CN106888247A - A kind of unified terminal IE configurations and the method for protection - Google Patents

A kind of unified terminal IE configurations and the method for protection Download PDF

Info

Publication number
CN106888247A
CN106888247A CN201611215653.7A CN201611215653A CN106888247A CN 106888247 A CN106888247 A CN 106888247A CN 201611215653 A CN201611215653 A CN 201611215653A CN 106888247 A CN106888247 A CN 106888247A
Authority
CN
China
Prior art keywords
local
configuration files
configurations
computer
browser
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611215653.7A
Other languages
Chinese (zh)
Other versions
CN106888247B (en
Inventor
张悦
刘佳琦
金魁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
360 Digital Security Technology Group Co Ltd
Original Assignee
SHENYANG GENERALSOFT CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENYANG GENERALSOFT CO Ltd filed Critical SHENYANG GENERALSOFT CO Ltd
Priority to CN201611215653.7A priority Critical patent/CN106888247B/en
Publication of CN106888247A publication Critical patent/CN106888247A/en
Application granted granted Critical
Publication of CN106888247B publication Critical patent/CN106888247B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/303Terminal profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of unified terminal IE configurations and the method for protection, the browser of various IE versions is can be widely applied to, unified configuration is conveniently realized in the configuration of unified modification terminal IE.Meanwhile, on the basis of the operating habit for not changing user, it is to avoid the configuration that user's manual modification and other rogue programs distort IE browser causes the user cannot problem that normally B/S handles official business.The present invention is adapted to IE configurations all configurations of corresponding relation with registration table.

