[go: up one dir, main page]

TW574645B - System and method for real time monitoring and control of a computer machine environment and configuration profile - Google Patents

System and method for real time monitoring and control of a computer machine environment and configuration profile Download PDF

Info

Publication number
TW574645B
TW574645B TW91106841A TW91106841A TW574645B TW 574645 B TW574645 B TW 574645B TW 91106841 A TW91106841 A TW 91106841A TW 91106841 A TW91106841 A TW 91106841A TW 574645 B TW574645 B TW 574645B
Authority
TW
Taiwan
Prior art keywords
registration
computer unit
unauthorized
paragraph
values
Prior art date
Application number
TW91106841A
Other languages
Chinese (zh)
Inventor
Robert F Terry
Original Assignee
Granite Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/827,451 external-priority patent/US20020026605A1/en
Application filed by Granite Technologies Inc filed Critical Granite Technologies Inc
Application granted granted Critical
Publication of TW574645B publication Critical patent/TW574645B/en

Links

Landscapes

  • Computer And Data Communications (AREA)

Description

574645 A7 B7 五、發明説明(1 ) 發明領媸 本發明一般而了關於貫體程式(作業系統)應用程式發展的 領域,更特定而言,但並不限於用於即時監看,記錄及/或控 制一電腦單元的内部環境之系統及方法,例如在一個人電 腦(PC)機器内的活動。 發明背景 當科技的使用擴展到企業及組織時,其愈來愈需要管理 員工,藉以有效地追蹤與控制公司所擁有技術的内部扣機 器活動(環境)。 舉例而言’一PC具有一内部作業系統(0/s),其係在該pc由 其内部硬碟“開機,,時所啟始。此0/8包含一系列數百個程式 ’其可管賴有第三方應用(程式)活動及所有使用者的活動 。一終端使用者所執行的每個動作(事件)可在該0/s内部來產 生一内邵反應(另一個事件)’以執行該使用者的請求。每個 由一第三万程式啟始的動作(事件)可在該0/s内部產生一内 部反應d個事件)來執行該程式的請求,有時候為修改該 電腦單元的内部ο/s環境(結構)。 -PC ο/s及所有第三方應用程式的最為關鍵的方面之一為 該⑽及所有第三方應用程式的啟動階段。此啟動階段包含 關鍵樓案及/或註冊登錄,其係由相對於該⑽及第三方應用 程式的某㈣部程式來讀取,其可導引該⑽及第三方應用 程式’其為該0/s“開機,,時或第三方應用(程式)執行時所1 要,,。 這些關鍵樓案及註冊登綠係考慮為“軟表格”,其可允許修574645 A7 B7 V. Description of the invention (1) The invention is generally related to the field of development of running programs (operating system) applications, more specifically, but not limited to real-time monitoring, recording and / Or systems and methods that control the internal environment of a computer unit, such as activities in a personal computer (PC) machine. BACKGROUND OF THE INVENTION As the use of technology extends to businesses and organizations, it increasingly requires managing employees to effectively track and control the internal machinery activities (environment) of a company's technology. For example, 'A PC has an internal operating system (0 / s), which is started when the PC is "booted from its internal hard disk. This 0/8 contains a series of hundreds of programs." Depends on third-party application (program) activities and all user activities. Each action (event) performed by an end user can generate an internal response (another event) within the 0 / s. Execute the user's request. Each action (event) initiated by a 30,000 program can generate an internal reaction d event within the 0 / s) to execute the program's request, sometimes to modify the computer Unit's internal ο / s environment (structure).-One of the most critical aspects of PC ο / s and all third-party applications is the startup phase of the 所有 and all third-party applications. This startup phase includes key building cases and / Or registration, which is read by a program relative to the platform and third-party applications, which can guide the platform and third-party applications 'it is the 0 / s' boot, when or When a third-party application (program) is executed, it is required. These key building cases and registered green systems are considered as "soft forms", which can be modified

574645574645

改’所以-o/s或第三方應用可修改其内部的作業環境來符 合該電腦單元及終端使用者之特定需要。 這些關鍵檔案及註冊登綠很有彈性,其有可能在一電腦 單元上啟始電腦程式,而終端使用者不知道,其可明顯地^ 改,收集,王報,啟始一工作,或摧毁資訊。 該註冊登錄為ο/s的部份,其定義及啟始一新程式,其可 自動地發生而使用者並不知道。該註冊可做為真正⑽心導 引”。當-程式的某些定義的元件被寫人能冊的特定部份 ,該ο/s將自動地開始該程式,而不需要通知使用者。 基於網際網路技術的發展,其能夠自動地以一壓縮格式 來由-電腦單元傳送資料到另一個電腦單元,其有可能以 一般資料的形式來“偽裝,,程式,其會在一電腦單元上啟始來 修改-關鍵ο/s或第三方應用程式啟動檔案,或載入到該註 冊,然後啟始一未知的程式來收集,呈報,啟始一工作或摧 毁在一電腦單元上的資訊。 所,這些可能性可在終端使用者或_企業或組織内的任 何人員不知道的情況下發生。 因此,其有需要一即時的追蹤工具,其可允許一有效率, 非侵錢方式來管理每個電腦單元的記錄,監看及呈報該 内部壤境。再者,其有需要一即時的工具來自動地“倒轉”任 何未經授權的内部修改’並呈報這些修改給一企業或組織 内的管理人員。 發明概要 在一具體實施例中,本發明提供一種電子式‘‘映射,,電腦單 -5- 本紙張又度適用中國國家標準(CNS) A4規格(210 X 297公董) 部註冊之重要統計 户勺更莱之即時方法,用以記錄該ο/s及第三方應用啟動環 二兄Y其包含:(a)分析該硬碟所有關鍵目錄及檔案的存在;(b 2所有目錄資訊的重要統計,M案數目,目綠大小,及其 它資訊;(C)記綠每個關鍵檔案的重要統計,例如檔案產2 時間,最後修改時Μ,樓案大小;⑹記錄該電腦單元的内 在另-具體實施射,本發明亦提供一料時方法來偵、 測由内部電腦單元環境所啟動的狀態,其包含:⑷狀看所 有可辨識視窗代碼之活動中視窗工作管理員;( 作業系統訊息,其可在第三方應用(程式)及該⑽之間傳送. ⑷偵測在-關鍵⑽樓案或第三方啟動樓案中的任何改變| ⑹偵測在孩?王冊的關鍵方面的任何改變;⑷傳送一内部處 理通訊訊息到任何可辨識視窗代碼’其係存在於該活動工 作管理員;(〇傳送一即時的鑑識報告到-監看站,其定兰 該偵測的狀態。 我 在另-具ff實施例巾,本發明亦提供_種即時方法來傳 送及儲存此重要資訊到一儲存裝置(監看站)。Change ’so -o / s or third-party applications can modify their internal operating environment to meet the specific needs of the computer unit and end user. These key files and registrations are very flexible. It is possible to start a computer program on a computer unit, but the end user does not know. It can obviously change, collect, report, start a job, or destroy. Information. The registration is part of ο / s, its definition and start a new program, which can happen automatically without the user's knowledge. The registration can be used as a true guide. "When certain defined elements of a program are written to a specific part of the human book, the ο / s will automatically start the program without notifying the user. Based on With the development of Internet technology, it can automatically transmit data from a computer unit to another computer unit in a compressed format. It is possible to "masquerade," a program, which will be on a computer unit in the form of general data. Start to modify-key ο / s or third-party application startup files, or load into the registration, and then start an unknown program to collect, report, start a job or destroy information on a computer unit. Therefore, these possibilities can occur without the knowledge of the end user or anyone within the business or organization. Therefore, there is a need for a real-time tracking tool that allows an efficient, non-monetary way to manage the records of each computer unit, monitor and report the internal soil. Furthermore, there is a need for an instant tool to automatically "reverse" any unauthorized internal changes' and report these changes to management within a business or organization. Summary of the Invention In a specific embodiment, the present invention provides an electronic `` mapping, '' a computer sheet-5- this paper is again applicable to the important statistics registered by the Chinese National Standard (CNS) A4 specification (210 X 297 public directors) The real-time method of the household spoon is used to record the ο / s and third-party application startup ring. It contains: (a) analysis of the existence of all key directories and files on the hard disk; (b 2 the importance of all directory information Statistics, the number of M cases, the size of the project, and other information; (C) Record the important statistics of each key file, such as the time when the file was produced, and the last modification, M, the size of the case; ⑹ record the internal -Implementation, the present invention also provides a time-based method to detect and measure the status initiated by the internal computer unit environment, which includes: looking at all window task managers who can identify all window code activities; (OS message , Which can be transmitted between a third-party application (program) and the ⑽. ⑷ Detect any changes in the -key dwelling case or the third-party startup case | ⑹Detect any key aspects of the child? change; Send an internal processing communication message to any recognizable window code 'It exists in the activity job manager; (0) Send an instant identification report to the -monitoring station, which determines the status of the detection. I am in another- With the embodiment of the present invention, the present invention also provides a real-time method to transmit and store this important information to a storage device (monitoring station).

在本發明一方面,該記錄及儲存的資料可由一客戶電腦 單元傳送,並由-第二電腦單元(監看站)來接收,其可K 管理觀視目前客戶電腦單元的内部作業環境,其可由第二 電腦單元(監看站)來管理及控制。 本發明™’其可包含能夠在__即時環境中呈報到 該監看站’關於任何未知的由未知程式修改該關鍵⑽,註 冊’或應用啟動標案’並倒轉這些修改回到其原始狀態的能 -6- 574645 A7 B7 五、發明説明(4 力。 本發明另一方面,其可包含能夠紀錄及分析一未知程式 的‘‘穿透樣式,,,以嘗試大幅修改,收集,呈報,啟始一作業 或摧毁一電腦單元上的資訊。, 本發明另一方面,其可包含能夠傳送此‘‘穿透樣式,,到該監 看站’並以所有額外的電腦單元分析該樣式,藉以決定最佳 的方法來停止該自動化修改,其可在整個區域網路(LAN)或 廣域網路(WAN)來執行。 显式簡軍說明 本發明的非限制性及非徹底性具體實施例係參考以下圖 面來說明’其中類似的參考編號係代表整個不同圖面中類 似的部份,除非另有指明。 圖1所示為可以實施本發明一具體實施例的網路系統之流 程圖。 圖2所示為電腦單元内部註冊資訊的“電子映射”之流程圖 ’其係關於一電腦單元的該啟動“開機”及所有第三方應用的 啟動。 圖3所不為關於一電腦單元的啟動(“開機,,)之所有關鍵目綠 及檔案之“電子映射,,之流程圖。 圖4所示為關於所有第三方應用(程式)的啟動之所有關鍵 目錄及檔案之“電子映射,,之流程圖。 圖5所示為攔截該作業系統與該第三方應用之間所產生的 所有訊息之方法的流程圖。 圖6所示為傳送一處理間通訊訊息到任何可辨識視窗代碼 本紙張尺度適用中國國家標準(CNS) A4規格(210X 297公釐) 574645 A7 B7 五、發明説明(5 ) 之方法的流程圖,其係存在於活動工作管理員表列中。 圖7所示為在該内部電腦單元内收集所有電腦單元(機器環 境)資訊之處理的流程圖,並組織此資訊,其方式可自動地 傳送此資料到一監看站。 圖8所示為由一區域網路(LAN)或廣域網路(WAN)上所有電 腦單元自動地收集所有電腦單元(機器環境)資料的處理之流 程圖。 圖9所示為一種自動分析外來實體程式的“穿透樣式”之處 理的流程圖,其可穿透一電腦單元來在一電腦單元上收集, 呈報,啟始一工作或摧毀資訊。 圖10所示為一種自動倒轉任何電腦單元(機器環境)改變之 處理的流程圖,其中一外來實體程式可在該實際電腦單元 内啟始。 圖11所示為一結構化信號檔案的方塊圖,其捕捉所有相對 於該“穿透樣式”的鑑識資料,其係傳送及儲存在該監看站。 圖12所示為一種在即時環境中自動地偵測任何未授權修 改該HKEY_LOCAL_MACHINE:Software註冊段落的處理之流程 圖。 圖13所示為一種在即時環境中自動地偵測任何未授權修 改該 HKEY_LOCAL_MACHINE:Software\Microsoft註冊段落的處理 之流程圖。 圖14所示為一種在即時環境中自動地偵測任何未授權修 改該 HKEY_LOCAL_MACHINE:Software\Microsoft\Run註冊段落的 處理之流程圖。 -8- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐)In one aspect of the present invention, the recorded and stored data can be transmitted by a client computer unit and received by a second computer unit (monitoring station), which can manage and observe the current internal operating environment of the client computer unit. It can be managed and controlled by a second computer unit (monitoring station). This invention ™ 'can include the ability to report to the monitoring station in a real-time environment' regarding any unknown changes to the key by unknown programs, register 'or application launch projects' and reverse these changes back to their original state Neng-6- 574645 A7 B7 V. Description of the invention (4 forces. On the other hand, the invention can include a `` penetration pattern '' that can record and analyze an unknown program, in order to try to modify, collect, and report substantially. Initiating an operation or destroying information on a computer unit. In another aspect of the invention, it may include the ability to transmit this `` penetration pattern, to the monitoring station '' and analyze the pattern with all additional computer units, By deciding the best way to stop this automated modification, it can be performed on the entire local area network (LAN) or wide area network (WAN). Explicit brief descriptions illustrate non-limiting and non-exhaustive specific embodiments of the present invention. Refer to the following drawings to explain 'where similar reference numerals represent similar parts throughout the different drawings, unless otherwise specified. Figure 1 shows a specific embodiment of the present invention can be implemented The flowchart of the network system. Figure 2 shows the flowchart of the "electronic mapping" of the internal registration information of the computer unit. It is about the startup of a computer unit and the startup of all third-party applications. It is a flowchart of "electronic mapping" of all the key projects and files related to the startup of a computer unit ("Startup,"). Figure 4 shows all the key directories and the startup of all third-party applications (programs). "Electronic mapping of files," flowchart. Figure 5 shows a flowchart of a method for intercepting all messages generated between the operating system and the third-party application. Figure 6 shows sending a communication message between processes to Any identifiable window code This paper size applies the Chinese National Standard (CNS) A4 specification (210X 297 mm) 574645 A7 B7 V. Flow chart of the method of invention description (5), which exists in the list of active job administrators Figure 7 shows a flowchart of the process of collecting all computer unit (machine environment) information in the internal computer unit, and organizes this information in a way that automatically transmits this data Go to a monitoring station. Figure 8 shows a flowchart of the process of automatically collecting all computer unit (machine environment) data from all computer units on a local area network (LAN) or wide area network (WAN). Figure 9 shows It is a flowchart of the process of automatically analyzing the "penetration pattern" of foreign physical programs, which can penetrate a computer unit to collect, report, start a job or destroy information on a computer unit. Figure 10 shows a kind of A flowchart that automatically reverses the process of any computer unit (machine environment) change, where an external physical program can be started in the actual computer unit. Figure 11 shows a block diagram of a structured signal file that captures all relative to The "penetration style" identification data is transmitted and stored at the monitoring station. Figure 12 shows a flowchart of a process for automatically detecting any unauthorized modification of the HKEY_LOCAL_MACHINE: Software registration section in a real-time environment. . Figure 13 shows a flowchart of a process for automatically detecting any unauthorized modification of the HKEY_LOCAL_MACHINE: Software \ Microsoft registration section in a live environment. Fig. 14 shows a flowchart of a process for automatically detecting any unauthorized modification of the HKEY_LOCAL_MACHINE: Software \ Microsoft \ Run registration section in a real-time environment. -8- This paper size applies to China National Standard (CNS) A4 (210 X 297 mm)

裝 訂Binding

574645 A7 _____B7_ 五、發明説明(6 ) 圖15所示為一種在即時環境中自動地偵測任何未授權修 改該HKEY_CLASS_ROOT:CLSID註冊段落的處理之流程圖。 圖16所示為一種在即時環境中自動地偵測任何未授權修 改該HKEY-CLASSES_R〇〇T:CID註冊段落(如果存在的話)的處 理之流程圖。 圖17所示為一種在即時環境中自動地偵測任何未授權修改該 HKEY_LOCAL_MACHINE:Software\Microsoft\Windows\CurrentVersion\ Shell Extensions\Approved註冊段落的處理之流程圖。 圖18所示為一種在即時環境中自動地偵測任何未授權修改該 HKEY_LOCAL_MACHINE:Soflware\Microsoft\Windows\CurrentVersion\ Run註冊段落的處理之流程圖。 圖19所示為一種在即時環境中自動地偵測任何未授權修改該 HKEY_LOCAL_MACHESfE:Software\Microsofl\Windows\CurrentVersion\ RunOnce註冊段落的處理之流程圖。 圖20所示為一種在即時環境中自動地偵測任何未授權修改該 HKEY_LOCAL_MACHINE:Softwar€\Microsoft\Windows\CurrentVersion\ RunOnceEx註冊段落的處理之流程圖。 圖21所示為一種在即時環境中自動地偵測任何未授權修 改該HKEY_CURRENTJJSER:Software註冊段落的處理之流程圖。 圖22所示為用來啟始整個PC桌上環境的“防護傘,,之不同方 法的方塊圖。 圖23所示為由該監看站的一主要應用_列所控制的該平 行串列之流程圖。 圖24所示為該鑑識穿透資料的比較分析之細節的流程圖。 -9- 本紙張尺度適用中國國家樣準(CNS) A4規格(210X297公釐) 574645 A7574645 A7 _____B7_ V. Description of the Invention (6) Figure 15 shows a flowchart of a process for automatically detecting any unauthorized modification of the HKEY_CLASS_ROOT: CLSID registration section in a real-time environment. Figure 16 shows a flow chart of a process for automatically detecting any unauthorized modification of the HKEY-CLASSES_ROOT: CID registration section (if any) in the immediate environment. FIG. 17 shows a flowchart of a process of automatically detecting any unauthorized modification of the HKEY_LOCAL_MACHINE: Software \ Microsoft \ Windows \ CurrentVersion \ Shell Extensions \ Approved registration section in a real-time environment. FIG. 18 is a flowchart of a process for automatically detecting any unauthorized modification of the HKEY_LOCAL_MACHINE: Soflware \ Microsoft \ Windows \ CurrentVersion \ Run registration section in a real-time environment. FIG. 19 is a flowchart of a process of automatically detecting any unauthorized modification of the HKEY_LOCAL_MACHESfE: Software \ Microsofl \ Windows \ CurrentVersion \ RunOnce registration section in a real-time environment. FIG. 20 shows a flowchart of a process for automatically detecting any unauthorized modification of the HKEY_LOCAL_MACHINE: Softwar € \ Microsoft \ Windows \ CurrentVersion \ RunOnceEx registration section in a real-time environment. FIG. 21 is a flowchart showing a process of automatically detecting any unauthorized modification of the HKEY_CURRENTJJSER: Software registration section in a real-time environment. Figure 22 shows a block diagram of different methods of "protective umbrellas" used to start the entire PC desktop environment. Figure 23 shows the parallel series controlled by a main application of the monitoring station Figure 24 shows the detailed flow chart of the comparative analysis of the forensic penetrating data. -9- This paper size applies to China National Standard (CNS) A4 (210X297 mm) 574645 A7

