Risk application detection method and device and server
A technology for risk and target applications, applied in computer security devices, instruments, character and pattern recognition, etc., can solve problems such as no solution, inability to accurately detect and identify risk applications, and missed detection, to reduce detection errors, The effect of protecting data security and improving detection accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0062] In order to better understand the technical solution in the present specification, the technical solutions in the present specification are clear and completely described below in conjunction with the drawings in the present specification. The embodiment is merely a part of the embodiments of the present specification, not all of the embodiments. Based on the embodiments in this specification, one of ordinary skill in the art will belong to all other embodiments obtained by creative labor, and should belong to the scope of this specification.
[0063] The present specification embodiment provides a method of detecting a risk application, and the detection method of the risk application can be applied to a system comprising a server and a detection terminal. Specific, you can see figure 1 Indicated. The server and the detection terminal can be connected by wired or wireless to perform specific data interactions.
[0064] In the present embodiment, the server can specifically...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap