Public security big data management method
A big data and public security technology, applied in the field of data processing, can solve the problems of data integrity and timeliness, which are difficult to meet intelligent applications, and achieve the effect of continuous optimization of data ecology
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0019] The present invention will be further described in detail below in conjunction with specific embodiments.
[0020] The key technical route adopted when carrying out data closed-loop construction in the present invention is:
[0021] 1. Flexible construction of logically integrated resource pools: gradually integrate original databases, resource databases, theme databases, knowledge databases, business databases and external data to form a unified data resource metadata center, fully supporting the public security big data governance capabilities, and targeting some The system data realizes physical decentralized storage, logical centralized management, and provides a unified data view through the ministerial-level information resource directory.
[0022] 2. Support continuous optimization of data models: Adopt data standardization strategy to comprehensively standardize the original library, resource library and theme library. On the one hand, it can adapt to changes in...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com