Process evaluation for malware detection in virtual machines
A virtual machine and malicious technology, applied in program control design, computer security devices, instruments, etc., can solve problems such as computer users losing data and sensitive information, identity theft and productivity loss
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] In the following description, it should be understood that all enumerated connections between structures may be direct operative connections or indirect operative connections through intervening structures. A component collection contains one or more components. Any listing of elements should be understood to mean at least one element. A plurality of elements includes at least two elements. The steps of any described method do not necessarily need to be performed in the particular order illustrated, unless otherwise required. A first element (eg, data) derived from a second element encompasses the first element being equal to the second element, as well as the first element and optionally other data resulting from processing the second element. Making a determination or decision based on parameters encompasses making a determination or decision based on parameters and optionally other data. Unless otherwise specified, an indicator of some quantity / data may be the qua...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com