Security detection method and device, equipment and storage medium
A security detection and detector technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems that affect the normal use of the terminal and user troubles
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] The core of the present application is to provide a security detection method, which can be applied to terminals such as computers, mobile phones, tablet computers, and notebook computers. A security detection client can be deployed in the terminal, and the security detection method provided in the embodiment of the present application is executed through the security detection client.
[0047] In order to enable those skilled in the art to better understand the scheme of the present application, the present application will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. Apparently, the described embodiments are only a part of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.
[00...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com