技术领域Technical Field
本申请涉及计算机技术领域,特别涉及电脑主机硬件防盗方法。The present application relates to the field of computer technology, and in particular to a method for preventing the hardware of a computer host from being stolen.
背景技术Background Art
本部分旨在为权利要求书中陈述的本申请的实施方式提供背景或上下文。本部分中的内容仅供参考,并不构成对其作为已被公开的现有技术的承认或确认。This section is intended to provide a background or context for the embodiments of the present application as stated in the claims. The contents in this section are for reference only and do not constitute an admission or confirmation that they are prior art that has been disclosed.
在电竞酒店中,由于客人频繁更替,放置在不同房间的电脑主机面临较高的硬件被盗风险,尤其是在电脑关机状态下,客人可能会盗走内存、显卡等硬件组件。当下一位客人入住并启动电脑时,虽然可以进行开机自检,但这会导致时间延迟和不确定性。现有的硬件防盗技术主要依赖于软件监控,通过实时检测硬件状态来防止盗窃。这些监控方法包括硬件监控软件(如HWiNFO、AIDA64等)、远程管理工具(如TeamViewer、VNC等)、以及自定义脚本(定期检测硬件配置并生成报告)。这些技术能够记录每台电脑主机的硬件配置,定期或实时检测硬件状态,并在发现硬件被替换或缺失时触发警报。这种方法具有实时性、精准性和自动化等优势,通过软件监控可以实时监测电脑主机状态,避免不必要的延迟,且能够准确识别硬件丢失的情况,从而提高电脑主机的安全性,减轻酒店工作人员的负担。In e-sports hotels, due to the frequent changes of guests, computer hosts placed in different rooms face a high risk of hardware theft, especially when the computer is turned off, guests may steal hardware components such as memory and graphics cards. When the next guest checks in and starts the computer, although a power-on self-test can be performed, this will cause time delays and uncertainties. Existing hardware anti-theft technologies mainly rely on software monitoring to prevent theft by detecting hardware status in real time. These monitoring methods include hardware monitoring software (such as HWiNFO, AIDA64, etc.), remote management tools (such as TeamViewer, VNC, etc.), and custom scripts (regularly detecting hardware configuration and generating reports). These technologies can record the hardware configuration of each computer host, regularly or in real time detect the hardware status, and trigger an alarm when the hardware is found to be replaced or missing. This method has the advantages of real-time, accuracy, and automation. Through software monitoring, the status of the computer host can be monitored in real time to avoid unnecessary delays, and the loss of hardware can be accurately identified, thereby improving the security of the computer host and reducing the burden on hotel staff.
然而,现有技术存在显著缺陷。首先,传统软件监控方案在电脑主机关机后无法进行硬件状态的监测和自检。其次,由于电脑主机受到客人的控制,监控软件容易被客人关闭,无法实现持续的硬件状态监测和保护。第三,当监控软件被关闭时,无法及时发出警报,使得电脑主机的硬件安全处于无人监管的状态,增加了被盗风险。此外,这些方案依赖于客人的配合和诚实,客人可能会故意关闭监控软件以进行非法操作,从而增加了硬件被盗的风险。最后,传统软件监控方案在监控数据的存储和分析方面可能存在不足,无法对历史硬件状态进行有效追踪和分析,难以发现潜在的安全隐患。However, the existing technology has significant defects. First, traditional software monitoring solutions cannot monitor and self-check the hardware status after the computer host is turned off. Second, since the computer host is controlled by the guest, the monitoring software can be easily turned off by the guest, and continuous hardware status monitoring and protection cannot be achieved. Third, when the monitoring software is turned off, the alarm cannot be issued in time, leaving the hardware security of the computer host unsupervised, increasing the risk of theft. In addition, these solutions rely on the cooperation and honesty of the guests. Guests may deliberately turn off the monitoring software to perform illegal operations, thereby increasing the risk of hardware theft. Finally, traditional software monitoring solutions may be deficient in the storage and analysis of monitoring data, and cannot effectively track and analyze historical hardware status, making it difficult to discover potential safety hazards.
发明内容Summary of the invention
本申请的目的在于提供一种电脑主机硬件防盗方法,即使在电脑关机的情况下,也能重新唤醒主机进行硬件状态的监测和自检,防止客人操控监控软件进行非法操作,从而有效地保护硬件安全。The purpose of this application is to provide a computer host hardware anti-theft method, which can reawaken the host to monitor and self-check the hardware status even when the computer is turned off, preventing guests from manipulating the monitoring software to perform illegal operations, thereby effectively protecting the hardware security.
本申请公开了一种电脑主机硬件防盗方法,包括:The present application discloses a computer host hardware anti-theft method, comprising:
远程服务器收到第一通知时,为第一电脑主机配置第一镜像,所述第一镜像包括自检程序;When the remote server receives the first notification, it configures a first image for the first computer host, wherein the first image includes a self-checking program;
所述远程服务器唤醒所述第一电脑主机并提供所述第一镜像,所述第一镜像供所述第一电脑主机上电后加载,所述第一电脑主机加载所述第一镜像后自动运行所述自检程序以检测是否有硬件丢失,并将检测结果发送至所述远程服务器;The remote server wakes up the first computer host and provides the first image, the first image is loaded by the first computer host after it is powered on, and the first computer host automatically runs the self-test program after loading the first image to detect whether there is any hardware missing, and sends the detection result to the remote server;
所述远程服务器为所述第一电脑主机配置第二镜像,供所述第一电脑主机下一次上电后加载。The remote server configures a second image for the first computer host, so that the first computer host can be loaded after it is powered on next time.
