Application identification methods, application identification system and related equipment
A target application and terminal device technology, applied in the computer field, can solve problems such as difficult to continuously detect malicious applications, difficult to accurately and continuously identify terminal device application security, and fast virus mutation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0144] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
[0145] See Figure 1a-Figure 1b , is a schematic diagram of a scenario of an application identification method provided by an embodiment of the present invention. Such as Figure 1a As shown, the server 10f is connected to the personal computer 10a, the personal computer 10b, the smart phone 10c, ..., the tablet computer 10d through the switch 10e. The log data of N malicious applications and the log data of N normal applications are stored in the server 10f. Inp...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


