CN109005042A - A kind of autocontrol method and equipment of computer - Google Patents

A kind of autocontrol method and equipment of computer Download PDF

Info

Publication number
CN109005042A
CN109005042A CN201810990225.4A CN201810990225A CN109005042A CN 109005042 A CN109005042 A CN 109005042A CN 201810990225 A CN201810990225 A CN 201810990225A CN 109005042 A CN109005042 A CN 109005042A
Authority
CN
China
Prior art keywords
computer
identity information
personnel
verifying
disengaging
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810990225.4A
Other languages
Chinese (zh)
Inventor
高晓锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201810990225.4A priority Critical patent/CN109005042A/en
Publication of CN109005042A publication Critical patent/CN109005042A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/12Arrangements for remote connection or disconnection of substations or of equipment thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of autocontrol method of computer and equipment, are related to computer automatic switching technology.The autocontrol method of computer disclosed by the invention, comprising: the identity information of verifying disengaging personnel;When the identity information of the personnel of disengaging passes through verifying, the computer media access control MAC addresses bound to the identity information of disengaging personnel send computer control instruction;Wherein, computer control instruction includes the instruction for starting the instruction of computer and/or shutting down computer.Using technical scheme, the waiting time can be saved, electric power resource is avoided to waste, and ensure Electrical Safety, improve the efficiency of management and intelligent level.

