthorized access. ; Ensure the security and stability of the remote access and control server process, and can better meet the needs of users.

为了使本技术领域的人员更好地理解本发明方案,下面结合附图和具体实施方式对本发明作进一步的详细说明。In order to make those skilled in the art better understand the solution of the present invention, the present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.

图1为本发明实施例提供的一种服务器的远程监控方法的流程图;如图1所示,本发明实施例提供的一种服务器的远程监控方法,包括步骤S101-步骤S103:FIG. 1 is a flowchart of a remote monitoring method for a server provided by an embodiment of the present invention; as shown in FIG. 1 , a remote monitoring method for a server provided by an embodiment of the present invention includes steps S101-S103:

步骤S101:与客户端建立连接,判断是否接收到客户端发送的用于与服务器建立远程访问连接并进行操控的请求信息;如果接收到,则进入步骤S102;Step S101: establish a connection with the client, and determine whether the request information sent by the client for establishing a remote access connection with the server and performing manipulation is received; if received, proceed to step S102;

在一个实施例中,应用于服务器主板上的BMC预先与各客户端建立通讯连接。在具体实施中,客户端具体为KVM客户端。客户可通过HTML5(超级文本标记语言第五代版本)登录KVM客户端,并控制客户端向BMC发送信息。In one embodiment, the BMC applied to the server motherboard establishes a communication connection with each client in advance. In a specific implementation, the client is specifically a KVM client. Customers can log in to the KVM client through HTML5 (Hyper Text Markup Language 5th Generation Version), and control the client to send information to the BMC.

在具体实施中,当客户想要访问服务器并进行操作时,可通过HTML5登录KVM客户端并向BMC发送用于与服务器建立远程访问连接并进行操控的请求信息。在一个实施例中,请求信息具体为通过HTTPS算法加密后的加密信息。In a specific implementation, when a client wants to access the server and perform operations, he can log in to the KVM client through HTML5 and send request information for establishing a remote access connection with the server and performing manipulations to the BMC. In one embodiment, the request information is specifically encrypted information encrypted by the HTTPS algorithm.

步骤S102:根据预先存储的各客户端对应的权限信息,判断请求信息是否符合权限要求;如果不符合,则进入步骤S103;Step S102: According to the pre-stored permission information corresponding to each client, determine whether the request information meets the permission requirements; if not, proceed to step S103;

步骤S103:阻止客户端访问服务器。Step S103: Prevent the client from accessing the server.

当接收到客户端发送的请求信息后,可根据预先存储的各客户端对应的权限信息,判断请求信息是否符合权限要求。需要说明的是,可在BMC中预先设置配置文件并进行存储,配置文件中包含有各客户端能够访问并操控服务器的权限信息。通过查看配置文件中的权限信息,即可清楚地确定当前发送请求信息的客户端对应的用户,是否具有请求信息相应的操作权限,具有相应的操作权限即为符合权限要求,则允许对服务器进行请求信息对应的操作;若权限信息中并未记录客户对设备对应的用户具有请求信息相应的操作权限,则说明该请求信息不符合权限要求,应阻止发送请求信息的客户端访问服务器。具体地,可通过IPMI指令预先对BMC设置配置文件,并相应地存储权限信息。After receiving the request information sent by the client, it can be determined whether the request information meets the permission requirement according to the pre-stored permission information corresponding to each client. It should be noted that a configuration file can be preset and stored in the BMC, and the configuration file contains permission information that each client can access and manipulate the server. By checking the permission information in the configuration file, you can clearly determine whether the user corresponding to the client currently sending the request information has the corresponding operation authority for the request information. The operation corresponding to the request information; if the authority information does not record that the client has the corresponding operation authority for the request information to the user corresponding to the device, it means that the request information does not meet the authority requirements, and the client sending the request information should be prevented from accessing the server. Specifically, a configuration file can be set for the BMC in advance through the IPMI instruction, and the permission information is stored accordingly.

