Method, system and device for traceability of Trojan horse files
A Trojan horse and file technology, applied in the direction of platform integrity maintenance, etc., can solve problems such as inability to effectively identify features, single detection source, isolated use of data, etc., and achieve the effect of improving speed and efficiency, simplifying system, and completing data resources.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0034] refer to figure 1 A Trojan file traceability device proposed in an embodiment of the present invention includes: a Trojan file gene feature extraction terminal 1, a cloud threat intelligence center server 2, a multi-source information library 3, and a cloud hacker fingerprint archive library 4; wherein, the cloud threat intelligence center server 2 is respectively connected to the Trojan horse file gene feature extraction terminal 1 and the cloud hacker fingerprint archive 4 through wired or wireless network communication, and the cloud threat intelligence center server 2 is connected to the multi-source information library 3 through wired or wireless network communication or the cloud threat intelligence center server 2 embedded multi-source information base 3.
[0035] Trojan horse file gene feature extraction terminal 1 stores computer program instructions, a kind of Trojan horse file traceability system applied to Trojan horse file gene feature extraction terminal 1...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com