Description

A kind of unified terminal IE configurations and the method for protection
Technical field
The invention belongs to computer system security administrative skill field, and in particular to a kind of unified terminal IE configurations and protection Method.
Background technology
Many B/S systems operationally, are required for configuring the running environment of IE browser, than such as whether allowing bullet Go out window, whether allow Cookies etc., when the IE browser of user is unsatisfactory for requiring, generally provides user's operating procedure and refer to User's collocation in successive steps is led, it is comparatively laborious in this way, and easily there is abnormal problem during modification, generally eventually End configuration cannot obtain unifying configuration.
Current techniques means are that IE environment is configured automatically by before first operation B/S systems, have been reached to IE's Set, but the configuration of IE is have modified due to user misoperation, or IE configurations are distorted by rogue program, and then result in use The B/S service applications at family can not be accessed normally.
The content of the invention
The present invention is to avoid weak point present in above-mentioned prior art, there is provided a kind of unified terminal IE configurations and guarantor The method of shield, do not change user normally using IE browser on the basis of realize the configuration of unified terminal IE, unified standard Change the display of terminal IE, the method is widely used in the browser of various IE versions, meanwhile, the configuration provides to IE browser are protected Protection mechanism, prevents user from changing manually or suffers that rogue program is distorted.
In order to solve the above technical problems, the present invention is adopted the following technical scheme that:
A kind of method of configuration and the protection of unified terminal IE is comprised the steps of:
A. local IE configuration files are obtained:By read registry entry HKEY_LOCAL_MACHINE SOFTWARE Microsoft Internet Explorer obtain the version information of local IE browser;By the version of local IE browser The local IE configuration files of acquisition of information;
The version information of the local IE browser includes:The version number of IE browser;
The local IE configuration files include:File name, MD5 yard;If the IE configuration files do not exist, can be by local The version information of IE browser identifies the form of IE configuration files, and the form of the IE configuration files is IE+ version numbers;
B. judge whether match with the title of the IE configuration files of service end:The IE of local IE configuration files and service end is configured File is matched;
The IE configuration files of the service end include:File name, MD5 yard;
If file name is matched, step c is continued executing with, if file name is mismatched, continue executing with step d;
C. judge whether match with MD5 yards in the IE configuration files of service end:By MD5 yards in local IE configuration files and clothes MD5 yards in the IE configuration files at business end is matched, if it does, then perform step e and reading and parsing local IE configurations text Part;If it does not match, performing step d updates local IE configuration files;
D. local IE configuration files are updated:It is by file download module that the IE configuration files of service end is locally downloading, and more New local IE configuration files are the IE configuration files of service end, continue executing with step e;
E. read and parse local IE configuration files:Local IE configuration files are read by API, in obtaining local IE configuration files Content;The content in local IE configuration files is parsed according to specified rule, local IE profile informations are obtained;
The local IE profile informations include:IE configuration items and corresponding value;
F. judge whether match with local IE configurations:Local IE profile informations are matched with local IE configurations, if Mismatch, then perform step g and change local IE configurations;If it does, will perform step h protects local IE configurations;
G. local IE configurations are changed:Local IE will be changed by API to configure;
H. local IE is protected to configure:Local IE configurations are protected not to be modified;
I. the local IE that standardizes shows:User start IE browser after, by hook(HOOK)Technology is linked up with local boot All processes, by process name judge start process whether be IE processes;
If not IE processes, then do not process;
If IE processes, then by enumerating the control obtained in IE forms, by the class name of IE form controls(Class Name)Set membership find need disabling handle, call API disable handle, make user cannot the local IE of manual modification match somebody with somebody Put, to realize that the local IE of unified standardization shows.
In the step h, local IE configurations are protected not to be modified, it is further comprising the steps:
H1. registry entry modification operation is monitored:Layer is driven the modification of registry entry is monitored by registering the readjustment of registration table Operation;
H2. judge whether the process ID of registry entry modification operation is legal:The process ID of modification operation is obtained by API, is judged Whether the process ID for changing operation is legitimate processes;If legal, do not process;If illegal, step h3 is performed;
H3. judge whether registry entry modification operation is identical with local IE profile informations, if identical, does not allow modification Local IE configurations;If it is not the same, then allowing to change local IE configurations.
The beneficial effects of the present invention are:
The present invention is to provide a kind of method of unified terminal IE configurations, the browser of various IE versions is can be widely applied to, The configuration of unified modification terminal IE, conveniently realizes unified configuration.Meanwhile, on the basis of the operating habit for not changing user On, it is to avoid the configuration that user's manual modification and other rogue programs distort IE browser causes the user cannot normally B/S offices Problem.The present invention is adapted to IE configurations all configurations of corresponding relation with registration table.
Brief description of the drawings
Fig. 1 is that method flow diagram is put in a kind of unified terminal IE configurations of the invention and protection;
Fig. 2 is the flow chart that method and step h is put in a kind of unified terminal IE configurations of the invention and protection;
Fig. 3 is the network structure of the specific embodiment of the invention.
Specific embodiment
Below in conjunction with accompanying drawing and example, the present invention is described in further detail.
The invention provides a kind of unified terminal IE configurations and the method for protection, its application scenarios is LAN environment, such as Shown in Fig. 3, the LAN includes server computer 301 and computer cluster 302, and computer cluster 302 is by computer A1, calculates Machine A2, computer A3 are constituted, and IE browser version and the IE configuration of every computer are different from together:
The IE browser version number of computer A1 is configured to that IE menu bars are visible, collection column is visible, trusted for 8.0.2900, IE Without trusted site in website;