在一个实施例中,根据预先存储的各客户端对应的权限信息,判断请求信息是否符合权限要求具体包括:In one embodiment, according to pre-stored permission information corresponding to each client, determining whether the request information meets the permission requirements specifically includes:

获取请求信息中包含的客户端IP及访问任务信息;Obtain the client IP and access task information contained in the request information;

根据权限信息,判断客户端IP是否具有访问任务信息对应的访问权限;According to the permission information, determine whether the client IP has the access permission corresponding to the access task information;

如果是,则说明请求信息符合权限要求;If yes, it means that the requested information meets the permission requirements;

如果否,则说明请求信息不符合权限要求。If not, the requested information does not meet the permission requirements.

具体地,请求信息中包括客户端IP、用于表示请求对服务器进行的操作任务的内容的访问任务信息。在具体实施中,BMC存储的配置文件中预先设定了各客户端IP及包含各客户端IP对应的访问权限的权限信息。当接收到请求信息后,可获取请求信息中包含的客户端IP和访问任务信息,在权限信息中获取该客户端IP对应的访问权限并判断该客户端IP是否具有访问任务信息中对应的访问权限,如果是,则说明服务器允许该客户端进行请求信息中的访问操作,请求信息符合权限要求;如果否,则说明该客户端并没有进行请求信息中的访问操作的权限,该请求信息不符合权限要求,属于越权操作。Specifically, the request information includes the client IP and access task information used to indicate the content of the operation task requested to be performed on the server. In a specific implementation, each client IP and authority information including access authority corresponding to each client IP are preset in the configuration file stored by the BMC. After receiving the request information, the client IP and access task information contained in the request information can be obtained, the access authority corresponding to the client IP can be obtained in the permission information, and it can be judged whether the client IP has the corresponding access in the access task information. permission, if yes, it means that the server allows the client to perform the access operation in the request information, and the request information meets the permission requirements; if not, it means that the client does not have the permission to perform the access operation in the request information, and the request information does not It meets the permission requirements and is an unauthorized operation.

在另一实施例中,请求信息还可以为包括客户端IP、访问任务信息、及客户端标识的信息。一个客户端标识只能对应一个客户端IP。并且,BMC存储的配置文件中也可为预先设定了各客户端标识及包含各客户端标识对应的访问权限的权限信息。In another embodiment, the request information may also be information including client IP, access task information, and client identification. A client ID can only correspond to one client IP. In addition, the configuration file stored by the BMC may also be preset with each client identifier and authority information including the access authority corresponding to each client identifier.

在具体实施中,根据预先存储的各客户端对应的权限信息,判断请求信息是否符合权限要求具体包括:In a specific implementation, according to the pre-stored permission information corresponding to each client, judging whether the request information meets the permission requirements specifically includes:

获取请求信息中包含的客户端标识及访问任务信息;Obtain the client identification and access task information contained in the request information;

根据权限信息,判断客户端标识是否具有访问任务信息对应的访问权限;According to the permission information, determine whether the client ID has the access permission corresponding to the access task information;

如果是,则说明请求信息符合权限要求;If yes, it means that the requested information meets the permission requirements;

如果否,则说明请求信息不符合权限要求。If not, the requested information does not meet the permission requirements.

本发明所提供的一种服务器的远程监控方法,包括:与客户端建立连接,判断是否接收到客户端发送的用于与服务器建立远程访问连接并进行操控的请求信息;如果接收到,则根据预先存储的各客户端对应的权限信息,判断所述请求信息是否符合权限要求;如果不符合,则阻止客户端访问服务器。由此可见,客户端在于服务器建立远程访问连接之前,将判断客户端提出的请求信息是否符合远程访问服务器的权限要求,从而确保只有符合权限要求的请求信息才能正常远程操控服务器,避免了出现越权的情况;保证了远程访问和操控服务器过程的安全性和稳定性,能够更好地满足用户的需求。A remote monitoring method for a server provided by the present invention includes: establishing a connection with a client, and judging whether the request information sent by the client for establishing a remote access connection with the server and performing control is received; if received, according to The pre-stored permission information corresponding to each client is used to determine whether the request information meets the permission requirements; if not, the client is prevented from accessing the server. It can be seen that before the server establishes a remote access connection, the client will judge whether the request information from the client meets the permission requirements of the remote access server, so as to ensure that only the request information that meets the permission requirements can remotely control the server normally, avoiding the occurrence of unauthorized access. It ensures the security and stability of the remote access and control server process, and can better meet the needs of users.

