System safety realizing method and relative system using sub form automatic machine
A technology of system security and implementation method, applied in computer security devices, transmission systems, digital transmission systems, etc., and can solve problems such as infeasibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] In the following description, the present invention will be explained through some specific embodiments. After reading the following description, you will have a more thorough understanding of the concept of the present invention. Of course, the detailed data provided in the following description shall not limit the patent scope of the present invention.
[0027] Since the relevant theories and knowledge of "regular expression", "state machine" and "automaton" are well known to those with ordinary knowledge in the technical field, the I won't go into details. And please note that in the following description, the name "state machine" will be used interchangeably with the term "state automaton". "Wild card" is used to represent special symbols, such as the combination of period (.) and asterisk (*) in English, which is used to represent 0, 1, or more characters (for example , ".*abc" means all patterns ending with "abc"). A "data unit" refers to data stored at a parti...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 