在一个优选例中,还包括:In a preferred embodiment, it also includes:
所述第一镜像和所述第二镜像的配置和调度由镜像管理系统控制,所述镜像管理系统自动选择对应的镜像加载至所述第一电脑主机上。The configuration and scheduling of the first image and the second image are controlled by an image management system, and the image management system automatically selects a corresponding image to load onto the first computer host.
在一个优选例中,还包括:In a preferred embodiment, it also includes:
响应于所述第一通知,所述镜像管理系统自动配置并指令所述第一电脑主机上电后加载所述第一镜像,所述第一镜像为不可变镜像;In response to the first notification, the image management system automatically configures and instructs the first computer host to load the first image after powering on, wherein the first image is an immutable image;
所述第一电脑主机自动运行所述自检程序以检测是否有硬件丢失;The first computer host automatically runs the self-check program to detect whether there is any hardware missing;
所述自检程序运行完毕发出关机指令,以关闭所述第一电脑主机。After the self-check program is completed, a shutdown command is issued to shut down the first computer host.
在一个优选例中,还包括:In a preferred embodiment, it also includes:
响应于所述自检程序发出的自检完成信号,所述镜像管理系统自动将所述第一电脑主机的启动配置从所述第一镜像切换至所述第二镜像,供所述第一电脑主机下一次上电后加载所述第二镜像。In response to the self-test completion signal sent by the self-test program, the image management system automatically switches the startup configuration of the first computer host from the first image to the second image, so that the first computer host can load the second image after being powered on next time.
在一个优选例中,还包括:In a preferred embodiment, it also includes:
所述远程服务器将所述检测结果发送至远程主机管理系统。The remote server sends the detection result to a remote host management system.
在一个优选例中,还包括:In a preferred embodiment, it also includes:
所述远程服务器通过API接口与所述远程主机管理系统建立连接。The remote server establishes a connection with the remote host management system through an API interface.
在一个优选例中,还包括:In a preferred embodiment, it also includes:
响应于第二通知,所述镜像管理系统自动将所述第一电脑主机的启动配置从所述第一镜像切换至所述第二镜像,供所述第一电脑主机下一次上电后加载所述第二镜像。In response to the second notification, the image management system automatically switches the startup configuration of the first computer host from the first image to the second image, so that the first computer host loads the second image after being powered on next time.
在一个优选例中,所述第一通知为酒店退房通知,所述第二通知为酒店登记通知。In a preferred example, the first notification is a hotel check-out notification, and the second notification is a hotel check-in notification.
本申请还公开了一种计算机可读存储介质,所述计算机可读存储介质中存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现如前文描述的方法中的步骤。The present application also discloses a computer-readable storage medium, in which computer-executable instructions are stored. When the computer-executable instructions are executed by a processor, the steps in the method described above are implemented.
本申请还公开了一种计算机程序产品,包括计算机可执行指令,该计算机可执行指令被处理器执行时实现前文描述方法中的步骤。The present application also discloses a computer program product, comprising computer executable instructions, which can implement the steps in the method described above when executed by a processor.
本申请的实施方式中,通过一台远程服务器进行控制,在接收到第一通知后自动配置第一镜像,并且即使在第一电脑主机的关机状态下也能将其唤醒,使其加载自检镜像来监测硬件状态,此操作减少了人工干预,提高了操作的准确性,自检镜像包含自检程序,自检程序能在硬件出现问题时及时发现,还能在检测完毕后将结果实时反馈给远程服务器,便于酒店在住客退房后及时地获得房间内硬件状态,完成自检后,下一次第一电脑主机上电后加载第二镜像,可以保证系统的快速恢复和正常运行;In the implementation manner of the present application, a remote server is used for control, and the first image is automatically configured after receiving the first notification, and the first computer host can be awakened even when it is turned off, so that it loads the self-check image to monitor the hardware status. This operation reduces manual intervention and improves the accuracy of the operation. The self-check image includes a self-check program, which can detect hardware problems in time, and can also feed back the results to the remote server in real time after the detection is completed, so that the hotel can obtain the hardware status in the room in time after the guest checks out. After completing the self-check, the second image is loaded when the first computer host is powered on next time, which can ensure the rapid recovery and normal operation of the system.
进一步地,镜像管理系统通过自动选择和加载对应的镜像,可以显著提高操作效率,减少管理复杂性,并确保系统的一致性与安全性;Furthermore, the image management system can significantly improve operational efficiency, reduce management complexity, and ensure system consistency and security by automatically selecting and loading the corresponding image;
进一步地,通过自动配置并加载不可变的第一镜像,不仅保障了在自检过程中系统状态的不可篡改,从而增加了安全性,还能通过自动执行自检程序来有效检测硬件丢失,自检完毕后,系统能够自动关闭,降低能耗并防止未授权的进一步操作,此外,通过API接口自动将检测结果发送至远程主机管理系统,不仅提高了操作的透明度,还加强了系统之间的协作,使得酒店管理层能够即时获得关键信息,进行快速决策和响应。Furthermore, by automatically configuring and loading the immutable first image, not only is it guaranteed that the system status cannot be tampered with during the self-check process, thereby increasing security, but it can also effectively detect hardware loss by automatically executing the self-check program. After the self-check is completed, the system can automatically shut down to reduce energy consumption and prevent further unauthorized operations. In addition, the detection results are automatically sent to the remote host management system through the API interface, which not only improves the transparency of operations, but also strengthens the collaboration between systems, allowing hotel management to obtain key information in real time and make quick decisions and responses.