The IE browser version number of computer A2 is configured to that IE menu bars are invisible, collection column is visible for 8.0.2800, IE, receives Without trusted site in letter website;
The IE browser version number of computer A3 be 10.0.2900, be configured to without IE configuration files, IE IE menu bars it is invisible, Collection column is visible, trusted site is 192.168.0.1 in trusted site;
The IE of the setting of server computer 301 is configured to:Unified hiding IE menu bars, unified hiding collection column, unified addition The trusted site 10.192.140.7 of IE
Now need that 3 computers are unified not to be modified for the IE of server computer setting is configured and protected.
As shown in figure 1, the specific works step of unified terminal IE configurations of the invention and protection is as follows:
A. local IE configuration files 101 are obtained:
By read respectively computer A1, computer A2, computer A3 registry entry HKEY_LOCAL_MACHINE SOFTWARE Microsoft Internet Explorer obtain computer A1, computer A2, computer A3 local IE it is clear Look at the version information of device;
The version number of the local IE browser of computer A1 is 8.0.2900, the version number of the local IE browser of computer A2 is 8.0.2800, the version number of the local IE browser of computer A3 is 10.0.2900;
Computer A1, computer A2 are obtained by the version number of computer A1, computer A2, the browser of computer A3, is calculated The local IE configuration files of machine A3;
The local IE configuration files of computer A1 include:File name IE8.txt, MD5 code 1c1297afcc5cd2f5c292e9dad94d6306;
The local IE configuration files of computer A2 include:File name IE8.txt, MD5 code 043464bff5c394d7437c9ee316d8674c;
The local IE configuration files of computer A3 include:File name does not exist, MD5 yards of sky, by the local IE of computer A3 The version number of browser is 10.0.2900, and the form that may recognize that IE configuration files is IE+10;
B. judge whether match 102 with the title of the IE configuration files of service end:
The IE of computer A1, computer A2, the local IE configuration files of computer A3 and server computer 301 is configured respectively File is matched;
2 IE configuration files, file name IE8.txt, MD5 code are included in server computer 301 1c1297afcc5cd2f5c292e9dad94d6306;File name IE10.txt, MD5 code 221297becc5cd2f5c292e9dad94d6382;
Wherein, the file name IE8.txt and server computer in the local IE configuration files of computer A1, computer A2 File name IE8.txt matchings in 301 IE configuration files, continue executing with step 103;
The local IE configuration files of computer A3 are mismatched with the IE configuration files of server computer 301, continue executing with step 104;
C. judge whether match 103 with MD5 yards in the IE configuration files of service end:
MD5 yards of 1c1297afcc5cd2f5c292e9dad94d6306 and service end in the local IE configuration files of computer A1 MD5 yards of 1c1297afcc5cd2f5c292e9dad94d6306 matchings in the IE configuration files of computer 301, then perform step 105;
MD5 yards of 043464bff5c394d7437c9ee316d8674c and service end in the local IE configuration files of computer A2 MD5 yards of 1c1297afcc5cd2f5c292e9dad94d6306 in the IE configuration files of computer 301 is mismatched, then perform step Rapid 104;
D. local IE configuration files 104 are updated:
File name IE8.txt, MD5 code in IE configuration files by file download module by server computer 301 1c1297afcc5cd2f5c292e9dad94d6306 downloads to computer A2, and the IE configuration files of more new computer A2 are text Part title IE8.txt, MD5 code 1c1297afcc5cd2f5c292e9dad94d6306;
File name IE10.txt, MD5 code in IE configuration files by file download module by server computer 301 221297becc5cd2f5c292e9dad94d6382 downloads to computer A3, and the IE configuration files of more new computer A3 are text Part title IE10.txt, MD5 code 221297becc5cd2f5c292e9dad94d6382;
E. read and parse local IE configuration files 105:
The local IE configuration files of computer A1, computer A2, computer A3 are read by API, local IE configuration files are obtained In content;The content in local IE configuration files is parsed according to specified rule, computer A1, computer A2, computer is obtained The local IE profile informations of A3;
The computer A1, computer A2, the local IE profile informations of computer A3 include:
F. judge whether match 106 with local IE configurations:Local IE profile informations are matched with local IE configurations, such as Fruit mismatches, then perform step 107 and change local IE configurations;Local IE is protected to configure if it does, step 108 will be performed;
IE configurations local with the computer A1 are contrasted:
IE configurations local with the computer A2 are contrasted:
IE configurations local with the computer A3 are contrasted:
G. local IE configurations 107 are changed:
The local IE of the computer A1 are changed by API to configure:
The local IE of the computer A2 are changed by API to configure:
The local IE of the computer A3 are changed by API to configure:
H. local IE configurations 108 are protected:If the IE trusted sites of computer A1 are revised as 192.168.0.58 by user manually, Need to perform step 201;
Step 201:Monitor the modification operation of the IE trusted sites of computer A1:Drive layer by register the readjustment of registration table come Monitor the modification operation of the IE trusted sites of computer A1;
Step 202:Judge whether the process ID of the modification operation of the IE trusted sites of computer A1 is legal:Obtained by API and counted The process ID of the modification operation of the IE trusted sites of calculation machine A1 is 1112, and legitimate processes ID is 1000, judges the IE of computer A1 The process ID of the modification operation of trusted site is illegal process for 1112, then perform step 203;
Step 203:Judge modification operation and the local IE configuration files HKEY_ of computer A1 of the IE trusted sites of computer A1 CURRENT_USER\Software\microsoft\Windows\CurrentVersion\Internet Settings\ Zonemap Ranges Range1 it is identical, then do not allow the local IE for changing computer A1 to configure;
I. the local IE that standardizes shows 109:User start IE browser after, by hook(HOOK)Technology hook is locally being opened Dynamic all processes, judge whether the process for starting is IE processes by process name;
What computer A1, computer A2, computer A3 started is IE processes, by enumerating the control obtained in IE forms, is passed through The class name of IE form controls(Class Name)Set membership find need disabling handle, call API disable handle, use Family cannot manual modification local IE configurations, to realize that the IE configurations by computer A1, computer A2, computer A3 are set to unification Hide IE menu bars, unified hiding collection column, the trusted site 10.192.140.7 of unified addition IE.
Local IE configurations are configured, read and parse by updating local IE, it is real according to IE configuration items and the difference of respective value Now unified terminal IE configurations easily and fast, and IE configurations are protected, on the basis of the operating habit for not changing user, Avoid user's manual modification and other rogue programs distort the configuration of IE browser and cause the user cannot normal asking of handling official business of B/S Topic.Meanwhile, the present invention is adapted to the browser for being widely used in various IE versions, and has corresponding with registration table suitable for IE configurations All configurations of relation, greatly improve configurable versatility and reliability.

