A Network Security Analysis Method in Big Data Environment
A technology of network security analysis and big data, applied in the field of network security analysis under big data environment, to achieve the effect of improving data authenticity and security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0039] The technical solution of this patent will be further described in detail below in conjunction with specific embodiments.
[0040] A network security analysis method in a big data environment, comprising the following steps:
[0041] Step 1: The user sends an identity authentication request to the authentication server through the client;
[0042] Step 2: The authentication server receives the user's identity authentication request, and performs identity authentication on the user; if the user passes the identity authentication, then perform step 3; otherwise, send an alarm message to the client, prohibit the user from accessing the network, and end;
[0043] Step 3: The user sends a big data resource access request to the big data resource download server through the client;
[0044] Step 4: The big data resource download server downloads the big data resource from the network according to the big data resource access request, and sends the downloaded big data resourc...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com