Description

A kind of autocontrol method and equipment of computer
Technical field
The present invention relates to computer automatic switching technology, in particular to the autocontrol method of a kind of computer and set It is standby.
Background technique
As cloud computing and modern management technique develop, computer has become the office appliance of office's indispensability, net Network is also the necessary condition of modern office, and attendance recorder also becomes the necessary equipment of modern offices examination.It goes to work to office First thing be exactly to check card, open computer, close computer before leaving offices, check card, this has become customary work on and off duty daily Make.Computer switch key is pressed daily to wait computer starting, close and can waste time, and After Hours forgets that closing computer will cause electricity The power wasting of resources and Electrical Safety hidden danger.
Summary of the invention
The invention discloses a kind of autocontrol method of computer and equipment, can solve and wait in existing working environment The problem of being wasted time caused by when computer starting, closing.
The invention discloses a kind of autocontrol methods of computer, specifically include that
Verify the identity information of disengaging personnel;
When the identity information of the personnel of disengaging passes through verifying, to the computer media of the identity information of disengaging personnel binding The access control address (MAC) sends computer control instruction;
The computer control instruction includes the instruction for starting the instruction of computer and/or shutting down computer.
Optionally, described when the identity information of the personnel of disengaging passes through verifying in the above method, to the body of disengaging personnel The computer MAC Address of part information binding sends computer control instruction, comprising:
When the identity information for entering personnel passes through verifying, to the computer MAC of identity information binding for entering personnel Address sends the instruction of starting computer.
Optionally, described when the identity information of the personnel of disengaging passes through verifying in the above method, to the body of disengaging personnel The computer MAC Address of part information binding sends computer control instruction, comprising:
When the identity information for the personnel that leave passes through verifying, to the computer MAC of identity information binding for leaving personnel Address sends the instruction shut down computer.
Optionally, in the above method, the identity information of the verifying disengaging personnel, comprising:
Device is verified by traditional identity or increases identification verification function newly in existing apparatus, verifies the identity of disengaging personnel Information, the existing apparatus include following any one or several:
Attendance recorder, access control equipment, smart home device, electronic lock, Fingerprint Lock.
Optionally, the above method further include:
The identity information of legitimate user is stored in advance, and is associated with the computer of binding with the identity information of legitimate user MAC Address.
There is disclosed herein a kind of automatic control equipments of computer, comprising:
First unit verifies the identity information of disengaging personnel;
Second unit is bound when the identity information of the personnel of disengaging passes through verifying to the identity information of disengaging personnel Computer MAC Address sends computer control instruction;
The computer control instruction includes the instruction for starting the instruction of computer and/or shutting down computer.
Optionally, in above equipment, the second unit, pass in and out personnel identity information pass through verifying when, to this into The computer MAC Address of the identity information binding of personnel sends computer control instruction out, comprising:
The second unit is tied up when the identity information for entering personnel passes through verifying to the identity information for entering personnel Fixed computer MAC Address sends the instruction of starting computer.
Optionally, in above equipment, the second unit, pass in and out personnel identity information pass through verifying when, to this into The computer MAC Address of the identity information binding of personnel sends computer control instruction out, comprising:
The second unit is tied up when the identity information for leaving personnel passes through verifying to the identity information for leaving personnel Fixed computer MAC Address sends the instruction shut down computer.
Optionally, in above equipment, the equipment is traditional identity verifying device or is to have increased identification verification function newly Following any one or several devices:
Attendance recorder, access control equipment, smart home device, electronic lock, Fingerprint Lock.
Optionally, above equipment further include:
Third unit is stored in advance the identity information of legitimate user, and is associated with binding with the identity information of legitimate user Computer MAC Address.
Using technical scheme, the computer that user uses can be automatically turned on or close, to save the waiting time, It avoids electric power resource from wasting, and ensures Electrical Safety, improve the efficiency of management and intelligent level.Working environment is particularly suitable for, It is automatic to start employee's computer when achievable employee's working is checked card, employee's computer is automatically closed when employee comes off duty and checks card.
Detailed description of the invention
Fig. 1 is the environment schematic that computer controlled automatic is realized in the embodiment of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with specific embodiment pair Technical solution of the present invention is described in further detail.It should be noted that in the absence of conflict, embodiments herein and Feature in embodiment can be arbitrarily combined with each other.
Embodiment 1
Computer Auto Power On can be configured daily timing start-up by power management relevant options in BIOS at present, or It is waken up by setting network remote, for office environment, weekend and festivals or holidays or the when of asking for leave will generate timing start-up Many troubles, Remote Wake Up also need specific software realization.
Therefore it is directed to working environment, present inventor proposes, if can start office meter automatically when working is checked card Calculation machine can be automatically closed office computer when coming off duty and checking card, will save time and electric power resource, and can bring one kind Completely new office experience.And this idea is also extend to other field, such as smart home, wisdom computer laboratory etc. Scene, if into or leave the personnel of current environment and passed through authentication, that is, can trigger computer automatic opening or from It is dynamic to close.
Therefore, it is based on above-mentioned thought, the present embodiment provides a kind of autocontrol method of computer, main includes following behaviour Make:
Verify the identity information of disengaging personnel;
When the identity information of the personnel of disengaging passes through verifying, to the computer MAC of the identity information of disengaging personnel binding Address sends computer control instruction;
Above-mentioned computer control instruction includes the instruction for starting the instruction of computer and/or shutting down computer.
Disengaging personnel involved in herein include entering personnel and leaving personnel.For entering personnel, if Its verifying for having passed through identity information, the computer MAC Address transmission that the identity information binding of personnel can be generally entered to this are opened The instruction of dynamic computer, the waiting time being switched on again when entering personnel using computer so as to shorten this.
