Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for unifying terminal ie configuration and protection

A terminal and configuration file technology, applied in transmission systems, program control devices, instruments, etc., can solve the problems of B/S business applications not being able to access normally, terminal configuration not being able to be uniformly configured, cumbersome, etc.

Active Publication Date: 2021-01-05
三六零数字安全科技集团有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] When many B / S systems are running, they need to configure the operating environment of the IE browser, such as whether to allow pop-up windows, whether to allow Cookies, etc. When the user's IE browser does not meet the requirements, the user's operation steps are usually guided The user configures step by step. This method is cumbersome, and abnormal problems are prone to occur during the modification process. Usually, the terminal configuration cannot be uniformly configured.
[0003] The current technical method is to automatically set the IE environment before running the B / S system for the first time, and the IE setting has been achieved. However, the IE configuration has been modified due to user misoperation, or the IE configuration has been tampered with by malicious programs, which has led to The user's B / S business application cannot be accessed normally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for unifying terminal ie configuration and protection
  • A method for unifying terminal ie configuration and protection
  • A method for unifying terminal ie configuration and protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be described in further detail below in conjunction with the accompanying drawings and examples.

[0033] The present invention provides a method for unified terminal IE configuration and protection, and its application scenario is a local area network environment, such as image 3 As shown, the local area network includes a server computer 301 and a computer group 302. The computer group 302 is composed of computer A1, computer A2, and computer A3. The IE browser version and IE configuration of each computer are different:

[0034] The version number of the IE browser of computer A1 is 8.0.2900, and the IE configuration is such that the IE menu bar is visible, the favorites bar is visible, and there is no trusted site among the trusted sites;

[0035] The version number of the IE browser of computer A2 is 8.0.2800, the IE configuration is such that the IE menu bar is invisible, the favorites bar is visible, and there is no trusted site among ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for unifying and protecting the IE configuration of a terminal. The method can be widely applied to IE browsers with various versions, modifies the IE configuration of the terminal in a unified way, and conveniently and quickly achieve unified configuration. In addition, on the basis of not changing the operating habit of a user, the method avoids manual modification and normal B / S office incapability caused by the configuration tampering of the IE browser performed by other malicious programs. The method is suitable for all configurations in which the IE configuration corresponds to the registry.

Description

technical field [0001] The invention belongs to the technical field of computer system safety management, and in particular relates to a method for unifying terminal IE configuration and protection. Background technique [0002] When many B / S systems are running, they need to configure the operating environment of the IE browser, such as whether to allow pop-up windows, whether to allow Cookies, etc. When the user's IE browser does not meet the requirements, the user's operation steps are usually guided The user configures step by step. This method is cumbersome, and abnormal problems are prone to occur during the modification process. Usually, the terminal configuration cannot be uniformly configured. [0003] The current technical method is to automatically set the IE environment before running the B / S system for the first time, and the IE setting has been achieved. However, the IE configuration has been modified due to user misoperation, or the IE configuration has been t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08G06F9/445
CPCG06F9/44505H04L67/06H04L67/303
Inventor 张悦刘佳琦金魁
Owner 三六零数字安全科技集团有限公司