SECURITY APPROACH FOR ASSET MANAGEMENT
摘要:
A method implemented by a computing entity includes issuing limit tables associated with an asset to be modified to an artificial intelligence (AI) computing entity and interpreting a response to produce a particular criterion for sharing with the AI computing entity. The method further includes triggering one or more operations based on the particular criterion and an analysis if the AI computing entity. The method further includes generating a group of algorithms to modify the asset and extracting current information for the asset from the AI computing entity. The method further includes executing the one or more operations using trigger indicators of the limit tables and modifying the asset to produce a modified asset.
信息查询
0/0