Information safety anomaly sensing platform based on data mining and analysis of big data
An information security and data mining technology, applied in the field of big data, can solve problems such as malicious information tampering, replacement and leakage, and attacks on unknown transaction information, and achieve the effect of reducing risks and ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0044] Embodiment 1: The collection of data flow during the transaction process is θ={θ 1 , θ 2 , θ 3 , θ 4 , θ 5}={30°, 53°, 45°, 60°, 63°}, corresponding to the set of data flow in the transaction process is The data retrieval unit retrieves the data flow direction and data flow to the transaction environment simulation test unit, and the information source and sink location unit confirms that the set of information source points is A={A 1 , A 2 , A 3 , A 4 , A 5}, the set of sink points is B={B 1 , B 2 , B 3 , B 4 , B 5}, establish a two-dimensional coordinate system with the location of the source as the origin, and confirm that the coordinate set of the data flow transmission vector during the transaction is The corresponding data flow transmission vector is According to the formula Get the data flow set in the tested transaction process: θ’={θ 1 ’, θ 2 ’, θ 3 ’, θ 4 ’, θ 5 ’}={30°, 53°, 45°, 30°, 63°}, according to the formula Get the data f...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



