Abnormal influence detection method and device, computer equipment and storage medium
A detection method and abnormal technology, applied in the computer field, can solve problems such as the lack of evaluation criteria, and achieve the effects of reducing human subjective influence, strengthening control, and objective versatility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] In order to make the purpose, technical solutions and advantages of the present application more clearly understood, the present application will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present application, but not to limit the present application.
[0034] In one embodiment, as figure 1 As shown in the figure, an abnormal influence detection method is provided. In this embodiment, the method is applied to a server as an example for description. It can be understood that the method can also be applied to a terminal, and can also be applied to a system including a terminal and a server. And through the interaction between the terminal and the server. In this embodiment, the method includes the following steps S102 to S108.
[0035] S102, when an abnormality in the system is monitored, acquire abnormality informati...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com