上述发明内容中公开的各个技术特征、在下文各个实施方式和例子中公开的各技术特征、以及附图中公开的各个技术特征,都可以自由地互相组合,从而构成各种新的技术方案(这些技术方案均应该视为在本说明书中已经记载),除非这种技术特征的组合在技术上是不可行的。例如,在一个例子中公开了特征A+B+C,在另一个例子中公开了特征A+B+D+E,而特征C和D是起到相同作用的等同技术手段,技术上只要择一使用即可,不可能同时采用,特征E技术上可以与特征C相组合,则,A+B+C+D的方案因技术不可行而应当不被视为已经记载,而A+B+C+E的方案应当视为已经被记载。Each technical feature disclosed in the above invention content, each technical feature disclosed in each implementation mode and example below, and each technical feature disclosed in the accompanying drawings can be freely combined with each other to form various new technical solutions (these technical solutions should be deemed to have been recorded in this specification), unless such combination of technical features is technically infeasible. For example, in one example, feature A+B+C is disclosed, and in another example, feature A+B+D+E is disclosed, and features C and D are equivalent technical means that play the same role. Technically, only one of them can be used, and it is impossible to use them at the same time. Feature E can be combined with feature C technically. Then, the solution of A+B+C+D should not be deemed to have been recorded because it is technically infeasible, while the solution of A+B+C+E should be deemed to have been recorded.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1是根据本申请的一个实施方式的电脑主机硬件防盗方法的流程示意图;FIG1 is a schematic flow chart of a method for preventing computer host hardware from being stolen according to an embodiment of the present application;
图2是根据本申请的一个实施方式的电脑主机硬件防盗方法的流程示意图;FIG2 is a flow chart of a method for preventing computer host hardware from being stolen according to an embodiment of the present application;
图3是根据本申请的一个实施方式的电脑主机硬件防盗方法的流程示意图;FIG3 is a flow chart of a method for preventing computer host hardware from being stolen according to an embodiment of the present application;
图4是根据本申请的一个实施方式的电脑主机硬件防盗方法的工作流程图。FIG4 is a flowchart of a computer host hardware anti-theft method according to an embodiment of the present application.
具体实施方式DETAILED DESCRIPTION
在以下的叙述中,为了使读者更好地理解本申请而提出了许多技术细节。但是,本领域的普通技术人员可以理解,即使没有这些技术细节和基于以下各实施方式的种种变化和修改,也可以实现本申请所要求保护的技术方案。In the following description, many technical details are provided to help readers better understand the present application. However, those skilled in the art can understand that the technical solution claimed in the present application can be implemented even without these technical details and various changes and modifications based on the following embodiments.
术语的说明:Explanation of terminology:
如本文所用,“WOL”是指即Wake-on-LAN(局域网唤醒/远程唤醒),是一种网络标准,用于远程唤醒通过网络连接但处于低功耗状态(如休眠或关机)的计算机,使计算机从休眠状态恢复成运作状态,或者从关机状态转成引导状态。As used in this article, "WOL" refers to Wake-on-LAN (Wake-up on LAN/Remote Wake-up), which is a network standard used to remotely wake up a computer that is connected to the network but in a low-power state (such as sleep or shutdown), so that the computer can be restored from sleep to operation, or from shutdown to boot.
如本文所用,“电脑主机”特指具备独立磁盘存储能力的计算机设备,用于执行各种计算任务和存储操作系统及其他软件应用。为明确本发明的范围,需要指出,“电脑主机”不包括无盘机。无盘机,即没有自身硬盘驱动器的计算机,它们依赖于网络连接到的服务器来加载操作系统和运行所需的软件。本申请的定义和实施例专门针对那些包含至少一个内部存储驱动器的计算机主机,这些存储设备能够独立地存储和检索数据,而不依赖于网络启动或远程文件系统。As used herein, "computer host" refers specifically to a computer device with independent disk storage capabilities for performing various computing tasks and storing operating systems and other software applications. To clarify the scope of the present invention, it should be noted that "computer host" does not include diskless machines. Diskless machines are computers without their own hard drives, which rely on a server connected to a network to load the operating system and run the required software. The definitions and embodiments of the present application are specifically directed to computer hosts that include at least one internal storage drive that can independently store and retrieve data without relying on network boot or remote file systems.
如本文所用,“API接口”英文全称为Application Programming Interface,中文全称为应用程序编程接口,指的是一组预定义的方法或协议,用于使远程服务器能够与其他系统、应用或设备进行通信和数据交换。其定义了不同软件应用或硬件之间如何相互操作,允许它们通过网络发送和接收数据,执行命令或者访问对方的服务和资源。As used in this article, "API" is the full name of Application Programming Interface in English and the full name of Application Programming Interface in Chinese. It refers to a set of predefined methods or protocols that enable remote servers to communicate and exchange data with other systems, applications or devices. It defines how different software applications or hardware can operate with each other, allowing them to send and receive data over the network, execute commands or access each other's services and resources.