Μ具體實詳細說明 在=匕處=說明中,提供了許多特定細節,例如系統,元件 ’”万法及處理的說明,以提供為本發明具體實施例的完整瞭 解。然而相關技藝之專業人士將可瞭解到,本發明可在不JL 有:或多個特定細節之下來實施,或利用其它方法,元件: 材料’零件或類似者β在其它狀況下,所熟知的 或作業並未詳細顯以描述,以避免混淆本發”範圍。 整個規格中參考到“ 一具體實施例,,者係指配合該具體實 施例所描述:特殊特徵’結構或特性’其係包含在本發明的 至少一具體實施例中。因此,在此規格中許多地方出現用語 “在-具體實施例中”並不必要全部代表相同的具體實施例。 再者’該特殊特徵,結構或特性可用任何適當的方式來結合 在一或多個具體實施例中。 概略而言,本發明一具體實施例提供一種系統及方法,用 以即時監看,記綠及/或控制該内部環境,例如為一實際個 人電腦(PC)機器(電腦單元)活動,其係關於在該工作管理員 内所列出的活動可辨識Wind0w®代碼,在所有應用(程式)及 該作業系統之間處理的視窗訊息,所有關鍵作業系統檔案, 啟動程式及所有關鍵的獨立應用(程式)檔案之註冊登綠,其 控制了 一電腦單元的該啟動(初始化),及控制了安裝在該電 腦單元上所有應用(程式)的該啟動(初始化)。雖然本發明的 不同具體實施例及特徵在此揭示内容中係以Windows作業系 統的% i兄來况明’在此揭示内容中所說明的本發明不同具 體實施例及特徵可應用到其它應用程式,其並非想要必須 -10- 本紙張尺度適用中國國家樣準(CNS) A4規格(210X 297公釐) 574645 A7 ____B7 五、發明説明(8~)" ~ --- 限制在Windows作業系統的環境。 現在請參考圖丨,所示為可實施本發明的一網路系統之範 例。在此具體實施例中,該網路系統1〇〇包含複數個電腦單 兀(或工作站)105a_1〇5d及108,及一網路伺服器125。該電腦單 元105及108可包含個人電腦,工作站,筆記型電腦,伺服器, 及/或其它適當的運算裝置。該網路伺服器125也可實施為例 如一伺服咨,一電腦單元,工作站或其它適當裝置。舉例而 言,根據本發明一具體實施例,該電腦單元1〇5a_l〇5d其每個 可分別包含一客戶應用(探針公用應用程式)11〇a_U〇d,而一 些电腦單元105可不包含一客戶應用no。但是,在圖i中任何 的電腦單元105可以或也可不實施該客卢應用11〇。為了輔助 解釋本叙明不同具體貫施例的功能,任何或所有電腦 105d—般可稱之為電腦1〇5,而任何或所有客戶應用u〇a_u〇d 一般可稱之為客戶應用(探針公用應用程式)u〇。 一些電腦單元根據本發明的一具體實施例可包含一管理 者(監看)應用115。在圖範例中,電腦單元(監看站)1〇8包 含該管理者應用115。但是,圖1中任何其它電腦單元也可實 施該管理者(監看)應用U5。 ' 圖1之電知單元可隸合於例如一線路集線器12〇。 一習用網路介面卡或LAN轉接器(未示出)基本上係實施在 圖1的每個電腦單元中,用以操作在該網路系統内的每個電 腦單元。一網路介面卡基本上係做為一給定電腦單元及該 網路系統中該纜線之間的一介面。一網路介面卡使用一特 殊化的處理器及程序來移動資料在該給定電腦單元的記憶 -11 - 本紙張尺度適用中國國家標準(CNS) A4規格(210X 297公釐) 574645 A7 B7 五、發明説明(9 ) 體,與附著於該給定電腦單元之網路纜線之間。 在一具體實施例中,本發明允許在具有該客戶應用110的 電腦單元105中追蹤所有内部機器組態輪廓檔(啟動)。所有内 部機器活動,或在這些活動中的改變係由該客戶應用110所 監看。該客戶應用110共存於一電腦單元105的作業系統,並 做為一非侵入式機器活動監看。舉例而言,假設該電腦單元 105開始一第三方程式130,且該程式活動及其啟動資訊在該 電腦單元105中來監看。在該電腦單元105中的該客戶應用110 將決定每個活動狀態,及該活動狀態對於日常作業是否為 正常。該客戶應用110固定地循環,比較初始記錄的内部組 態輪廓檔,與當該電腦單元105執行時的其目前輪廓檔。 在一具體實施例中,該客戶應用110為一公用應用程式, 其係在 Microsoft Visual C++及在 Microsoft 32 Bit API環境中設計 及開發。該客戶應用110以兩種不同的方法來存取該習用的 Windows作業系統資訊,其為1)經由一完全可再利用的C++函 式庫,即習知的Microsoft基礎類別(MFC);或2)經由與作業系 統原有函式的直接介面,稱之為Microsoft應用程式介面(API)。 該MFC隱藏該基本,(高階)應用程式介面(API),其中一程 式師通常使用及提供一摘要發展層,其允許一程式師來設 計/開發一 Microsoft Windows多重串列公用應用程式,而不需 要知道在該Microsoft作業系統内每個原始獨立API的實際細節 。另外陳述的是,該MFC為一群組的API,其使得程式師較為 容易進行軟體設計及開發。 在開發程式中,如本技藝專業人士所熟知,一 ♦列為一程 -12- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐)The detailed description of Μ is provided in the description. Many specific details are provided, such as the description of the system, components, and methods to provide a complete understanding of the specific embodiments of the present invention. However, professionals of related skills It will be understood that the present invention can be implemented without JL: or more specific details, or using other methods, components: materials' parts or similar β in other conditions, well-known or operations are not shown in detail Take the description to avoid confusing the scope of this post. Throughout the specification, reference is made to "a specific embodiment," which refers to the description of the specific embodiment: the special feature 'structure or characteristic' is included in at least one specific embodiment of the present invention. Therefore, in this specification The appearance of the word "in-specific embodiment" in many places does not necessarily all represent the same specific embodiment. Furthermore, 'the particular feature, structure, or characteristic may be combined in any suitable manner in one or more specific embodiments. In summary, a specific embodiment of the present invention provides a system and method for real-time monitoring, recording green and / or controlling the internal environment, such as an actual personal computer (PC) machine (computer unit) activity, which is Regarding the activities listed in the task manager, Wind0w® codes are recognized, window messages processed between all applications (programs) and the operating system, all critical operating system files, startup programs, and all critical stand-alone applications ( Program) file registration green, which controls the startup (initialization) of a computer unit, and controls the computer unit installed The startup (initialization) of all the applications (programs) on the above. Although the different specific embodiments and features of the present invention are described in this disclosure with the %% of the Windows operating system, 'this document described in this disclosure Different specific embodiments and features of the invention can be applied to other applications, which are not intended. -10- This paper size applies to China National Standard (CNS) A4 specification (210X 297 mm) 574645 A7 ____B7 V. Description of the invention (8 ~) " ~ --- Limited to the Windows operating system environment. Now please refer to Figure 丨, which shows an example of a network system that can implement the present invention. In this specific embodiment, the network system 1〇 〇 Contains multiple computer units (or workstations) 105a 105d and 108, and a network server 125. The computer units 105 and 108 may include personal computers, workstations, notebook computers, servers, and / or other appropriate Computing device. The network server 125 may also be implemented as, for example, a servo server, a computer unit, a workstation, or other suitable device. For example, according to a specific embodiment of the present invention, the computer server Each element 105a_105d may include a client application (probe utility) 11a_U〇d, and some computer units 105 may not include a client application no. However, any computer unit in FIG. 105 may or may not implement the guest application 11. In order to assist in explaining the functions of the different specific embodiments described in this description, any or all computers 105d may be generally referred to as computer 105, and any or all customer applications u 〇a_u〇d can generally be referred to as a client application (probe utility) u. Some computer units may include a supervisor (monitoring) application 115 according to a specific embodiment of the present invention. In the example of the figure, the computer The unit (monitoring station) 108 contains the manager application 115. However, any other computer unit in Figure 1 can also implement the supervisor (watch) application U5. 'The electronic knowledge unit of FIG. 1 may be attached to, for example, a line hub 120. A conventional network interface card or LAN adapter (not shown) is basically implemented in each computer unit of FIG. 1 to operate each computer unit in the network system. A network interface card is basically used as an interface between a given computer unit and the cable in the network system. A network interface card uses a special processor and program to move data in the memory of a given computer unit. 11-This paper size applies to China National Standard (CNS) A4 specifications (210X 297 mm) 574645 A7 B7 5 The invention description (9) body and the network cable attached to the given computer unit. In a specific embodiment, the present invention allows tracking of all internal machine configuration profiles (start-up) in the computer unit 105 having the client application 110. All internal machine activities, or changes in these activities, are monitored by the customer application 110. The client application 110 co-exists in the operating system of a computer unit 105 and is monitored as a non-intrusive machine activity. For example, it is assumed that the computer unit 105 starts a third-party program 130, and the program activity and its startup information are monitored in the computer unit 105. The client application 110 in the computer unit 105 will determine each activity state and whether the activity state is normal for daily operations. The client application 110 cycles cyclically and compares the internal configuration profile of the initial record with its current profile when the computer unit 105 executes. In a specific embodiment, the client application 110 is a public application program, which is designed and developed in Microsoft Visual C ++ and Microsoft 32 Bit API environment. The client application 110 accesses the conventional Windows operating system information in two different ways, which is 1) via a fully reusable C ++ library, known as the Microsoft Foundation Class (MFC); or 2 ) Through the direct interface with the original function of the operating system, it is called the Microsoft Application Programming Interface (API). The MFC hides the basic, (high-level) application programming interface (API), in which a programmer usually uses and provides a summary development layer that allows a programmer to design / develop a Microsoft Windows multiple serial utility application without You need to know the actual details of each of the original independent APIs within this Microsoft operating system. What's more, the MFC is a group of APIs, which makes it easier for programmers to design and develop software. In the development of the program, as is well known to those skilled in the art, ♦ is listed as a journey -12- This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm)

裝 訂Binding

574645574645

式的-部份’其可獨立地執行其它部份。支援多重串列的作 業系統使得程式師可設計出程^,其有串㈣部份可由作 業系統同時地執行。 如上所述,該MFC係用於“高階,,作業系統函式。對於該 低階函式,藉由該實際Wind〇ws作業系統原始獨立函式來 利用一 Micmsoft 32位元ΑΠ介面,用以取得目前作業系統機器 組態及活動狀態。 現在概述該管理者應用115的一具體實施例之作業。該監 看站(或管理者應用)1〇8,其可存在於例如一標準電腦單元 PC或網路伺服器,收集與維持所有組態,鑑識資料及管理策 略,其係實施在整個具有該客戶應用1丨〇的網路環境中。 如圖23所示,當該監看站115啟始時’該主要應用_列啟始 一系列的子串列(“平行串列,,),其皆為平行,並由該主要應 用串列所控制。每個啟始的平行串列即指定一工作來收集 與記綠相對於每個客戶應用110的作業環境的資料。 該第一平行串列指定來查詢(2310)該網路系統100中任何結 構化的信號檔案,其可包含在每個運作一客戶應用u〇的電 腦單元105上的組態資料。當此第一平行串列收集組態資料 ’此串列即分析(2315)該組態資料,並儲存(2320)在該管理應 用1 15局部位置處的該組態資料。此資料為該客戶應用1 1Q的 冤全組態環境,其定義所有Ο/S檔案的“電子足跡”,所以‘‘第 三方”啟動資料,及所有電腦註冊資料。 該第二平行串列指定來查詢(2325)網路系統1〇〇中任何結構 化信號檔案,其可在運作一客戶應用110的每個電腦單元105 -13- 本紙張尺度適用中國國家標準((:;1^3) A4規格(210 X 297公釐) 574645 A7 B7 11 五、發明説明( 上包含鑑識或“穿透樣式,,資料。當此第二平行串列輪詢該網 路系統100,如果鑑識資料由該客戶應用11〇傳送,該管理應 用115知收术與儲存(2320)要在管理應用i丨5内顯示印25)之資 料,其為泫管理者(或使用者)所需要(選擇)。 该第二平行串列指定來傳送(234〇)組態及運作政策結構化 檔案到個別的每個客戶應用11〇或整體所有客戶應用。該串 列傳运孩結構化檔案,其中該管理者(或使用者)已經產生及 足義成一政策結構化信號檔案,並選擇來經由該網路系統 100傳送(展開)該政策。 該第四,第五及第六平行串列為一系列指令,及控制結構 化仏號^案,其係傳送(展開)到每個客戶應用1 1〇,其在某些 條件下中止(2345)該客戶應用u〇。每個“關機”或中止信號對 於一客戶應用110具有一不同的效應。一旦一客戶應用丨川重 新開始或啟始時,該客戶應用1〇〇可以:(丨)繼續其正常活動 ,(2)初始化其安裝順序,並在其相關的電腦單元ι〇5上收集 新組悲頁料,及/或(3)維持中止,直到一 “恢復,,結構化信號檔 案由該管理應用115傳送。 在該管理應用115中其餘的串列及程式(圖23中未示出),其 執伃例行的管理功能,如顯示資料,檔案化資料,並允許使 用者視需要來匯出或抹除資訊。 現在請參考圖2,用於討論根據本發明一具體實施例的該 客戶應用之功能性機制。特別是,圖2所示為電腦單元内部 1王冊資訊的‘‘電子映射,,之流程圖,其係關於一電腦單元1〇5 的孩啟動“開機,,,及所有第三方應用的該啟動(例如在圖1中 -14 - 574645 A7 ____ B7__ 五、發明説明(12 ) 的第三方應用130)。其可注意到,一第三方應用可例如由一 使用者安裝在任何的電腦單元1〇5中,或玎由一資料網路下 載到任何的電腦單元1〇5,例如網際網路。 一旦啟動一客戶應用丨1〇,該客戶應用110執行一系列的平 行串列函式,其輪詢來查詢該作業系統有關高階資訊,並執 行一系列的獨立32位元API DLL來收集低階資訊。如本技藝 專業人士所知,一動態連結函式庫(DLL)為一可執行函式或 資料的儲存庫,其可由Windows應用來使用。基本上,一 DLL 提供一或多個特殊函式及一程式來藉由產生一靜態或動態 連結到該DLL來存取該函式。一靜態連結在程式執行期間維 持固定,而一動態連結係依需要而由程式所產生。DLL也可 只包含資料。該連結器自動地在函式庫中搜尋在其它地方 找不到的程序。在MS-Windows環境中,函式庫檔案具有一別 的副檔名。 其輪詢的高階資訊包含該活動程式記憶體堆疊,其列出 所有目前在記憶體中進行的活動程式“代碼”。該活動中“焦 點視窗’’ “指向”到由該“終端使用者”目前使用的該應用。 所執行的獨立API DLL可包含下述:GTApprvd.dll,GTclsid.dll, GTCmpNm.dll, GTCUSoft.dll, GTDrvQry.dll GTKeyBrd.dll, GTKillAp.dll, GTMicrRun.dll, GTRegQry.dll, GTRegSoft.dll, GTRgstry.dll, GTRunExe.dll, GTRunWat.dll, GTShell.dll, GTShellExt.dll, GTShellNme.dll, GTSysMsg.dll, 及 GTTaskBar.dll 〇 每個獨立的DLL係由一高階平行串列所控制。其所收集的 低階資料(資訊)的範例為所有的註冊組態資料,在該Ο/S與相 -15- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐) 574645 A7 _____B7 五、發明説明(13 ) ~~B -- 對於視窗物件的第三方應用丨3 〇之間處理之所有的即時“核 心系統汛息,視窗種類,滑鼠移動,滑鼠選擇及1/〇運作。可 收集的額外低階資料可包含鍵盤中斷,註冊狀態(對於程式 初始化很重要的不同關鍵段落),應用指令,及傳送到應用, 程式管理員及工作列的控制信號。 在一客戶應用110的初始安裝期間,一平行串列函式被啟 始(方塊201),其啟始該32位元API DLL ,如此處所述’係由本 發明人設計及開發,且其取得一電腦單元1〇5的所有内部註 冊資訊。 该電腦單元105的内部機器註冊,維持了適當初始化該電 腦單元105所需要的每個程式實體程式的初始化表列,藉以 執行基本的Windows作業系統及所有那些程式,其為初始化 第三方應用130所需要。 一些第二方應用13〇需要某些程式來該作業系統初始啟動 時即被啟始,而其它的僅需要在使用者啟始該第三方應用 時才需要額外的程式。 在一具體實施例中,一旦該電腦單元的註冊資訊由該客 戶應用110取得,該註冊資訊儲存到記憶體陣列,並寫入一 結構化ASC檔案,其係儲存在該電腦單元1〇5中。-Partial 'which can independently execute other parts. A job system that supports multiple serializations allows programmers to design processes ^, and a part of them can be executed simultaneously by the job system. As mentioned above, the MFC is used for "high-level, operating system functions. For this low-level function, a Micmsoft 32-bit ΑΠ interface is used by the actual WindOws operating system original independent function to Obtain the current operating system machine configuration and activity status. The operation of a specific embodiment of the manager application 115 is now outlined. The monitoring station (or manager application) 108 may exist in, for example, a standard computer unit PC Or network server to collect and maintain all configurations, identification data and management strategies, which are implemented in the entire network environment with the client application 1 〇. As shown in Figure 23, when the monitoring station 115 is started At the beginning, the main application_column starts a series of sub-strings ("parallel strings,"), which are all parallel and controlled by the main application string. Each starting parallel series specifies a job to collect and record data relative to the operating environment of each client application 110. The first parallel series is designated to query (2310) any structured signal file in the network system 100, which may include configuration data on each computer unit 105 running a client application u0. When this first parallel series collects configuration data, this series analyzes (2315) the configuration data, and stores (2320) the configuration data at the local position of the management application 1 15. This information is the full configuration environment for the customer's application of 1Q, which defines the "electronic footprint" of all 0 / S files, so "third party" startup data, and all computer registration data. The second parallel serial designation To query (2325) any structured signal file in the network system 100, which can be used in each computer unit 105 of a customer application 110 -13- This paper size applies to Chinese national standards ((:; 1 ^ 3) A4 specification (210 X 297 mm) 574645 A7 B7 11 V. The invention description (including identification or "penetration pattern," data. When this second parallel series polls the network system 100, if the identification data is The client application 110 transmits, and the management application 115 knows that the receiving and storage (2320) data to be displayed in the management application i5 is printed on 25), which is required (selected) by the manager (or user). The second parallel serial designation is to transfer (234) the structured file of configuration and operation policies to each individual customer application 11 or to all of the customer applications as a whole. The serial delivery structured file in which the manager (or User) has been generated and sufficient Create a policy structured signal file, and choose to transmit (expand) the policy via the network system 100. The fourth, fifth, and sixth are serially arranged as a series of instructions, and control structured code ^ case, which The system transmits (expands) to each client application 1 10, which terminates (2345) the client application u0 under certain conditions. Each "shutdown" or suspension signal has a different effect on a client application 110. Once When a client application restarts or starts, the client application 100 can: (丨) continue its normal activities, (2) initialize its installation sequence, and collect new groups on its related computer unit ι05. The sad page material, and / or (3) remain suspended until a "recovery," and the structured signal file is transmitted by the management application 115. The remaining sequences and programs in the management application 115 (not shown in Figure 23) It performs routine management functions, such as displaying data, archiving data, and allowing users to export or erase information as needed. Please refer to FIG. 2 for a discussion of this method according to a specific embodiment of the present invention. Customer application Functional mechanism. In particular, Figure 2 shows the flow chart of `` electronic mapping '' of 1 book information inside the computer unit. It is a flowchart about the startup of a computer unit 105, and all This launch of the three-party application (for example, in Figure 1 -14-574645 A7 ____ B7__ V. Third-party application 130 of the invention description (12)). It may be noted that a third-party application may be installed by any user, for example, on any Computer unit 105, or downloaded from a data network to any computer unit 105, such as the Internet. Once a client application is launched, the client application 110 executes a series of parallel series Function that polls the operating system for high-level information and executes a series of independent 32-bit API DLLs to collect low-level information. As known to those skilled in the art, a dynamic link library (DLL) is a repository of executable functions or data, which can be used by Windows applications. Basically, a DLL provides one or more special functions and a program to access the function by generating a static or dynamic link to the DLL. A static link is maintained fixed during program execution, while a dynamic link is generated by the program as needed. DLLs can also contain information only. The linker automatically searches the library for procedures not found elsewhere. In the MS-Windows environment, the library file has a different extension. The high-level information it polls contains the active program memory stack, which lists all the active program "codes" currently in memory. In this event, the "focus window" "points" to the application currently used by the "end user". The independent API DLLs executed may include the following: GTApprvd.dll, GTclsid.dll, GTCmpNm.dll, GTCUSoft. dll, GTDrvQry.dll GTKeyBrd.dll, GTKillAp.dll, GTMicrRun.dll, GTRegQry.dll, GTRegSoft.dll, GTRgstry.dll, GTRunExe.dll, GTRunWat.dll, GTShell.dll, GTShellExt.dll, GTShellNme.dll, GTSysMsg .dll, and GTTaskBar.dll 〇 Each independent DLL is controlled by a high-level parallel series. Examples of the low-level data (information) it collects are all registered configuration data. -15- This paper size applies to Chinese National Standard (CNS) A4 (210 X 297 mm) 574645 A7 _____B7 V. Description of the invention (13) ~~ B-For third-party applications of window objects 丨 3 〇 All the real-time "core system flood information, window types, mouse movement, mouse selection and 1 / 〇 operation. Additional low-level data that can be collected can include keyboard interrupts, registration status (different key paragraphs important for program initialization), application commands, and control signals sent to the application, program manager, and taskbar. During the initial installation of a client application 110, a parallel serial function is started (block 201), which starts the 32-bit API DLL, as described herein, 'designed and developed by the inventor, and obtained All internal registration information of a computer unit 105. The internal machine registration of the computer unit 105 maintains an initialization list of each program entity program required to properly initialize the computer unit 105, so as to run the basic Windows operating system and all those programs, which are used to initialize third-party applications 130. need. Some second-party applications 13 require certain programs to be started when the operating system is initially started, while others only require additional programs when the user starts the third-party application. In a specific embodiment, once the registration information of the computer unit is obtained by the client application 110, the registration information is stored in the memory array and written into a structured ASC file, which is stored in the computer unit 105 .

