Dynamically updating rules for detecting compromised devices
Abstract:
Examples for detecting a compromised device are described. A set of threat detection rules can instruct an application on the client device how to detect whether the client device is compromised. The rules can be updated dynamically and without updating the application that is performing the compromise detection. The rules can be encoded in an interpreted scripting language and executed by a runtime environment that is embedded within the application.
Public/Granted literature
Information query
Patent Agency Ranking
0/0