Claims (2)

1. a kind of method of configuration and the protection of unified terminal IE it is characterized in that:
A. local IE configuration files are obtained:By read registry entry HKEY_LOCAL_MACHINE SOFTWARE Microsoft Internet Explorer obtain the version information of local IE browser;By the version of local IE browser The local IE configuration files of acquisition of information;
The version information of the local IE browser includes:The version number of IE browser;
The local IE configuration files include:File name, MD5 yard;If the IE configuration files do not exist, can be by local The version information of IE browser identifies the form of IE configuration files, and the form of the IE configuration files is IE+ version numbers;
B. judge whether match with the title of the IE configuration files of service end:The IE of local IE configuration files and service end is configured File is matched;
The IE configuration files of the service end include:File name, MD5 yard;
If file name is matched, step c is continued executing with, if file name is mismatched, continue executing with step d;
C. judge whether match with MD5 yards in the IE configuration files of service end:By MD5 yards in local IE configuration files and clothes MD5 yards in the IE configuration files at business end is matched, if it does, then perform step e and reading and parsing local IE configurations text Part;If it does not match, performing step d updates local IE configuration files;
D. local IE configuration files are updated:It is by file download module that the IE configuration files of service end is locally downloading, and more New local IE configuration files are the IE configuration files of service end, continue executing with step e;
E. read and parse local IE configuration files:Local IE configuration files are read by API, in obtaining local IE configuration files Content;The content in local IE configuration files is parsed according to specified rule, local IE profile informations are obtained;
The local IE profile informations include:IE configuration items and corresponding value;
F. judge whether match with local IE configurations:Local IE profile informations are matched with local IE configurations, if Mismatch, then perform step g and change local IE configurations;If it does, will perform step h protects local IE configurations;
G. local IE configurations are changed:Local IE will be changed by API to configure;
H. local IE is protected to configure:Local IE configurations are protected not to be modified;
I. the local IE that standardizes shows:User start IE browser after, by hook(HOOK)Technology is linked up with local boot All processes, by process name judge start process whether be IE processes;
If not IE processes, then do not process;
If IE processes, then by enumerating the control obtained in IE forms, by the class name of IE form controls(Class Name)Set membership find need disabling handle, call API disable handle, make user cannot the local IE of manual modification match somebody with somebody Put, to realize that the local IE of unified standardization shows.
2. method according to claim 1, it is characterised in that in the step h, in the step h, protection is local IE configurations are not modified, further comprising the steps:
H1. registry entry modification operation is monitored:Layer is driven the modification of registry entry is monitored by registering the readjustment of registration table Operation;
H2. judge whether the process ID of registry entry modification operation is legal:The process ID of modification operation is obtained by API, is judged Whether the process ID for changing operation is legitimate processes;If legal, do not process;If illegal, step h3 is performed;
H3. judge whether registry entry modification operation is identical with local IE profile informations, if identical, does not allow modification Local IE configurations;If it is not the same, then allowing to change local IE configurations.
CN201611215653.7A 2016-12-26 2016-12-26 Method for unified terminal IE configuration and protection Active CN106888247B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611215653.7A CN106888247B (en) 2016-12-26 2016-12-26 Method for unified terminal IE configuration and protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611215653.7A CN106888247B (en) 2016-12-26 2016-12-26 Method for unified terminal IE configuration and protection