图2为本发明实施例提供的另一种服务器的远程监控方法的流程图;如图2所示,在一个实施例中,本发明提供的服务器的远程监控方法,还包括步骤S104:FIG. 2 is a flowchart of another remote monitoring method for a server provided by an embodiment of the present invention; as shown in FIG. 2 , in one embodiment, the remote monitoring method for a server provided by the present invention further includes step S104:

步骤S104:根据接收到的更新信息,添加或删除权限信息。Step S104: According to the received update information, add or delete authority information.

具体地,对服务器进行远程监控的客户端可能不断的增加或减少。当客户端发生变化时,则需要相应的更新预先存储在配置文件中的权限信息。可通过IPMI指令向BMC发送更新信息,根据接收到的更新信息对配置文件中的权限信息进行添加或减少操作,从而完成权限信息的更新。保证了存储的权限信息的时效性,更好地满足了用户的需求。Specifically, the number of clients remotely monitoring the server may increase or decrease continuously. When the client changes, the permission information pre-stored in the configuration file needs to be updated accordingly. The update information can be sent to the BMC through the IPMI instruction, and the permission information in the configuration file can be added or reduced according to the received update information, thereby completing the update of the permission information. This ensures the timeliness of the stored permission information and better meets the needs of users.

在一个实施例中,本发明提供的服务器的远程监控方法,还包括步骤S105:In one embodiment, the remote monitoring method for a server provided by the present invention further includes step S105:

步骤S105:当请求信息不符合权限要求时,向发出请求信息的客户端发送用于表示请求失败的反馈信息。Step S105: When the request information does not meet the permission requirements, send feedback information indicating that the request fails to the client that sent the request information.

具体地,当确定请求信息不符合权限要求,并阻止该客户端访问服务器后,可生成用于表示请求失败的反馈信息发送至客户端,增加用户体验感。Specifically, when it is determined that the request information does not meet the permission requirements and the client is blocked from accessing the server, feedback information indicating that the request fails can be generated and sent to the client to increase user experience.

在一个实施例中,本发明提供的服务器的远程监控方法,还包括步骤S106-步骤S107:In one embodiment, the remote monitoring method for a server provided by the present invention further includes steps S106-S107:

步骤S106:记录各客户端发送的请求信息中不符合权限要求的次数;Step S106: record the number of times that the request information sent by each client does not meet the permission requirements;

步骤S107:当所述次数达到预设的告警次数时,生成异常信息以进行告警提示。Step S107: When the number of times reaches a preset number of alarms, generate abnormality information to give an alarm prompt.

具体地,当同一个客户端发送的请求信息多次不符合权限要求时,可能为恶意的访问,为保护服务器的信息安全。可记录各客户端发送的请求信息中不符合权限要求的次数,并与预先设定告警次数进行对比,当记录的次数达告警次数时,生成异常信息进行告警提示。例如,告警次数为10次,当记录的同一个客户端发送的请求信息不符合权限要求的次数为10次时,则生成异常信息进行告警提示。从而便于运维人员发现异常并及时处理,保证了服务器的正常工作。Specifically, when the request information sent by the same client fails to meet the permission requirements for many times, it may be malicious access, in order to protect the information security of the server. It can record the number of times that the request information sent by each client does not meet the permission requirements, and compare it with the preset number of alarms. When the number of records reaches the number of alarms, abnormal information is generated to give an alarm prompt. For example, if the number of alarms is 10 times, when the recorded number of times that the request information sent by the same client does not meet the permission requirements is 10 times, abnormal information will be generated to give an alarm prompt. Therefore, it is convenient for operation and maintenance personnel to find abnormalities and deal with them in time, ensuring the normal operation of the server.

