Terminal attack defense method and device, terminal and cloud server
A terminal and cloud technology, applied in the computer field, can solve problems such as unstoppable repeated attempts by hackers
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present application, the technical solutions in the embodiments of the present application will be further described in detail below in conjunction with the accompanying drawings.
[0038] In order to better explain the technical solution provided by the embodiment of the present application, firstly explain the secure execution environment and the general execution environment (rich execution environment, REE). The secure execution environment in this embodiment includes the trusted execution environment (trust execution environment) environment, TEE) and cloud security environment, REE generally refers to the general operating system execution environment, and the application program in REE is a common customer application CA. The cloud security environment is a virtual security execution environment on the network side, which can be generated by a securit...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com