Method and device for processing software malicious behaviors
A processing method and technology of a processing device are applied in the field of computer information security, and can solve the problems that users cannot know the influence of mobile phone program users, malicious behaviors cannot be accurately known, and meanings cannot be accurately conveyed.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] The present invention will be described in detail below in conjunction with the accompanying drawings and specific implementation methods. The schematic implementation and description of the present invention are used to explain the present invention, but are not intended to limit the present invention.
[0030] see figure 1 , which is an effect diagram of processing malicious behaviors by existing software.
[0031] see figure 2 , which is a flow chart of steps of a method for processing malicious software behavior described in the present invention, including the following steps:
[0032] S1: Scan the mobile phone program to obtain the scanning result.
[0033] Specifically, use the mobile phone security software to scan the mobile phone program, and obtain the scanning result that the mobile phone security software judges that the mobile phone program is a malicious mobile phone program or a normal mobile phone program.
[0034] S2: Analyze the malicious mobile p...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com