一旦所有組態資料由該電腦單元1〇5收集,該資料即儲存 在孩電腦單元1〇5的本身,並啟始以下的函式。在載入所有 註冊CLASS組態資料到記憶體陣列(方塊211)時啟始一函式。 在載入所有註冊CURRENT (目前使用者)組態資料到記憶體陣 列(方塊212)時啟始一函式。在載入所有註冊L〇CAL -16- t張尺度適用中國國家標準(CNS) A4規梅:(2ι〇χ跗7公釐)~^-- 574645 A7 ---- B7 五、發明説明(Μ ) 組怨貝料到1己憶體陣列(方塊2丨3)時啟始一函式。在載入所有 汪冊USERS組態資料到記憶體陣列(方塊214)時啟始一函式。 一旦所有註冊資料載入到記憶體,一平行_列啟始(方塊 215)孩系列的低階API 32位元DLL,其輪詢每個定義的註冊段 落來決定如果有任何註冊資料已被修改(方塊216)。 如果在方塊216中的函式,其決定是否有進行註冊修改, 其辨識到一修改,則該函式即藉由產生及傳送一結構化信 號樓案(方塊218)來呈報(警報)給該管理應用U5。如果並沒有 註冊修改’則藉由回到方塊215中的函式來繼續(217)輪詢該 足義的註冊段落。 在方塊218中,該結構化ASC檔案可由該電腦單元1〇5電子 化地取得,而到該監看站U5由該網路管理者進行詳細分析。 該客戶應用(探針實體程式應用)丨10代表係在方塊2〇〇中啟 始。在该註冊資訊的初始記錄(方塊220)之後,該平行串列(方 塊210) ’其命令由本發明人所設計及開發的獨立32位元Αρι DLL來啟始一系列的次函式(如以上方塊211到218所述),其即 監看在該電腦單元1〇5環境中即時改變的所有註冊資訊。 如果啟始了修改任何内部註冊環境的程式,則由該客戶 應用110產生一内部訊息到該電腦單元的主螢幕,警告該終 端使用者,並產生(傳送)一信號到該監看站。 如果該註冊修改為該使用者即/或網路管理所不知道的一 未授權改變,被修改的該内部註冊資訊即倒轉回到其原始 狀態。 該組態檔案,其係儲存在該電腦單元105内,維持該電腦 -17- 本紙張尺度適用中國國家標準(CNS) A4規格(210X 297公釐) 574645 A7 B7 五、發明説明(15 ) " ^ " 一 單7L 105的疋義組態。當發生一修改時,該客戶應用ιι〇參考 垓儲存的組怨貪料,並將恢復該電腦單元回到其原始狀 怨,其係在該未授權修改之前所記錄的。然後該改變的特性 2儲存在一結構化ASC襠案,並記錄為一穿透樣式。然後該 電腦單元105產生(傳送)此穿透樣式樓案到該監看i占115來由 忑監看站做進一步比較分析。由該監看站啟始的比較分析 為一系列的平行_列函式,其比較由所有電腦單元1〇5所接 收的牙透樣式(客戶應用11〇),其傳送資訊到該監看站115。 如圖24所π ,該比較分析係由分析包含鑑識穿透資料的每 個結構化信號檔案來執行。該樓案先進行分析來建立該未 杈榷修改,並定義在該鑑識檔案。每個未授權修改係與來自 其Έ:具有一客戶應用11〇的其它電腦單元1〇5之鑑識資料做比 較(2400)以建乂 一水平樣式”,或是發生在整個網路系統 1〇〇足未授權修改中的一致性。下一個分析(2405)係在當發生 未技權乜改時,決足每個電腦單元1〇5的該‘‘視窗代碼”狀態 。藉由分析(2405)該“視窗代碼狀態”,可建立一“樣式,,到該 ‘‘使用者條件,,,其啟始了該電腦單元1〇5的未授權修正。 在執行該種修改的自動化分析及在一即時環境中啟始該 修改的使用者環境中,該管理者應用U5即可快速地發展一 “政策”,並展開(傳送)該政策到整個網路系統1〇〇來自動地停 止每個電腦單元中的未授權修改(方塊241〇)。 如圖2所示,當該客戶應用11〇安裝在一電腦單元1〇5時,該 客戶應用110將啟始一平行串列(方塊2〇1),其將啟始一系列 的子串列,其可收集整個該電腦單元1〇5註冊的不同定義段 -18- 本纸張尺度適用中國國家標準(CNS) Μ規格(21GX297公I) 574645 A7 B7五、發明説明(l6 ) 落之註冊資訊。該平行_列201係在該初始安裝或重新初始 化時來啟動,如果該電腦單元105係以新的授權軟體來更新 時。 每個子串列啟動該獨立32位元API DLL,其收集在一定義段 落内的註冊資訊。一子串列(方塊202)啟始該32位元API DLL, 其收集在該HKEY_CLASSES_ROOT註冊鍵上的所有註冊資料。 一子串列(方塊203)啟始該32位元API DLL,其收集在該 HKEY_CURRENTJJSER註冊鍵上的所有註冊資料。一子串列(方 塊204)啟始該32位元API DLL,其收集在該HKEY_LOCAL_MACHINE 註冊鍵上的所有註冊資料。一子串列(方塊205)啟始該32位元 API DLL,其收集在該HKEYJJSERS註冊鍵上的所有註冊資料。 所有由每個32位元API DLL收集的資料係由一函式(方塊206) 聯合,其儲存該資料到該當地電腦單元105。一旦已經儲存 該資料,即啟始一函式(方塊207),其傳送所有註冊組態資料 到具有該監看應用115的該管理單元108。 現在請參考圖3,用於討論根據本發明一具體實施例之客 戶應用110的函式機制。特別是,圖3為相對於一電腦單元105 的該啟動“開機”之所有關鍵目錄及檔案的“電子映射”之流 程圖。 在一客戶應用110的初始安裝期間,其啟始一額外的平行 串列函式(方塊340),其取得在該作業系統於啟動(初始“開 機’’)期間啟始時所有需要的該電腦單元的内部目錄及檔案資 訊。 該電腦單元的内部機器硬碟維持一目錄架構,用於適當 -19 -Once all configuration data is collected by the computer unit 105, the data is stored in the child computer unit 105 and the following function is started. A function is initiated when all registered CLASS configuration data is loaded into the memory array (block 211). A function starts when all registered CURRENT (current user) configuration data is loaded into the memory array (block 212). When loading all registered L〇CAL -16-t scales, the Chinese National Standard (CNS) A4 regulations are applicable: (2ι〇χ 跗 7mm) ~ ^-574645 A7 ---- B7 V. Description of the invention ( (M) The group complains that a function is started when a memory array (blocks 2 to 3) is found. A function is initiated when all Wang Book USERS configuration data is loaded into the memory array (block 214). Once all registration data is loaded into memory, a parallel low-level API 32-bit DLL starts (block 215), which polls each defined registration paragraph to determine if any registration data has been modified (Block 216). If the function in block 216 determines whether a registration modification has been made and it recognizes a modification, the function reports (alerts) to the function by generating and transmitting a structured signal case (block 218). Management application U5. If there is no registration modification ', then return to the function in block 215 to continue (217) to poll the full registration paragraph. In block 218, the structured ASC file may be obtained electronically by the computer unit 105, and the monitoring station U5 may be analyzed in detail by the network administrator. The client application (probe application for probes) 丨 10 represents the start of block 200. After the initial record of the registration information (block 220), the parallel string (block 210) 'its command is to start a series of secondary functions by the independent 32-bit ALP DLL designed and developed by the inventor (as above Blocks 211 to 218), which monitors all registration information that changes in real time in the 105 environment of the computer unit. If a program to modify any internal registration environment is initiated, the client application 110 generates an internal message to the main screen of the computer unit, warns the end user, and generates (transmits) a signal to the monitoring station. If the registration modification is an unauthorized change unknown to the user or network management, the modified internal registration information is reverted back to its original state. The configuration file is stored in the computer unit 105 to maintain the computer-17- This paper size applies to the Chinese National Standard (CNS) A4 specification (210X 297 mm) 574645 A7 B7 V. Description of the invention (15) " ^ " The meaning of a single 7L 105. When a modification occurs, the client refers to the stored group complaints and returns the computer unit to its original state, which was recorded before the unauthorized modification. The changed characteristic 2 is then stored in a structured ASC crotch case and recorded as a penetration pattern. The computer unit 105 then generates (transmits) the penetrating style building case to the monitoring station i, 115 for further comparison and analysis by the monitoring station. The comparison and analysis initiated by the monitoring station is a series of parallel_column functions that compare the tooth penetration patterns received by all computer units 105 (customer application 11), which sends information to the monitoring station 115. As shown in Fig. 24, this comparative analysis is performed by analyzing each structured signal file containing forensic penetration data. The building case was first analyzed to establish the unresolved amendments and defined in the forensic file. Each unauthorized modification is compared (2400) with the identification information from other computer units 1050 with a client application 1110 to create a horizontal pattern ", or it occurs in the entire network system 10 〇 Consistency in unauthorized modification. The next analysis (2405) is to determine the "window code" status of each computer unit 105 when unauthorized modification occurs. By analyzing (2405) the "window code status", it is possible to establish a "style, to the" user conditions, which initiates an unauthorized modification of the computer unit 105. This modification is being performed Automated analysis and user environment where the modification was initiated in an immediate environment, the manager can quickly develop a "policy" using U5 and launch (transmit) the policy to the entire network system. Automatically stop unauthorized modification in each computer unit (block 2410). As shown in FIG. 2, when the client application 110 is installed in a computer unit 105, the client application 110 will start a parallel series Column (box 201), which will start a series of sub-strings, which can collect the different defined segments registered by the entire computer unit 105-18-This paper size applies to the Chinese National Standard (CNS) M specifications (21GX297 public I) 574645 A7 B7 V. Registration information of the invention description (l6). The parallel column 201 is activated during the initial installation or re-initialization. If the computer unit 105 is updated with new authorized software When each sub-string starts this independent 3 A 2-bit API DLL that collects registration information in a defined section. A sub-series (block 202) starts the 32-bit API DLL that collects all registration data on the HKEY_CLASSES_ROOT registration key. A sub-string Column (block 203) starts the 32-bit API DLL, which collects all registered data on the HKEY_CURRENTJJSER registration key. A sub-string (block 204) starts the 32-bit API DLL, which collects the HKEY_LOCAL_MACHINE registration All registration data on the key. A sub-series (block 205) starts the 32-bit API DLL, which collects all the registration data on the HKEYJJSERS registration key. All the data collected by each 32-bit API DLL is Combined by a function (block 206), it stores the data to the local computer unit 105. Once the data has been stored, a function is started (block 207), which sends all registered configuration data to the system that has the watch The management unit 108 of the application 115. Please refer to FIG. 3 for discussing the function mechanism of the client application 110 according to a specific embodiment of the present invention. In particular, FIG. "Electronic Mapping" flowchart of all key directories and files. During the initial installation of a client application 110, it initiates an additional parallel serial function (block 340), which is obtained when the operating system is launched (Initial "boot") All required internal directory and file information for the computer unit at the start of the period. The computer unit's internal machine hard drive maintains a directory structure for proper -19-

裝 訂Binding

線 本紙張又度適用中國國家標準(CNS) A4規格(210X297公釐) 也儲存’分類及區隔所有目錄及檔案,其為啟始該電腦單元 5所而要的,以適當地執行該基本斯^加奶作業系統,及在 X欠動時間執行所需要的那些程式,以啟始化第三方應用 1^°旦该目錄及檔案資訊由該客戶應用110取得,該目錄 /、Λ即儲存到圮憶體陣列,並寫入在一結構化檔案中, 二係儲存在1g電腦單元105内。該結構化檔案可由該電腦 时—05黾子化地取得到該監看站1丨5,而由該網路管理者做 詳細的分析。 在邊目錄及樓案資訊的初始記綠之後,該平行串列(方塊 :〇)’其指示這些初始函式’啟始一系列的次函式,然後即 監看在該電腦單元105環境内即時性改變的所有目錄及樓案 資訊。 一旦控制該目錄環境的主要平行事列啟始(方塊31〇),即啟 始-次函式來由資料攮案載入所有儲存的目錄組態到記憶 體陣列(方塊311)。當載入該記憶體陣列時,即啟始一平行串 列,其會循環該電腦單元⑽的目錄結構,分析該電腦單元 1〇5在該定義的目錄結構中任何可能的結構改變。如果偵測 到-新目錄,該探針函式(方塊312)將分析該目錄的内部内容 :並搜尋任何可能的未授權程式(方塊313)。如果偵測到一未 f權程式,一結構鑑識信號標案即產生,並傳送回到該電腦 單元(方塊315)。如果未偵測到未授權程式,該探針將“迴路,, 回到該查詢函式(方塊313),並繼續分析該目錄架構中可能的 未授權程式。 如果啟始-程式(其中該程式修改任何的内部目錄或樓案 -20- 本纸張尺度適用中s S家標準(CNS) A4規格(21GX297公釐] —------------ 574645The thread paper is again applicable to the Chinese National Standard (CNS) A4 specification (210X297 mm). It also stores' classification and partitioning of all directories and files, which are required to start the computer unit 5 in order to properly implement the basic Add milk operation system and those programs needed to run at X time to start third-party applications. Once the directory and file information is obtained by the client application 110, the directory /, Λ is stored. It is stored in the memory array and written in a structured file. The second line is stored in the 1g computer unit 105. The structured file can be obtained by the computer from 05 to 05, and the network manager will make a detailed analysis. After the initial recording of the side catalog and building case information, the parallel series (box: 0) 'which instructs these initial functions' starts a series of secondary functions, and then is monitored in the environment of the computer unit 105 All directory and case information that changes instantly. Once the main parallel control of the directory environment is started (block 31), a function is initiated to load all stored directory configurations from the data file into the memory array (block 311). When the memory array is loaded, a parallel series is started, which will cycle the directory structure of the computer unit ⑽ and analyze any possible structural changes of the computer unit 105 in the defined directory structure. If a new directory is detected, the probe function (block 312) will analyze the contents of the directory: and search for any possible unauthorized programs (block 313). If an unweighted program is detected, a structural identification signal token is generated and transmitted back to the computer unit (block 315). If an unauthorized program is not detected, the probe will "return," return to the query function (block 313), and continue to analyze possible unauthorized programs in the directory structure. If you start a program (where the program Modify any internal catalog or building case-20- This paper is applicable in China Standard (CNS) A4 specification (21GX297 mm) —------------ 574645

環境),即由該客戶應用uo產生一内部訊息到該電腦單元的 王螢幕,警告該終端使用者,並產生(傳送)一信號到該監看 站(方塊315)。 如果該修改為該使用者及/或網路管理所不知道的一未授 權改k ’该被修改之電腦單元的内部目錄及/或檔案資訊即 倒轉回到其原始狀態。 如果一未授權程式在一目錄中偵測到,該分析該目錄之 函式即參考孩儲存的組態資料,其在偵測該未授權程式之 削即定義该目錄架構。然後分析該定義的目錄結構,以“倒 轉”或移除包含該未授權程式的新目錄。 該倒轉函式的啟始係由比較該目錄的先前架構性“足跡,, 與琢新的(未授權)“足跡”,並執行該倒轉函式,其係藉由抹 除具有該未授權程式的該新目錄,或如果一未授權程式移 動到一既有目錄時’即僅移除該未授權程式。 然後該改變的特性即記錄在一結構化ASC檔案中,並登錄 為一穿透樣式。然後該電腦單元1〇5產生(傳送)此穿透樣式檔 案到該監看站115來由該監看站U5做進一步比較分析。 由該監看站115所啟始的該比較分析為一系列的平行串列 函式,其比較自所有電腦單元1〇5 (客戶應用u〇)所接收的所 有穿透樣式,其傳送資訊到該監看站115。 當該客戶應用U0安裝在該電腦單元1〇5時,即啟始一主要 平行串列(方塊340),其啟始一系列次函式,來掃描整個電腦 單元105,用以記錄所有既存的目錄(樓案夾)及子目錄(子檔 案失)。一次函式啟始(方塊341)來分析該Ο/S目綠結構,及存 -21 - 本紙張尺度適用”國家標準(CNS) A4規格(2iGχ撕公爱) —----__ 574645 A7Environment), that is, the client application uo generates an internal message to the Wang Ping of the computer unit, warns the end user, and generates (transmits) a signal to the monitoring station (block 315). If the modification is an unauthorized change k 'unknown to the user and / or network management, the internal directory and / or file information of the modified computer unit is reversed back to its original state. If an unauthorized program is detected in a directory, the function that analyzes the directory refers to the configuration data stored by the child, and it defines the directory structure when detecting the unauthorized program. The defined directory structure is then analyzed to "reverse" or remove a new directory containing the unauthorized program. The inversion function begins by comparing the previous architectural "footprint" of the directory with a new (unauthorized) "footprint" and executing the inversion function by erasing the program with the unauthorized program. The new directory, or if an unauthorized program is moved to an existing directory, 'the unauthorized program is only removed. The changed characteristics are then recorded in a structured ASC file and registered as a penetration style . Then the computer unit 105 generates (transmits) the penetration pattern file to the monitoring station 115 for further comparison and analysis by the monitoring station U5. The comparative analysis initiated by the monitoring station 115 is a This series of parallel serial functions compares all penetration patterns received from all computer units 105 (customer application u〇) and sends information to the monitoring station 115. When the customer application U0 is installed on the computer At unit 105, a major parallel series is started (block 340). It starts a series of secondary functions to scan the entire computer unit 105 to record all existing directories (building folders) and subdirectories. (Sub file missing). One function started Box 341) to analyze the Ο / S green mesh structure, and keep -21-- scale of this paper applies the "National Standards (CNS) A4 size (2iGχ tear Kimiyoshi) -----__ 574645 A7

574645 A7 B7 五、發明説明(2〇 ) 洋細的分析。 在該目錄及檔案資訊的初始記錄之後,該平行串列(方塊 410)啟始一系列的次函式(方塊413),其即監看所有目錄及檔 案資訊之即時改變到啟始在該電腦單元環境内的任何第三 方應用。 如果一程式啟始及修改任何内部目錄或檔案環境,即由 該客戶應用110產生一内部訊息到該電腦單元1〇5主螢幕,警 告該終端使用者,並產生(傳送)一信號到該監看站115。 如果該修改為該使用者及/或網路管理不知道的一未授權 改變’被修改的該内部目錄及/或樓案資訊即倒轉回到其原 始狀態。 然後該改變的特性即記錄在一結構化Asc檔案,並登錄為 一穿透樣式。然後該電腦單元105產生(傳送)此穿透樣式檔案 到該監看站115,來由該監看站U5做進一步比較分析。 由茲監看站115所啟始的該比較分析為一系列的平行串列 函式,其比較自所有的電腦單元1〇5 (客戶應用11〇)接收的所 有穿透樣式,其傳送資訊到該監看站115。此比較分析即為 先前所述。574645 A7 B7 V. Description of the invention (20) Western analysis. After the initial recording of the directory and file information, the parallel series (block 410) starts a series of secondary functions (block 413), which monitors all the directory and file information for real-time changes to start on the computer Any third-party application within the unit environment. If a program starts and modifies any internal directory or file environment, the client application 110 generates an internal message to the computer unit 105 main screen, warns the end user, and generates (transmits) a signal to the monitor Look at station 115. If the modification is an unauthorized change unknown to the user and / or network management, the internal directory and / or building case information that was modified is reversed back to its original state. The changed characteristics are then recorded in a structured Asc file and registered as a penetration pattern. The computer unit 105 then generates (transmits) the penetration pattern file to the monitoring station 115 for further comparison and analysis by the monitoring station U5. The comparison analysis initiated by monitoring station 115 is a series of parallel serial functions that compares all penetration patterns received from all computer units 105 (customer application 11), and sends information to The monitoring station 115. This comparative analysis is described previously.

裝 訂Binding

線 當啟始該平行串列(方塊410)時,在方塊411中 始,且此函式載入所有第三方“啟動,,資訊到記憶體陣列 旦該函式(在线411中)已、經完成其作t,啟始—額外i (方塊41—)其載入所有第三方“如”(初始化)樓案的該择 “檔案簽章”到記憶體陣列。 在所有資訊載入到記憶體之後,啟始上述函式的平ί -23- 574645 A7 B7 五、發明説明(21 ) 列即啟始(413)—輪詢函式(方塊414),其固定地循環,比較所 有第三方“啟動,,資訊及“ _ini,,檔案資訊,到其儲存到記憶體陣 列之先前記錄的資訊。 如果偵測到一未授權修改,該函式(在方塊414中)產生一結 構化信號檔案,並傳送該結構化信號檔案到該管理應用ιΐ5 。如果未偵測到未授權修改,該函式繼續迴路(方塊415)回到 在方塊414中所啟始的其輪詢函式。 一系列額外的平行串列係啟始來收集及管理所有作業系 統(ο/s)訊息,其係產生在該0/s及所有第三方應用之間。這些 _列啟始一系列MFC函式及/或本發明人所設計及開發的獨 三32位兀API DLL。這些MFC函式及32位元API DLL啟始一系 列的作業系統(Ο/S) “掛鉤,,及MFC相互連結,其監看及收集來 自記憶體緩衝器的即時資料,其關於滑藏移動,應用到〇/s 汛息,裝置存取,鍵盤存取,通訊埠存取,網際網路瀏覽器 存取,應用焦點,電子郵件管理,磁碟檔案移動,活動中視 窗代碼工作表列,磁碟機(媒體)管理,工作列管理,及程式 管理員管理。 當該客戶應用110安裝在該電腦單元1〇5上,啟始一平行串 歹1J (方塊440),其初始化一函式(方塊441),其掃描該電腦單元 105上可存在於遠電腦單元内的所有“第三方,,“啟動,,樓案。 當該函式(方塊441)已經完成時,初始化一額外的函式(方 塊442) ’其掃描該電腦中所有“·ini”(初始化)樓案,並記綠在 遠電腦單元105内的每個檔案的‘‘關鍵樓案簽章,,。 在冤成該函式(方塊442)時,一函式(方塊443)聯合該資訊, 本紙張尺度適用中國國家標準(CNS) A4規格(21〇 X 297:^---— 574645 A7 __B7 五、發明説明(22 ) 並儲存所有資料在該電腦單元105内的實體檔案。在完成方 塊443中的函式時,一額外函式(方塊444)即啟始,並開始如方 塊410所述的維護輪詢率列。 現在請參考圖5 ’以討論根據本發明一具體實施例的該客 戶應用110的額外功能性機制。特別是,圖5為攔截在該作業 系統129及第三方應用130之間產生的所有訊息之方法的流程 本發明人所設計及開發的一系列MFC函式及32位元API DLL啟始(方塊505)—系列的作業系統(〇/S) “掛鉤,,及MFC相互 連結,其監看及收集來自記憶體緩衝器關於滑鼠移動及應 用到Ο/S訊息之即時資料。該掛鉤為Microsoft Windows的“開放 式架構”開發之一部份。圖5所示為一 “掛鉤,,序列到該實際的 Microsoft Ο/S核心,其中至少可擴取下列的一部份:所有視窗 物件識別(ID),視窗物件種類,滑鼠移動,滑鼠指令,及整數 傳遞,其係在該Ο/S核心與所有應用活動之間來處理。 一平行串列啟始(500),其啟動該獨立的32位元API DLL (505) ,其係由該發明人設計及開發,其建立了 一“掛鉤”到該實際 Ο/S核心。該“掛鉤”建立與該WH—SYSMSG ID的一相互連結(方 塊510),其監看滑鼠移動及滑鼠活動的核心岔斷(方塊515), 對話盒,功能表,表列盒活動,其定義了該視窗物件ID及該 視窗物件種類(方塊520),並接收一 Ο/S訊息做為由該核心所 正在執行的該機制作業(方塊525)。 基於在WH_SYSMSG ID之下所接收的資訊,該“掛鉤,,可傳 送其ID (方塊535)到該WH_CBT ID,以收集更多關於Ο/S核心機 -25- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐) 裝 訂When starting the parallel series (block 410), the line starts in block 411, and this function loads all third-party "starts, information to the memory array. Once the function (in line 411) has passed, After completing its work, start—extra i (block 41—) it loads all third-party "such" (initialization) cases into the memory array. All information is loaded into memory After that, the above-mentioned functions are started. -23- 574645 A7 B7 V. The description of the invention (21) The line is started (413)-the polling function (block 414), which loops steadily and compares all third parties " Startup, information, and "_ini," file information, to previously recorded information stored in the memory array. If an unauthorized modification is detected, the function (in block 414) generates a structured signal file, And sends the structured signal file to the management application 5. If unauthorized modification is not detected, the function continues the loop (block 415) to return to its polling function initiated in block 414. A series of additional Began to collect and manage all works System (ο / s) messages, which are generated between the 0 / s and all third-party applications. These columns start a series of MFC functions and / or unique 32-bit units designed and developed by the inventor. API DLLs. These MFC functions and 32-bit API DLLs start a series of operating system (OO / S) "hooks," and MFC interconnects to monitor and collect real-time data from the memory buffer. Hide and move, apply to 0 / s flood, device access, keyboard access, port access, Internet browser access, application focus, email management, disk file movement, active window code work List, drive (media) management, taskbar management, and program administrator management. When the client application 110 is installed on the computer unit 105, a parallel string 1J (block 440) is initiated, which initializes a function (block 441), which scans the computer unit 105 that may exist in a remote computer unit All "third-party," "launched," floor cases. When the function (block 441) has been completed, an additional function is initialized (block 442) 'It scans all "· ini" (initialization) cases in the computer and records every green in the remote computer unit 105 The signature of the key files of the files, When the function (box 442) is unsuccessful, a function (box 443) combines the information. This paper size applies the Chinese National Standard (CNS) A4 specification (21〇X 297: ^ ---- 574645 A7 __B7 5 The invention description (22) and stores all data in the physical file of the computer unit 105. When the function in block 443 is completed, an additional function (block 444) is started and begins as described in block 410 Maintain the polling rate column. Please refer to FIG. 5 ′ to discuss the additional functional mechanism of the client application 110 according to a specific embodiment of the present invention. In particular, FIG. 5 is a block diagram of the operating system 129 and the third-party application 130. The flow of the method of all the messages generated between the series of MFC functions and 32-bit API DLL designed and developed by the inventor (block 505)-a series of operating systems (〇 / S) "hook, and MFC It is interconnected, which monitors and collects real-time data from the memory buffer on mouse movement and application to 0 / S messages. This hook is part of the "open architecture" development of Microsoft Windows. Figure 5 shows A "hook," the sequence goes to the real Microsoft Ο / S core, which can be extended to at least one of the following: all window object identification (ID), type of window object, mouse movement, mouse command, and integer transfer, which are based on the 〇 / S core And all application activities. A parallel serial start (500), which starts the independent 32-bit API DLL (505), which was designed and developed by the inventor, which established a "hook" To the actual 0 / S core. The "hook" establishes an interconnection with the WH_SYSMSG ID (block 510), which monitors the core break of mouse movement and mouse activity (block 515), dialog box, Function table, list box activity, which defines the window object ID and the window object type (block 520), and receives a 10 / S message as the mechanism operation being performed by the core (block 525). The information received under the WH_SYSMSG ID, the "hook," can send its ID (block 535) to the WH_CBT ID to collect more information about the 〇 / S core machine-25- This paper standard applies to the Chinese National Standard ) A4 size (210 X 297 mm) binding

