Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Big data security threat processing method and system based on smart service

A threat processing and big data technology, applied in the fields of electronic digital data processing, digital data protection, computer security devices, etc., can solve the problems of increasing the risk of data leakage and the difficulty of data security protection for smart business activities

Active Publication Date: 2022-03-04
中软数智信息技术(武汉)有限公司
View PDF26 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the big data environment, the security requirements of various industries and fields are changing. With the further concentration of data and the continuous growth of data volume, it becomes more difficult to protect the data of smart business activities in the smart business environment.
At the same time, the distributed, collaborative, and open processing of smart business activity data also increases the risk of data leakage. In the process of big data application, how to conduct accurate and credible security evaluation of smart business activity data in the smart business environment so that The follow-up security threat processing is a technical problem that needs to be solved urgently.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data security threat processing method and system based on smart service
  • Big data security threat processing method and system based on smart service
  • Big data security threat processing method and system based on smart service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] figure 1 A block diagram of a large data security threat processing system 10 provided in the present application embodiment is shown. The large data security threat processing system 10 in the present application embodiment can be a server having data storage, transmission, processing, such as figure 1 As shown, the big data security threat processing system 10 includes: memory 1011, processor 1012, network module 1013, and artificial intelligence new media resource processing device 20.

[0031] The memory 1011, the processor 1012, and the network module 1013 are electrically connected directly or indirectly to achieve transmission or interaction of data. For example, these elements can be electrically connected to each other by one or more communication bus or signal lines. The memory 1011 stores a new media resource processing apparatus 20 based on artificial intelligence, which includes at least one software function that can be stored in the memory 1011 in the form o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of smart services and big data security and protection, in particular to a big data security threat processing method and system based on smart services, which can determine information threat security evaluation by means of smart service activity data collected by a big data processing thread. Unnecessary resource overhead caused by adoption of an extra information threat detection mode is avoided, and the determination efficiency of information threat security evaluation is improved; the business activity popularity description reflects the global activity popularity of all potential threat type business items in the suspected intrusion threat scene, and compared with a global statistical result of the current activity popularity of all potential threat type business items in the suspected intrusion threat scene, the global activity popularity of all potential threat type business items in the suspected intrusion threat scene is obtained; the business activity popularity description can more accurately feed back an information threat condition in a suspected intrusion threat scene; on the premise of business activity popularity description, the accuracy and credibility of information threat security evaluation can be remarkably improved in combination with the business project emergency degree.

Description

Technical field [0001] The embodiments of the present application relate to smart business and large data security technology, which involve a large data security threat processing method and system based on smart business. Background technique [0002] In large data environments, safety requirements in various industries and areas are changing. As the data is further concentrated and the amount of data, security protection for smart business activities in wisdom business is more difficult. At the same time, the distribution, collaborative and open processing of smart business activity data has also increased the risk of data leaks. In the big data application process, how to accurately and determine the smart business activity data in the smart business environment, so that Subsequent security threat processing is a technical issue that is now in urgent needovers. Inventive content [0003] In view of this, the present application provides a large data security threat processin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
CPCG06F21/6218
Inventor 邓禄红
Owner 中软数智信息技术(武汉)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products