Search

CN-122020680-A - Data processing method, device, electronic equipment and storage medium

CN122020680ACN 122020680 ACN122020680 ACN 122020680ACN-122020680-A

Abstract

The invention provides a data processing method, a device, electronic equipment and a storage medium, wherein the method comprises the steps that a baseboard management controller acquires a permission code in response to the fact that the type of a received operation instruction is a first type, the baseboard management controller verifies the permission code, if the permission code is verified, the baseboard management controller executes operation corresponding to the operation instruction, records an operation user identifier corresponding to the operation instruction, an auditing equipment identifier corresponding to the permission code, operation time and the operation, wherein the electronic equipment corresponding to the operation user and the auditing equipment are different electronic equipment, the permission code is data generated by the auditing equipment based on a time window and a secret key, and is transmitted to the electronic equipment corresponding to the operation user after confirming the permission of the operation user.

Inventors

  • ZHOU QING
  • CHEN KUN
  • YAO JIE
  • LIN TINGTING

Assignees

  • 联想(北京)有限公司

Dates

Publication Date
20260512
Application Date
20251224

Claims (10)

  1. 1. A method of data processing, the method comprising: Responding to the received operation instruction of a first type, and acquiring an authority code by the baseboard management controller; The baseboard management controller verifies the authority code, if the authority code passes the verification, the baseboard management controller executes the operation corresponding to the operation instruction, and records the operation user identifier corresponding to the operation instruction, the auditing equipment identifier corresponding to the authority code, the operation time and the operation; The authority codes are data generated by the auditing equipment based on a time window and a secret key, and are transmitted to the electronic equipment corresponding to the operation user after confirming the authority of the operation user.
  2. 2. The method of claim 1, the method further comprising: the baseboard management controller creates a first user, and the authority of the first user comprises the permission of an operation user to realize a first type of operation; the baseboard management controller determines a secret key corresponding to the first user and transmits the secret key to the auditing equipment; the auditing equipment periodically generates a permission code based on a current time window and the secret key; Wherein, the authority codes are effective in corresponding time windows, and each time window corresponds to one authority code; and the auditing equipment executes the authority of the first user.
  3. 3. The method of claim 2, the transmitting the key to the auditing device, comprising one of: the baseboard management controller transmits the secret key to the auditing equipment through a network; The baseboard management controller transmits the secret key to the auditing equipment through a cable; and the baseboard management controller generates a bar code based on the secret key, and the auditing equipment acquires and identifies the bar code based on the image acquisition device.
  4. 4. The method of claim 1, the method further comprising: The operation user inputs an operation user identification and a password; And the baseboard management controller verifies the operation user identifier and the corresponding password, and allows the operation user to log in the baseboard management controller in response to the verification success.
  5. 5. The method of claim 1, the baseboard management controller obtaining a permission code comprising one of: The baseboard management controller obtains the permission code based on external equipment; The baseboard management controller obtains the authority code based on a network; The baseboard management controller obtains the permission code based on a cable connected with the auditing equipment.
  6. 6. The method of claim 1, the baseboard management controller validating the permission code, comprising: determining a verification permission code based on a secret key corresponding to the auditing equipment and a current time window; comparing the verification permission code with the permission code; and confirming that the authority code passes the verification in response to the verification authority code being identical to the authority code, or confirming that the authority code fails the verification in response to the verification authority code being different from the authority code.
  7. 7. The method of claim 6, the method further comprising, after the validation authority code verification fails: and recording an operation user identifier, operation time and the operation instruction corresponding to the operation instruction.
  8. 8. A data processing apparatus, the apparatus comprising: the acquisition unit is used for responding to the received operation instruction of which the type is the first type, and acquiring the permission code; The execution unit is used for verifying the permission code, executing the operation corresponding to the operation instruction if the permission code passes the verification, and recording the operation user identification corresponding to the operation instruction, the auditing equipment identification corresponding to the permission code, the operation time and the operation; The authority codes are data generated by the auditing equipment based on a time window and a secret key, and are transmitted to the electronic equipment corresponding to the operation user after confirming the authority of the operation user.
  9. 9. An electronic device, comprising: And a memory communicatively coupled to the at least one processor, wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-7.
  10. 10. A non-transitory computer readable storage medium storing computer instructions for causing a computer to perform the method of any one of claims 1-7.

Description

Data processing method, device, electronic equipment and storage medium Technical Field The disclosure relates to the technical field of authority verification, and in particular relates to a data processing method, a data processing device, electronic equipment and a storage medium. Background In the related art, a single super administrator account system is mostly adopted in the system, the operation authority is highly concentrated, any operator capable of logging in the super administrator account has the operation authority of all functions of the system, secondary confirmation of key operation is lacking, and misoperation or malicious operation cannot be effectively prevented. Disclosure of Invention The present disclosure provides a data processing method, apparatus, electronic device, and storage medium, so as to at least solve the above technical problems in the prior art. According to a first aspect of the present disclosure, there is provided a data processing method comprising: Responding to the received operation instruction of a first type, and acquiring an authority code by the baseboard management controller; The baseboard management controller verifies the authority code, if the authority code passes the verification, the baseboard management controller executes the operation corresponding to the operation instruction, and records the operation user identifier corresponding to the operation instruction, the auditing equipment identifier corresponding to the authority code, the operation time and the operation; The authority codes are data generated by the auditing equipment based on a time window and a secret key, and are transmitted to the electronic equipment corresponding to the operation user after confirming the authority of the operation user. In the above scheme, the method further comprises: the baseboard management controller creates a first user, and the authority of the first user comprises the permission of an operation user to realize a first type of operation; the baseboard management controller determines a secret key corresponding to the first user and transmits the secret key to the auditing equipment; the auditing equipment periodically generates a permission code based on a current time window and the secret key; Wherein, the authority codes are effective in corresponding time windows, and each time window corresponds to one authority code; and the auditing equipment executes the authority of the first user. In the above scheme, the transmitting the key to the auditing device includes one of the following: the baseboard management controller transmits the secret key to the auditing equipment through a network; The baseboard management controller transmits the secret key to the auditing equipment through a cable; and the baseboard management controller generates a bar code based on the secret key, and the auditing equipment acquires and identifies the bar code based on the image acquisition device. In the above scheme, the method further comprises: The operation user inputs an operation user identification and a password; And the baseboard management controller verifies the operation user identifier and the corresponding password, and allows the operation user to log in the baseboard management controller in response to the verification success. In the above scheme, the baseboard management controller obtains the authority code, including one of the following: The baseboard management controller obtains the permission code based on external equipment; The baseboard management controller obtains the authority code based on a network; The baseboard management controller obtains the permission code based on a cable connected with the auditing equipment. In the above scheme, the verifying the authority code by the baseboard management controller includes: determining a verification permission code based on a secret key corresponding to the auditing equipment and a current time window; comparing the verification permission code with the permission code; and confirming that the authority code passes the verification in response to the verification authority code being identical to the authority code, or confirming that the authority code fails the verification in response to the verification authority code being different from the authority code. In the above solution, after the verification of the validation authority code is failed, the method further includes: and recording an operation user identifier, operation time and the operation instruction corresponding to the operation instruction. According to a second aspect of the present disclosure, there is provided a data processing apparatus comprising: the acquisition unit is used for responding to the received operation instruction of which the type is the first type, and acquiring the permission code; The execution unit is used for verifying the permission code, executing the operation corresponding to the operation instru