Big data information safety-based strategy configuration method and artificial intelligence protection system
A policy configuration and information security technology, applied in the field of big data information security, can solve problems such as lack of threat defense capabilities and insufficient reliability of security protection, and achieve the effect of improving reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] figure 1 It is a schematic diagram of an application scenario of the policy configuration system 10 based on big data information security provided by an embodiment of the present application. The policy configuration system 10 based on big data information security may include an artificial intelligence protection system 100 and a big data service terminal 200 communicatively connected to the artificial intelligence protection system 100 . figure 1 The shown policy configuration system 10 based on big data information security is only a feasible example, and in other feasible embodiments, the policy configuration system 10 based on big data information security may also only include figure 1 At least some of the components shown may also include other components.
[0023] In an embodiment that can be based on an independent idea, the artificial intelligence protection system 100 and the big data service terminal 200 in the policy configuration system 10 based on big d...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com