如本文所用,“不可变镜像”指一种固定状态的系统镜像,一旦创建,其内容不允许被修改或更新,用于保证系统的一致性和安全性,不可变镜像包含操作系统、预配置的应用程序、系统设置及安全配置。As used in this article, "immutable image" refers to a system image in a fixed state. Once created, its content is not allowed to be modified or updated. It is used to ensure the consistency and security of the system. The immutable image includes the operating system, pre-configured applications, system settings and security configurations.
下面概要说明本申请的实施方式的部分创新点:The following is a brief description of some innovative aspects of the implementation methods of this application:
1.本申请通过一台远程服务器进行统一管理,相较于传统的软件监控方案,增强了集中控制和管理的能力,利用远程服务器,实现了对电脑主机的远程启动、系统镜像的动态切换、硬件状态的检测以及警报的发送等功能,从而显著提升了管理的效率和系统的安全性。1. This application is managed uniformly through a remote server. Compared with traditional software monitoring solutions, it enhances the ability of centralized control and management. By using the remote server, it realizes functions such as remote startup of the computer host, dynamic switching of system images, detection of hardware status, and sending of alarms, thereby significantly improving management efficiency and system security.
2.本申请使用了定制的硬件检测系统镜像,该镜像具备防篡改的特点,防止客人对其进行修改或替换,此系统镜像集成了全面的硬件检测和识别工具,可以对电脑主机的所有硬件进行精确和全面的检测,确保了设备的安全性。2. This application uses a customized hardware detection system image, which is tamper-proof to prevent guests from modifying or replacing it. This system image integrates comprehensive hardware detection and identification tools, which can accurately and comprehensively detect all hardware of the computer host, ensuring the security of the device.
3.本申请实现了高度自动化的管理功能,通过与远程主机管理系统的即时通信,能够自动执行电脑主机的监控、系统镜像的动态切换以及硬件检测结果的即时报告,这种自动化减少了酒店工作人员的工作压力,并显著提升了设备的安全性及管理的效率。3. This application realizes a highly automated management function. Through instant communication with the remote host management system, it can automatically perform computer host monitoring, dynamic switching of system images, and instant reporting of hardware detection results. This automation reduces the workload of hotel staff and significantly improves the security of equipment and management efficiency.
为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请的实施方式作进一步地详细描述。In order to make the objectives, technical solutions and advantages of the present application clearer, the implementation methods of the present application will be further described in detail below in conjunction with the accompanying drawings.
本申请的第一实施方式涉及一种电脑主机硬件防盗方法,其流程如图1所示,该方法包括以下步骤:The first embodiment of the present application relates to a computer host hardware anti-theft method, the process of which is shown in FIG1 , and the method comprises the following steps:
在步骤S101中,远程服务器收到第一通知时,为第一电脑主机配置第一镜像,第一镜像包括自检程序。In step S101, when the remote server receives the first notification, it configures a first image for the first computer host, where the first image includes a self-test program.
在步骤S102中,远程服务器唤醒第一电脑主机并提供第一镜像,第一镜像供第一电脑主机上电后加载,第一电脑主机加载第一镜像后自动运行自检程序以检测是否有硬件丢失,并将检测结果发送至远程服务器。In step S102, the remote server wakes up the first computer host and provides a first image, which is loaded by the first computer host after it is powered on. After loading the first image, the first computer host automatically runs a self-test program to detect whether there is any hardware missing, and sends the test result to the remote server.
在步骤S103中,远程服务器为第一电脑主机配置第二镜像,供第一电脑主机下一次上电后加载。In step S103, the remote server configures the second image for the first computer host, so that the first computer host can be loaded when it is powered on next time.
在一个可选的实施例中,远程服务器可以配置于单独或多个物理位置,专门用于远程管理和控制与之通信的设备,该服务器拥有处理和存储能力,能够执行软件应用和处理数据,以支持对连接的电脑主机或其他设备进行监控、数据处理、系统管理和其他相关的网络服务。远程服务器可以是物理服务器,也可以是虚拟服务器,部署在公有云、私有云或混合云环境中。远程服务器的主要功能包括但不限于:发送指令以控制和配置电脑主机、接收和处理来自电脑主机的数据、执行数据分析和维护更新、提供API接口以与其他管理系统如远程主机管理系统进行通信。此外,远程服务器负责执行安全措施,保护数据传输的安全性,并确保所有管理操作符合预定的安全政策和合规要求。In an optional embodiment, the remote server can be configured in a single or multiple physical locations, specifically for remote management and control of devices communicating with it. The server has processing and storage capabilities, can execute software applications and process data to support monitoring, data processing, system management and other related network services for connected computer hosts or other devices. The remote server can be a physical server or a virtual server, deployed in a public cloud, private cloud or hybrid cloud environment. The main functions of the remote server include but are not limited to: sending instructions to control and configure computer hosts, receiving and processing data from computer hosts, performing data analysis and maintenance updates, and providing API interfaces to communicate with other management systems such as remote host management systems. In addition, the remote server is responsible for implementing security measures to protect the security of data transmission and ensure that all management operations comply with predetermined security policies and compliance requirements.
在一个可选的实施例中,第一镜像和第二镜像的配置和调度由镜像管理系统控制,镜像管理系统自动选择对应的镜像加载至第一电脑主机上。In an optional embodiment, the configuration and scheduling of the first image and the second image are controlled by an image management system, and the image management system automatically selects the corresponding image to load onto the first computer host.
