Big data intelligent analysis and application method based on network security
A technology of network data and application methods, applied in the field of network security, can solve the problems of lack of data collection, analysis, prediction, early warning and solutions
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] In order to have a further understanding of the purpose, structure, features and functions of the present invention, the detailed description is as follows in conjunction with the embodiments.
[0019] Certain terms are used in the description and claims to refer to particular elements. Those of ordinary skill in the art will appreciate that manufacturers may refer to the same element by different terms. The specification and claims do not use the difference in name as a way to distinguish components, but use the difference in function of components as a criterion for distinguishing. "Include" mentioned throughout the specification and claims is an open term, so it should be interpreted as "including but not limited to".
[0020] See figure 1 , figure 1 It is a schematic flow chart of a network security-based big data intelligent analysis application method provided by an embodiment of the present invention.
[0021] Such as figure 1 As shown, the big data intellig...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com