本发明还提供一种服务器的远程监控装置和服务器的远程监控设备对应的实施例。需要说明的是,本发明从两个角度对实施例进行描述,一种是基于功能模块的角度,另一种是基于硬件的角度。The present invention also provides the corresponding embodiments of the remote monitoring device of the server and the remote monitoring device of the server. It should be noted that the present invention describes the embodiments from two perspectives, one is based on a functional module perspective, and the other is based on a hardware perspective.

图3为本发明实施例提供的一种服务器的远程监控装置的结构图;如图3所示,本发明实施例提供的一种服务器的远程监控装置,包括:FIG. 3 is a structural diagram of a remote monitoring device for a server provided by an embodiment of the present invention; as shown in FIG. 3 , a remote monitoring device for a server provided by an embodiment of the present invention includes:

第一判断模块10,用于与客户端建立连接,判断是否接收到客户端发送的用于与服务器建立远程访问连接并进行操控的请求信息;如果接收到,则进入第二判断模块;The first judging module 10 is used to establish a connection with the client, and judge whether the request information sent by the client for establishing a remote access connection with the server and performing manipulation is received; if received, enter the second judging module;

第二判断模块11,用于根据预先存储的各客户端对应的权限信息,判断请求信息是否符合权限要求;如果不符合,则进入阻止访问模块;The second judgment module 11 is used to judge whether the request information meets the authority requirement according to the authority information corresponding to each client stored in advance; if not, enter the block access module;

阻止访问模块12,用于阻止客户端访问服务器。The blocking access module 12 is used to block the client from accessing the server.

在一个实施例中,本发明提供的服务器的远程监控装置,还包括:In one embodiment, the remote monitoring device for a server provided by the present invention further includes:

更新模块,用于根据接收到的更新信息,添加或删除权限信息。The update module is used to add or delete permission information according to the received update information.

在一个实施例中,本发明提供的服务器的远程监控装置,还包括:In one embodiment, the remote monitoring device for a server provided by the present invention further includes:

反馈模块,用于当请求信息不符合权限要求时,向发出请求信息的客户端发送用于表示请求失败的反馈信息。The feedback module is used to send feedback information indicating that the request fails to the client that sends the request information when the request information does not meet the permission requirements.

在一个实施例中,本发明提供的服务器的远程监控装置,还包括:In one embodiment, the remote monitoring device for a server provided by the present invention further includes:

记录模块,用于记录各客户端发送的请求信息中不符合权限要求的次数;The recording module is used to record the number of times that the request information sent by each client does not meet the permission requirements;

告警模块,用于当所述次数达到预设的告警次数时,生成异常信息以进行告警提示。The alarm module is configured to generate abnormal information to prompt an alarm when the number of times reaches a preset number of alarms.

由于本部分的实施例与方法部分的实施例相互对应,因此本部分的实施例请参见方法部分的实施例的描述,这里暂不赘述。Since the embodiments in this part correspond to the embodiments in the method part, the embodiments in this part refer to the description of the embodiments in the method part, and details are not described here for the time being.

本发明所提供的一种服务器的远程监控装置,与客户端建立连接,判断是否接收到客户端发送的用于与服务器建立远程访问连接并进行操控的请求信息;如果接收到,则根据预先存储的各客户端对应的权限信息,判断所述请求信息是否符合权限要求;如果不符合,则阻止客户端访问服务器。由此可见,客户端在于服务器建立远程访问连接之前,将判断客户端提出的请求信息是否符合远程访问服务器的权限要求,从而确保只有符合权限要求的请求信息才能正常远程操控服务器,避免了出现越权的情况;保证了远程访问和操控服务器过程的安全性和稳定性,能够更好地满足用户的需求。A remote monitoring device for a server provided by the present invention establishes a connection with a client, and determines whether the request information sent by the client for establishing a remote access connection with the server and performing control is received; if received, according to the pre-stored request information The permission information corresponding to each client is judged whether the request information meets the permission requirements; if not, the client is prevented from accessing the server. It can be seen that before the server establishes a remote access connection, the client will judge whether the request information from the client meets the permission requirements of the remote access server, so as to ensure that only the request information that meets the permission requirements can remotely control the server normally, avoiding the occurrence of unauthorized access. It ensures the security and stability of the remote access and control server process, and can better meet the needs of users.

