Data security authentication method between cloud and edge node
An edge node and authentication method technology, applied in the field of communication security, can solve the problems of identity counterfeiting, limited computing resources, complex communication protocols, etc., and achieve the effects of fast computing speed, lightweight encryption function, and small storage space
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0047] In order to further illustrate the technical means and effects adopted by the present invention to achieve the intended purpose, the present invention will be described in detail below in conjunction with the accompanying drawings and preferred embodiments.
[0048] With the development of the industrial Internet platform, industrial data uploading to the cloud has become the only way to realize intelligent production and operation in the industrial field. However, the data volume of the industrial Internet is huge, the real-time requirements are high, and the data is uploaded to the cloud in various forms. From the perspective of data sources and typical application requirements, there are six forms of industrial Internet data upload and download, namely: the transmission between cloud and collaborative layer office network data, the purpose is to promote the collaboration and intelligence of enterprise office business systems; The main purpose of the data transmission...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com