Publications (2)

Publication Number Publication Date
CN106888247A true CN106888247A (en) 2017-06-23
CN106888247B CN106888247B (en) 2021-01-05

Family

ID=59176437

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611215653.7A Active CN106888247B (en) 2016-12-26 2016-12-26 Method for unified terminal IE configuration and protection

Country Status (1)

Country Link
CN (1) CN106888247B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109657178A (en) * 2018-11-12 2019-04-19 平安科技(深圳)有限公司 Page table list processing method, device, computer equipment and storage medium
CN110244986A (en) * 2019-05-20 2019-09-17 平安银行股份有限公司 Browser configuration method and device
CN113778506A (en) * 2021-07-23 2021-12-10 北京国电通网络技术有限公司 Browser control method, system and device and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1741454A (en) * 2004-08-24 2006-03-01 Nhn株式会社 Change method and system for initial main page of network customer terminal
CN101729594A (en) * 2009-11-10 2010-06-09 中兴通讯股份有限公司 Remote configuration control method and system
CN103218242A (en) * 2013-04-19 2013-07-24 飞天诚信科技股份有限公司 Method of automatic update
CN103365694A (en) * 2013-07-31 2013-10-23 北京金和软件股份有限公司 Method for setting IE (internet explorer) environment during primary operation of B/S (browser/server) system
US8887132B1 (en) * 2010-09-03 2014-11-11 Christopher R. Hunter Application runtime environment and framework
CN104580480A (en) * 2015-01-15 2015-04-29 上海瀚银信息技术有限公司 Remote automatic deployment system and method for client end
CN105956202A (en) * 2016-06-27 2016-09-21 北京小米移动软件有限公司 Web page display method and web page display apparatus in browser as well as terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1741454A (en) * 2004-08-24 2006-03-01 Nhn株式会社 Change method and system for initial main page of network customer terminal
CN101729594A (en) * 2009-11-10 2010-06-09 中兴通讯股份有限公司 Remote configuration control method and system
US8887132B1 (en) * 2010-09-03 2014-11-11 Christopher R. Hunter Application runtime environment and framework
CN103218242A (en) * 2013-04-19 2013-07-24 飞天诚信科技股份有限公司 Method of automatic update
CN103365694A (en) * 2013-07-31 2013-10-23 北京金和软件股份有限公司 Method for setting IE (internet explorer) environment during primary operation of B/S (browser/server) system
CN104580480A (en) * 2015-01-15 2015-04-29 上海瀚银信息技术有限公司 Remote automatic deployment system and method for client end
CN105956202A (en) * 2016-06-27 2016-09-21 北京小米移动软件有限公司 Web page display method and web page display apparatus in browser as well as terminal

