Application control-based anti-virus attack realization method and system
A technology of application programs and implementation methods, applied in the fields of instruments, electrical digital data processing, platform integrity maintenance, etc., can solve the problems of computer system security damage, application programs are vulnerable to attacks, tampered or terminated, etc., to ensure safe operation. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0049] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.
[0050] figure 1 Shows the implementation flow chart of the antivirus attack implementation method based on application program management and control provided by the present invention, which specifically includes the following steps:
[0051] In step S101, when it is detected that the application program is started, it is determined whether the client user is a trusted user, if it is a trusted user, step S102 is performed, otherwise, step S103 is performed.
[0052] In step S102, when the client user is a trusted user, control allows the application to be started.
[0053] In step S103, ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap