Big data business processing method and business server based on digitization and visualization
A business processing and big data technology, applied in the direction of electronic digital data processing, digital data authentication, character and pattern recognition, etc., can solve the problems of low security, poor visual interaction effect, etc., and achieve the effect of avoiding blurred screen
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0114] Embodiment 1: For each digital interactive service item, obtain the digital business interaction data of the digital interactive service item recorded by each target front-end visual interaction device during the second vulnerability detection period, and determine the digital interaction according to the acquired digital business interaction data. The business interaction error log of the service item under the preset offline business interaction scenario, and the first item of the digital interactive service item is updated according to the business interaction error log of the digital interactive service item under the preset offline business interaction scenario. Business Vulnerability Classification Characteristics for Business Status Category Items.
[0115] In Embodiment 1, the second vulnerability detection period can be adjusted according to the actual situation, for example, the second vulnerability detection period can be determined according to the received o...
Embodiment 2
[0116] Embodiment 2: For each digital interactive service item, obtain the service assistant detection record of the digital interactive service item in the third vulnerability detection period, and update the second service status category of the digital interactive service item according to the acquired service assistant detection record. The business vulnerability classification feature of the project; wherein the business vulnerability detection result of the digital interactive service item is based on the business vulnerability classification feature of the at least one business vulnerability category item and the first business status category item and the second business The business vulnerability classification characteristics of at least one of the status category items are jointly determined.
[0117]In Embodiment 2, the third vulnerability detection period can be determined according to the activation period of the service assistant software, and the service assista...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


