A network security processing method and device
A network security and processing method technology, applied in the field of network security processing methods and devices, can solve the problems of server paralysis, network data leakage, low efficiency, etc., and achieve the effect of improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] Please refer to the pattern, where the same component symbol represents the same components, the principle of this application is to illustrate in an appropriate operational environment. The following description is based on the specific embodiments of the present application exemplified, and it is not to be considered as limiting other specific embodiments that are not described herein.
[0030] In the following description, the specific embodiments of the present application will refer to the steps and symbols performed by one or more computers, unless otherwise specifically. Thus, these steps and operations will be described several times to execute by the computer, and the computer referred to herein includes an operation including a computer processing unit that represents an electronic signal representative of data in a structured type. This operation converts the data or maintains it in a location in the memory system of the computer, which can be reconfigured or in ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