If it is the personnel that leave, identity information has passed through verifying, and the identity information binding of personnel can be generally left to this Computer MAC Address send the instruction shut down computer, so that the personnel be avoided to forget the wave of electric power caused by shutdown when leaving Take, and ensures Electrical Safety.Wherein, the calculating after the identity information to disengaging personnel is verified, with identity information binding It is the association binding from the identity information and computer MAC Address of legitimate user when machine MAC Address sends computer control instruction Inquire specified computer MAC Address in relationship, and the identity information of legitimate user and its computer MAC of association binding Address be it is pre-stored, can store in the authentication means or server end.
It should also be noted that can be tested using traditional identity when verifying the identity information of disengaging personnel in the above method Card device (such as biometric authentication device etc.) is verified.It is also possible to carry out after increasing identification verification function newly in existing apparatus Verifying.Such as increase body in the devices such as existing attendance recorder, access control equipment, smart home device, electronic lock, Fingerprint Lock Part authentication module is verified.
In addition, the interaction between authentication means and computer can be carried out by wired or wireless network, main energy Computer control instruction is enough transmitted, this present embodiment is not particularly limited.
Below by taking working environment as an example, illustrate the specific implementation of above-mentioned computer controlled automatic method, the realization of this method Rely on framework as shown in Figure 1.In working environment, checking card movement and trigger the realization of computer controlled automatic with user Journey is as follows:
Firstly, increasing switching on and shutting down management module on the basis of current attendance recorder (increases examining for switching on and shutting down management module Diligent machine is equivalent to authentication means), it is mainly responsible for verifying worker, record attendance information.
Secondly, server management module increases employee ID, employee's office computer MAC Address is associated with binding management function, Store each employee ID and its corresponding employee's office computer MAC Address.
Finally, being responsible for sending the instruction of switching computer by attendance recorder in clock in and out, computer is opened or closed.
I.e. receive employee punch in operate when, inquire the employee ID of the employee, be equivalent to verifying worker, it Inquiry is associated with the MAC Address of employee's office computer of binding with the employee ID afterwards, sends starting meter to the MAC Address inquired The instruction of calculation machine.
Correspondingly, receive employee clock out operate when, inquire the employee ID of the employee, be equivalent to verifying employee's body Part, inquiry is associated with the MAC Address of employee's office computer of binding with the employee ID later, sends to the MAC Address inquired The instruction shut down computer.
In addition, can refer to the above method for access control equipment, smart home device, electronic lock and realize computer It automatically controls.Increase identification verification function on the basis of access control equipment, smart home device, electronic lock, so as to right Disengaging personnel carry out authentication, wherein enter personnel for by authentication, the identity that personnel can be entered to this is believed The computer MAC Address of breath binding sends the instruction of starting computer.For leaving personnel by authentication, left to this The computer MAC Address of the identity information binding of personnel sends the instruction shut down computer.
Embodiment 2
The present embodiment provides a kind of automatic control equipments of computer, mainly include following two units.
First unit verifies the identity information of disengaging personnel;
Second unit is bound when the identity information of the personnel of disengaging passes through verifying to the identity information of disengaging personnel Computer media access control MAC addresses send computer control instruction, and computer control instruction includes the finger for starting computer The instruction for enabling and/or shutting down computer.
Wherein, for entering personnel, when having passed through identity information verifying, second unit enters the identity of personnel to this The computer MAC Address of information binding sends the instruction of starting computer.
For leaving personnel, when having passed through identity information verifying, second unit leaves the identity information of personnel to this The computer MAC Address of binding sends the instruction shut down computer.
In addition, the automatic control equipment of computer can also include third unit, main on the basis of said two units It is used to be stored in advance the identity information of legitimate user, and is associated with the computer MAC of binding with the identity information of legitimate user Address.
In practical application, the automatic control equipment of above-mentioned computer can be traditional identity verifying device.It is also possible to new Increase following any one or several devices of identification verification function:
Attendance recorder, access control equipment, smart home device, electronic lock, Fingerprint Lock etc..
For below using the intelligent Checking on Work Attendance machine in working environment as computer controlled automatic equipment, it is automatic to introduce computer The realization process of control:
General frame is divided into four parts: intelligent Checking on Work Attendance machine (including first unit and second unit), server in this example Manage end module (being equivalent to third unit), network module, computer on/off module.
Wherein, intelligent Checking on Work Attendance machine that is, the present embodiment introduction computer controlled automatic equipment, be to be examined at present Increase management module on the basis of diligent machine, responsible verifying worker, record attendance information, and sent out to by the employee of verifying Send starting or close particular mac address (i.e. with by verifying employee employee ID be associated with bind employee's office computer MAC Address) computer instruction.
Server admin end module (can be an independent module, can also be placed in intelligent Checking on Work Attendance pusher side), be existing Increase on the basis of attendance management and is responsible for employee ID and the associated management function of employee's office computer MAC Address binding.
Network module, responsible attendance recorder couple with office computer, the instruction that transmission starts or shuts down computer.
Computer on/off control module (can be located at computer-side), be responsible for the finger for receiving starting or shutting down computer It enables.
(card, fingerprint, iris) or intelligence from above-described embodiment as can be seen that technical scheme can check card in working When energy gate inhibition, by sending power-on instruction from trend employee's computer after attendance recorder identification worker, computer receives booting It can Auto Power On after instruction.In next check card, shutdown command is sent from attendance recorder to employee's computer, computer receives pass It can automatic shutdown after machine instruction.
Those of ordinary skill in the art will appreciate that all or part of the steps in the above method can be instructed by program Related hardware is completed, and described program can store in computer readable storage medium, such as read-only memory, disk or CD Deng.Optionally, one or more integrated circuits can be used also to realize in all or part of the steps of above-described embodiment.Accordingly Ground, each module/unit in above-described embodiment can take the form of hardware realization, can also use the shape of software function module Formula is realized.The application is not limited to the combination of the hardware and software of any particular form.
The above, preferred embodiments only of the invention, is not intended to limit the scope of the present invention.It is all this Within the spirit and principle of invention, any modification, equivalent substitution, improvement and etc. done should be included in protection model of the invention Within enclosing.

