Browse Prior Art Database

Method for a Securised Self-service Data Center

IP.com Disclosure Number: IPCOM000212426D
Publication Date: 2011-Nov-11
Document File: 1 page(s) / 50K

Publishing Venue

The IP.com Prior Art Database

Abstract

Security in Colocation Data Centers is really a challenge. Several people and operators need to have access to the Data Center in order to upgrade a machine, modify the network configuration, start a server, etc. Occasionally people make mistakes by working on the wrong resources. This solution is to provide a method for a Securised Self-service Data Center based on a method and apparatus to avoid any mistakes and provide security at the IT resources level.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 100% of the total text.

Page 01 of 1

Method for a Securised Self-service Data Center

This idea is to put in place a method and apparatus to avoid any mistakes and provide security at the IT resources level.

    This solution has many advantages:
- no more using physical keys
- people can't enter in the Data Center without a code - the access to the room is secured
- the security access is managed in real-time

    This solution includes:
- an access lock installed on the Data Center door and all the IT racks. - a management system with network capabilities.
- a smart lighting system.

The following is a high-level diagram of the system:

1 - The Management System receives an alert from a server (outage, IT alert: disk space, network...).
2 - The system generates a code linked to this alert.
3 - The system sends the code to the operator who needs to go inside the Data Center to fix the problem.
4 - The operator enters the code at the entrance of the Data Center.
5 - Then the Management System checks the code and displays the rack and servers information.
6 - The system unlocks the access to the Data Center.
7 - Based on the IT rack position, the system will switch on a light path that the operator must follow to go in front of the resource.
8 - The system will then unlock the door of the IT rack.