Method for solving phishing attack of Android platform
A phishing attack and solution technology, applied in the software field, can solve problems such as affecting system performance, unable to intercept phishing applications, losing monitoring effects, etc., to achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0049] The present invention will be further described below in conjunction with the accompanying drawings. It should be noted that this embodiment is based on the technical solution and provides detailed implementation steps and specific operation methods, but the scope of protection of the present invention is not limited to this Examples.
[0050] In the Android platform, the activation of all applications is handled by the activity management service AMS at the framework layer, and the application layer has no authority to interfere with the AMS process. One solution to phishing attacks on the Android platform is to set up an identification and interception module in AMS. Specifically include the following process:
[0051] According to the security sensitivity of the application, the user divides the applications in the mobile phone into three categories except for the system applications: the first type of protected application, the second type of protected application, and ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com