線 574645Line 574645

制的資訊,其係在一即時環境中所正在啟始者。 由該核心系統“掛鉤,,所接收的資訊係相較於其它資訊並 攔截該“高階”〇/S資訊,例如分析該活動中視窗代碼表歹 ,中視窗焦點代碼’以及目前儲存所有註冊狀態⑽及 弟三方“啟動”资訊的記憶體陣列,其表示一該客戶應請 所攔截的“圖像”’做為實際的“即時,,機器及使用者狀況(或 事件),其係正在該電腦單元上啟始(方塊545)。 決定由該使用者所啟始的動作過程。此資訊(525)接著在一即 時環境中處理(545)’以決定該使用者的“意圖,,,及是否該使 用者動作為授權或未授權。 由本發明人所設計及開發的該32位元奶虹,傳遞所有 搁截的信號訊息’含視窗物件存取,視窗物件種類(52〇),功 能表或對話盒物件ID,滑鼠移動及位置。基於由該Αρι接收 的信號(整數),管理該中央處理單元(cpu)的MP c平行串列可 現在請參考圖6,以討論根據本發明一具體實施例的該客 戶應用110之額外功能性機制之目的。特別是,圖6為一種傳 送處理間通訊訊息到任何可辨識視窗代碼的方法之流程圖 ’其存在於該活動工作管理員表列中。 由本發明人設計及開發的獨立32位元Api DLL接收來自該 既有MFC平行序列的即時狀態資訊,其決定了該使用者動作 或内部权式活動為合法或非法。該合法性係藉由比較該實 際活動與所有平行串列來決定(圖1到5),其係監看該註冊, ο/s,第三方整合性,及該電腦單元丨05的作業系統核心訊息。 如果4使用者或程式活動被判定為非法,該平行_列啟 -26- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公董) 574645Controlled information is the one who is starting in an immediate environment. The core system is "linked", and the received information is compared to other information and intercepts the "high-level" 0 / S information, such as analyzing the window code table of the event, the focus code of the window, and all registration statuses currently stored. The memory array of the "startup" information of the third party and the younger party indicates that the customer should request the "image" that is intercepted as the actual "real-time, machine and user status (or event)", which is in progress. The computer unit starts (block 545). Determine the course of action initiated by the user. This information (525) then processes (545) 'in a real-time environment to determine the user's "intent," and whether the user's actions are authorized or unauthorized. The 32-bit designed and developed by the inventor Yuan milk rainbow, pass all the suspended signal messages' including window object access, window object type (52), menu or dialog box object ID, mouse movement and position. Based on the signal received by this Αρι (integer) The MP c parallel string that manages the central processing unit (cpu) can now refer to FIG. 6 to discuss the purpose of the additional functional mechanism of the client application 110 according to a specific embodiment of the present invention. In particular, FIG. 6 is A flow chart of a method for transmitting inter-process communication messages to any recognizable window code, which exists in the active job manager list. An independent 32-bit Api DLL designed and developed by the inventor receives parallel data from the existing MFC. Real-time status information of the sequence, which determines whether the user action or internal rights-based activity is legal or illegal. The legitimacy is determined by comparing the actual activity with all parallel sequences (Figures 1 to 5), which monitors the registration, ο / s, third-party integration, and the core message of the operating system of the computer unit 05. If 4 users or program activities are determined to be illegal, the parallel_列 启 -26- This paper size applies to Chinese National Standard (CNS) A4 (210 X 297 public directors) 574645

始由本發明人設計及開發的該獨立32位元Αρι,其終止了目 丽為該使用者或無人化電腦之主要焦點的該程式活動。 一平行_列被啟始(方塊6〇5),其循環在該電腦單元ι〇5内 所有活動中可辨識代碼的該活動中視窗管理工作表列。此 平行事列S1 $地循環,監看該視窗1/〇(方塊61〇),並監看為該 電腦單元之使用者所對焦的該實際視窗代碼。 基於在圖1到5中所述來處理的資訊,如果一未授權事件正 在孩電腦單元105中啟始,該平行串列(方塊61〇)將傳送一自 動的處理間通訊(IPC)信號訊息醫—QUT (方塊615)到由本發明 人所設計及開發的該獨立32位元Api DLL (方塊62〇),其將接 受該IPC,並傳送該wm—quh訊息(方塊625)到該使用者目前所 對焦的該活動中視窗代碼。 然後戎ΑΠ將檢查該ipc的狀態,以決定所傳送訊息ipc是否 成功,然後傳送所有資訊回到該主要平行_列,其將決定額 外動作(方塊630)是否有必要來停止在該電腦單元1〇5内所發 生的該未授權事件。 現在請參考圖7,以討論根據本發明一具體實施例之客戶 應用的功能性機制。圖7為在該内部電腦單元1〇5中收集所有 電腦單元(機咨環境)資訊的處理之流程圖,並组織此資訊藉 以自動地傳送此資料到一監看站丨15。 自動地收集在該内部電腦105上的電腦單元(機器環境)資 料及組織該資訊來自動或“依需要請求,,地傳送到一監看站 115之處理,其係由一平行串列(方塊7〇〇)所管理,其接收來自 該監看站115的一結構檔案信號,如上所述。如果已經自該 裝 訂The independent 32-bit Αρι, which was originally designed and developed by the present inventor, terminates the program activity which is the main focus of the user or unmanned computer. A parallel column is started (block 605), which loops through the window management worksheet columns of all activities in the computer unit ι5 with identifiable codes. This parallel sequence S1 $ ground loop, monitor the window 1/0 (block 610), and monitor the actual window code focused by the user of the computer unit. Based on the information processed as described in Figures 1 to 5, if an unauthorized event is being initiated in the child computer unit 105, the parallel string (block 61) will transmit an automatic inter-process communication (IPC) signal message Medical-QUT (block 615) to the independent 32-bit Api DLL (block 62) designed and developed by the present inventor, which will accept the IPC and send the wm-quh message (block 625) to the user The window code for the event that is currently focused. Rong AΠ will then check the status of the ipc to determine if the transmitted message ipc was successful, and then send all information back to the main parallel column, which will determine if additional actions (block 630) are necessary to stop at the computer unit 1 The unauthorized event occurred within 05. Please refer to FIG. 7 to discuss the functional mechanism of the client application according to a specific embodiment of the present invention. Figure 7 is a flowchart of the process of collecting all computer unit (machine environment) information in the internal computer unit 105, and organize this information to automatically transmit this data to a monitoring station. Automatically collect computer unit (machine environment) data on the internal computer 105 and organize the information to automatically or "as required, send it to a monitoring station 115 for processing, which consists of a parallel series (block 7〇〇) management, which receives a structural file signal from the monitoring station 115, as described above. If it has been bound from the

k -27-k -27-

574645 A7574645 A7

監看站115接收一信號,該平行串列啟始一 MFC次函式,其傳 送(方塊750)所有組態資料到該監看站丨丨5。 在方塊705中的函式,及在方塊71加到71〇d中所代表的資料 ,係類似於以上關於圖2所述。在方塊715中的函式,及在方 塊720a到720b中所代表的資料,係類似於以上關於圖3所述。 在方塊725中的函式,及在方塊73〇&到73〇b中所代表的資料, 係類似於以上關於圖4所述。 該收集的電腦單元(機器環境)資料係在當地儲存用於探針 取得及更新(方塊740)。如果由該監看站115收到一結構檔案 信號(方塊745),如上所述,該收集的機器環境資料即轉移到 該監看站115。 現在請參考圖8,以討論根據本發明一具體實施例的該客 戶應用110之額外功能性機制。特別是,圖8為自動地收集在 一區域網路(LAN)或一廣域網路(WAN)(例如網路系統丨〇〇)上所 有電腦單元105的所有電腦單元(機器環境)資料之處理的流程 圖。 孩監看站115具有能力來自動地由一電腦單元1〇5接收所有 組態資料,或傳送一結構信號檔案(由該管理者所啟始),以 要求所有組態資料傳送到該監看站115。 圖8為該管理應用115安裝在該網路系統1〇〇上,及一客戶應 用110安裝在該網路系統100上之後的一作業的流程圖,且如 果該網路路徑已經正確地設定,其中該客戶應用110可有效 地與該管理應用115通訊。基本上’在該客户應用UG執行其 電腦單元105的分析之後,即儲存所有資訊到其資料檔案, -28- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐) 574645The monitoring station 115 receives a signal, and the parallel series starts an MFC function, which sends (block 750) all configuration data to the monitoring station 5. The function in block 705, and the data represented in blocks 71 to 71d, are similar to those described above with respect to FIG. The function in block 715 and the data represented in blocks 720a to 720b are similar to those described above with respect to FIG. The function in block 725, and the data represented in blocks 730 & 730b, are similar to those described above with respect to FIG. 4. The collected computer unit (machine environment) data is stored locally for probe retrieval and update (block 740). If a structural file signal is received by the monitoring station 115 (block 745), as described above, the collected machine environmental data is transferred to the monitoring station 115. Please refer to FIG. 8 to discuss the additional functional mechanism of the client application 110 according to a specific embodiment of the present invention. In particular, FIG. 8 is a process for automatically collecting all computer unit (machine environment) data of all computer units 105 on a local area network (LAN) or a wide area network (WAN) (such as a network system). flow chart. The child monitoring station 115 has the ability to automatically receive all configuration data from a computer unit 105, or send a structure signal file (started by the administrator) to request all configuration data to be transmitted to the monitoring station. Station 115. FIG. 8 is a flowchart of an operation after the management application 115 is installed on the network system 100 and a client application 110 is installed on the network system 100, and if the network path has been correctly set, The client application 110 can effectively communicate with the management application 115. Basically, after the customer uses UG to perform the analysis of his computer unit 105, all the information is stored in his data file. -28- This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) 574645

並轉換所有資料到記憶體陣列(方塊83〇),一平行_列(方塊 835)即啟始來輪詢該網路連接的狀態,並保證與與該客戶應 用110建立所有適當的路徑,來與該管理應用U5通訊。、 如果該平行串列(方塊840)偵測到該網路的存在,即所有定 義的路徑已經正確地建立,該客戶應用丨1〇將傳送所有資料 到該管理應用115 (方塊845)。 孩管理應用115也將開始一平行串列(方塊8〇2),其將輪詢 (方塊805)來檢查該網路的狀態,及該定義的網路路徑是否建 立。如果整體網路狀態為正確,該管理應用115將自動地接 收來自該客戶應用110的結構檔案信號資訊。 在某些命令及控制指令經由該使用者而由該管理應用115 啟始的事件中,例如一更新請求,一内部函式(方塊810)將啟 始該結構化信號檔案,然後將會傳送到該客戶應用110(方塊 815)。在一具體實施例中,該結構化信號檔案藉由使用一網 路生產目錄(方塊825)來傳送,其可例如位在該電腦單元1〇5 的當地。該函式傳送該資訊回到該主要平行串列,然後其將 接收及處理自該客戶應用所接收的資訊(方塊82〇)。 現在請參考圖9,以討論根據本發明一具體實施例的客戶 應用110之額外功能性機制。特別是,圖9為自動地分析外來 實體程式的“穿透樣式”之處理的流程圖,其會穿透一電腦單 元來收集,呈報,啟始一工作或摧毀一電腦單元上的資訊。 該實體程式應用110即啟始,藉此使得上述的探針函式初始 化(方塊200)。該方塊905的函式代表由方塊2〇1·2〇6 (圖2),方塊 340-343 (圖3)及方塊440-443 (圖4)所執行的資料收集函式。 -29· 本紙張尺度適用中國國家標準(CNS) Α4規格(210X 297公#) ' -----*-- 574645 A7 B7 五、發明説明(27 ) 該方塊910的函式代表由方塊210-215所執行的函式(圖2)。該 方塊915-920的檢查函數係由該方塊216-217的函式所代表。該 方塊925的函式代表由方塊310-312所執行的函式(圖3)。該方塊 930-935的檢查函式為由該方塊313-314的函式所代表。該方塊 940的函式代表由方塊410-413所執行的函式(圖4)。該方塊945-950的檢查函式為由該方塊414-415的函式所代表。該方塊955 的函式為由該方塊218, 315及416的函式所代表,如先前所述 。因此’圖9所示為一穿透樣式之分析的概述,其係自每個 電腦單元110接收,而傳送資料到該監看站115。 現在請參考圖10 ’以討論根據本發明一具體實施例中該客 戶應用的功能性機制。特別是,圖10為一種自動倒轉任何電 腦單元(機器環境)改變之處理的流程圖,其為一外來實體程 式可以在該實際電腦單元110中啟始。在方塊到1050中的 函式即為先前所述,並相同於圖9中的方塊905-950。在方塊 1055中,該客戶應用110搜尋在該客戶電腦ι〇5當地的資料字 典’而如果在遠架構中具有在该電腦單元105中所啟始的一 外來實體程式進行的未授權修改,則該客戶應用11〇將倒轉 該架構回到在該未授權修改之前所定義的架構。 現在請參考圖11 ’以討論根據本發明一具體實施例中該客 戶應用的功能性機制。特別是,圖11為一結構化信號樓案的 方塊圖,其捕捉關於該“穿透樣式”的所有鑑識資料,其係傳 送並儲存在該監看站115。 居結構化樓案1100被產生’並由该客戶應用傳送所有 “穿透樣式”(鑑識)資料到該監看站115。如圖u所示,以下係 -30- 本紙張尺度適用中國國家標準(CNS) A4規格(210X297公釐) 574645 A7 B7 五、發明説明(28 ) 顯示在該資料結構1100中,其可允許一電腦鑑識設計來在一 即時環境下運作。 SOT [cr] [If]And convert all data to the memory array (block 83), a parallel column (block 835) starts to poll the status of the network connection, and ensures that all appropriate paths are established with the client application 110 to Communicate with the management application U5. If the parallel string (block 840) detects the existence of the network, that is, all defined paths have been established correctly, the client application 10 will send all data to the management application 115 (block 845). The child management application 115 will also start a parallel series (block 802), which will poll (block 805) to check the status of the network and whether the defined network path is established. If the overall network status is correct, the management application 115 will automatically receive structural file signal information from the client application 110. In the event that certain commands and control instructions are initiated by the management application 115 via the user, such as an update request, an internal function (block 810) will initiate the structured signal file, which will then be sent to The client application 110 (block 815). In a specific embodiment, the structured signal file is transmitted by using a network production directory (block 825), which may be located, for example, at the computer unit 105. The function sends the information back to the main parallel series, and it will then receive and process the information received from the client application (block 82). Reference is now made to FIG. 9 to discuss additional functional mechanisms of the client application 110 according to an embodiment of the present invention. In particular, FIG. 9 is a flowchart of a process of automatically analyzing a “penetration pattern” of a foreign entity program, which penetrates a computer unit to collect, report, start a job, or destroy information on a computer unit. The physical program application 110 is started, thereby initializing the probe function described above (block 200). The function of block 905 represents the data collection function performed by blocks 201 · 206 (Figure 2), blocks 340-343 (Figure 3), and blocks 440-443 (Figure 4). -29 · This paper size applies Chinese National Standard (CNS) A4 specification (210X 297 male #) '----- *-574645 A7 B7 V. Description of the invention (27) The function of block 910 is represented by block 210 Function executed by -215 (Figure 2). The check functions of blocks 915-920 are represented by the functions of blocks 216-217. The function of block 925 represents the function performed by blocks 310-312 (Figure 3). The check functions of blocks 930-935 are represented by the functions of blocks 313-314. The function of block 940 represents the function performed by blocks 410-413 (Figure 4). The check functions of blocks 945-950 are represented by the functions of blocks 414-415. The function of block 955 is represented by the functions of blocks 218, 315, and 416, as described earlier. Therefore, FIG. 9 shows an overview of a penetration pattern analysis, which is received from each computer unit 110 and transmitted to the monitoring station 115. Please refer to FIG. 10 'to discuss the functional mechanism of the customer application according to a specific embodiment of the present invention. In particular, FIG. 10 is a flowchart of a process for automatically reversing changes in any computer unit (machine environment), which is a foreign entity program that can be started in the actual computer unit 110. The functions in blocks 1050 are described previously and are the same as blocks 905-950 in Figure 9. In block 1055, the client application 110 searches for a local data dictionary on the client's computer 05 and if there is unauthorized modification by a foreign entity program initiated in the computer unit 105 in the remote architecture, then The client application 110 will reverse the architecture back to the architecture defined before the unauthorized modification. Please refer to FIG. 11 'to discuss the functional mechanism of the client application according to a specific embodiment of the present invention. In particular, FIG. 11 is a block diagram of a structured signal building that captures all forensic information about the “penetration pattern”, which is transmitted and stored at the monitoring station 115. The residential structure case 1100 was generated ’and the client application transmitted all“ penetration patterns ”(identification) data to the monitoring station 115. As shown in Figure u, the following are -30- This paper size applies to the Chinese National Standard (CNS) A4 specification (210X297 mm) 574645 A7 B7 V. Description of the invention (28) is shown in the data structure 1100, which can allow one Computer forensics is designed to operate in an immediate environment. SOT [cr] [If]

Date= CCYY\MM\DD [cr] [If]Date = CCYY \ MM \ DD [cr] [If]

Time=HH:MM:SS [cr] [If] 3 Wind= Variable Up To 500 Characters [cr] [If] 2Wind= Variable Up To 500 Characters [cr] [If] lWind= Variable Up To 500 Characters [cr] [If]Time = HH: MM: SS [cr] [If] 3 Wind = Variable Up To 500 Characters [cr] [If] 2Wind = Variable Up To 500 Characters [cr] [If] lWind = Variable Up To 500 Characters [cr] [If]

Mssg - Variable Up To 500 Characters [cr] [If] EOT [cr] [If] 以上參數係定義如下: SOT -開始傳輸; [cr]-換行ASCII控制字元; [If]-換列ASCII控制字元; EOT -傳輸結束; 3Wind -在2Wind之前聚焦的前一個視窗代碼; 2Wind -在1 Wind之前聚焦的前一個視窗代碼; 1 Wind -在未授權活動聚焦的視窗代碼;及 Mssg -未授權活動的定義。 現在請參考圖12,以討論根據本發明一具體實施例中該客 戶應用的功能性機制。特別是,圖12為一種在一即時環境中 自動地偵測該HKEY_LOCAL_MACHINE:Software註冊段落的未 授權的修改之處理的流程圖。該流程圖說明一種自動分析 該外來實體程式的“穿透樣式”之處理,其可穿透一電腦單元 -31 - 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐)Mssg-Variable Up To 500 Characters [cr] [If] EOT [cr] [If] The above parameters are defined as follows: SOT-start transmission; [cr]-newline ASCII control character; [If]-newline ASCII control word Yuan; EOT-end of transmission; 3Wind-previous window code focused before 2Wind; 2Wind-previous window code focused before 1 Wind; 1 Wind-window code focused on unauthorized activity; and Mssg-unauthorized activity Definition. Please refer to FIG. 12 to discuss the functional mechanism of the client application according to a specific embodiment of the present invention. In particular, FIG. 12 is a flowchart of a process for automatically detecting unauthorized modification of the HKEY_LOCAL_MACHINE: Software registration section in an instant environment. This flowchart illustrates a process that automatically analyzes the "penetration pattern" of the foreign entity program, which can penetrate a computer unit -31-This paper size applies to China National Standard (CNS) A4 (210 X 297 mm)

裝 訂Binding

線 574645 A7 B7 五、發明説明(29 105來收集,呈報,啟始一工作,或摧毁在一電腦單元1〇5上 的資訊。自每個電腦單元105接收的穿透樣式分析可用資料 傳送到該監看站115。 在收集到一客戶電腦105傳送到該監看站115的所有内部註 冊資料之後,一 PC探針(屬於該客戶應用110)即啟始本發明人 所設計及開發的一額外平行串列函式(方塊1205),而該額外 平行串列函式啟始由本發明人設計及開發的一額外獨立的 21 API DLL,其對該 HKEYJLOCAL_MACHINE:Softwaire進行分析 ,(此後即稱之為該定義段落PEFINED SEGMENT)),其為該内 部註冊的一段落。上述PC探針的一範例為位在美國田納西 州的Granite Technologies公司所提供的形式。該分析包含一種 開啟該實際註冊鍵的方法,並開啟及查詢對於在該註冊的 此特殊區域内任何可能的未授權改變的該定義段落。 該内部註冊為該Windows作業系統所使用的一資料庫(如 Windows 95及NT)來儲存組態資訊。該註冊基本上包含以下的 主要區段: ⑴HKEY_Classes_Root _檔案關聯及物件連結與嵌入(OLE) 資訊, (2) HKEY_CurrentJLJser -目前使用者的所有喜好組合; (3) HKEYJUser -每個該系統之使用者的所有目前使用者 的資訊; (4) HKEY_Local_Machine -硬體,作業系統,及安裝的應用 之設定; (5) HKEY_Current_Configuration -該顯示器及列表機的設定; -32-Line 574645 A7 B7 V. Invention Description (29 105 to collect, report, start a job, or destroy information on a computer unit 105. The penetration pattern analysis received from each computer unit 105 can be transmitted to The monitoring station 115. After collecting all the internal registration data transmitted from a client computer 105 to the monitoring station 115, a PC probe (belonging to the client application 110) starts a design and development by the inventor. An additional parallel serial function (block 1205), and the additional parallel serial function started with an additional independent 21 API DLL designed and developed by the inventor, which analyzes the HKEYJLOCAL_MACHINE: Softwaire, (hereinafter referred to as PEFINED SEGMENT)), which is a paragraph of the internal registration. An example of the above PC probe is the format provided by Granite Technologies, Tennessee, USA. The analysis includes a method to open the actual registration key, and to open and query the definition paragraph for any possible unauthorized changes in this special area of the registration. The internal registration is a database (such as Windows 95 and NT) used by the Windows operating system to store configuration information. The registration basically includes the following main sections: ⑴HKEY_Classes_Root _file association and object linking and embedding (OLE) information, (2) HKEY_CurrentJLJser-all favorite combinations of current users; (3) HKEYJUser-each user of the system Information of all current users; (4) HKEY_Local_Machine-settings of hardware, operating system, and installed applications; (5) HKEY_Current_Configuration-settings of the display and list machine; -32-