Claims (10)

1. a kind of autocontrol method of computer, which is characterized in that specifically include that
Verify the identity information of disengaging personnel;
When the identity information of the personnel of disengaging passes through verifying, the computer media bound to the identity information of disengaging personnel is accessed It controls MAC Address and sends computer control instruction;
The computer control instruction includes the instruction for starting the instruction of computer and/or shutting down computer.
2. the method as described in claim 1, which is characterized in that it is described when the identity information of the personnel of disengaging passes through verifying, to The computer MAC Address of the identity information binding of disengaging personnel sends computer control instruction, comprising:
When the identity information for entering personnel passes through verifying, to the computer MAC Address of identity information binding for entering personnel Send the instruction of starting computer.
3. method according to claim 1 or 2, which is characterized in that it is described when the identity information of the personnel of disengaging passes through verifying, The computer MAC Address bound to the identity information of disengaging personnel sends computer control instruction, comprising:
When the identity information for the personnel that leave passes through verifying, to the computer MAC Address of identity information binding for leaving personnel Send the instruction shut down computer.
4. method as claimed in claim 3, which is characterized in that the identity information of the verifying disengaging personnel, comprising:
Device is verified by traditional identity or increases identification verification function newly in existing apparatus, the identity letter of verifying disengaging personnel Breath, the existing apparatus include following any one or several:
Attendance recorder, access control equipment, smart home device, electronic lock, Fingerprint Lock.
5. method as claimed in claim 4, which is characterized in that this method further include:
The identity information of legitimate user is stored in advance, and the computer MAC bound is associated with the identity information of legitimate user Location.
6. a kind of automatic control equipment of computer characterized by comprising
First unit verifies the identity information of disengaging personnel;
Second unit, when the identity information of the personnel of disengaging passes through verifying, to the calculating of the identity information of disengaging personnel binding Machine MAC address sends computer control instruction;
The computer control instruction includes the instruction for starting the instruction of computer and/or shutting down computer.
7. equipment as claimed in claim 6, which is characterized in that the second unit passes through in the identity information of disengaging personnel When verifying, the computer MAC Address bound to the identity information of disengaging personnel sends computer control instruction, comprising:
The second unit is bound when the identity information for entering personnel passes through verifying to the identity information for entering personnel Computer MAC Address sends the instruction of starting computer.
8. equipment as claimed in claims 6 or 7, which is characterized in that the second unit is logical in the identity information of disengaging personnel When crossing verifying, the computer MAC Address bound to the identity information of disengaging personnel sends computer control instruction, comprising:
The second unit is bound when the identity information for leaving personnel passes through verifying to the identity information for leaving personnel Computer MAC Address sends the instruction shut down computer.
9. equipment as claimed in claim 8, which is characterized in that
The equipment is traditional identity verifying device or is the following any one or several devices for having increased identification verification function newly:
Attendance recorder, access control equipment, smart home device, electronic lock, Fingerprint Lock.
10. equipment as claimed in claim 8, which is characterized in that the equipment further include:
The identity information of legitimate user is stored in advance in third unit, and the meter of binding is associated with the identity information of legitimate user Calculation machine MAC Address.
CN201810990225.4A 2018-08-28 2018-08-28 A kind of autocontrol method and equipment of computer Pending CN109005042A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810990225.4A CN109005042A (en) 2018-08-28 2018-08-28 A kind of autocontrol method and equipment of computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810990225.4A CN109005042A (en) 2018-08-28 2018-08-28 A kind of autocontrol method and equipment of computer

