Method and device for determining attack request
A determination method and redirection technology, applied in the field of network security, can solve the problem of inability to identify and intercept backdoor files, and achieve the effect of avoiding attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] The terms used in this application are only for the purpose of describing particular embodiments, not to limit the invention. "One", "one", "one", "one", "" "," and "" "as used in the present application and the appended claims are also intended to include many forms unless otherwise clearly indicated. It should also be understood that the terms "and / or" as used herein refer to any or from any or more of the associated listing items.
[0028] It will be appreciated that various information may be described in the present application, which may be described in terms of the terms first, second, and third, etc., but this information should not be limited to these terms. These terms are used only to distinguish the same type of information from each other. For example, the first information may be referred to as a second information without departing from the scope of the present application, and the second information can also be referred to as the first information. Dependi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com