Android malicious program detecting and processing method and device as well as equipment
A technology of malicious programs and detection methods, applied in the field of mobile Internet information security, can solve problems such as destruction, user loss, and inability to remove users, and achieve the effect of accurate detection and processing, and protection of security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0031] Activity is one of the most basic and most commonly used four components in Android components (Activity, Service service, ContentProvider content provider, BroadcastReceiver broadcast receiver).
[0032] All operations in the Activity are closely related to the user. It is a component responsible for interacting with the user. In an Android application, an Activity is usually a separate screen, which can display some controls, and can also listen to and...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 