Identification method, identification device and storage medium for terminal security agent breakthrough
A terminal security and device identification technology, which is applied in the field of network security, can solve problems such as terminal security agents being broken through and cannot be identified, and achieve the effect of improving security defense capabilities
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.
[0046] refer to figure 1 , figure 1 This is a schematic structural diagram of a hardware operating environment identification device involved in the solution of the embodiment of the present invention.
[0047] like figure 1 As shown, the identification device may include: a processor 1001 , such as a CPU, a communication bus 1002 , a user interface 1003 , a network interface 1004 , and a memory 1005 . Among them, the communication bus 1002 is used to realize the connection and communication between these components. The user interface 1003 may include a display screen (Display), an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface. Optionally, the network interface 1004 may include a standard wired interface an...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


