Detecting software attacks on processes in computing devices
A technology of computing equipment and processes, used in computing, computer security devices, instruments, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] Various embodiments will be described in detail with reference to the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts. References to specific examples and implementations are for illustrative purposes and are not intended to limit the scope of the written description or the claims.
[0025] As used herein, the term "computing device" refers to any or all of the following: cellular telephones, smart phones, personal or mobile multimedia players, personal data assistants, desktop computers, laptop computers, Tablet computers, servers, smart phones, smart watches, handheld computers, wireless email receivers, multimedia Internet-enabled cellular phones, wireless game controllers, and similar personal or business electronic devices that include programmable processors and memory.
[0026] Computing devices execute various applications and system processes, some of which may have lo...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