在一个可选的实施例中,远程服务器通过WOL唤醒第一电脑主机。WOL可以在不同时间自动唤醒电脑主机,以执行系统更新、安全检查或其他配置任务。In an optional embodiment, the remote server wakes up the first computer host through WOL. WOL can automatically wake up the computer host at different times to perform system updates, security checks or other configuration tasks.
在一个可选的实施例中,如图2所示,还可以包括:In an optional embodiment, as shown in FIG2 , the method may further include:
在步骤S201中,响应于第一通知,镜像管理系统自动配置并指令第一电脑主机上电后加载第一镜像,第一镜像为不可变镜像;In step S201, in response to the first notification, the image management system automatically configures and instructs the first computer host to load the first image after powering on, and the first image is an immutable image;
在步骤S202中,第一电脑主机自动运行自检程序以检测是否有硬件丢失;In step S202, the first computer host automatically runs a self-checking program to detect whether there is any hardware missing;
在步骤S203中,自检程序运行完毕发出关机指令,关闭第一电脑主机。In step S203, after the self-checking program is completed, a shutdown command is issued to shut down the first computer host.
在一个可选的实施例中,如图2所示,还可以包括:In an optional embodiment, as shown in FIG2 , the method may further include:
在步骤S2021中,响应于自检程序发出的自检完成信号,镜像管理系统自动将第一电脑主机的启动配置从第一镜像切换至第二镜像,供第一电脑主机下一次上电后加载第二镜像。In step S2021, in response to the self-test completion signal sent by the self-test program, the image management system automatically switches the startup configuration of the first computer host from the first image to the second image, so that the first computer host can load the second image after being powered on next time.
在一个可选的实施例中,如图3所示,还可以包括:In an optional embodiment, as shown in FIG3 , the method may further include:
在步骤S1021中,远程服务器将检测结果发送至远程主机管理系统。In step S1021, the remote server sends the detection result to the remote host management system.
在一个可选的实施例中,如图3所示,还可以包括:In an optional embodiment, as shown in FIG3 , the method may further include:
在步骤S100中,远程服务器通过API接口与远程主机管理系统建立连接。In step S100, the remote server establishes a connection with the remote host management system through an API interface.
在一个可选的实施例中,API接口可以实现远程服务器与远程主机管理系统之间的数据通信和命令传输。例如,远程服务器可以通过API接口发送设备自检的结果给远程主机管理系统,或者接收来自远程主机管理系统的操作命令,如设备启动或配置更改指令。API接口可以支持多种数据格式,如JSON,XML等,以适应不同系统的需要。API接口的具体实现细节可以根据实际应用需求进行调整,本申请的API接口不仅涵盖当前已实现的接口类型,也包括未来可能开发的基于此原理的接口技术。In an optional embodiment, the API interface can realize data communication and command transmission between the remote server and the remote host management system. For example, the remote server can send the results of the device self-test to the remote host management system through the API interface, or receive operation commands from the remote host management system, such as device startup or configuration change instructions. The API interface can support multiple data formats, such as JSON, XML, etc., to meet the needs of different systems. The specific implementation details of the API interface can be adjusted according to the actual application requirements. The API interface of this application not only covers the currently implemented interface types, but also includes interface technologies based on this principle that may be developed in the future.
在一个可选的实施例中,远程主机管理系统是一种集中式的计算平台,用于监控和控制连接到网络的一台或多台主机(如个人计算机、服务器或其他网络设备)。该系统使管理员能够远程执行各种管理任务,包括但不限于系统监控、数据备份、软件更新、硬件检测以及安全管理等。远程主机管理系统可以跨不同的操作系统和硬件配置工作,提供一致的管理接口。可选的,远程主机管理系统可以作为酒店管理系统管理酒店内的各设备,或作为网吧管理系统用于监控和维护网吧的计算机设施,远程主机管理系统可以支持多种通信协议和接口,与各种软件和应用程序无缝集成,从而适应不同的管理环境和技术需求。In an optional embodiment, the remote host management system is a centralized computing platform for monitoring and controlling one or more hosts (such as personal computers, servers or other network devices) connected to the network. The system enables administrators to perform various management tasks remotely, including but not limited to system monitoring, data backup, software updates, hardware detection, and security management. The remote host management system can work across different operating systems and hardware configurations, providing a consistent management interface. Optionally, the remote host management system can be used as a hotel management system to manage various devices in the hotel, or as an Internet cafe management system to monitor and maintain the computer facilities of the Internet cafe. The remote host management system can support a variety of communication protocols and interfaces, and seamlessly integrate with various software and applications to adapt to different management environments and technical requirements.
在一个可选的实施例中,还可以包括:In an optional embodiment, it may also include:
响应于第二通知,镜像管理系统自动将第一电脑主机的启动配置从第一镜像切换至第二镜像,供第一电脑主机下一次上电后加载第二镜像。In response to the second notification, the image management system automatically switches the startup configuration of the first computer host from the first image to the second image, so that the first computer host can load the second image after being powered on next time.
在一个可选的实施例中,第一通知为酒店退房通知,第二通知为酒店登记通知。In an optional embodiment, the first notification is a hotel check-out notification, and the second notification is a hotel check-in notification.
