Method and apparatus for determining safety rules
A regular and safe technology, applied in the information field, can solve problems such as user interruptions, insufficient influence caused by security users, and users not knowing information, so as to reduce interruptions and improve security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] Embodiments of the present application are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary, and are only for explaining the present application, and should not be construed as limiting the present application. On the contrary, the embodiments of the present application include all changes, modifications and equivalents falling within the spirit and scope of the appended claims.
[0020] figure 1 It is a schematic flowchart of a method for determining security rules proposed by an embodiment of the present application, and the method includes:
[0021] S11: Acquire security rules recommended to the user, where the security rules are predetermined, and the security rules are determined according to user personalized data.
[0022] I...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


