Unlock instant, AI-driven research and patent intelligence for your innovation.

Big data information security protection method and cloud server applied to artificial intelligence

A technology of artificial intelligence and information security, applied in the direction of digital data protection, etc., can solve the problems of data loss, data security, leakage, etc., and achieve the effect of ensuring credibility, security, and high matching.

Active Publication Date: 2022-07-12
武汉钐秾科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Specifically, user data and even privacy-related content may be leaked intentionally or unintentionally during remote computing, storage, and communication, and there are also data loss or data security issues caused by failures such as power outages or downtime. , even for unreliable cloud infrastructure and service providers, it is possible to know the business secrets of cloud business through analysis and speculation of cloud business interaction behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] Exemplary embodiments will be described in detail herein, examples of which are illustrated in the accompanying drawings. Where the following description refers to the drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the illustrative examples below are not intended to represent all implementations consistent with this application. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present application as recited in the appended claims.

[0063] It should be noted that the terms "first", "second" and the like in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence.

[0064] The method embodiments provided in the embodiments of the present application may be executed in a cloud server, a computer d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The big data information security protection method and cloud server applied to artificial intelligence disclosed in the present invention can obtain different business behavior data obtained after behavior identification of the target cloud business interaction behavior, according to the corresponding business behavior data in the determined business behavior data. The associated information of the behavior data segment is obtained from the target business behavior data segment, and authorization authentication processing is performed on the target business behavior data segment in some business behavior data, which can effectively ensure the credibility of the target business behavior data segment. The security behavior operation content in the business behavior data is integrated to obtain target business behavior data, and a security protection policy is generated according to the target business behavior data. It can ensure that the security protection strategy is highly matched with the interaction behavior of cloud services, improve the protection capability of the security protection strategy, such as improving the sensitivity of protection and ensuring the credibility of protection, and ensuring the data and information security of the target cloud business during the interaction process.

Description

technical field [0001] The present disclosure relates to the technical field of artificial intelligence and big data, in particular to a big data information security protection method and a cloud server applied to artificial intelligence. Background technique [0002] Artificial Intelligence (AI) is a branch of computer science that is used to understand the essence of intelligence and to produce a new intelligent machine that can respond in a similar way to human intelligence. Research in this field includes Robots, language recognition, image recognition, natural language processing and expert systems, etc. Since the birth of artificial intelligence, the theory and technology have become more and more mature, and the application field has also continued to expand. [0003] With the rapid development of science and technology, the increasing popularity of the Internet and smart devices, the application of big data processing technology and cloud computing technology is in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/60
Inventor 张雪君
Owner 武汉钐秾科技有限公司