为了能够更好地理解本申请的技术方案,下面结合几个具体的例子来进行说明,该例子中罗列的细节主要是为了便于理解,不作为对本申请的保护范围的限制。In order to better understand the technical solution of the present application, several specific examples are provided below for illustration. The details listed in the examples are mainly for ease of understanding and are not intended to limit the scope of protection of the present application.
实施例1Example 1
图4所示为本实施例的工作流程图,当远程服务器收到酒店管理系统(远程主机管理系统)发出的退房通知时(第一通知),镜像管理系统自动为第一电脑主机配置并指令其加载包含自检程序的第一镜像。该第一镜像是不可变的,确保其内容在使用过程中不被篡改。随后,远程服务器通过Wake-On-LAN技术唤醒第一电脑主机,使其上电并加载第一镜像。一旦加载完成,第一电脑主机自动运行自检程序,检测是否有硬件丢失,并在自检完毕后自动发出关机指令,关闭电脑以等待下一步操作。FIG4 is a flowchart of the work flow of the present embodiment. When the remote server receives the check-out notification (first notification) issued by the hotel management system (remote host management system), the image management system automatically configures the first computer host and instructs it to load the first image containing the self-check program. The first image is immutable to ensure that its content is not tampered with during use. Subsequently, the remote server wakes up the first computer host through the Wake-On-LAN technology, powers it on and loads the first image. Once the loading is completed, the first computer host automatically runs the self-check program to detect whether there is any hardware missing, and automatically issues a shutdown command after the self-check is completed, turning off the computer to wait for the next operation.
自检程序完成后发出的自检完成信号被镜像管理系统捕获,响应这一信号,系统随即自动将第一电脑主机的启动配置从第一镜像切换至第二镜像。这确保在电脑主机的下一次启动时,将加载第二镜像,该镜像供正常操作使用。同时,远程服务器将自检结果通过API接口发送至酒店管理系统,以记录并处理相关的安全和维护信息。The self-test completion signal sent after the self-test program is completed is captured by the image management system. In response to this signal, the system automatically switches the startup configuration of the first computer host from the first image to the second image. This ensures that the second image will be loaded when the computer host is started next time, and this image is used for normal operation. At the same time, the remote server sends the self-test results to the hotel management system through the API interface to record and process relevant safety and maintenance information.
当酒店管理系统发出新的入住登记通知(第二通知)时,确保第一电脑主机已经配置好第二镜像,为新客户提供即时可用的系统环境。When the hotel management system sends a new check-in registration notification (second notification), ensure that the first computer host has been configured with the second image to provide an immediately available system environment for the new customer.
实施例2Example 2
与实施例1的区别在于,本实施例可应用于网吧环境,上机、下机通知替代了酒店的入住登记、退房通知。本实施例可以为网吧环境提供强有力的硬件防盗措施,尤其针对网吧包房中客人下机时可能发生的硬件盗窃问题。The difference from the first embodiment is that the present embodiment can be applied to an Internet cafe environment, and the on-board and off-board notifications replace the hotel check-in and check-out notifications. The present embodiment can provide a powerful hardware theft prevention measure for the Internet cafe environment, especially for the hardware theft problem that may occur when guests log off the computer in the Internet cafe private room.
当远程服务器收到网吧管理系统(远程主机管理系统)发出的下机通知时(第一通知),镜像管理系统自动为第一电脑主机配置并指令其加载包含自检程序的第一镜像。该第一镜像是不可变的,确保其内容在使用过程中不被篡改。如果此时电脑主机没有关闭,远程服务器可以发送命令强制重启电脑。强制重启可以通过网络管理命令实现,如使用远程桌面协议(RDP)、安全外壳(SSH)或其他远程执行工具来发送重启命令。在第一电脑主机完成重启并处于关机状态时,可以利用WOL技术唤醒它,以便加载第一镜像进行必要的操作。一旦加载完成,第一电脑主机自动运行自检程序,检测是否有硬件丢失,并在自检完毕后自动发出关机指令,关闭电脑以等待下一步操作。When the remote server receives the offline notification (first notification) issued by the Internet cafe management system (remote host management system), the image management system automatically configures the first computer host and instructs it to load the first image containing the self-test program. The first image is immutable to ensure that its content is not tampered with during use. If the computer host is not turned off at this time, the remote server can send a command to force the computer to restart. Forced restart can be achieved through network management commands, such as using Remote Desktop Protocol (RDP), Secure Shell (SSH) or other remote execution tools to send restart commands. When the first computer host completes the restart and is in the shutdown state, it can be awakened using WOL technology to load the first image for necessary operations. Once the loading is complete, the first computer host automatically runs the self-test program to detect whether there is any hardware missing, and automatically issues a shutdown command after the self-test is completed, turning off the computer to wait for the next step.
自检程序完成后发出的自检完成信号被镜像管理系统捕获,响应这一信号,系统随即自动将第一电脑主机的启动配置从第一镜像切换至第二镜像。这确保在电脑主机的下一次启动时,将加载第二镜像,该镜像供正常操作使用。同时,远程服务器将自检结果通过API接口发送至网吧管理系统,以记录并处理相关的安全和维护信息。After the self-check procedure is completed, the self-check completion signal is captured by the image management system. In response to this signal, the system automatically switches the startup configuration of the first computer host from the first image to the second image. This ensures that the second image will be loaded when the computer host is started next time, and this image is used for normal operation. At the same time, the remote server sends the self-check results to the Internet cafe management system through the API interface to record and process relevant security and maintenance information.