图4为本发明实施例提供的一种服务器的远程监控设备的结构图。如图4所示,本发明实施例提供的一种服务器的远程监控设备,包括存储器20,用于存储计算机程序;FIG. 4 is a structural diagram of a remote monitoring device for a server according to an embodiment of the present invention. As shown in FIG. 4 , a remote monitoring device for a server provided by an embodiment of the present invention includes a memory 20 for storing a computer program;

处理器21,用于执行计算机程序时实现如上述任一项的服务器的远程监控方法的步骤。The processor 21 is configured to implement the steps of the remote monitoring method for a server according to any one of the above when executing the computer program.

其中,处理器21可以包括一个或多个处理核心,比如4核心处理器、8核心处理器等。处理器21可以采用DSP(Digital Signal Processing,数字信号处理)、FPGA(Field-Programmable Gate Array,现场可编程门阵列)、PLA(Programmable Logic Array,可编程逻辑阵列)中的至少一种硬件形式来实现。处理器21也可以包括主处理器和协处理器,主处理器是用于对在唤醒状态下的数据进行处理的处理器,也称CPU(Central ProcessingUnit,中央处理器);协处理器是用于对在待机状态下的数据进行处理的低功耗处理器。在一些实施例中,处理器21可以在集成有GPU(Graphics Processing Unit,图像处理器),GPU用于负责显示屏所需要显示的内容的渲染和绘制。一些实施例中,处理器21还可以包括AI(Artificial Intelligence,人工智能)处理器,该AI处理器用于处理有关机器学习的计算操作。The processor 21 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and the like. The processor 21 may use at least one hardware form among DSP (Digital Signal Processing, digital signal processing), FPGA (Field-Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array, programmable logic array) accomplish. The processor 21 may also include a main processor and a coprocessor. The main processor is a processor used to process data in the wake-up state, also called a CPU (Central Processing Unit, central processing unit); A low-power processor for processing data in a standby state. In some embodiments, the processor 21 may be integrated with a GPU (Graphics Processing Unit, image processor), and the GPU is used for rendering and drawing the content that needs to be displayed on the display screen. In some embodiments, the processor 21 may further include an AI (Artificial Intelligence, artificial intelligence) processor, where the AI processor is used to process computing operations related to machine learning.

存储器20可以包括一个或多个计算机可读存储介质,该计算机可读存储介质可以是非暂态的。存储器20还可包括高速随机存取存储器,以及非易失性存储器,比如一个或多个磁盘存储设备、闪存存储设备。本实施例中,存储器20至少用于存储以下计算机程序201,其中,该计算机程序被处理器21加载并执行之后,能够实现前述任一实施例公开的服务器的远程监控方法中的相关步骤。另外,存储器20所存储的资源还可以包括操作系统202和数据203等,存储方式可以是短暂存储或者永久存储。其中,操作系统202可以包括Windows、Unix、Linux等。Memory 20 may include one or more computer-readable storage media, which may be non-transitory. Memory 20 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash storage devices. In this embodiment, the memory 20 is at least used to store the following computer program 201, where, after the computer program is loaded and executed by the processor 21, it can implement the relevant steps in the remote monitoring method for a server disclosed in any of the foregoing embodiments. In addition, the resources stored in the memory 20 may also include an operating system 202, data 203, etc., and the storage mode may be short-term storage or permanent storage. The operating system 202 may include Windows, Unix, Linux, and the like.

在一些实施例中,服务器的远程监控设备还可包括有输入输出接口22、通信接口23、电源24以及通信总线25。In some embodiments, the remote monitoring device of the server may further include an input/output interface 22 , a communication interface 23 , a power supply 24 and a communication bus 25 .

本领域技术人员可以理解,图4中示出的结构并不构成对服务器的远程监控设备的限定,可以包括比图示更多或更少的组件。Those skilled in the art can understand that the structure shown in FIG. 4 does not constitute a limitation on the remote monitoring device of the server, and may include more or less components than those shown in the drawings.