Publications (1)

Publication Number Publication Date
CN109005042A true CN109005042A (en) 2018-12-14

Family

ID=64594338

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810990225.4A Pending CN109005042A (en) 2018-08-28 2018-08-28 A kind of autocontrol method and equipment of computer

Country Status (1)

Country Link
CN (1) CN109005042A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024007617A1 (en) * 2022-07-08 2024-01-11 华为云计算技术有限公司 Desktop cloud service application control method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN200994142Y (en) * 2007-01-04 2007-12-19 余承桓 Identity verifying start device
CN101651548A (en) * 2009-09-21 2010-02-17 中国电信股份有限公司 Remote starting method and system for equipment
CN101854250A (en) * 2009-03-30 2010-10-06 联想(北京)有限公司 Electronic device management system and method
CN102867348A (en) * 2012-08-09 2013-01-09 天津三星电子有限公司 Switching control system of computer
CN103220157A (en) * 2013-03-04 2013-07-24 中兴通讯股份有限公司 Method and system for automatic power-off of mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN200994142Y (en) * 2007-01-04 2007-12-19 余承桓 Identity verifying start device
CN101854250A (en) * 2009-03-30 2010-10-06 联想(北京)有限公司 Electronic device management system and method
CN101651548A (en) * 2009-09-21 2010-02-17 中国电信股份有限公司 Remote starting method and system for equipment
CN102867348A (en) * 2012-08-09 2013-01-09 天津三星电子有限公司 Switching control system of computer
CN103220157A (en) * 2013-03-04 2013-07-24 中兴通讯股份有限公司 Method and system for automatic power-off of mobile terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024007617A1 (en) * 2022-07-08 2024-01-11 华为云计算技术有限公司 Desktop cloud service application control method and device

Similar Documents

Publication Publication Date Title
CN204926094U (en) System based on authentication is carried out to biological characteristics information
AU2016280664B2 (en) Credential cache
CN105741395A (en) Entrance guard access method and system based on two-dimension code and face identification
CN103295296B (en) Method for controlling access control system by utilizing embedded motherboard and embedded motherboard
CN105303664A (en) Intelligent access control system based on two dimensional code technology and control method thereof
CN110005266A (en) Control method, device and its relevant device of intelligent door lock
CN103117853B (en) A kind of safe storage device account input and authentication method
CN105991565B (en) Method, system and the database proxy server of read and write abruption
CN104966343B (en) Access control method Internet-based
CN101854250A (en) Electronic device management system and method
CN103825745B (en) The method and system being authenticated to user are closed based on Home IOT clouds
CN102867348A (en) Switching control system of computer
CN105472037A (en) Method and device for opening entrance guard through scanning two-dimension code
CN204759558U (en) Intelligent entrance guard , equipment and system
CN108416885A (en) Intelligent key access device and method
CN108932421A (en) A kind of identity identifying method and device
CN108900536A (en) Authentication method, device, computer equipment and storage medium
CN109949466A (en) A kind of intelligent entrance guard control system and method
CN109005042A (en) A kind of autocontrol method and equipment of computer
CN101997691A (en) Remote starting unit
CN103186408A (en) Management method of operated virtual machine, system and device thereof
CN107623701A (en) A kind of fast and safely authentication method and device based on 802.1X
CN108713199B (en) Authority management method and system, mobile terminal, shared charging equipment and server
CN104899483B (en) A kind of start method for verifying authority and system based on intelligent terminal
CN111061579A (en) Method and system for transferring information of intelligent cabinet driven by multi-state machine events

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181214

RJ01 Rejection of invention patent application after publication