当网吧管理系统发出新的上机登记通知(第二通知)时,确保第一电脑主机已经配置好第二镜像,为新客户提供即时可用的系统环境。When the Internet cafe management system sends a new computer registration notification (second notification), it ensures that the first computer host has been configured with the second image to provide an immediately available system environment for the new customer.
相应地,本申请的实施方式还提供一种计算机可读存储介质,其中存储有计算机可执行指令,该计算机可执行指令被处理器执行时实现本申请的各方法实施方式。计算机可读存储介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括但不限于,相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读存储介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。Accordingly, the embodiments of the present application also provide a computer-readable storage medium, in which computer executable instructions are stored, and when the computer executable instructions are executed by the processor, the various method embodiments of the present application are implemented. Computer-readable storage media include permanent and non-permanent, removable and non-removable media, and information storage can be implemented by any method or technology. Information can be a computer-readable instruction, a data structure, a module of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, read-only compact disk read-only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, magnetic cassettes, disk storage or other magnetic storage devices or any other non-transmission media that can be used to store information that can be accessed by a computing device. As defined herein, computer-readable storage media does not include temporary computer-readable media (transitory media), such as modulated data signals and carriers.
此外,本申请的实施方式还提供一种计算机程序产品,其中包括计算机可执行指令,该计算机可执行指令被处理器执行时实现上述各方法实施方式中的步骤。In addition, an embodiment of the present application further provides a computer program product, which includes computer executable instructions, and when the computer executable instructions are executed by a processor, the steps in the above-mentioned method embodiments are implemented.
需要说明的是,在本申请中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。本申请中,如果提到根据某要素执行某行为,则是指至少根据该要素执行该行为的意思,其中包括了两种情况:仅根据该要素执行该行为、和根据该要素和其它要素执行该行为。多个、多次、多种等表达包括2个、2次、2种以及2个以上、2次以上、2种以上。It should be noted that, in the present application, relational terms such as first and second, etc. are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply that there is any such actual relationship or order between these entities or operations. Moreover, the term "include", "comprise" or any other variant thereof is intended to cover non-exclusive inclusion, so that the process, method, article or equipment including a series of elements includes not only those elements, but also includes other elements not explicitly listed, or also includes elements inherent to such process, method, article or equipment. In the absence of more restrictions, the elements defined by the sentence "include one" do not exclude the existence of other identical elements in the process, method, article or equipment including the elements. In the present application, if it is mentioned that a certain action is performed according to a certain element, it means at least the meaning of performing the action according to the element, which includes two situations: performing the action only according to the element and performing the action according to the element and other elements. Multiple, multiple, multiple, etc. expressions include 2, 2 times, 2 kinds and more than 2, more than 2 times, more than 2 kinds.
在描述方法的步骤时使用的序号本身并不对这些步骤的顺序构成任何的限定。例如,序号大的步骤并非一定要在序号小的步骤之后执行,也可以是先执行序号大的步骤再执行序号小的步骤,还可以是并行执行,只要这种执行顺序对于本领域技术人员来说是合理的即可。又如,拥有连续编号序号的多个步骤(例如步骤101,步骤102,步骤103等)并不限制其他步骤可以在其间执行,例如步骤101和步骤102之间可以有其他的步骤。The serial numbers used in describing the steps of the method do not themselves constitute any limitation on the order of these steps. For example, the step with a larger serial number does not necessarily have to be executed after the step with a smaller serial number. The step with a larger serial number may be executed first and then the step with a smaller serial number. They may also be executed in parallel, as long as this execution order is reasonable for those skilled in the art. For another example, multiple steps with consecutive serial numbers (e.g., step 101, step 102, step 103, etc.) do not limit other steps that can be executed in between. For example, there may be other steps between step 101 and step 102.
本说明书包括本文所描述的各种实施例的组合。对实施例的单独提及(例如“一个实施例”或“一些实施例”或“优选实施例”);然而,除非指示为是互斥的或者本领域技术人员很清楚是互斥的,否则这些实施例并不互斥。应当注意的是,除非上下文另外明确指示或者要求,否则在本说明书中以非排他性的意义使用“或者”一词。This specification includes combinations of the various embodiments described herein. Individual references to embodiments (e.g., "one embodiment" or "some embodiments" or "preferred embodiments"); however, these embodiments are not mutually exclusive unless indicated as mutually exclusive or it is clear to a person skilled in the art that they are mutually exclusive. It should be noted that the word "or" is used in this specification in a non-exclusive sense unless the context clearly indicates or requires otherwise.
在本说明书提及的所有文献都被认为是整体性地包括在本申请的公开内容中,以便在必要时可以作为修改的依据。此外应理解,以上所述仅为本说明书的较佳实施例而已,并非用于限定本说明书的保护范围。凡在本说明书一个或多个实施例的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本说明书一个或多个实施例的保护范围之内。All documents mentioned in this specification are considered to be included in the disclosure of this application as a whole, so that they can be used as a basis for modification when necessary. In addition, it should be understood that the above is only a preferred embodiment of this specification and is not intended to limit the scope of protection of this specification. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and principles of one or more embodiments of this specification should be included in the scope of protection of one or more embodiments of this specification.
