Application reinforcement method and apparatus
An installation package and configuration file technology, applied in the field of communication, can solve problems such as low security, high security risk, and security risk enterprise damage, and achieve the effect of improving safety factor and reducing security risk
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.
[0031] In this embodiment, an application reinforcement method is provided, figure 1 is a flow chart of an applied hardening method according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:
[0032] Step S102, determining the security features that the application lacks;
[0033] Step S104, performing security hardening on the application according to the missing security features.
[0034] In this embodiment, through the above steps, in order to meet the security needs of different users in different scenarios, determine the security features that the current application lacks, and strengthen the application according to the missing o...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
