Intrusion detection method and device
A technology of intrusion detection and location designation, applied in computer security devices, instruments, computing, etc., to solve problems such as illegal profits
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0071] Embodiments of the present application provide an intrusion detection method and device to reliably and effectively detect whether an external process invades an application process.
[0072] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.
[0073] figure 1 is a schematic flowchart of an intrusion detection method according to an embodiment of the present invention, such as figure 1 As...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