在一些情况下,在权利要求书中记载的动作或步骤可以按照不同于实施例中的顺序来执行并且仍然可以实现期望的结果。另外,在附图中描绘的过程不一定要求示出的特定顺序或者连续顺序才能实现期望的结果。在某些实施方式中,多任务处理和并行处理也是可以的或者可能是有利的。In some cases, the actions or steps described in the claims may be performed in a different order than in the embodiments and still achieve the desired results. In addition, the processes depicted in the drawings do not necessarily require the specific order or sequential order shown to achieve the desired results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410984218.9ACN118886072B (en) | 2024-07-22 | 2024-07-22 | Computer host hardware anti-theft method |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410984218.9ACN118886072B (en) | 2024-07-22 | 2024-07-22 | Computer host hardware anti-theft method |
| Publication Number | Publication Date |
|---|---|
| CN118886072Atrue CN118886072A (en) | 2024-11-01 |
| CN118886072B CN118886072B (en) | 2025-05-13 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202410984218.9AActiveCN118886072B (en) | 2024-07-22 | 2024-07-22 | Computer host hardware anti-theft method |
| Country | Link |
|---|---|
| CN (1) | CN118886072B (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20010016202A (en)* | 2000-11-22 | 2001-03-05 | 정지후 | Computer Stealth Trace System & Method |
| US20070226548A1 (en)* | 2006-03-23 | 2007-09-27 | Ming-Shiang Lai | System for booting from a non-xip memory utilizing a boot engine that does not have ecc capabilities during booting |
| KR20100015024A (en)* | 2008-08-04 | 2010-02-12 | 생크 주식회사 | Missing prevention service system and method thereof |
| US20120072765A1 (en)* | 2010-09-20 | 2012-03-22 | International Business Machines Corporation | Job migration in response to loss or degradation of a semi-redundant component |
| US9632881B1 (en)* | 2015-03-24 | 2017-04-25 | EMC IP Holding Company LLC | Replication of a virtual distributed volume |
| CN107704731A (en)* | 2017-09-28 | 2018-02-16 | 成都安恒信息技术有限公司 | A kind of cloud platform mirror image method for preventing piracy based on HOTP |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20010016202A (en)* | 2000-11-22 | 2001-03-05 | 정지후 | Computer Stealth Trace System & Method |
| US20070226548A1 (en)* | 2006-03-23 | 2007-09-27 | Ming-Shiang Lai | System for booting from a non-xip memory utilizing a boot engine that does not have ecc capabilities during booting |
| KR20100015024A (en)* | 2008-08-04 | 2010-02-12 | 생크 주식회사 | Missing prevention service system and method thereof |
| US20120072765A1 (en)* | 2010-09-20 | 2012-03-22 | International Business Machines Corporation | Job migration in response to loss or degradation of a semi-redundant component |
| US9632881B1 (en)* | 2015-03-24 | 2017-04-25 | EMC IP Holding Company LLC | Replication of a virtual distributed volume |
| CN107704731A (en)* | 2017-09-28 | 2018-02-16 | 成都安恒信息技术有限公司 | A kind of cloud platform mirror image method for preventing piracy based on HOTP |
| Publication number | Publication date |
|---|---|
| CN118886072B (en) | 2025-05-13 |
| Publication | Publication Date | Title |
|---|---|---|
| CN105677431B (en) | Background work and foreground is decoupling | |
| US11381647B2 (en) | IoT device jobs | |
| US10949539B2 (en) | Systems and methods for secure boot and runtime tamper detection | |
| US20140208133A1 (en) | Systems and methods for out-of-band management of an information handling system | |
| US20160026661A1 (en) | System and method for the automated generation of events within a server environment | |
| US20100306544A1 (en) | Secure computing environment in a transportable container | |
| BRPI0806772A2 (en) | security module having a secondary agent in coordination with host agent | |
| US11475111B2 (en) | Method and system for pro-active desktop resume operation based on historical data | |
| CN101902357A (en) | Method and system for dispatching business server | |
| US11991058B2 (en) | Containerized service with embedded script tool for monitoring health state of hyper-converged infrastructure resources | |
| CN107633168A (en) | Automate Password Management | |
| WO2025007795A1 (en) | Method and device for configuring resources | |
| US12056005B2 (en) | Apparatus and method for detecting and correcting failures in kiosks and informational displays | |
| KR101431712B1 (en) | Apparatus and method for notifying the setting state of the wake-on-LAN function | |
| US20180041543A1 (en) | Systems and methods for dynamic root of trust measurement in management controller domain | |
| US20150358213A1 (en) | Systems and methods for sharing a single firmware image in a chassis configured to receive a plurality of modular information handling systems | |
| CN118886072A (en) | Computer host hardware anti-theft method | |
| US9594721B1 (en) | Datacenter event handling | |
| CN110750805A (en) | Application access control method, apparatus, electronic device and readable storage medium | |
| US12047442B1 (en) | Configuring a replacement node using a configuration backup of a failed node being replaced | |
| US10153937B1 (en) | Layered datacenter components | |
| CN115510064A (en) | ES alarm data backfill method, device, equipment and medium | |
| US10348592B2 (en) | Systems and methods for dynamic availability of executable endpoints | |
| JP4983241B2 (en) | Device management support method and device management support program | |
| US20220353057A1 (en) | Managing migration of self encrypted drive within a single key management system user group |
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |