Inspection method, device and server for system configuration information

A technology of configuration information and system configuration, applied in computer security devices, instruments, computing, etc., can solve the problems of limited configuration information, time-consuming and labor-intensive efficiency, and difficulty in comprehensive inspection of the system, and achieve the effect of improving system security.

Active Publication Date: 2021-08-06
XINHUASAN INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Engineers can manually verify the security configuration of terminals one by one, but when the number of terminals is large, this method is time-consuming, laborious and inefficient
In another way, the configuration information of the system can be obtained through the interactive interface reserved in the terminal operating system, such as the WMI (Windows Management Instrumentation, Windows Management Specification) command and the CMD (Command, command prompt) command in the Windows operating system, Then, secure data processing is performed on the obtained configuration information; however, the configuration information obtained in this way is limited, and it is difficult to conduct a comprehensive inspection of the system, which affects the security of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Inspection method, device and server for system configuration information
  • Inspection method, device and server for system configuration information
  • Inspection method, device and server for system configuration information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the purpose, technical solutions and advantages of the embodiments of the present disclosure clearer, the technical solutions of the present disclosure will be clearly and completely described below in conjunction with the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present disclosure, not all of them. implementation. Based on the implementation manners in the present disclosure, all other implementation manners obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present disclosure.

[0022] In terminals such as PCs (Personal Computers, personal computers) and servers used by enterprises, institutions and individuals in their daily work, the Windows operating system currently occupies the mainstream market. ) as the target device to be inspected; the inspection method for devices with other operating systems is similar.

[0023] For ea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present disclosure provides a system configuration information inspection method, device, and server; wherein, the method includes: after establishing a communication connection with the target device, taking each inspection item in the inspection item group of the target device as The current inspection item; each inspection item in the inspection item group includes the inspection command and the compliance information corresponding to the inspection command, and the types of inspection commands contained in the inspection item group are WMI type, registry type and Secedit type; execute the inspection command in the current inspection item to obtain the configuration information of the target device; generate the inspection result of the current inspection item according to the compliance information and configuration information included in the current inspection item; according to the inspection item The inspection result of each inspection item in the group generates the inspection result of the target device. In the present disclosure, relatively complete configuration information of a target device can be obtained through various types of inspection commands, so as to realize a comprehensive inspection of Windows devices, thereby improving system security.

Description

technical field [0001] The present disclosure relates to the technical field of system inspection, and in particular, to a method, device and server for inspection of system configuration information. Background technique [0002] In order to improve the terminal's immunity to viruses, Trojan horses and other malicious software, it is necessary to effectively block and repair the security holes of the terminal. Through standard security configurations, it is possible to limit or prohibit potential security vulnerabilities from being exploited by malicious software, thereby improving the security protection function of the system and enhancing the terminal's ability to resist security risks. [0003] Engineers can manually verify the security configuration of terminals one by one, but when the number of terminals is large, this method is time-consuming, laborious and inefficient. In another way, the configuration information of the system can be obtained through the interact...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 刘汉杰杨烟台
Owner XINHUASAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products