Information security protection method based on data graph, information graph and knowledge graph
A knowledge graph, information security technology, applied in the intersection of distributed computing and software engineering, can solve problems such as user information security protection that cannot be fundamentally solved
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] The specific process of an information security protection method based on data graph, information graph and knowledge graph is as follows:
[0049] Step 1) corresponds to figure 1 As shown in 001, according to the needs of users, a framework based on data graphs, information graphs, and knowledge graphs is established;
[0050] Step 2) correspond to figure 1 As shown in 002, according to formula 1, the security level L of information security resources Privacy Determine the sequence of requirement description analysis;
[0051] Step 3) correspond to figure 1 As shown in 003, combine formula 2 and algorithm 1 to analyze the feasibility of security requirement description;
[0052] Step 4) correspond to figure 1 As shown in 004, combine formula 3 and algorithm 2 to analyze the consistency of security requirement description;
[0053] Step 5) correspond to figure 1 As shown in 005, combined with Formula 4 and Algorithm 3, analyze the redundancy of the security requ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com