Data security evaluation method and evaluation system and storage medium
A data security and evaluation value technology, applied in the field of data security, can solve the problems of leakage of confidential documents, increase the workload of the person in charge of the file data comparison and confirmation, and achieve the effect of reducing the workload
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0094] In order to make the purpose, technical solutions and advantages of the present application more clearly understood, the following is combined with the appendix Figure 1-9 and Examples, the present application will be further described in detail. It should be understood that the specific embodiments described herein are only used to explain the present application, but not to limit the present application.
[0095] The embodiment of the present application discloses a data security assessment method.
[0096] refer to figure 1 , a data security assessment method includes:
[0097] Step S100, acquiring the operator's operation instruction information and the operator's current average heart rate information per unit time.
[0098] The operator's operation instruction information refers to the information input by the operator when controlling the transmission of the confidential file, which may be password information input in the system, or may be a voice password o...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com