Data security protocol
A data security and protocol technology, applied in the field of data services, can solve problems that cannot meet the needs of big data analysis
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0014] The following is a detailed description of the embodiments of the present invention: this embodiment is implemented on the premise of the technical solution of the present invention, and provides detailed implementation methods and specific operation processes. It should be noted that those skilled in the art can make several modifications and improvements without departing from the concept of the present invention, and these all belong to the protection scope of the present invention.
[0015] like figure 1 As shown, a data security protocol includes a client 1, a server 2, a security computer 3, a data collection terminal 4, and a cloud data module 5 connected in sequence;
[0016] Wherein, described server module 2 comprises data analysis module 6, knowledge base 7, model base 8, database 9; Described data analysis module 6 is connected with knowledge base 7, model base 8 respectively; Described database 9 is connected with data analysis module respectively 6. The k...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