裝 訂Binding

線 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐) 574645 A7 B7 五、發明説明(3〇 ) (6) HKEYJ^yn—Data -效能資料。 大多數的Windows應用會寫入資料到該註冊,至少在安裝 期間。該註冊可使用該作業系統所提供的該註冊編輯器 (regA/zY.exe)來直接編輯。因此,該Windows註冊即儲存系統組 態細節,所以Windows即查看並以想要的方式運行。該註冊 儲存使用者輪廓資訊在一稱為“ user.dat”的檔案中,例如底色 圖案,配色,及桌面配置,並儲存特定硬體細節及特定軟體 細節在一稱為“ system.dat”的檔案中,例如裝置管理及副檔名 關聯。在許多方式中,該註冊即取代了來自Windows早期版 本的win.ini及system.ini之功能,雖然這些樓案仍存留,因為許 多Windows應用參考到它們。 該註冊係由啟始在Microsoft API開發環境中所定義的32位 元API函式呼叫來開啟。 在該註冊開啟的時間,該定義段落以參數傳送來成功地 開啟該註冊的特殊段落。此參數係包含在該32 API函式中(來 自該Microsoft API開發環境),其被啟始來開啟一註冊段落。 該方法包含建立在該註冊的此特殊段落中所有授權的登 錄之“基本計數”。該“基本計數”為記錄在該註冊的定義段落 内的登錄之總數。在建立該“基本計數”之後,該“基本計數” 的數值整數即儲存在記憶體(例如RAM)。然後該MFC平行串 歹|J (方塊1215)即啟始由本發明人設計及開發的32位元API,其 啟始一演算法,計算出該註冊的此特殊定義段落的“基本計 數”是否有發生任何改變。該32位元API設計的實際函式描述 於下。一子串列(方塊1240)啟始該32位元API DLL,其收集在 -33- 本紙張尺度適用中國國^標準(CNS) A4規格(210X297公釐)LINE This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) 574645 A7 B7 V. Description of the invention (30) (6) HKEYJ ^ yn—Data-Performance data. Most Windows applications write data to this registration, at least during installation. The registration can be edited directly using the registration editor (regA / zY.exe) provided by the operating system. Therefore, this Windows registration is storing the system configuration details, so Windows is viewing and running in the desired way. The registration stores user profile information in a file called "user.dat", such as background patterns, color schemes, and desktop configurations, and stores specific hardware details and specific software details in a system called "system.dat" , Such as device management and extension extensions. In many ways, this registration replaces the functionality of win.ini and system.ini from earlier versions of Windows, although these cases still exist because many Windows applications refer to them. The registration is started by the 32-bit API function call that was originally defined in the Microsoft API development environment. At the time when the registration is opened, the definition paragraph is passed as a parameter to successfully open the special section of the registration. This parameter is included in the 32 API function (from the Microsoft API development environment), which is started to open a registration section. The method involves establishing a "basic count" of all authorized registrations in this particular paragraph of the registration. The "base count" is the total number of entries recorded in the definition section of the registration. After the "basic count" is established, a numerical integer of the "base count" is stored in a memory (for example, RAM). Then the MFC parallel string | J (block 1215) is a 32-bit API designed and developed by the present inventor. It starts an algorithm to calculate whether there is a "basic count" for this specially defined paragraph of the registration. Any change. The actual function of the 32-bit API design is described below. A sub-series (block 1240) started the 32-bit API DLL, which was collected at -33- This paper size applies to China National Standard (CNS) A4 specification (210X297 mm)

裝 訂Binding

線 574645 A7 ------- B7 五、發明説明(31 ) 遠HKEY—LOCAL一MACHINE:SOFTWARE註冊段落上所有的註冊 貝料。在圖12中的其它函式的執行則類似於在先前圖面中所 描述的相對應類似函式。 本發明人所設計的演算法方法查詢該註冊的定義段落, 其方式為實際上不會有資源利用被註冊在該CPu内。因為是 在孩註冊的定義段落内’其有可能該登錄不會依照特殊的 順序來列出,且性質上為隨機的。 同時,實際的0/S必須查詢在整個註冊的每一個註冊段落 來建立及維護其程式環境,本發明人所設計及開發的方法 為一種演算法,其計算在此定義的註冊段落内所有登錄的 最大“基本計數”(整數),減去該“基本計數,,減2。該‘‘基本計 數減2 ’係等於該開始位置指標,其中該演算法繼續計數剩 餘的登錄,及在該註冊段落的此特殊定義部份内的最後‘‘日 期時間修改,,。 當該演算法在該開始位置指標處啟始其計數時,該演算 法將進行计數在該柱冊的定義段落内的剩餘登錄。如果該 最大計數等式,其不等於該預先計算的結果,該定義註冊段 落即已經被使用者人為編輯,或由一未授權程式修改所侵 入。 舉例而言,HKEY一LOCAL—MACHINE:Software可包含50個登錄 ’其1己綠了安裝在該電腦内的不同應用。監看及控制此環境 的32位元API DLL將會輪詢此段落,用以在每5到8秒内偵測一 未授權註冊登錄或刪除。如果該註冊段落被修改,即會偵測 ’到该未授權修改,並呈報到啟始該32位元Api DLL之主要平 -34- 本紙張尺度適财8 @家標準(CNS) M規格(2ig χ哪讀) 574645 A7 B7 五、發明説明(32 ) 行串列。 該預先計算的結果可保證來自該查詢為100%正確的結果 (其中該查詢係透過來自該Microsoft 32位元API開發環境的32 API函式呼叫的該註冊段落本身),因為該演算法係設計來查 詢該定義的段落,例如約在每5到8秒。該查詢的速率使其對 於一使用者不可能在未被該演算法所攔截之下來刪除或加 入一新的登錄到該定義段落。 在約5到8秒下的速率及準確性即已足夠,因為任何嘗試來 刪除’然後加入一記錄到一註冊段落之未授權的程式或使 用者,將強迫該註冊段落到一 “更新循環,,,藉此其執行其内 部的“管家動作”。該“管家動作,,需要大約4到6秒來機械化地 執行其内部運作。再者,未授權程式執行一計算來加入登錄 到該註冊的一定義區域,其使得本發明人所設計的演算法 可100%準確地對付未授權的程式活動。 最後’该1王冊保護’以及保護該〇/s及第三方啟動環境的 剩餘功能,即可提供一多層防護姿態,來保護該電腦單元 105该電腦單元會對於未授權修改的所有弱點。 上述的平行串列可執行該輪詢函式,而不會造成該CPU時 脈所使用之貞源的一衝擊或損害。此好處可藉由設計在平 订串列執仃狀態的循環當中具有一自動化的休眠狀態,並 基於該特殊串列的重要性來達成,所以該系統運作並不會 減慢。 丹 > 考圖13,以纣論根據本發明一具體實施例的該客 戶應用110之額外功能料祕 刀把f生機制。特別是,圖13為在一即時環境 -35 - 本紙張尺度通财_家標準^- 574645 A7 B7 五、發明説明(33 ) 中自動地偵測該 HKEY_LOCAL_MACHINE:Software\Microsoft註冊 段落之任何未授權的修改之處理的流程圖。 在該所有内部註冊資料的收集傳送到該監看站115之後, 在該客戶應用110中的PC探針即啟始由本發明人所設計及開 發的一額外平行串列函式,其可啟始由本發明人設計及開 發的一額外獨立的21 API DLL,其進行分析該内部註冊的 HKEY_LOCAI^MACHINE:Soflware\Microsoft段落。此分析包含一 種開啟該實際註冊鍵的方法,並開啟及查詢此段落中在該 註冊的此特殊區域内的任何可能的未授權改變。該方法包 含建立在該註冊的此特殊段落中之所有授權登錄之“基本計 數”。在建立該“基本計數”之後,該“基本計數”的數值整數 即儲存在RAM中。然後該MFC平行串列即啟始由本發明人設 計及開發的一 32位元API,其啟始一演算法來計算出該註冊 的此特殊定義段落之“基本計數”是否發生任何改變。 然後該MFC平行串列(方塊1315)啟始由本發明人設計及開發 的該32位元API,其啟始一演算法來計算出該註冊的此特殊 定義段落之“基本計數,,是否發生任何改變。該32位元API設 計的實際功能進一步說明於下。一子串列(方塊1340)啟始該32 位元 API DLL ,其收集在該 HKEY_LOCAL_MACHINE:Software\MiciOsoft 註冊段落上的所有登錄資料。在圖13中的其它函式的執行類 似於在先前圖面中所對應的類似函式所描述者。 本發明人所設計的演算法方法查詢該註冊的該定義段落 ,其方式為實際上不會有資源利用被註冊在該CPU内。因為 是在該註冊的定義段落内,其有可能該登錄不會依照特殊 -36- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐) 574645 A7 B7 五、發明説明(34 ) 的順序來列出,且性質上為隨機的。 同時,實際的ο/s必須查詢在整個註冊的每一個註冊段落 來建立及維護其程式環境,本發明人所設計及開發的方法 為一種演算法,其計算在此定義的註冊段落内所有登錄的 最大“基本計數”(整數),減去該“基本計數,,減2。該“基本計 數”減2,係等於該開始位置指標,其中該演算法繼續計數剩 餘的登錄,及在該註冊段落的此特殊定義部份内的最後“日 期時間修改”。 當該演算法在該開始位置指標處啟始其計數時,該演算 法將進行計數在該註冊的定義段落内的剩餘登錄。如果該 最大計數等式,其不等於該預先計算的結果,該定義註冊段 落即已經被使用者人為編輯,或由一未授權程式修改所侵 入0 遠預先計算結果可保證來自該查詢的為1〇〇%正確的結果 ’因為該演算法係設計來在約每5到8秒查詢該定義的段落。 泫查珣的速率使其對於一使用者不可能來刪除及加入一新 登錄到該定義的段落,而不會被該演算法所攔截到。再者, 未授權程式執行一計算來加入登錄到該註冊的一定義區域 ,其使得本發明人所設計的演算法可100%準確地對付未授 權的程式活動。 現在叫參考圖14 ,以根據本發明一具體實施例來討論該客 戶應用no的額外功能性機制。特別是,圖14為—種在_即時 % !兄中自動地偵測對於該Line 574645 A7 ------- B7 V. Description of the invention (31) HKEY—LOCAL_MACHINE: SOFTWARE All registration materials in the registration paragraph. The execution of the other functions in Figure 12 is similar to the corresponding similar functions described in the previous figure. The algorithm method designed by the inventor inquires the definition paragraph of the registration in such a way that no resource utilization is actually registered in the CPu. Because it is in the definition section of the child registration, it is possible that the registration will not be listed in a special order and is random in nature. At the same time, the actual 0 / S must query each registration paragraph in the entire registration to establish and maintain its programming environment. The method designed and developed by the inventor is an algorithm that calculates all registrations in the registration paragraph defined here. The maximum "base count" (integer) minus the "base count, minus 2. The" base count minus 2 "is equal to the starting position indicator, where the algorithm continues to count the remaining logins, and in the registration The last `` date time '' in this special definition section of the paragraph is modified. When the algorithm starts its counting at the start position indicator, the algorithm will count the number of times in the definition section of the column. Remaining registration. If the maximum counting equation is not equal to the pre-calculated result, the definition registration paragraph has been edited by the user or intruded by an unauthorized program modification. For example, HKEY_LOCAL_MACHINE : Software can contain 50 logins. 1 of them has different applications installed in this computer. The 32-bit API DLL that monitors and controls this environment will poll this section , Used to detect an unauthorized registration login or deletion every 5 to 8 seconds. If the registration paragraph is modified, it will detect 'the unauthorized modification and report to the start of the 32-bit Api DLL Main Ping-34- This paper is suitable for financial standards 8 @ 家 标准 (CNS) M specifications (2ig χ Where to read) 574645 A7 B7 V. Description of the invention (32) Rows and columns. The pre-calculated result can be guaranteed from the query as 100% correct result (where the query is the registration paragraph itself called through a 32 API function from the Microsoft 32-bit API development environment), because the algorithm is designed to query the defined paragraph, for example about every 5 to 8 seconds. The rate of this query makes it impossible for a user to delete or add a new login to the defined paragraph without being intercepted by the algorithm. The rate and accuracy at about 5 to 8 seconds Sex is sufficient, because any unauthorized program or user who attempts to delete 'then adding a record to a registration paragraph will force the registration paragraph to an "update cycle," whereby it executes its internal "steward action". The "steward action" takes about 4 to 6 seconds to mechanize its internal operations. Furthermore, an unauthorized program performs a calculation to join a defined area registered in the registration, which makes the algorithm designed by the inventor Can deal with unauthorized program activities with 100% accuracy. Finally, 'the 1 book protection' and the remaining functions to protect the 0 / s and third-party startup environment, can provide a multilayer protection posture to protect the computer unit 105 The computer unit will deal with all the weaknesses of unauthorized modification. The above-mentioned parallel series can execute the polling function without causing a shock or damage to the source of the clock used by the CPU clock. This benefit can be designed by There is an automatic dormant state in the loop of the order execution state, and it is achieved based on the importance of the special sequence, so the system operation will not slow down. Dan> Consider Figure 13 for the sake of discussion According to a specific embodiment of the present invention, the additional function of the customer application 110 is a secret knife mechanism. In particular, FIG. 13 is a real-time environment. A7 B7 V. Flow chart of the process of automatically detecting any unauthorized modification of the HKEY_LOCAL_MACHINE: Software \ Microsoft registration paragraph in the description of the invention (33). After the collection of all internal registration data is transmitted to the monitoring station 115 The PC probe in the client application 110 starts an additional parallel serial function designed and developed by the inventor, which can start an additional independent 21 API DLL designed and developed by the inventor. Analyze the HKEY_LOCAI ^ MACHINE: Soflware \ Microsoft section of the internal registration. This analysis includes a way to turn on the actual registration key, and open and query any possible unauthorized changes in this section in this special area of the registration. The method includes the "basic count" of all authorized logins established in this special paragraph of the registration. After the "basic count" is established, the numeric integer of the "basic count" is stored in RAM. Then the MFC parallel string The column is a 32-bit API designed and developed by the inventor. It starts an algorithm to calculate this special definition of the registration. Is there any change in the "basic count"? Then the MFC parallel string (block 1315) starts the 32-bit API designed and developed by the inventor, and it starts an algorithm to calculate this special registration. Defines the "base count" of a paragraph, whether any changes have occurred. The actual functions of this 32-bit API design are further explained below. A sub-series (block 1340) starts the 32-bit API DLL, which collects all the login information on the HKEY_LOCAL_MACHINE: Software \ MiciOsoft registration section. The execution of the other functions in Fig. 13 is similar to that described by the similar function corresponding to the previous drawing. The algorithm method designed by the inventor inquires the definition of the registration in a manner that, in practice, no resource utilization is registered in the CPU. Because it is in the definition paragraph of the registration, it is possible that the registration will not follow the special -36- This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) 574645 A7 B7 V. Description of the invention (34 ), And are random in nature. At the same time, the actual ο / s must query each registration paragraph in the entire registration to establish and maintain its programming environment. The method designed and developed by the inventor is an algorithm that calculates all registrations in the registration paragraph defined here. The maximum "base count" (integer), minus the "base count," minus 2. The "base count" minus 2, is equal to the starting position indicator, where the algorithm continues to count the remaining logins, and in the registration The last "datetime modification" in this special definition part of the paragraph. When the algorithm starts its counting at the start position indicator, the algorithm will count the remaining entries in the definition section of the registration. If The maximum counting equation is not equal to the pre-calculated result. The definition registration paragraph has been manually edited by the user or intruded by an unauthorized program modification. 0 The pre-calculated result can guarantee that the query result is 1. 〇% correct result 'because the algorithm is designed to query the defined paragraph about every 5 to 8 seconds. It is not possible to delete and add a newly registered paragraph to the definition without being intercepted by the algorithm. Furthermore, an unauthorized program performs a calculation to add a registration to a defined area of the registration, which makes this The algorithm designed by the inventor can deal with unauthorized program activities with 100% accuracy. Now refer to FIG. 14 to discuss the additional functional mechanism of the client application no according to a specific embodiment of the present invention. In particular, FIG. 14 For—kind of _immediate%! Brother automatically detects

Mi⑽SOft\Run註冊段落之任何未授權修改之處理的流程圖。 -37-Flow chart of the processing of any unauthorized modification of the Mi⑽SOft \ Run registration section. -37-

574645 A7 B7 五、發明説明(35 ) 在該所有内部註冊資料的收集傳送到該監看站115之後, 在該客戶應用110中的PC探針即啟始由本發明人所設計及開 發的一額外平行串列函式,其可啟始由本發明人設計及開 發的一額外獨立的21 API DLL,其進行分析該内部註冊的 HKEY_L〇CAL_MACHINE:Software\Microsoft\Run段落。此分析包 含一種開啟該實際註冊鍵的方法,並開啟及查詢此段落中 在該註冊的此特殊區域内的任何可能的未授權改變。該方 法包含建立在該註冊的此特殊段落中之所有授權登錄之“基 本計數”。在建立該“基本計數”之後,該“基本計數”的數值 整數即儲存在RAM中。然後該MFC平行串列即啟始由本發明 人設計及開發的一 32位元API,其啟始一演算法來計算出該 註冊的此特殊定義段落之“基本計數”是否發生任何改變。 然後該MFC平行串列(方塊1415)啟始由本發明人設計及開 發的該32位元API,其啟始一演算法來計算出該註冊的此特 殊定義段落之“基本計數”是否發生任何改變。該32位元API 設計的實際功能進一步說明於下。一子串列(方塊1440)啟始 該 32位元 API DLL,其收集在該 HKEY_LOCAL_MACHINE:Soflware\ Microsoft\Run註冊段落上的所有註冊資料。在圖14中的其它函 式的執行類似於在先前圖面中所對應的類似函式所描述者。 本發明人所設計的演算法方法查詢該註冊的該定義段落 ,其方式為實際上不會有資源利用被註冊在該CPU内。因為 是在該註冊的定義段落内,其有可能該登錄不會依照特殊 的順序來列出,且性質上為隨機的。 同時,實際的Ο/S必須查詢在整個註冊的每一個註冊段落 -38- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐)574645 A7 B7 V. Description of the invention (35) After the collection of all internal registration data is transmitted to the monitoring station 115, the PC probe in the client application 110 starts an additional design and development by the inventor A parallel serial function, which can start an additional independent 21 API DLL designed and developed by the inventor, which analyzes the internally registered HKEY_LOCAL_MACHINE: Software \ Microsoft \ Run paragraph. This analysis includes a way to turn on the actual registration key, and turn on and query for any possible unauthorized changes in this particular area of the registration in this paragraph. The method includes a "basic count" of all authorized logins established in this special paragraph of the registration. After the "base count" is established, the integer value of the "base count" is stored in the RAM. Then, the MFC parallel series starts a 32-bit API designed and developed by the inventor, and starts an algorithm to calculate whether there is any change in the "base count" of this registered special-defined paragraph. Then the MFC parallel string (block 1415) starts the 32-bit API designed and developed by the present inventor, which starts an algorithm to calculate whether there is any change in the "basic count" of this specially defined paragraph of the registration . The actual functionality of this 32-bit API design is further explained below. A sub-series (block 1440) starts the 32-bit API DLL, which collects all the registration information in the HKEY_LOCAL_MACHINE: Soflware \ Microsoft \ Run registration section. The execution of the other functions in FIG. 14 is similar to that described by the similar function corresponding to the previous drawing. The algorithm method designed by the inventor inquires the definition of the registration in a manner that, in practice, no resource utilization is registered in the CPU. Because it is in the definition paragraph of the registration, it is possible that the registration will not be listed in a special order and is random in nature. At the same time, the actual O / S must be checked in each registration paragraph of the entire registration. -38- This paper size applies to China National Standard (CNS) A4 (210 X 297 mm)