由于设备部分的实施例与方法部分的实施例相互对应,因此设备部分的实施例请参见方法部分的实施例的描述,这里暂不赘述。在本发明的一些实施例中,处理器和存储器可通过总线或其它方式连接。Since the embodiments of the device part and the embodiments of the method part correspond to each other, the embodiments of the device part refer to the description of the embodiments of the method part, which will not be repeated here. In some embodiments of the invention, the processor and memory may be connected by a bus or otherwise.

本发明所提供的一种服务器的远程监控设备,能够实现如下方法:与客户端建立连接,判断是否接收到客户端发送的用于与服务器建立远程访问连接并进行操控的请求信息;如果接收到,则根据预先存储的各客户端对应的权限信息,判断所述请求信息是否符合权限要求;如果不符合,则阻止客户端访问服务器。由此可见,客户端在于服务器建立远程访问连接之前,将判断客户端提出的请求信息是否符合远程访问服务器的权限要求,从而确保只有符合权限要求的请求信息才能正常远程操控服务器,避免了出现越权的情况;保证了远程访问和操控服务器过程的安全性和稳定性,能够更好地满足用户的需求。The remote monitoring device for a server provided by the present invention can implement the following method: establishing a connection with a client, and judging whether the request information sent by the client for establishing a remote access connection with the server and performing control is received; , then according to the pre-stored permission information corresponding to each client, it is judged whether the request information meets the permission requirement; if not, the client is prevented from accessing the server. It can be seen that before the server establishes a remote access connection, the client will judge whether the request information from the client meets the permission requirements of the remote access server, so as to ensure that only the request information that meets the permission requirements can remotely control the server normally, avoiding the occurrence of unauthorized access. It ensures the security and stability of the remote access and control server process, and can better meet the needs of users.

最后,本发明还提供一种计算机可读存储介质对应的实施例。计算机可读存储介质上存储有计算机程序,计算机程序被处理器执行时实现如上述方法实施例中记载的步骤。Finally, the present invention also provides an embodiment corresponding to a computer-readable storage medium. A computer program is stored on the computer-readable storage medium, and when the computer program is executed by the processor, the steps described in the foregoing method embodiments are implemented.

可以理解的是,如果上述实施例中的方法以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。It can be understood that, if the methods in the above embodiments are implemented in the form of software functional units and sold or used as independent products, they may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present invention is essentially or the part that contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , execute all or part of the steps of the methods described in the various embodiments of the present invention. The aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program codes .

本发明所提供的一种计算机可读存储介质,被处理器执行时能够实现如下方法:与客户端建立连接,判断是否接收到客户端发送的用于与服务器建立远程访问连接并进行操控的请求信息;如果接收到,则根据预先存储的各客户端对应的权限信息,判断所述请求信息是否符合权限要求;如果不符合,则阻止客户端访问服务器。由此可见,客户端在于服务器建立远程访问连接之前,将判断客户端提出的请求信息是否符合远程访问服务器的权限要求,从而确保只有符合权限要求的请求信息才能正常远程操控服务器,避免了出现越权的情况;保证了远程访问和操控服务器过程的安全性和稳定性,能够更好地满足用户的需求。A computer-readable storage medium provided by the present invention can implement the following method when executed by a processor: establishing a connection with a client, and judging whether a request sent by the client for establishing a remote access connection with a server and performing manipulation is received. information; if received, determine whether the request information meets the permission requirements according to the pre-stored permission information corresponding to each client; if not, prevent the client from accessing the server. It can be seen that before the server establishes a remote access connection, the client will judge whether the request information from the client meets the permission requirements of the remote access server, so as to ensure that only the request information that meets the permission requirements can remotely control the server normally, avoiding the occurrence of unauthorized access. It ensures the security and stability of the remote access and control server process, and can better meet the needs of users.

