Strategy identification method and device
A technology for identifying methods and strategies, applied in the field of network security, can solve problems such as different analysis results, inconvenient security business management platform to coordinate the overall situation, and dependence
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027]The exemplary embodiment will be described in detail herein, and examples thereof are shown in the drawings. The following description is related to the drawings, unless otherwise indicated, the same numbers in the drawings represent the same or similar elements. The embodiments described in the exemplary embodiments are not meant to all embodiments consistent with the present application. Instead, they are only examples of devices and methods consistent with some aspects of this application.
[0028]The terms used in this application are only for the purpose of describing particular embodiments, not to limit the invention. "One", "one", "one" and "" "as used in this application, are also intended to include most forms unless the context clearly represents other meanings. It should also be understood that the terms "and / or" as used herein refer to any or more possible combinations of one or more corresponding listing items.
[0029]It will be appreciated that various information m...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com