裝 訂Binding

k 574645 A7 B7 五、發明説明(% ) ----- 來建立及維護其程式環境,本發明人所設計及開發的方法 為一種肩异法,其計算在此定義的註冊段落内所有登錄的 最大“基本計數”(整數),減去該‘‘基本計數,,減2。該“基本計 數減2,係等於該開始位置指標,其中該演算法繼續計數剩 餘的登錄,及在該註冊段落的此特殊定義部份内的最後‘‘日 期時間修改”。 當該演算法在該開始位置指標處啟始其計數時,該演算 法將進行計數在該註冊的定義段落内的剩餘登錄。如果該 最大計數等式,其不等於該預先計算的結果,該定義註冊段 落即已經被使用者人為編輯,或由一未授權程式修改所侵 入0 4預先計算結果可保證來自該查詢的為1〇〇%正確的結果 ’因為該演算法係設計來在約每5到8秒查詢該定義的段落。 孩查詢的速率使其對於一使用者不可能來刪除及加入一新 登錄到該定義的段落,而不會被該演算法所攔截到。再者, 未授權程式執行一計算來加入登錄到該註冊的一定義區域 ’其使得本發明人所設計的演算法可1〇〇%準確地對付未授 權的程式活動。 現在請參考圖15,以根據本發明一具體實施例來討論該客 戶應用110的額外功能性機制。特別是,圖15為一種在一即時 ;哀境中自動地偵測對於該HKEY—CLASSES_R00T:CLSID註冊段 洛之任何未授權修改的之處理的流程圖。 在孩所有内部註冊資料的收集傳送到該監看站n5之後, 孩PC探針即啟始由本發明人所設計及開發的一額外平行串 -39- 本紙張尺度適用τ㈣轉準(⑽“(靡撕公⑻ 574645 A7 B7 五、發明説明(37 ) 列函式,其可啟始由本發明人設計及開發的一額外獨立的21 API DLL,其進行分析該内部註冊的HKEY_CLASSES_R〇〇T: CLSID段落。此分析包含一種開啟該實際註冊鍵的方法,並 開啟及查詢此段落中在該註冊的此特殊區域内的任何可能 的未授權改變。該方法包含建立在該註冊的此特殊段落中 之所有授權登錄之“基本計數”。在建立該“基本計數”之後, 該“基本計數”的數值整數即儲存在RAM中。然後該MFC平行 串列即啟始由本發明人設計及開發的一 32位元API,其啟始 一演算法來計算出該註冊的此特殊定義段落之“基本計數” 是否發生任何改變。 然後該MFC平行串列(方塊1515)啟始由本發明人設計及開 發的該32位元API,其啟始一演算法來計算出該註冊的此特 殊定義段落之“基本計數”是否發生任何改變。該32位元API 設計的實際功能進一步說明於下。一子串列(方塊1540)啟始 該 32位元 API DLL,其收集在該 HKEY_CLASSES_RO〇T:CLSID註 冊段落上的所有登錄資料。在圖15中的其它函式的執行類似 於在先前圖面中所對應的類似函式所描述者。 本發明人所設計的演算法方法查詢該註冊的該定義段落 ,其方式為實際上不會有資源利用被註冊在該CPU内。因為 是在該註冊的定義段落内,其有可能該登錄不會依照特殊 的順序來列出,且性質上為隨機的。 、 同時,實際的Ο/S必須查詢在整個註冊的每一個註冊段落 來建立及維護其程式環境,本發明人所設計及開發的方法 為一種演算法,其計算在此定義的註冊段落内所有登錄的 -40- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐) 裝 訂k 574645 A7 B7 V. Description of the invention (%) ----- To establish and maintain its programming environment, the method designed and developed by the present inventor is a shoulder method, which calculates all the registrations in the registration paragraph defined here The maximum "base count" (integer), minus the "base count," and subtract 2. The "basic count minus 2" is equal to the starting position indicator, in which the algorithm continues to count the remaining entries and the last '' date time modification 'within this special definition part of the registration paragraph. When the algorithm starts its count at the start position index, the algorithm will count the remaining entries in the definition section of the registration. If the maximum counting equation is not equal to the pre-calculated result, the definition registration paragraph has been edited by the user or intruded by an unauthorized program modification. 0 The pre-calculated result can guarantee that the query comes from 1. 〇〇% correct result 'Because the algorithm is designed to query the defined paragraph about every 5 to 8 seconds. The rate of querying makes it impossible for a user to delete and add a new entry to the defined paragraph without being intercepted by the algorithm. Furthermore, the unauthorized program performs a calculation to add to a defined area registered in the registration, which allows the algorithm designed by the inventor to 100% accurately deal with unauthorized program activities. Please refer to FIG. 15 to discuss the additional functional mechanism of the client application 110 according to a specific embodiment of the present invention. In particular, FIG. 15 is a flowchart of a process for automatically detecting any unauthorized modification of the HKEY_CLASSES_R00T: CLSID registration section in an instant; After the collection of all internal registration information of the child is transmitted to the monitoring station n5, the child PC probe starts an additional parallel string designed and developed by the inventor. Superman 574645 A7 B7 V. Description of the invention (37) A function that can start an additional independent 21 API DLL designed and developed by the inventor, which analyzes the internally registered HKEY_CLASSES_R〇〇T: CLSID Paragraph. This analysis includes a method to turn on the actual registration key, and to open and query any possible unauthorized changes in this paragraph in this special area of the registration. This method includes the establishment in this special paragraph of the registration The "basic count" of all authorized registrations. After the "basic count" is established, the integer value of the "basic count" is stored in the RAM. Then the MFC parallel string starts a 32-bit designed and developed by the inventor. Bit API, which starts an algorithm to calculate whether any change has occurred to the "basic count" of this specially defined paragraph of the registration. Then the MFC parallel string (block 1515) starts The 32-bit API, which was originally designed and developed by the present inventor, starts an algorithm to calculate whether the "basic count" of this specially defined paragraph of the registration has changed. The actual function of the 32-bit API design further Illustrated below. A sub-series (block 1540) starts the 32-bit API DLL, which collects all the login information on the HKEY_CLASSES_ROOT: CLSID registration section. The execution of other functions in Figure 15 is similar to It is described by the similar function corresponding to the previous figure. The algorithm method designed by the present inventor queries the definition of the registration in a way that no resource utilization is actually registered in the CPU. Because It is within the definition paragraph of the registration, it is possible that the registration will not be listed in a special order, and is random in nature. At the same time, the actual O / S must query each registration paragraph in the entire registration to Establish and maintain its programming environment. The method designed and developed by the inventor is an algorithm that calculates all -40 registered in the registration paragraph defined here. This paper size applies National Standards (CNS) A4 size (210 X 297 mm) stapling

線 574645 A7Line 574645 A7

θ ,大.基本计數”(整數),減去該“基本計數”減2。該“基本計 數”5’係等於該開始位置指#,其中該演算法繼續計數剩 餘的登綠,及在該註冊段落的此特殊定義部份内的最後“日 期時間修改,,。 印该凊算法在該開始位置指標處啟始其計數時,該演算 法將進行計數在該註冊的定義段落内的剩餘登錄。如果該 =大计數等式,其不等於該預先計算的結果,該定義註冊段 落即已經被使用者人為編輯,或由一未授權程式修改所侵 入0 泫預先計算結果可保證來自該查詢的為1〇〇%正確的結果 ’因為該演算法係設計來在約每5到8秒查詢該定義的段落。 泫查珣的速率使其對於一使用者不可能來刪除及加入一登 錄到孩定義的段落,而不會被該演算法所攔截到。再者,未 授權程式執行一計算來加入登錄到該註冊的一定義區域, 其使得本發明人所設計的演算法可1〇〇%準確地對付未授權 的程式活動。 現在請參考圖16,以根據本發明一具體實施例來討論該客 戶應用110的額外功能性機制。特別是,圖16為一種在一即時 環境中自動地偵測對於該HKEY-CLASSES—RO〇T:CID註冊段落 (如果存在的話)之任何未授權修改的之處理的流程圖。 在该所有内部註冊資料的收集傳送到該監看站1 1 5之後, 該PC探針即啟始由本發明人所設計及開發的一額外平行率 列函式’其可啟始由本發明人設計及開發的一額外獨立的9 1θ, Large. Basic Count "(integer), minus the" Basic Count "minus 2. The" Basic Count "5 'is equal to the starting position refers to #, where the algorithm continues to count the remaining greens, and The last "datetime modification," in this special definition section of the registration paragraph. When the 凊 algorithm starts its counting at the start position index, the algorithm will count the remaining entries in the definition section of the registration. If the = big count equation, it is not equal to the pre-calculated result, the definition registration paragraph has been edited by the user or intruded by an unauthorized program modification. 0 The pre-calculated result can guarantee that the query comes from 100% correct result 'because the algorithm is designed to query the defined paragraph at approximately every 5 to 8 seconds. The rate of the search makes it impossible for a user to delete and add a login to a child-defined paragraph without being intercepted by the algorithm. Furthermore, the unauthorized program performs a calculation to add to a defined area registered in the registration, which allows the algorithm designed by the inventor to 100% accurately deal with unauthorized program activities. Please refer to FIG. 16 to discuss the additional functional mechanism of the client application 110 according to a specific embodiment of the present invention. In particular, FIG. 16 is a flowchart of a process for automatically detecting any unauthorized modification of the HKEY-CLASSES_ROT: CID registration section (if any) in an instant environment. After the collection of all internal registration data is transmitted to the monitoring station 115, the PC probe starts an additional parallel ratio function designed and developed by the inventor, which can be initiated by the inventor. And development of an additional independent 9 1

API DLL,其進行分析該内部註冊的HKEYJXASSESJROOTXID -41 - 本紙張尺度適用中國國家標準(CNS) A4規格(210X 297公釐) 574645 A7 B7 五、發明説明(39 ) 段落。此分析包含一種開啟該實際註冊鍵的方法,並開啟及 查詢此段落中在該註冊的此特殊區域内的任何可能的未授 權改變。該方法包含建立在該註冊的此特殊段落中之所有 授權登錄之“基本計數”。在建立該“基本計數,,之後,該“基 本計數’’的數值整數即儲存在RAM中。然後該%?(:平行争列 即啟始由本發明人設計及開發的一 32位元Αρι,其啟始一演 算法來計算出該註冊的此特殊定義段落之“基本計數,,是否 發生任何改變。 然後該MFC平行串列(方塊1615)啟始由本發明人設計及開 發的該32位元API,其啟始一演算法來計算出該註冊的此特 殊定義段落之“基本計數,’是否發生任何改變。該32位元Αρι 設計的實際功能進一步說明於下。一子串列(方塊164〇)啟始 p亥 32位元 API DLL ’ 其收集在 |亥 HKEY—CLASSES ROOT.CID註冊 段落上的所有登錄資料。在圖16中的其它函式的執行類似於 在先前圖面中所對應的類似函式所描述者。 本發明人所設計的演算法方法查詢該註冊的該定義段落 ’其方式為實際上不會有資源利用被註冊在該CPU内。因為 是在該註冊的定義段落内,其有可能該登錄不會依照特殊 的順序來列出,且性質上為隨機的。 同時,實際的Ο/S必須查詢在整個註冊的每一個註冊段落 來建立及維護其程式環境,本發明人所設計及開發的方法 為一種演算法’其計算在此定義的註冊段落内所有登錄的 最大“基本計數”(整數),減去該“基本計數”減2。該“基本計 數”減2,係等於該開始位置指標,其中該演算法繼續計數剩 -42- 本紙張尺度適用中國國家搮竿(CNS) A4規格(210X 297公釐)API DLL, which analyzes the internally registered HKEYJXASSESJROOTXID -41-This paper size applies to the Chinese National Standard (CNS) A4 specification (210X 297 mm) 574645 A7 B7 V. Paragraph (39) of the invention description. This analysis includes a way to turn on the actual registration key, and turn on and query any possible unauthorized changes in this particular area of the registration in this paragraph. The method includes a "basic count" of all authorized logins established in this special paragraph of the registration. After the "basic count" is established, a numerical integer of the "base count" is stored in the RAM. Then the%? (: Parallel contention is a 32-bit Αρι designed and developed by the present inventor, which starts an algorithm to calculate the "basic count of this special definition paragraph of the registration, whether any occurrence of Change. Then the MFC parallel string (block 1615) starts the 32-bit API designed and developed by the inventor, which starts an algorithm to calculate the "basic count of this registered special-defined paragraph," whether or not Any changes have occurred. The actual function of the 32-bit APH design is further explained below. A sub-series (block 164) starts the p-hai 32-bit API DLL 'which is collected in the | HKEY-CLASSES ROOT.CID registration paragraph All the login information on. The execution of other functions in Figure 16 is similar to that described by the similar function corresponding to the previous drawing. The algorithm method designed by the inventor queries the definition of the registration paragraph The method is that no resource utilization is actually registered in the CPU. Because it is in the definition section of the registration, it is possible that the login will not be listed in a special order, and the nature is At the same time, the actual O / S must query each registration paragraph in the entire registration to establish and maintain its programming environment. The method designed and developed by the inventor is an algorithm 'whose calculation is within the registration paragraph defined here The maximum "base count" (integer) of all logins, minus the "base count" minus 2. The "base count" minus 2 is equal to the starting position indicator, where the algorithm continues to count the remaining -42- Applicable to China National Standard (CNS) A4 (210X 297mm)

裝 訂Binding

線 574645 A7 B7 五、發明説明(4〇 ) 餘的登錄,及在該註冊段落的此特殊定義部份内的最後“日 期時間修改”。 當該演算法在該開始位置指標處啟始其計數時,該演算 法將進行計數在該註冊的定義段落内的剩餘登錄。如果該 最大計數等式,其不等於該預先計算的結果,該定義註冊段 落即已經被使用者人為編輯,或由一未授權程式修改所侵 入。 該預先計算結果可保證來自該查詢的為100%正確的結果 ,因為該演算法係設計來在約每5到8秒查詢該定義的段落。 該查詢的速率使其對於一使用者不可能來刪除及加入一新 登錄到該定義的段落,而不會被該演算法所攔截到。再者, 未授權程式執行一計算來加入登錄到該註冊的一定義區域 ,其使得本發明人所設計的演算法可100%準確地對付未授 權的程式活動。 現在請參考圖17,以根據本發明一具體實施例來討論該客 戶應用115的額外功能性機制。特別是,圖17為一種在一即時 環境中自動地偵測對於該HKEY_LOCAL_MACHINE:Software\ Microsoft、Windows\CurrentVersion\Shell Extensions\Approved註冊段落 之任何未授權修改的之處理的流程圖。 在該所有内部註冊資料的收集傳送到該監看站115之後, 該PC探針即啟始由本發明人所設計及開發的一額外平行串 列函式,其可啟始由本發明人設計及開發的一額外獨立的21 API DLL,其進行分析該内部註冊的HKEY_L〇CAL_MACHINE: Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved段 -43- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐)Line 574645 A7 B7 V. Description of the invention (40) The remaining registration, and the last "date time modification" in this special definition part of the registration paragraph. When the algorithm starts its count at the start position index, the algorithm will count the remaining entries in the definition section of the registration. If the maximum counting equation is not equal to the pre-calculated result, the definition registration segment has been manually edited by the user or intruded by an unauthorized program modification. This pre-computed result guarantees 100% correct results from the query, because the algorithm is designed to query the defined paragraph about every 5 to 8 seconds. The rate of the query makes it impossible for a user to delete and add a new entry to the defined paragraph without being intercepted by the algorithm. Furthermore, the unauthorized program performs a calculation to add to a defined area registered in the registration, which allows the algorithm designed by the inventor to 100% accurately deal with unauthorized program activities. Referring now to FIG. 17, an additional functional mechanism of the customer application 115 is discussed in accordance with a specific embodiment of the present invention. In particular, FIG. 17 is a flowchart of a process for automatically detecting any unauthorized modification to the HKEY_LOCAL_MACHINE: Software \ Microsoft, Windows \ CurrentVersion \ Shell Extensions \ Approved registration section in an instant environment. After the collection of all the internal registration data is transmitted to the monitoring station 115, the PC probe starts an additional parallel serial function designed and developed by the inventor, which can be initiated by the inventor's design and development An additional independent 21 API DLL, which analyzes the internally registered HKEY_LOCAL_MACHINE: Software \ Microsoft \ Windows \ CurrentVersion \ Shell Extensions \ Approved paragraph -43- This paper standard applies to the Chinese National Standard (CNS) A4 specification (210 X 297 mm)

裝 訂Binding

線 574645 A7 B7 五、發明説明(41 ) 落。此分析包含一種開啟該實際註冊鍵的方法,並開啟及查 詢此段落中在該註冊的此特殊區域内的任何可能的未授權 改變。該方法包含建立在該註冊的此特殊段落中之所有授 權登錄之“基本計數”。在建立該“基本計數”之後,該“基本 計數”的數值整數即儲存在RAM中。然後該MFC平行_列即 啟始由本發明人設計及開發的一 32位元API,其啟始一演算 法來計算出該註冊的此特殊定義段落之“基本計數”是否發 生任何改變。 然後該MFC平行串列(方塊1715)啟始由本發明人設計及開 發的該32位元API,其啟始一演算法來計算出該註冊的此特 殊定義段落之“基本計數”是否發生任何改變。該32位元API 設計的實際功能進一步說明於下。一子串列(方塊1740)啟始 該 32位元 API DLL,其收集在該 HKEY_LOCAL_MACHINE:Software\ MicrosoftWindows\CurrentVersion\Shell Extensions\Approved註冊段落 上的所有登錄資料。在圖17中的其它函式的執行類似於在先 前圖面中所對應的類似函式所描述者。 本發明人所設計的演算法方法查詢該註冊的該定義段落 ,其方式為實際上不會有資源利用被註冊在該CPU内。因為 是在該註冊的定義段落内,其有可能該登錄不會依照特殊 的順序來列出,且性質上為隨機的。 同時,實際的0/S必須查詢在整個註冊的每一個註冊段落 來建立及維護其程式環境,本發明人所設計及開發的方法 為一種演算法,其計算在此定義的註冊段落内所有登錄的 最大“基本計數”(整數),減去該“基本計數”減2。該“基本計 -44- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐)Line 574645 A7 B7 V. Description of the invention (41) Drop. This analysis includes a way to turn on the actual registration key, and turn on and query any possible unauthorized changes in this particular area of the registration in this paragraph. The method includes a "basic count" of all authorized entries established in this particular paragraph of the registration. After the "base count" is established, the integer value of the "base count" is stored in the RAM. Then the MFC parallel column starts a 32-bit API designed and developed by the present inventor, which starts an algorithm to calculate whether there is any change in the "base count" of this specially defined paragraph of the registration. Then the MFC parallel string (block 1715) starts the 32-bit API designed and developed by the present inventor, which starts an algorithm to calculate whether there is any change in the "basic count" of this specially defined paragraph of the registration . The actual functionality of this 32-bit API design is further explained below. A sub-series (block 1740) starts the 32-bit API DLL, which collects all the login information on the HKEY_LOCAL_MACHINE: Software \ MicrosoftWindows \ CurrentVersion \ Shell Extensions \ Approved registration section. The execution of the other functions in Fig. 17 is similar to that described by the similar functions in the previous figure. The algorithm method designed by the inventor inquires the definition of the registration in a manner that, in practice, no resource utilization is registered in the CPU. Because it is in the definition paragraph of the registration, it is possible that the registration will not be listed in a special order and is random in nature. At the same time, the actual 0 / S must query each registration paragraph in the entire registration to establish and maintain its programming environment. The method designed and developed by the inventor is an algorithm that calculates all registrations in the registration paragraph defined here. The maximum "base count" (integer), minus the "base count" minus 2. The "Basic Count -44- This paper size applies to China National Standard (CNS) A4 specifications (210 X 297 mm)

Hold

574645 A7 B7 五、發明説明(42 數”減2 ’係等於該開始位置指標,其中該演算法繼續計數剩 餘的登錄,及在該註冊段落的此特殊定義部份内的最後“日 期時間修改,,。 當該演算法在該開始位置指標處啟始其計數時,該演算 法將進行計數在該註冊的定義段落内的剩餘登錄。如果該 最大計數等式,其不等於該預先計算的結果,該定義註冊段 落即已經被使用者人為編輯,或由一未授權程式修改所侵 入0 該預先計算結果可保證來自該查詢的為丨〇〇%正確的結果 ’因為該演算法係設計來在約每5到8秒查詢該定義的段落。 該查詢的速率使其對於一使用者不可能來刪除及加入一新 登錄到該定義的段落,而不會被該演算法所攔截到。再者, 未授權程式執行一計算來加入登錄到該註冊的一定義區域 ’其使得本發明人所設計的演算法可100%準確地對付未授 權的程式活動。 現在請參考圖18,以根據本發明一具體實施例來討論該客 戶應用110的額外功能性機制。特別是,圖18為一種在一即時 環境中自動地偵測對於該HKEY一LOCAL—MACHINE:Software\ Microsoft\Windows\CurrentVersion\Run註冊段落之任何未授權修改 的之處理的流程圖。 在該所有内部註冊資料的收集傳送到該監看站115之後, 該PC探針即啟始由本發明人所設計及開發的一額外平行串 列函式,其可啟始由本發明人設計及開發的一額外獨立的21 API DLL ’其進行分析該内部註冊的HKEYJLOCAL MACHINCE. -45 -574645 A7 B7 V. Description of the invention (42 digits minus 2 'is equal to the starting position indicator, in which the algorithm continues to count the remaining entries, and the last "date time modification" in this special definition part of the registration paragraph, When the algorithm starts its counting at the starting position indicator, the algorithm will count the remaining entries in the definition section of the registration. If the maximum counting equation is not equal to the pre-calculated result The definition registration paragraph has been manually edited by the user or intruded by an unauthorized program modification. 0 The pre-calculation result can guarantee that the query is a correct result of 丨 〇〇 ′ because the algorithm is designed to The defined paragraph is queried approximately every 5 to 8 seconds. The rate of the query makes it impossible for a user to delete and add a new login to the defined paragraph without being intercepted by the algorithm. Furthermore The unauthorized program performs a calculation to join a defined area registered in the registration, which allows the algorithm designed by the inventor to deal with unauthorized programs 100% accurately. Please refer to FIG. 18 to discuss the additional functional mechanism of the client application 110 according to a specific embodiment of the present invention. In particular, FIG. 18 is a method for automatically detecting the HKEY_LOCAL in an instant environment. —MACHINE: Software \ Microsoft \ Windows \ CurrentVersion \ Run flowchart of any unauthorized modification of the registration paragraph. After the collection of all internal registration data is transmitted to the monitoring station 115, the PC probe starts An additional parallel serial function designed and developed by the inventor can start an additional independent 21 API DLL designed and developed by the inventor, which analyzes the internally registered HKEYJLOCAL MACHINCE. -45-

裝 訂Binding

線 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐) 574645 A7 B7 五、發明説明(43 )Line This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) 574645 A7 B7 V. Description of the invention (43)

Software\Microsoft\Windows\CurrentVersion\Run段落。此分析包含一 種開啟該實際註冊鍵的方法,並開啟及查詢此段落中在該 註冊的此特殊區域内的任何可能的未授權改變。該方法包 含建立在該註冊的此特殊段落中之所有授權登錄之“基本計 數”。在建立該“基本計數”之後,該“基本計數”的數值整數 即儲存在RAM中。然後該MFC平行_列即啟始由本發明人設 計及開發的一 32位元API,其啟始一演算法來計算出該註冊 的此特殊定義段落之“基本計數”是否發生任何改變。 然後該MFC平行串列(方塊1815)啟始由本發明人設計及開 發的該32位元API,其啟始一演算法來計算出該註冊的此特 殊定義段落之“基本計數”是否發生任何改變。該32位元API 設計的實際功能進一步說明於下。一子串列(方塊1840)啟始 該 32位元 API DLL,其收集在該 HKEY_LOCAL_MACHINE:Software\ Microsoft\Windows\CurrentVersion\Run註冊段落上的所有註冊資料 。在圖18中的其它函式的執行類似於在先前圖面中所對應的 類似函式所描述者。 本發明人所設計的演算法方法查詢該註冊的該定義段落 ,其方式為實際上不會有資源利用被註冊在該CPU内。因為 是在該註冊的定義段落内,其有可能該登錄不會依照特殊 的順序來列出,且性質上為隨機的。 同時,實際的Ο/S必須查詢在整個註冊的每一個註冊段落 來建立及維護其程式環境,本發明人所設計及開發的方法 為一種演算法,其計算在此定義的註冊段落内所有登綠的 最大“基本計數”(整數),減去該“基本計數”減2。該“基本計 -46- 本紙張尺度適用中國國家標準(CNS) A4規格(210X297公釐)Software \ Microsoft \ Windows \ CurrentVersion \ Run paragraph. This analysis includes a way to turn on the actual registration key, and turn on and query any possible unauthorized changes in this particular area of the registration in this paragraph. The method includes the "basic count" of all authorized logins established in this special paragraph of the registration. After the "basic count" is established, the numeric integer of the "base count" is stored in the RAM. Then the MFC parallel column starts a 32-bit API designed and developed by the present inventor, which starts an algorithm to calculate whether there is any change in the "basic count" of this specially defined paragraph of the registration. Then the MFC parallel string (block 1815) starts the 32-bit API designed and developed by the inventor, which starts an algorithm to calculate whether the "basic count" of this specially defined paragraph of the registration has changed. . The actual functionality of this 32-bit API design is further explained below. A sub-series (block 1840) starts the 32-bit API DLL, which collects all registration information in the HKEY_LOCAL_MACHINE: Software \ Microsoft \ Windows \ CurrentVersion \ Run registration section. The execution of the other functions in Fig. 18 is similar to that described in the similar function corresponding to the previous drawing. The algorithm method designed by the inventor inquires the definition of the registration in a manner that, in practice, no resource utilization is registered in the CPU. Because it is in the definition paragraph of the registration, it is possible that the registration will not be listed in a special order and is random in nature. At the same time, the actual O / S must query each registration paragraph in the entire registration to establish and maintain its programming environment. The method designed and developed by the inventor is an algorithm that calculates all registrations in the registration paragraph defined here. Green's maximum "base count" (integer), minus that "base count" minus two. The "Basic Count -46- This paper size applies to China National Standard (CNS) A4 specifications (210X297 mm)