以上对本发明所提供的一种服务器的远程监控方法、装置、设备及介质。进行了详细介绍。说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似部分互相参见即可。对于实施例公开的装置而言,由于其与实施例公开的方法相对应,所以描述的比较简单,相关之处参见方法部分说明即可。应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以对本发明进行若干改进和修饰,这些改进和修饰也落入本发明权利要求的保护范围内。The above is a remote monitoring method, device, device and medium for a server provided by the present invention. described in detail. The various embodiments in the specification are described in a progressive manner, and each embodiment focuses on the differences from other embodiments, and the same and similar parts between the various embodiments can be referred to each other. As for the device disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the relevant part can be referred to the description of the method. It should be pointed out that for those skilled in the art, without departing from the principle of the present invention, several improvements and modifications can also be made to the present invention, and these improvements and modifications also fall within the protection scope of the claims of the present invention.

还需要说明的是,在本说明书中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。It should also be noted that, in this specification, relational terms such as first and second, etc. are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply these entities or operations. There is no such actual relationship or sequence between operations. Moreover, the terms "comprising", "comprising" or any other variation thereof are intended to encompass a non-exclusive inclusion such that a process, method, article or device that includes a list of elements includes not only those elements, but also includes not explicitly listed or other elements inherent to such a process, method, article or apparatus. Without further limitation, an element qualified by the phrase "comprising a..." does not preclude the presence of additional identical elements in a process, method, article or apparatus that includes the element.

Claims (10)

1. A remote monitoring method for a server is characterized by comprising the following steps:
establishing connection with each client, and judging whether request information which is sent by the client and used for establishing remote access connection with a server and carrying out operation and control is received;
if so, judging whether the request information meets the authority requirement according to the prestored authority information corresponding to each client;
if not, the client is prevented from accessing the server.
2. The remote monitoring method for the server according to claim 1, wherein the determining whether the request information meets the permission requirement according to the pre-stored permission information corresponding to each client specifically comprises:
acquiring a client IP and access task information contained in the request information;
judging whether the client IP has an access authority corresponding to the access task information or not according to the authority information;
if yes, the request information is proved to meet the authority requirement;
if not, the request information is not in accordance with the authority requirement.
3. The method for remote monitoring of a server according to claim 1, wherein the client is specifically a KVM client.
4. The method for remotely monitoring a server according to claim 1, wherein the request message is an encrypted message encrypted by HTTPS algorithm.
5. The remote monitoring method of the server according to claim 1, further comprising:
and adding or deleting the authority information according to the received updating information.
6. The remote monitoring method of the server according to claim 1, further comprising:
and when the request information does not meet the authority requirement, sending feedback information for indicating request failure to the client sending the request information.
7. The remote monitoring method of the server according to claim 1, further comprising:
recording the times of the request information sent by each client which does not meet the authority requirement;
and when the frequency reaches the preset alarm frequency, generating abnormal information to carry out alarm prompt.
8. A remote monitoring apparatus for a server, comprising:
the first judgment module is used for establishing connection with a client and judging whether request information which is sent by the client and used for establishing remote access connection with a server and carrying out operation and control is received; if the data is received, entering a second judgment module;
the second judgment module is used for judging whether the request information meets the authority requirement or not according to the prestored authority information corresponding to each client; if not, entering a block access module;
and the access preventing module is used for preventing the client from accessing the server.
9. A remote monitoring apparatus of a server, comprising a memory for storing a computer program;
processor for implementing the steps of the method for remote monitoring of a server according to any of claims 1 to 7 when executing said computer program.
10. A computer-readable storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, carries out the steps of the method for remote monitoring of a server according to any one of claims 1 to 7.
CN202010110964.7A 2020-02-21 2020-02-21 Remote monitoring method, device, equipment and medium for server Withdrawn CN111371752A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010110964.7A CN111371752A (en) 2020-02-21 2020-02-21 Remote monitoring method, device, equipment and medium for server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010110964.7A CN111371752A (en) 2020-02-21 2020-02-21 Remote monitoring method, device, equipment and medium for server

Publications (1)

Publication Number Publication Date
CN111371752A true CN111371752A (en) 2020-07-03

Family

ID=71210105

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010110964.7A Withdrawn CN111371752A (en) 2020-02-21 2020-02-21 Remote monitoring method, device, equipment and medium for server

