Unlock instant, AI-driven research and patent intelligence for your innovation.

Artificial intelligence-based protection operation service configuration method and blockchain system

A technology of artificial intelligence and configuration method, which is applied in the field of information security, can solve the problems of affecting information security, not taking into account the adaptation of protection sharing strategy protection operation service, and insufficient protection reliability of security protection configuration, so as to improve the reliability of protection Effects on sexuality and information security

Active Publication Date: 2021-12-21
广域铭岛数字科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the business access process of related technologies, the adaptation degree of the protection sharing strategy and the current protection operation service is not considered, which leads to insufficient protection reliability of the security protection configuration and affects subsequent information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Artificial intelligence-based protection operation service configuration method and blockchain system
  • Artificial intelligence-based protection operation service configuration method and blockchain system
  • Artificial intelligence-based protection operation service configuration method and blockchain system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present disclosure will be described in detail below with reference to the accompanying drawings, and the specific operation methods in the method embodiments can also be applied to the device embodiments or system embodiments.

[0032] figure 1 It is an interactive schematic diagram of the artificial intelligence-based protection operation service configuration system 10 provided by an embodiment of the present disclosure. The artificial intelligence-based protection operation service configuration system 10 may include a blockchain system 100 and a service access terminal 200 communicatively connected to the blockchain system 100 . figure 1 The shown artificial intelligence-based protection operation service configuration system 10 is only a feasible example, and in the remaining feasible embodiments, the artificial intelligence-based protection operation service configuration system 10 may also only include figure 1 At least some of the components shown may also...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present disclosure provides an artificial intelligence-based protection operation service configuration method and a blockchain system, which extracts the protection environment matching object information of the target protection configuration information from multiple dimensions, and provides protection operation services based on multiple protection operation services, The protection key object information of each protection operation service is matched with the protection environment matching object information of the target protection configuration information, and then the target protection operation service matching the target protection configuration information is obtained, and the target protection configuration information and the target protection operation service are analyzed. The protection sharing policy is generated to obtain the target protection sharing policy. By matching the characteristics of the target protection configuration information and the protection operation service, the obtained target protection operation service has a high degree of correlation with the current target protection configuration information, so that it can be quickly generated. The current protection operation service has a high degree of adaptation of the protection sharing strategy, thereby improving the protection reliability and information security of the security protection configuration.

Description

technical field [0001] The present disclosure relates to the technical field of information security, and specifically relates to an artificial intelligence-based protection operation service configuration method and a blockchain system. Background technique [0002] The processing and storage of cloud computing data are carried out on the cloud platform, and the separation of computing resource owners and users has become an inherent feature of the cloud computing model, resulting in users' concerns about the safe storage and privacy of their own data It is inevitable. [0003] Specifically, user data and even privacy-related content may be leaked intentionally or unintentionally during remote computing, storage, and communication, and there are also data loss problems caused by failures such as power outages or downtime. Unreliable cloud infrastructure and service providers may also obtain users' private information through analysis and speculation of user behavior. Thes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/20H04L67/1097H04L9/50
Inventor 高斌陈宙
Owner 广域铭岛数字科技有限公司