Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and apparatus for obtaining a valid registry key name

A registry and key-value technology, applied in the computer field, can solve the problems of slow running speed of the host, complex data structure, consumption, etc., and achieve the effect of speeding up reading

Active Publication Date: 2019-01-15
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the files (i.e. items) in the security baseline knowledge base are generally used by the Microsoft system itself and the Microsoft affiliated software written by Microsoft Corporation, the eXtensible Markup Language (XML( extensiblemarkup language, XML) data structure is extremely complex, when reading the XML data in the ADML-type security baseline project through the security baseline inspection program officially developed by Microsoft, it will consume a lot of system resources due to the simultaneous reading of the data of common setting items. The host is running slowly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and apparatus for obtaining a valid registry key name
  • A method and apparatus for obtaining a valid registry key name
  • A method and apparatus for obtaining a valid registry key name

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The embodiment of the present application provides a method and device for obtaining valid registry key names, which are used to pre-set the method for reading valid registry key names for ADML-type security baseline items, and speed up the reading of valid registry key names. speed.

[0050] see figure 1 , figure 1 It is a schematic diagram of an embodiment of a method for obtaining a valid registry key name in the embodiment of the present application. An embodiment of the method for obtaining a valid registry key name in the embodiment of the present application includes:

[0051] 101. The host loads the XML data in the ADML-type security baseline project into the memory;

[0052] In this embodiment, when the host is writing a security baseline check program check software not officially developed by Microsoft, in order to quickly extract the valid registry key name in the ADML-type security baseline item, the host can first add an XML of an ADML-type security baseli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the application discloses a method and a device for obtaining a valid registry key name, which are used for presetting a method for reading the valid registry key name according to an ADML-type security baseline item, thereby accelerating the speed of reading the valid registry key name. A method according to an embodiment of that present application is stored in an active directory management language ADML-type security baseline project. The method includes: a host loads data of an extensible markup language XML in the ADML-type security baseline project into a memory; the host computer judges whether the attribute content of the first valid name exists in the policy node of the XML data; if so, the host reads the attribute content of the first valid name; the host determines that the attribute content of the first valid name is the valid registry key name.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a method and a device for obtaining valid registry key names. Background technique [0002] The security baseline is a system inspection to check whether the security configuration parameters in the Microsoft system meet the standards in order to meet the security specification requirements of the Microsoft security system. The security baseline also has the function of repairing the system. The security baseline exists in the form of a knowledge base. The security baseline knowledge base usually includes multiple items, which can also be called files. In other words, the security baseline knowledge base securely stores a set of files for checking and repairing Microsoft systems. There are a large number of active directory management language (ADML)-type security baseline projects in Microsoft's official security baseline. The extensible markup language (XML) data i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/54
CPCG06F21/54
Inventor 王唯融
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD