Rapid malware inspection of mobile applications
    2.
    发明授权
    Rapid malware inspection of mobile applications 有权
    快速恶意软件检测移动应用程序

    公开(公告)号:US09336389B1

    公开(公告)日:2016-05-10

    申请号:US13970322

    申请日:2013-08-19

    Abstract: Disclosed are various embodiments for inspecting malware with little or no user interruption. A first computing device may compare a source code of an application to a fingerprint stored locally on the first computing device. The first computing device may transmit the source code to a second computing device to determine whether the source code resides in a database comprising approved applications. If the source code does not reside in the database, a thorough scan of the source code may be conducted.

    Abstract translation: 公开了用于在很少或没有用户中断的情况下检查恶意软件的各种实施例。 第一计算设备可以将应用的源代码与本地存储在第一计算设备上的指纹进行比较。 第一计算设备可以将源代码发送到第二计算设备,以确定源代码是否驻留在包括已批准应用的数据库中。 如果源代码不在数据库中,则可以对源代码进行彻底的扫描。

    RAPID MALWARE INSPECTION OF MOBILE APPLICATIONS
    4.
    发明申请
    RAPID MALWARE INSPECTION OF MOBILE APPLICATIONS 有权
    快速检测移动应用的恶意软件

    公开(公告)号:US20160070911A1

    公开(公告)日:2016-03-10

    申请号:US14935666

    申请日:2015-11-09

    Abstract: Disclosed are various embodiments for inspecting malware with little or no user interruption. A first computing device may compare a source code of an application to a fingerprint stored locally on the first computing device. The first computing device may transmit the source code to a second computing device to determine whether the source code resides in a database comprising approved applications. If the source code does not reside in the database, a thorough scan of the source code may be conducted.

    Abstract translation: 公开了用于在很少或没有用户中断的情况下检查恶意软件的各种实施例。 第一计算设备可以将应用的源代码与本地存储在第一计算设备上的指纹进行比较。 第一计算设备可以将源代码发送到第二计算设备,以确定源代码是否驻留在包括已批准应用的数据库中。 如果源代码不在数据库中,则可以对源代码进行彻底的扫描。

    Rapid malware inspection of mobile applications

    公开(公告)号:US09183389B1

    公开(公告)日:2015-11-10

    申请号:US13970322

    申请日:2013-08-19

    Abstract: Disclosed are various embodiments for inspecting malware with little or no user interruption. A first computing device may compare a source code of an application to a fingerprint stored locally on the first computing device. The first computing device may transmit the source code to a second computing device to determine whether the source code resides in a database comprising approved applications. If the source code does not reside in the database, a thorough scan of the source code may be conducted.

Patent Agency Ranking