裝 訂Binding

線 574645 A7 ___ B7 五、發明44""") ^ ~ 數”減2’係等於該開始位置指標’其中該演算法繼鲭計數剩 餘的㈣’及在該註冊段落的此特殊定義部份内的最後“日 期時間修改,,。 當孩演算法在該開始位置指標處啟始其計數時,該演算 法將進仃計數在該註冊的定義段落内的剩餘登錄。如果該 取大計數等式,其不等於該預先計算的結果,該定義註冊段 落即已經被使用者人為編輯,或由一未授權程式修改所侵 入0 涊預先計算結果可保證來自該查詢的為丨〇〇%正確的結果 ,因為該演算法係設計來在約每5到8秒查詢該定義的段落。 該查詢的速率使其對於一使用者不可能來刪除及加入一新 登錄到該定義的段落,而不會被該演算法所攔截到。再者, 未指:權程式執行一計算來加入登錄到該註冊的一定義區域 ’其使得本發明人所設計的演算法可100%準確地對付未授 權的程式活動。 現在請參考圖19,以根據本發明一具體實施例來討論該客 戶應用的功能性機制。特別是,圖19為一種在一即時環境中 自動地僧測對於該 HKEYJLOCAL—MACHINE:S〇ftware\Micros〇ft\ Windows\CurrentVersion\RunOnce註冊段落之任何未授權修改的 之處理的流程圖。 在該所有内部註冊資料的收集傳送到該監看站U5之後, 該PC探針即啟始由本發明人所設計及開發的一額外平行串 列函式,其可啟始由本發明人設計及開發的一額外獨立的9 1 API DLL ’其進行分析該内部註冊的HKEY^LOCAL^MACHII^ -47- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐) 574645 A7 B7 五、發明説明(45 )Line 574645 A7 ___ B7 V. Invention 44 " " ") ^ ~ The number "minus 2 'is equal to the starting position index' where the algorithm counts the remaining ㈣ following the mackerel 'and this special definition in the registration section The last "Date Time Modification," in the copy. When the child algorithm starts counting at the start position index, the algorithm will count the remaining entries in the definition section of the registration. If the large counting equation is not equal to the pre-calculated result, the definition registration paragraph has been manually edited by the user or intruded by an unauthorized program modification. 涊 The pre-calculated result can guarantee that the query comes from丨 〇〇% correct results, because the algorithm is designed to query the definition of the paragraph about every 5 to 8 seconds. The rate of the query makes it impossible for a user to delete and add a new entry to the defined paragraph without being intercepted by the algorithm. Furthermore, it does not mean that the right program performs a calculation to add to a defined area registered in the registration, which allows the algorithm designed by the inventor to 100% accurately deal with unauthorized program activities. Please refer to FIG. 19 to discuss the functional mechanism of the customer application according to a specific embodiment of the present invention. In particular, FIG. 19 is a flowchart of a process for automatically detecting any unauthorized modification to the HKEYJLOCAL_MACHINE: Sftft \ Microsft \ Windows \ CurrentVersion \ RunOnce registration section in an instant environment. After the collection of all internal registration data is transmitted to the monitoring station U5, the PC probe starts an additional parallel serial function designed and developed by the inventor, which can be initiated by the inventor's design and development An additional independent 9 1 API DLL 'which analyzes the internally registered HKEY ^ LOCAL ^ MACHII ^ -47- This paper size applies to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) 574645 A7 B7 V. Description of the invention (45)

Software\Microsoft\Winclows\CurrentVersion\RunOnce段落。此分析包 含一種開啟該實際註冊鍵的方法,並開啟及查詢此段落中 在該註冊的此特殊區域内的任何可能的未授權改變。該方 法包含建立在該註冊的此特殊段落中之所有授權登錄之“基 本計數”。在建立該“基本計數”之後,該“基本計數”的數值 整數即儲存在RAM中。然後該MFC平行串列即啟始由本發明 人設計及開發的一 32位元API,其啟始一演算法來計算出該 註冊的此特殊定義段落之“基本計數”是否發生任何改變。 然後該MFC平行串列(方塊1915)啟始由本發明人設計及開 發的該32位元API,其啟始一演算法來計算出該註冊的此特 殊定義段落之“基本計數”是否發生任何改變。該32位元API 設計的實際功能進一步說明於下。一子串列(方塊1940)啟始 該 32位元 API DLL,其收集在該 HKEYJLOCAL_MACHINE:Software\ Microsoft\Windows\CurrentVersion\RunOnce註冊段落上的所有登錄 資料。在圖19中的其它函式的執行類似於在先前圖面中所對 應的類似函式所描述者。 本發明人所設計的演算法方法查詢該註冊的該定義段落 ,其方式為實際上不會有資源利用被註冊在該CPU内。因為 是在該註冊的定義段落内,其有可能該登錄不會依照特殊 的順序來列出,且性質上為隨機的。 同時,實際的Ο/S必須查詢在整個註冊的每一個註冊段落 來建立及維護其程式環境,本發明人所設計及開發的方法 為一種演算法,其計算在此定義的註冊段落内所有登錄的 最大“基本計數”(整數),減去該“基本計數”減2。該“基本計 -48- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐)Software \ Microsoft \ Winclows \ CurrentVersion \ RunOnce paragraph. This analysis includes a way to turn on the actual registration key, and turn on and query for any possible unauthorized changes in this particular area of the registration in this paragraph. The method includes a "basic count" of all authorized logins established in this special paragraph of the registration. After the "base count" is established, the integer value of the "base count" is stored in the RAM. Then, the MFC parallel series starts a 32-bit API designed and developed by the inventor, and starts an algorithm to calculate whether there is any change in the "base count" of this registered special-defined paragraph. Then the MFC parallel string (block 1915) starts the 32-bit API designed and developed by the present inventor, which starts an algorithm to calculate whether there is any change in the "basic count" of this specially defined paragraph of the registration . The actual functionality of this 32-bit API design is further explained below. A sub-series (block 1940) starts the 32-bit API DLL, which collects all the login data in the HKEYJLOCAL_MACHINE: Software \ Microsoft \ Windows \ CurrentVersion \ RunOnce registration section. The execution of the other functions in FIG. 19 is similar to that described by the similar function corresponding to the previous drawing. The algorithm method designed by the inventor inquires the definition of the registration in a manner that, in practice, no resource utilization is registered in the CPU. Because it is in the definition paragraph of the registration, it is possible that the registration will not be listed in a special order and is random in nature. At the same time, the actual O / S must query each registration paragraph in the entire registration to establish and maintain its programming environment. The method designed and developed by the inventor is an algorithm that calculates all registrations in the registration paragraph defined here. The maximum "base count" (integer), minus the "base count" minus 2. The "Basic Count -48- This paper size applies to China National Standard (CNS) A4 specifications (210 X 297 mm)

Hold

574645 A7 B7 五、發明説明(46 ) 數”減2,係等於該開始位置指標,其中該演算法繼續計數剩 餘的登錄,及在該註冊段落的此特殊定義部份内的最後“曰 期時間修改’’。 當該演算法在該開始位置指標處啟始其計數時,該演算 法將進行計數在該註冊的定義段落内的剩餘登錄。如果該 最大計數等式,其不等於該預先計算的結果,該定義註冊段 落即已經被使用者人為編輯,或由一未授權程式修改所侵 入0 該預先計算結果可保證來自該查詢的為100%正確的結果 ,因為該演算法係設計來在約每5到8秒查詢該定義的段落。 該查詢的速率使其對於一使用者不可能來删除及加入一新 登錄到該定義的段落,而不會被該演算法所攔截到。再者, 未授權程式執行一計算來加入登錄到該註冊的一定義區域 ,其使得本發明人所設計的演算法可100%準確地對付未授 權的程式活動。 現在請參考圖20,以根據本發明一具體實施例來討論該客 戶應用110的額外功能性機制。特別是,圖20為一種在一即時 環境中自動地偵測對於該HKEY_L〇CAL_MACHINE:Software\ MicrosoftWindows\CurrentVersion\RunOnceEx註冊段落之任何未授 權修改的之處理的流程圖。574645 A7 B7 V. Description of the invention (46) The number "minus 2" is equal to the starting position index, in which the algorithm continues to count the remaining entries and the last "date time" in this special definition part of the registration paragraph modify''. When the algorithm starts its count at the start position index, the algorithm will count the remaining entries in the definition section of the registration. If the maximum counting equation is not equal to the pre-calculated result, the definition registration paragraph has been edited by the user or intruded by an unauthorized program modification. 0 The pre-calculated result can guarantee that the query is 100. % Correct result, because the algorithm is designed to query the defined paragraph about every 5 to 8 seconds. The rate of the query makes it impossible for a user to delete and add a new entry to the defined paragraph without being intercepted by the algorithm. Furthermore, the unauthorized program performs a calculation to add to a defined area registered in the registration, which allows the algorithm designed by the inventor to 100% accurately deal with unauthorized program activities. Referring now to FIG. 20, an additional functional mechanism of the client application 110 is discussed in accordance with a specific embodiment of the present invention. In particular, FIG. 20 is a flowchart of a process for automatically detecting any unauthorized modification to the HKEY_LOCAL_MACHINE: Software \ MicrosoftWindows \ CurrentVersion \ RunOnceEx registration section in an instant environment.

在該所有内部註冊資料的收集傳送到該監看站115之後, 該PC探針即啟始由本發明人所設計及開發的一額外平行串 列函式,其可啟始由本發明人設計及開發的一額外獨立的32 位元API DLL,其進行分析該内部註冊的HKEY_LOCAL_MACHINR -49- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐) 裝 訂After the collection of all the internal registration data is transmitted to the monitoring station 115, the PC probe starts an additional parallel serial function designed and developed by the inventor, which can be initiated by the inventor's design and development An additional independent 32-bit API DLL that analyzes the internally registered HKEY_LOCAL_MACHINR -49- This paper size applies to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) binding

線 574645 A7 B7 五、發明説明(47 )Line 574645 A7 B7 V. Description of the invention (47)

Software\Microsoft\Windows\CurrentVersion\RunOnceEx段落。此分析 包含一種開啟該貫際註冊鍵的方法,並開啟及查詢此段落 中在該註冊的此特殊區域内的任何可能的未授權改變。該 方法包含建立在該註冊的此特殊段落中之所有授權登錄之 “基本計數”。在建立該“基本計數”之後,該“基本計數,,的數 值整數即儲存在RAM中。然後該MFC平行串列即啟始由本發 明人設計及開發的一 32位元API,其啟始一演算法來計算出 該註冊的此特殊定義段落之“基本計數,,是否發生任何改變。 然後該MFC平行串列(方塊2015)啟始由本發明人設計及開 發的該32位元API,其啟始一演算法來計算出該註冊的此特 殊定義段落之“基本計數”是否發生任何改變。該32位元API 設計的實際功能進一步說明於下。一子串列(方塊2040)啟始 該 32位元 API DLL,其收集在該 HKEY_LOCAL_MACHINE:Software\ Microsoft\Windows\CurrentVersion\Run〇nceEx註冊段落上的所有登 錄資料。在圖20中的其它函式的執行類似於在先前圖面中所 對應的類似函式所描述者。 本發明人所設計的演算法方法查詢該註冊的該定義段落 ’其方式為實際上不會有資源利用被註冊在該CPU内。因為 是在該註冊的定義段落内,其有可能該登錄不會依照特殊 的順序來列出,且性質上為隨機的。 同時,實際的Ο/S必須查詢在整個註冊的每一個註冊段落 來建立及維護其程式環境,本發明人所設計及開發的方法 為一種演算法,其計算在此定義的註冊段落内所有登錄的 最大“基本計數,,(整數),減去該“基本計數,,減2。該“基本計 -50- 本紙張尺度適用中國國家標準(CNS) A4規格(210X 297公釐) 574645 A7 ___ B7 五、發明說明(48 ) 數減2 ’係等於該開始位置指標,其中該演算法繼續計數剩 餘々豆綠,及在该纟主冊段洛的此特殊定義邵份内的最後“日 期時間修改,,。 當該演算法在該開始位置指標處啟始其計數時,該演算 法將進行计數在該註冊的定義段落内的剩餘登錄。如果該 最大計數等式,其不等於該預先計算的結果,該定義註冊段 落即已經被使用者人為編輯,或由一未授權程式修改所侵 入0 違預先計算結果可保證來自該查詢的為正確的結果 ’因為該演算法係設計來在約每5到8秒查詢該定義的段落。 孩查詢的速率使其對於一使用者不可能來刪除及加入一新 登錄到該定義的段落,而不會被該演算法所攔截到。再者, 未授權程式執行一計算來加入登錄到該註冊的一定義區域 ’其使得本發明人所設計的演算法可100%準確地對付未授 權的程式活動。 現在請參考圖21 ,以根據本發明一具體實施例來討論該客 戶應用110的額外功能性機制。特別是,圖21為一種在一即時 環境中自動地偵測對於該HKEY—CURR£NT—USER:s〇ftware註冊 段落之任何未授權修改的之處理的流程圖。 在該所有内部註冊資料的收集傳送到該監看站1 15之後, 该PC探針即啟始由本發明人所設計及開發的一額外平行争 列函式,其可啟始由本發明人設計及開發的一額外獨立的32 位元API DLL,其進行分析該内部註冊的hkey_current user Software段落。此分析包含一種開啟該實際註冊鍵的方法,並 -51 - 本紙張尺度適用中國國家標準(CNS) A4規格(210X297公爱) 574645 A7Software \ Microsoft \ Windows \ CurrentVersion \ RunOnceEx paragraph. This analysis includes a way to turn on the inter-registration key, and turn on and query for any possible unauthorized changes in this particular area of the registration in this paragraph. The method includes a "basic count" of all authorized logins established in this special paragraph of the registration. After the "basic count" is established, the numerical value of the "basic count" is stored in the RAM. Then, the MFC parallel string starts a 32-bit API designed and developed by the inventor. Algorithm to calculate the "basic count" for this specially defined paragraph of the registration, whether any changes have occurred. Then the MFC parallel tandem (block 2015) started the 32-bit API designed and developed by the inventor, and it started an algorithm to calculate whether there was any change to the "basic count" of this specially defined paragraph of the registration . The actual functionality of this 32-bit API design is further explained below. A sub-series (block 2040) starts the 32-bit API DLL, which collects all the registration information on the HKEY_LOCAL_MACHINE: Software \ Microsoft \ Windows \ CurrentVersion \ Run〇nceEx registration section. The execution of the other functions in Fig. 20 is similar to that described by the similar function corresponding to the previous drawing. The algorithm method designed by the present inventor queries the definition paragraph of the registration in such a manner that virtually no resource utilization is registered in the CPU. Because it is in the definition paragraph of the registration, it is possible that the registration will not be listed in a special order and is random in nature. At the same time, the actual O / S must query each registration paragraph in the entire registration to establish and maintain its programming environment. The method designed and developed by the inventor is an algorithm that calculates all registrations in the registration paragraph defined here. The maximum "base count," (integer), minus the "base count," minus 2. The "Basic Count -50-This paper size applies to China National Standard (CNS) A4 specifications (210X 297 mm) 574645 A7 ___ B7 V. Description of the invention (48) The number minus 2 'is equal to the starting position index, where the calculation The method continues to count the remaining cowpea green, and the last "date time modification," in this special definition of Luo in the book's main section. When the algorithm starts its count at the start position index, the algorithm will count the remaining entries in the definition section of the registration. If the maximum counting equation is not equal to the pre-calculated result, the definition registration paragraph has been edited by the user or intruded by an unauthorized program modification. 0 The pre-calculated result can guarantee the correctness from the query. The result 'because the algorithm is designed to query the defined paragraph about every 5 to 8 seconds. The rate of querying makes it impossible for a user to delete and add a new entry to the defined paragraph without being intercepted by the algorithm. Furthermore, the unauthorized program performs a calculation to add to a defined area registered in the registration, which allows the algorithm designed by the inventor to deal with unauthorized program activities with 100% accuracy. Please refer to FIG. 21 to discuss the additional functional mechanism of the client application 110 according to a specific embodiment of the present invention. In particular, FIG. 21 is a flowchart of a process for automatically detecting any unauthorized modification to the HKEY_CURR £ NT_USER: sftware registration section in an instant environment. After the collection of all internal registration data is transmitted to the monitoring station 115, the PC probe starts an additional parallel dispute function designed and developed by the inventor, which can be started by the inventor design and An additional independent 32-bit API DLL was developed which analyzes the hkey_current user Software section of the internal registration. This analysis includes a method to turn on the actual registration key, and -51-This paper size applies to China National Standard (CNS) A4 specification (210X297 public love) 574645 A7

開啟及查詢此段落中在該註冊的此特殊區域㈣任何可能 的未技權改又。该方法包含建立在該註冊的此特殊段落中 之所有授權登錄之“基本計數,,。在建立該“基本計數,,之後, 該“基本計數’’的數值整數即儲存在編巾。然後該聽平行 串列即啟始&本發明人設計及開發的一现& Αρι,其啟始 -演算法來計算出該註冊的此特殊定義段落之“基本計數,, 是否發生任何改變。 然後該MFC平行串列(方塊2U5)啟始由本發明人設計及開 發的該32位元API,其啟始―演算法來計算出該註冊的此特 殊定義段落之“基本計數,,是否發生任何改變。該32位元Αρι 設計的實際功能進一步說明於下。一子串列(方塊214〇)啟始 該 32位元 API DLL,其收集在該 HKEY_CURRENT—USER:Software 註冊段落上的所有登錄資料。在圖21中的其它函式的執行類 似於在先前圖面中所對應的類似函式所描述者。 本發明人所設計的演算法方法查詢該註冊的該定義段落 ,其方式為實際上不會有資源利用被註冊在該CPU内。因為 是在該註冊的定義段落内,其有可能該登錄不會依照特殊 的順序來列出,且性質上為隨機的。 同時,實際的ο/s必須查詢在整個註冊的每一個註冊段落 來建立及維護其程式環境,本發明人所設計及開發的方法 為一種演算法,其計算在此定義的註冊段落内所有登錄的 最大“基本計數,,(整數),減去該“基本計數”減2。該“基本計 數”減2,係等於該開始位置指標,其中該演算法繼續計數剩 餘的登綠,及在該註冊段落的此特殊定義部份内的最後“日 -52-本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐) 574645Open and check in this paragraph in this special area of the registration, any possible unauthorized changes. The method includes establishing the "basic count" of all authorized registrations in this special paragraph of the registration. After establishing the "basic count," the numeric integer of the "basic count" is stored in the weave. Then the Listening to the parallel series is the start-up & design of the present inventor & Αρι, whose start-up algorithm calculates the "basic count" of this specially defined paragraph of the registration, whether any changes have occurred. Then the MFC parallel series (block 2U5) starts the 32-bit API designed and developed by the inventor, and its start-calculus algorithm calculates the "basic count of this registered special-defined paragraph, whether any Changes. The actual functions of the 32-bit Αρι design are further explained below. A sub-series (block 214) starts the 32-bit API DLL, which collects all the login information on the HKEY_CURRENT_USER: Software registration section The execution of other functions in FIG. 21 is similar to that described by the similar function corresponding to the previous drawing. The algorithm method designed by the present inventor queries the defined paragraph of the registration in a manner that is actually No resource utilization will be registered in the CPU. Because it is in the definition section of the registration, it is possible that the login will not be listed in a special order and is random in nature. At the same time, the actual ο / s must query each registration section in the entire registration to establish and maintain its programming environment. The method designed and developed by the inventor is an algorithm that calculates the registration section defined here All the maximum registered in a "base count ,, (integer), by subtracting the" base count "minus 2. The "Basic Count" minus 2 is equal to the starting position indicator, in which the algorithm continues to count the remaining greens, and the last "Day-52-This paper size applies to China in this special definition part of the registration paragraph National Standard (CNS) A4 (210 X 297 mm) 574645

