Method and device for determining and processing security of rule set
A technology for determining methods and security, applied in the Internet field, can solve the problems of leaking data resources, insecure rule models, etc., and achieve the effect of reducing the risk of leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] In order to enable those skilled in the art to better understand the technical solutions in this specification, the technical solutions in this specification will be clearly and completely described below in conjunction with the accompanying drawings in this specification. Obviously, the described The embodiments are only some of the embodiments in this specification, not all of the embodiments. Based on the implementations in this specification, all other implementations obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of this specification.
[0020] Some embodiments of this specification provide a method for determining the security of a rule model, and the method can be specifically applied to a system including a first server, a second server, and a third server.
[0021] For details, please refer to figure 1 shown. The above-mentioned first server may specifically include a server deployed on the sid...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


