A protection method for application layer attacks and an attack protection terminal
An application layer, client-side technology, applied in the field of network communication, can solve the problem of ineffective attack behavior
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is only a part of the embodiments of the present application, but not all the embodiments. The following detailed description of the embodiments of the application is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments of the present application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of the present application.
[0038] The following methods, devices, electronic devices, or computer storage media in the embodiments of the present applicati...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