Country Status (1)

Country Link
CN (1) CN111371752A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111245656A (en) * 2020-01-10 2020-06-05 浪潮商用机器有限公司 Method and system for remote monitoring through mobile equipment
CN113127823A (en) * 2021-03-26 2021-07-16 山东英信计算机技术有限公司 Method, system and medium for managing local serial port login and authority
CN113286116A (en) * 2020-12-28 2021-08-20 常熟昊虞电子信息科技有限公司 Information prompting method and device for monitoring security management and cloud server
CN113765712A (en) * 2021-08-26 2021-12-07 浪潮电子信息产业股份有限公司 Server management method and device, electronic equipment and readable storage medium
CN114826693A (en) * 2022-04-07 2022-07-29 中通服创立信息科技有限责任公司 Data interaction method, device and medium

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111245656A (en) * 2020-01-10 2020-06-05 浪潮商用机器有限公司 Method and system for remote monitoring through mobile equipment
CN111245656B (en) * 2020-01-10 2023-04-07 浪潮商用机器有限公司 Method and system for remote monitoring through mobile equipment
CN113286116A (en) * 2020-12-28 2021-08-20 常熟昊虞电子信息科技有限公司 Information prompting method and device for monitoring security management and cloud server
CN113286116B (en) * 2020-12-28 2022-08-02 常熟昊虞电子信息科技有限公司 Information prompting method and device for monitoring security management and cloud server
CN113127823A (en) * 2021-03-26 2021-07-16 山东英信计算机技术有限公司 Method, system and medium for managing local serial port login and authority
CN113127823B (en) * 2021-03-26 2022-06-07 山东英信计算机技术有限公司 A management method, system and medium for local serial port login and authority
CN113765712A (en) * 2021-08-26 2021-12-07 浪潮电子信息产业股份有限公司 Server management method and device, electronic equipment and readable storage medium
CN113765712B (en) * 2021-08-26 2024-05-31 浪潮电子信息产业股份有限公司 Server management method, device, electronic device and readable storage medium
CN114826693A (en) * 2022-04-07 2022-07-29 中通服创立信息科技有限责任公司 Data interaction method, device and medium

Similar Documents

Publication Publication Date Title
CN111371752A (en) Remote monitoring method, device, equipment and medium for server
US9921819B2 (en) Persistent mobile device enrollment
CN110943860B (en) BMC (baseboard management controller) firmware updating method and system, electronic equipment and storage medium
US10938859B2 (en) Managing privileged system access based on risk assessment
US9940466B2 (en) Computer-implemented command control in information technology service environment
US11271746B2 (en) Component commissioning to IoT hub using permissioned blockchain
JP6637940B2 (en) Forced encryption on connected devices
CN106341381A (en) Method and system for managing security keys of rack server system
JP2021500656A (en) User selection key authentication
WO2020000758A1 (en) Server acceptance method and apparatus, computer device, and storage medium
CN117280327A (en) Detecting data center large scale interruptions through near real time/offline data using machine learning models
CN109583199A (en) A kind of access auditing method, system, equipment and the medium of storage management system
WO2021158274A1 (en) Method and system for protecting privacy of users in session recordings
CN110221910B (en) Method and apparatus for performing MPI jobs
US11170080B2 (en) Enforcing primary and secondary authorization controls using change control record identifier and information
CN113626133B (en) Virtual machine control method, device, equipment and computer readable storage medium
WO2025056036A1 (en) Key management method, apparatus, and system, device, and storage medium
CN111381850B (en) BIOS firmware upgrading method, device, equipment and medium
CN106161592B (en) A kind of method and device realizing remote command and executing
CN110362983B (en) Method and device for ensuring consistency of dual-domain system and electronic equipment
CN110262837A (en) Server remote method for restarting, device, equipment and storage medium based on management
US12182279B2 (en) Techniques for providing security-related information
CN113114693B (en) Account state display method and device
TWI858438B (en) Bios setup menu access method
US20160105443A1 (en) Resource access

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20200703