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
赵永琳: ""别来纠缠我——IE设置工具V1.0"", 《电脑采购周刊》 *
龙智超: ""IE中的代理设置"", 《中国会计电算化》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109657178A (en) * 2018-11-12 2019-04-19 平安科技(深圳)有限公司 Page table list processing method, device, computer equipment and storage medium
CN109657178B (en) * 2018-11-12 2024-03-01 平安科技(深圳)有限公司 Page form processing method and device, computer equipment and storage medium
CN110244986A (en) * 2019-05-20 2019-09-17 平安银行股份有限公司 Browser configuration method and device
CN110244986B (en) * 2019-05-20 2023-12-08 平安银行股份有限公司 Browser configuration method and device
CN113778506A (en) * 2021-07-23 2021-12-10 北京国电通网络技术有限公司 Browser control method, system and device and electronic equipment
CN113778506B (en) * 2021-07-23 2024-05-10 北京国电通网络技术有限公司 Browser management and control method, system and device and electronic equipment

Also Published As

Publication number Publication date
CN106888247B (en) 2021-01-05

Similar Documents

Publication Publication Date Title
CN103617057B (en) Application program installation method and device
JP6644001B2 (en) Virus processing method, apparatus, system, device, and computer storage medium
US8726387B2 (en) Detecting a trojan horse
EP2912547B1 (en) Configuration file updater
US9367695B2 (en) Software vulnerability notification via icon decorations
EP3198418B1 (en) Method to modify android application life cycle to control its execution in a containerized workspace environment
US20120291023A1 (en) Device and method for automatic driver installation
CN109690548B (en) Computing device protection based on device attributes and device risk factors
US20120102569A1 (en) Computer system analysis method and apparatus
CN106888247A (en) A kind of unified terminal IE configurations and the method for protection
WO2017112168A1 (en) Multi-label content recategorization
US8677346B1 (en) Providing installer package information to a user
US8478705B2 (en) Portable data management using rule definitions
US20230216868A1 (en) Analysis of endpoint detect and response data
US20170091654A1 (en) Multi-label classification for overlapping classes
US20080168565A1 (en) Method, system, mobile device, apparatus and computer program product for validating rights objects
US7949641B1 (en) Systems and methods for validating a portion of a file that is downloaded from another computer system
US9542075B2 (en) Method and server for managing domain-specific toolbar button automatically
US8539598B2 (en) Detection of customizations of application elements
US20140149585A1 (en) Software asset management using a browser plug-in
CN110363011B (en) Method and apparatus for verifying security of UEFI-based BIOS
CN109117202B (en) Method and system for setting audit type configuration items
CN106411899A (en) Security detection method and device for data files
CN113329107B (en) Method and device for coping with influence of operating system change on equipment fingerprint calculation
CN114637526A (en) Product component upgrading method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20210715

Address after: 100020 1773, 15 / F, 17 / F, building 3, No.10, Jiuxianqiao Road, Chaoyang District, Beijing

Patentee after: Beijing Hongteng Intelligent Technology Co.,Ltd.

Address before: 110179 building 21, jinpenglong high tech Industrial Park, 19 Wenhui street, Hunnan New District, Shenyang City, Liaoning Province

Patentee before: SHENYANG GENERALSOFT Co.,Ltd.

TR01 Transfer of patent right
CP01 Change in the name or title of a patent holder

Address after: 100020 1773, 15 / F, 17 / F, building 3, No.10, Jiuxianqiao Road, Chaoyang District, Beijing

Patentee after: Sanliu0 Digital Security Technology Group Co.,Ltd.

Address before: 100020 1773, 15 / F, 17 / F, building 3, No.10, Jiuxianqiao Road, Chaoyang District, Beijing

Patentee before: Beijing Hongteng Intelligent Technology Co.,Ltd.

CP01 Change in the name or title of a patent holder