期時間修改’,。 田涘/角算法在該開始位置指標處啟始其計數時,兮寅赏 法將進行計數在該註冊的定義段落内的剩餘登綠。如果= 最大計數等式,其不等於該預先計算的結果,該定義註冊= 落即已經被使用者人為編輯,或由一未授權程式修改所^ 入。 垓預先計算結果可保證來自該查詢的為1〇〇%正確的結果 ,因為該演算法係設計來在約每5到8秒查詢該定義的段落。 該查詢的速率使其對於一使用者不可能來刪除及加入一新 登錄到該定義的段落,而不會被該演算法所攔截到。再者, 未授權程式執行一計算來加入登錄到該註冊的一定義區域 ,其使得本發明人所設計的演算法可100%準確地對付未授 權的程式活動。 現在凊參考圖22 ’以根據本發明一具體實施例來討論該客 戶應用110的額外功能性機制。特別是,圖22所示為用來啟始 整個PC桌上環境的一‘‘防護傘,,之不同方法的方塊圖。 本發明人所設計及開發的平行串列及所有32位元API DLL ,其與該客戶應用110共同執行,而展開在整個pC客戶電腦 環境上的一‘‘防護傘”或‘‘免疫系統,,。 該客戶應用110固定地由該Ο/S檔案(2215)及該第三方‘‘啟動,, (2210)的組態來輪詢及查詢該客戶電腦的每個主要關鍵段落 ’產生新目錄或檔案夾(2220),產生新程式及維護該電腦註 冊(2205)的組態。該註冊2225也在以上不同的區段中討論到。 再者,本發明中至少一部份組成可藉由使用一可程式通 -53- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐)Period modification ',. When the field / angle algorithm starts its counting at the starting position indicator, the Xiyin reward method will count the remaining greens within the definition section of the registration. If = the maximum counting equation, which is not equal to the result of the pre-calculation, the definition registration = has been manually edited by the user, or modified by an unauthorized program ^.垓 Pre-calculated results can guarantee 100% correct results from the query, because the algorithm is designed to query the defined paragraphs about every 5 to 8 seconds. The rate of the query makes it impossible for a user to delete and add a new entry to the defined paragraph without being intercepted by the algorithm. Furthermore, the unauthorized program performs a calculation to add to a defined area registered in the registration, which allows the algorithm designed by the inventor to 100% accurately deal with unauthorized program activities. Referring now to FIG. 22 ', an additional functional mechanism of the customer application 110 is discussed in accordance with a specific embodiment of the present invention. In particular, FIG. 22 is a block diagram of a different method of starting a 'protection umbrella' for the entire PC desktop environment. The parallel series and all 32-bit API DLLs designed and developed by the inventor are executed together with the client application 110, and a `` protective umbrella '' or `` immune system '' is deployed on the entire PC client computer environment. The client application 110 is fixedly started by the 0 / S file (2215) and the third party '', (2210) configuration to poll and query each major key paragraph of the client computer 'to generate a new directory Or folder (2220) to generate new programs and maintain the configuration of the computer registration (2205). The registration 2225 is also discussed in the above different sections. Furthermore, at least a part of the composition of the present invention can be implemented by Use One Programmable -53- This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm)

装 訂Binding

線 574645 A7Line 574645 A7

用目的數位電腦’應用特定積體電路,或場域可程式問極陣 I ’或—相互連接的組件及電路之财來實施。連接可為有 、·泉,典線,藉由數據機或類似者。 在本發明的範圍内亦包本杂 . 岡門J匕。貝她一可儲存在一機器可讀取 媒體上的程式或碼,並可分今 /、J兄许一電腦來執行任何上述的方 法0 •以上本發明的說明具體實施例之描述,包含在摘要中所 述,並不疋要成為徹底,或來限制本發明到所揭#的精確形 式。此處所揭示的本發明之特定具體實施例及範例係做為 說明用途,對相關技藝專業人士而言將可瞭解到在本發明 範圍内有可能有許多相等性的修改。 這些妨改可在以上本發明詳細說明的啟示之下來進行。 在以下申請專利範圍内所使用的名詞不應視為限制了本發 明在該規格及申請專利範圍中所揭示的特定具體實施例。 而是,本發明的範圍係皆由以下的申請專利範圍來完全決 定,其應視為係根據申請專利範圍解釋所建立的原理。 -54- 本紙張尺度適用中國國家標準(CNS) Α4規格(210 X 297公釐)It can be implemented with the purpose of a digital computer 'using a specific integrated circuit, or a field programmable array I' or-interconnected components and circuits. The connection can be,, spring, code line, through a modem or the like. Within the scope of the present invention, this miscellaneous. Gangmen J Dagger. She can store programs or codes on a machine-readable medium, and can perform any of the above methods using a computer. • The above description of specific embodiments of the present invention is included in The summary is not intended to be exhaustive or to limit the invention to the precise form disclosed. The specific embodiments and examples of the present invention disclosed herein are for illustrative purposes, and those skilled in the art will appreciate that many equivalent modifications are possible within the scope of the present invention. These modifications can be made under the enlightenment detailed above in the present invention. The terms used in the following patent application scope should not be considered as limiting the specific embodiments disclosed in the specification and patent application scope of the present invention. Instead, the scope of the present invention is completely determined by the scope of the following patent applications, which should be regarded as the principles established based on the interpretation of the scope of patent applications. -54- This paper size applies to China National Standard (CNS) A4 (210 X 297 mm)

Claims (1)

574645 f__—一—_ 第〇9丨1〇6841號專利申請案 忠华、P In修正 _中又申請專利範圍替換本(92年10月或、"補免 六、申請專利範圍 • 一種偵測由一電腦單元啟動的狀態之方法,該方法包含: 檢查在該電腦單元的一記憶體區域中或儲存在該電腦 單元中一專屬檔案中的一組數值,其每組數值係對應於 由遠電腦單元所啟動的一狀態;及 捕捉每組數值來決定由該電腦單元所啟動的每個狀態。 2·如申請專利範圍第1項之方法,其中該檢查該組數值包含: 啟始一平行註冊段落_列。 3.如申請專利範圍第2項之方法,其中該啟始該平行註冊段 落串列包含: 收集註冊資料。 4·如申請專利範圍第丨項之方法,其中該檢查該組數值包含·· 啟始一平行作業系統段落串列。 5. 如申請專利範圍第4項之方法,其中該啟始該平行作業系 統段落串列包含: 刀析至少一個一作業系統目錄結構,“根,,及所有目綠 及子目錄。 6. 如申請專利範圍第旧之方法,其中該檢查該組數值包含: 啟始一平行第三方段落串列。 7. 如申請專利範圍第6項之方法,其中該啟始該平行第三方 段落串列包含: 掃描所有第三方啟動檔案及所有初始化檔案。 8. 如申請專利範圍第旧之方法,其中該檢查該組數值包含: 啟始一輪詢_列。 申明專利範圍第8項之方法,其中該啟始該輪詢串列包 本紙張尺歧财s s雜準(CNS) A4規格^0X297公釐)574645 f __— 一 —_ No. 〇09 丨 1〇6841 Patent Application Zhonghua, P In Amendment _ and apply for a replacement scope of the patent (October 1992 or, " Supplementary Exemption VI. Patent Application Scope A method for measuring a state activated by a computer unit, the method comprising: checking a set of values in a memory area of the computer unit or in a dedicated file stored in the computer unit, each set of values corresponding to A state activated by a remote computer unit; and capturing each set of values to determine each state initiated by the computer unit. 2. As in the method of the first scope of the patent application, the checking of the set of values includes: Paragraphs and columns of parallel registration. 3. If the method of applying for the scope of the second item of the patent, the sequence of the parallel registration paragraphs initiating includes: Collecting registration information. The set of values includes the paragraph sequence of starting a parallel operating system. 5. If the method of the scope of patent application No. 4 is used, the paragraph sequence of starting the parallel operating system includes: analysis of at least one Operating system directory structure, "root," and all green and subdirectories. 6. If the method of applying for the oldest patent scope, where the check of the set of values includes: starting a parallel third-party paragraph string. 7. If applying The method of item 6 of the patent, wherein the starting of the parallel third-party paragraph series includes: scanning all third-party startup files and all initialization files. 8. If the method of applying for the oldest of the patent scope, wherein the check of the set of values contains : Initiating a polling column. The method of declaring item 8 of the patent scope, wherein the initiating the polling is in series with a paper ruler, a paper ruler, a ss, miscellaneous standard (CNS), A4 specification, ^ 0X297 mm) 含: 載入組態資料到記憶體中。 10·如申請專利範圍第8項之方力,其中該啟始該輪詢串列包 含: 載入儲存的目綠組態資料到記憶體。 U.如申請專利範圍第8項之方法’其中該啟始該輪詢串列包 含: 載入第三方啟動資訊到記憶體中。 U·如申請專利範圍第8項之方法,其中該啟始該輪詢串列包 含: 偵測一未授權的修改。 如申請專利範圍第}項之方法,進一步包含: 傳送每組數值到一遠端運算單元。 14· 一種製造物件,其包含: 一種在其上儲存有指令的機器可讀取媒體,藉以: 檢查在該電腦單元的一記憶體區域中或儲存在該電腦 單元中一專屬檔案中的一組數值,其每組數值係對應於 由該電腦單元所啟動的一狀態;及 捕捉每組數值來決定由該電腦單元所啟動的每個狀態。 15· —種偵測由一電腦單元啟動的狀態之裝置,該裝置包含: 用以檢查在該電腦單元的一記憶體區域中或儲存在該 電腦單元中一專屬檔案中的一組數值之裝置,其每組數 值係對應於由該電腦單元所啟動的一狀態;及 可通訊地耦合到該檢查裝置,用以捕捉每組數值來決 -2 - 本紙張尺度適用中國國家樣準(CNS) A4規格(210 X 297公釐)Contains: Load configuration data into memory. 10. If the power of item 8 in the scope of patent application is applied, the polling sequence includes: loading the saved configuration data into the memory. U. The method according to item 8 of the scope of patent application, wherein the initiating the polling sequence includes: loading third-party startup information into the memory. U. The method of claim 8 in which the initiation of the polling sequence includes: detecting an unauthorized modification. For example, the method in the patent application scope item} further includes: transmitting each set of values to a remote computing unit. 14. · An article of manufacture comprising: a machine-readable medium having instructions stored thereon to: check a group in a memory area of the computer unit or in a dedicated file stored in the computer unit Values, each set of values corresponding to a state activated by the computer unit; and capturing each set of values to determine each state activated by the computer unit. 15 · —A device for detecting a state started by a computer unit, the device comprising: a device for checking a set of values in a memory area of the computer unit or in a dedicated file stored in the computer unit , Each set of values corresponds to a state activated by the computer unit; and communicably coupled to the inspection device to capture each set of values to determine -2-This paper size applies to China National Standards (CNS) A4 size (210 X 297 mm) 疋由該電腦單元所啟動的每個狀態之裝置。 種包子化映射一電腦單元的硬碟來記錄一作業系統及 第三方應用啟動環境的方法,該方法包含: (a) 分析一記憶體中所存在的所有關鍵目錄及檔案; (b) 记錄選擇資訊的重要統計資料; (c) ?己錄每個關鍵檔案的重要統計資料;及 (Φ記錄該電腦單元中一内部註冊的重要統計資料。 17·如申請專利範圍第16項之方法,其中每個⑷到⑷的步驟 係即時來執行。 队一種偵測在一内部電腦單元環境中啟動之狀態的方法, 該方法包含: (a) 監看所有可辨識的視窗代碼的一活動中視窗工作管 理員; (b) 攔截在一第三方應用及一作業系統之間傳送的作業 系統訊息; (c) 偵測在一關鍵作業系統檔案或第三方啟動檔案中的 改變; (d) 偵測在該内部電腦單元環境中一註冊的關鍵方面之 改變; (e) 傳送一内部處理通訊訊息到任何存在於該活動工作 管理員内的可辨識視窗代碼; ⑴傳送一即時鑑識報告到一監看站,該即時鑑識報告 定義了該偵測的狀態。 19. 一種處理电5主冊;貝訊的方法’以偵測一未授權行為或 本紙張尺度適用中國國家棵準(CNS) A4規格(210 X 297公釐) 574645 A8 B8 C8装置 Every state device activated by the computer unit. A method of bunning mapping a computer unit's hard disk to record an operating system and a third-party application startup environment. The method includes: (a) analyzing all key directories and files existing in a memory; (b) recording Select important statistical information of the information; (c) Record the important statistical information of each key file; and (Φ record the important statistical information registered in an internal unit of the computer unit. 17. If the method of the 16th scope of the patent application, Each of these steps is executed in real time. A method for detecting the status of activation in an internal computer unit environment, the method includes: (a) an active window that monitors all recognizable window codes Task manager; (b) intercept operating system messages transmitted between a third-party application and an operating system; (c) detect changes in a critical operating system file or third-party startup file; (d) detect Changes in a key aspect of the registration in the internal computer unit environment; (e) sending an internal processing communication message to any identifiable video present in the activity manager Code; ⑴ Send a real-time identification report to a monitoring station, the real-time identification report defines the status of the detection. 19. A method to deal with the electricity 5 master book; Beixun's method to detect an unauthorized act or the paper Standards apply to China National Standard (CNS) A4 (210 X 297 mm) 574645 A8 B8 C8 一未授權軟體程式,其包含·· 儲存所有電腦註冊資訊在記憶體;及 記錄該電腦註冊資訊到一結構化檔案來傳輸,以允許 偵測一未授.權行為或一未授權軟體程式。 20· —種在一即時環境中檢查所有電腦註冊資訊的方法,以 偵測一未授權行為或一未授權軟體程式,該方法包含: 比較該目前電腦單元機器註冊活動狀態與先前記綠的 註冊狀態,以偵測對於該電腦單元的一註冊之未授權改 變,包括計算一最大基數以用於-已定義註冊片段之輸 入0 21. —種電子化地儲存映射的目錄及檔案之方法,以偵測一 未授權行為或一未授權軟體程式,該方法包含: 提供電子化映射的目錄,其為該第三方應用的啟動要 安裝在一電腦單元内所需要; 映射該目錄到一結構化樓案; 計算一最大基數以用於一已定義註冊片段之輸入。 22· —種檢查電腦啟動目錄及檔案之方法,其包含: 比較目前的電腦單元機器目錄及檔案活動狀態與先前 記錄的目錄及檔案狀態來偵測對於一電腦單元的啟動目 麵:及樓案之未授權的改變,包括計算一最大基數以用於 一已定義註冊片段之輸入。 · 23. —種監看作業系統訊息之方法,以偵測一未授權行為或 一未授權軟體程式,其包含: 比較訊息與一授權的活動表列檔案來偵測未授權的活 -4 - 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐)An unauthorized software program, which contains ... stores all computer registration information in memory; and records the computer registration information in a structured file for transmission to allow detection of an unauthorized behavior or an unauthorized software program. 20 · —A method of checking all computer registration information in an instant environment to detect an unauthorized behavior or an unauthorized software program, the method includes: comparing the current computer unit machine registration activity status with the previous green registration Status to detect unauthorized changes to a registration of the computer unit, including calculating a maximum cardinality for the input of defined registration segments. 21. A method of electronically storing mapped directories and files, to Detecting an unauthorized behavior or an unauthorized software program, the method includes: providing an electronically mapped directory, which is required for the startup of the third-party application to be installed in a computer unit; mapping the directory to a structured building Calculate a maximum cardinality for the input of a defined registration segment. 22 · —A method for checking computer startup directories and files, which includes: comparing the current computer unit machine directory and file activity status with the previously recorded directory and file status to detect the startup target for a computer unit: and the case Unauthorized changes include calculating a maximum cardinality for the input of a defined registration segment. · 23. —A method of monitoring operating system messages to detect an unauthorized activity or an unauthorized software program, which includes: comparing messages with an authorized activity list file to detect unauthorized activity-4- This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) 動 入 包括計算一最大基數以用於一 已足義註冊片段之輸 24·—種呈報在電腦單元中未授權内部活動的方法,農包本. 偵測該電腦單元中未授權的活動,其法為藉由比ς_ 目前電腦單元機器註料動狀態與—先前記綠註冊狀態 以偵測至該電腦單元之一註冊之未授權變更·,及 傳送該活動的一報告到一第二電腦單元,並計算一最 大基數以用於一已定義註冊片段之輸入,以允許偵測該 電腦單元中未授權活動。 25· —種偵測在一電腦單元中未授權活動之方法,其包含: 王報一活動中焦點視窗代碼,並在一即時環境中,藉 由比較該訊息與一授權的活動表列檔案來偵測未授權的 活動,包括計算一最大基數以用於一已定義註冊片段之 輸入。 26. —種偵測由一電腦單元啟動之狀態的裝置,該裝置包含: 一第一引擎,其能夠檢查在該電腦單元的一記憶體區 域中或儲存在該電腦單元中一專屬檔案中的一組數值, 其每組數值係對應於由該電腦單元所啟動的一狀態;及 一第二引擎,其可通訊地耦合到第一引擎,以捕捉每 組數值來決定由該電腦單元所啟動的每個狀態。 27·如申請專利範圍第26項之裝置,其中每個狀態對應於該 電腦單元所啟始的一特殊活動。 28.如申請專利範圍第26項之裝置,其中該第一引擎啟始一 平行註冊段落串列。 本紙張尺度適用中國國家標準(CNS) Α4規格(210 X 297公釐) 574645Involving includes calculating a maximum cardinality for the loss of an adequately registered segment 24. A method of reporting unauthorized internal activities in a computer unit, a farmer's book. Detecting unauthorized activities in the computer unit, which The method is to compare the current state of the computer unit machine injection with the previous state of the green unit registration and to detect the unauthorized changes in the registration of one of the computer units, and to send a report of the activity to a second computer unit. A maximum cardinality is calculated for the input of a defined registration segment to allow detection of unauthorized activity in the computer unit. 25 · —A method for detecting unauthorized activities in a computer unit, including: Wang Bao, a focus window code in an activity, and in a real-time environment by comparing the message with an authorized activity list file Detecting unauthorized activities, including calculating a maximum cardinality for the input of a defined registration segment. 26. A device for detecting a state activated by a computer unit, the device comprising: a first engine capable of inspecting a memory area in the computer unit or an exclusive file stored in the computer unit A set of values, each set of values corresponding to a state started by the computer unit; and a second engine communicatively coupled to the first engine to capture each set of values to determine the start of the computer unit Every state. 27. The device as claimed in claim 26, wherein each state corresponds to a special activity initiated by the computer unit. 28. The device of claim 26, wherein the first engine starts a series of parallel registration paragraphs. This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) 574645 A8 B8 C8A8 B8 C8 29·如申請專利範圍第28項之裝置,其中該平行註冊段落率 列能夠收集註冊資料。 30. 如申請專利範圍第26項之裝置,其中該第一引擎啟始一 平行作業系統段落串列。 31. 如申請專利範圍第30項之裝置,其中該平行作業系統段 落串列能夠來分析至少一個一作業系統目錄結構,“根” 及所有目錄與子目錄。 32. 如申請專利範圍第26項之裝置,其中該第一引擎啟始一 平行第三方段落串列。 33·如申請專利範圍第26項之裝置,其中該平行第三方段落 串列能夠掃描所有第三方啟動檔案及所有初始化檔案。 34. 如申請專利範圍第26項之裝置,其中該第一引擎啟始一 輪詢_列。 35. 如申請專利範圍第34項之裝置,其中該輪詢串列能夠載 入組態資料到記憶體。 36·如申請專利範圍第34項之裝置,其中該輪詢串列能夠載 入儲存的目錄組態資料到記憶體。 37·如申請專利範圍第34項之裝置,其中該輪詢串列包含能 夠載入第三方啟動資訊到記憶體。 38·如申請專利範圍第34項之裝置,其中該輪詢串列能夠偵 測一未授權修改。 39.如申請專利範圍第26項之裝置,進一步包含: 一第三引擎,其能夠傳送每組數值到一遠端運算單元。 -6 - 本紙張尺度仙巾S S轉準(CNS) Α4規格(21QX297公^29. The device according to item 28 of the scope of patent application, wherein the parallel registration paragraph rate column can collect registration data. 30. The device of claim 26, wherein the first engine starts a parallel operating system paragraph sequence. 31. For the device in the scope of patent application No. 30, the parallel operating system segments can be used to analyze at least one operating system directory structure, "root" and all directories and subdirectories. 32. The device of claim 26, wherein the first engine starts a series of parallel third-party paragraphs. 33. The device of claim 26, wherein the parallel third-party paragraph sequence can scan all third-party startup files and all initialization files. 34. For the device under the scope of application for patent No. 26, the first engine starts a polling column. 35. For the device in the scope of patent application No. 34, the polling sequence can load configuration data into memory. 36. The device according to item 34 of the patent application scope, wherein the polling sequence can load the stored directory configuration data into the memory. 37. The device according to item 34 of the patent application, wherein the polling sequence contains the ability to load third-party startup information into memory. 38. The device of claim 34, wherein the polling sequence is capable of detecting an unauthorized modification. 39. The device of claim 26, further comprising: a third engine capable of transmitting each set of values to a remote computing unit. -6-This paper is a standard Sin towel S S standard (CNS) Α4 size (21QX297 male ^
TW91106841A 2001-04-06 2002-04-04 System and method for real time monitoring and control of a computer machine environment and configuration profile TW574645B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/827,451 US20020026605A1 (en) 2000-04-06 2001-04-06 System and method for real time monitoring and control of a computer machine environment and configuration profile
PCT/US2001/011432 WO2001077794A2 (en) 2000-04-06 2001-04-06 System and method for real time monitoring and control of a computer machine environment and configuration profile

Publications (1)

Publication Number Publication Date
TW574645B true TW574645B (en) 2004-02-01

Family

ID=32736662

Family Applications (1)

Application Number Title Priority Date Filing Date
TW91106841A TW574645B (en) 2001-04-06 2002-04-04 System and method for real time monitoring and control of a computer machine environment and configuration profile

Country Status (1)

Country Link
TW (1) TW574645B (en)

Similar Documents

Publication Publication Date Title
US6961765B2 (en) System and method for real time monitoring and control of networked computers
US20020026605A1 (en) System and method for real time monitoring and control of a computer machine environment and configuration profile
Maggi et al. Andrototal: A flexible, scalable toolbox and service for testing mobile malware detectors
US6981279B1 (en) Method and apparatus for replicating and analyzing worm programs
US10235520B2 (en) System and method for analyzing patch file
US20210182392A1 (en) Method for Detecting and Defeating Ransomware
US20060031673A1 (en) Method and system for detecting infection of an operating system
EP1605332A2 (en) Managing spyware and unwanted software through auto-start extensibility points
CN114424194A (en) Automatic malware repair and file recovery management
US9652616B1 (en) Techniques for classifying non-process threats
Gianazza et al. Puppetdroid: A user-centric ui exerciser for automatic dynamic analysis of similar android applications
US20080168423A1 (en) Characterizing software components or soa services of a computerized system by context
CN110059007B (en) System vulnerability scanning method and device, computer equipment and storage medium
US7496913B2 (en) Monitoring and displaying progress of silent installation of a subordinate program
US8978151B1 (en) Removable drive security monitoring method and system
CN117529719A (en) Host-level data analysis for network attack detection
Shree et al. Memory forensic: Acquisition and analysis mechanism for operating systems
Liu et al. Accurate and scalable detection and investigation of cyber persistence threats
US9201591B1 (en) Automated coverage monitoring of mobile applications
TW574645B (en) System and method for real time monitoring and control of a computer machine environment and configuration profile
Gandotra et al. Malware intelligence: beyond malware analysis
CN111639316B (en) Information processing method and device for WEB page
CN108228319A (en) A kind of Semantics Reconstruction method based on more bridges
Barakat et al. Windows forensic investigations using powerforensics tool
TW552522B (en) System and method for real time monitoring and control of networked computers

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent