Malicious process processing method, terminal equipment and storage medium

A terminal equipment and process processing technology, applied in the computer field, can solve the problems of reducing the quality of the terminal, affecting the continuity of the terminal, and losing user information, and achieving the effect of efficient human-computer interaction

Pending Publication Date: 2020-10-16
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this security mechanism will affect the continuity of terminal operation, which m

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious process processing method, terminal equipment and storage medium
  • Malicious process processing method, terminal equipment and storage medium
  • Malicious process processing method, terminal equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to understand the characteristics and technical contents of the embodiments of the present application in more detail, the implementation of the embodiments of the present application will be described in detail below in conjunction with the accompanying drawings. The attached drawings are only for reference and description, and are not intended to limit the embodiments of the present application.

[0022] In the following description, references to "some embodiments" describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or a different subset of all possible embodiments, and Can be combined with each other without conflict.

[0023] It should be pointed out that the terms "first, second, and third" involved in the embodiments of the present application are only used to distinguish similar objects, and do not represent a specific ordering of objects. Understandably, "first, second, third Where permitte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a malicious process processing method, terminal equipment and a storage medium, and the method comprises the steps of generating malicious process prompt information when a malicious process is detected; outputting the malicious process prompt information based on the running state of the terminal equipment; and executing a processing operation for the malicious process. Thus, before the terminal equipment executes the processing operation for the malicious process,, the malicious process prompt information is output firstly to inform the user terminal that some processing operations need to be executed when the attack of the malicious process occurs currently, and then the processing operations corresponding to the malicious process are executed, so that the reasoncan be informed to the user in time when the terminal executes the system repair operation, and efficient man-machine interaction is realized.

Description

technical field [0001] The present application relates to computer technology, and in particular to a malicious process processing method, terminal equipment and storage media. Background technique [0002] With the increasingly complex network environment, terminals are facing more and more security threats from uncertain factors. Using the existing security mechanism of the terminal, after detecting a malicious process, it will automatically restart to prevent malicious process operations. There is a risk here. When the terminal is running the application normally, it does not know that the application is a malicious application. Under the security mechanism of "restart after interception", the terminal will be forced to restart, so as to achieve the purpose of restoring the system. However, this security mechanism will affect the continuity of terminal operation, may cause problems such as loss of user information, and reduce the quality of the terminal. Contents of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55G06F21/56
CPCG06F21/554G06F21/566G06F21/568
Inventor 陈勇陈振明李擎宇
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products