Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security service method oriented to health cloud

A technology of network security and service method, which is applied in the field of network security services for health cloud, can solve the problems of inability to prevent virtual machine network attacks, performance bottlenecks, high costs, etc., and achieve reduced maintenance and management complexity and good scalability and robustness, cost reduction effect

Pending Publication Date: 2018-10-12
广东迪特赛恩软件技术有限公司 +1
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Chen, Jianyong and others tried to provide on-demand cloud computing security services, but because the more stringent security requirements need to spend more security detection time, more resources such as memory and bandwidth, if all cloud computing services adopt the most stringent The security protection measures are unrealistic, which will seriously damage the availability of cloud computing, and even make it unusable
[0004] Complex network services are carried on the health cloud. The traditional way is to protect network security by integrating a large number of Mboxes. A large number of devices will lead to high cost, high complexity, low scalability and serious performance bottlenecks, and cannot prevent virtual computer-to-computer network attack
Health Cloud involves various types of users and stores important information of users. It is necessary to ensure that users' privacy is not leaked. However, cloud service providers do not understand the network security needs of Health Cloud users and cannot provide customized network security services.
And the traditional method is to use a large number of Mboxes to protect network security, but there are great differences in configuration and management of different types of Mboxes. It is almost impossible to provide customized network security services manually, and The high cost of Mbox is not conducive to large-scale deployment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security service method oriented to health cloud
  • Network security service method oriented to health cloud
  • Network security service method oriented to health cloud

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The preferred implementation of the health cloud-oriented network security service method of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0029] Figure 1 to Figure 4 Provide the specific implementation method of this health cloud-oriented network security service method:

[0030] The user types of the health cloud are generally divided into residents, hospital medical institutions, government health institutions, and third-party institutions. Each type of user has a different role type. The health cloud platform obtains residents' health data from mobile terminals (such as blood pressure monitors, blood glucose meters, etc.) to establish a health file management system, and provides health file query services, appointment registration services, health knowledge push services, home health services, health consultation services, large-scale Intelligent data analysis, etc., such as figure 1 shown. Customized n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security service method oriented to a health cloud, and relates to the technical field of the information. A manufacturing method of the thermal-bonded invisible socks comprises six steps of tailoring, stitching, positioning, bonding, punching, and stitching. The thermo-bonded invisible socks are made of elastic knitted fabric and composed of four parts of sock sole, sock top, heel plastic-dropping sheet and a hot melt adhesive film. The sock sole and the sock top are used as the main body component of the product, and the heel plastic-dropping sheet plays theeffect of the preventing falling and sliding; the hot melt adhesive film is mainly used for bonding the rib cuff and the heel. The socks have the features of being light and thin, flat, elastic, andcomfortable for wearing; the sock top and the sock sole are stitched through a numerically-controlled sewing machine; the rib cuff and the heel are bonded through the hot melt adhesive. The thermal-bonded invisible socks product disclosed by the invention is beautiful, light and thin, flat, elastic, comfortable for wearing, strong in breathability, less in process, and low in cost.

Description

technical field [0001] The present invention relates to the field of information technology, in particular, the present invention relates to a health cloud-oriented network security service method. Background technique [0002] In the field of cloud computing, network security is considered to be one of the most important security issues, which may bring the same fatal threat as data security and privacy leakage. If cloud computing security adopts a customized security service policy, it can check and filter adaptive security levels according to service types and security needs, so as to meet the security needs of cloud user services and reduce cloud computing resource consumption. [0003] CloudWatcher mentions customized cloud computing network security services. According to cloud user services, security requirements are filled in and sent to CloudWatcher. CloudWatcher analyzes these requirements and forms customized security services. CloudWatcher only mentioned such a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L29/06H04L29/08
CPCH04L41/0803H04L63/0209H04L67/10
Inventor 陈雷霆李巧平陈秋生陈雅琳刘薇徐安
Owner 广东迪特赛恩软件技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products