Unlock instant, AI-driven research and patent intelligence for your innovation.

Behavioral trust measurement method and device based on power edge computing

An edge computing and reliability technology, applied in computing, data processing applications, instruments, etc., can solve problems such as malfunction, network and node attacks, and difficulty in ensuring the safety of power operation, and achieve the effect of improving security

Active Publication Date: 2022-05-06
CHINA SOUTHERN POWER GRID COMPANY
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, since the overall application of power edge computing involves the constraints of remote control, access control, cross-domain interaction, deployment environment and other factors, it is easy to be attacked and destroyed, and it is difficult to guarantee the security of power operation
However, the current security protection mechanism of power edge computing mainly adopts passive defense mechanisms such as intrusion detection, which causes when malicious behaviors are found, the power edge computing network and nodes may have been attacked and destroyed, and cannot work normally.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Behavioral trust measurement method and device based on power edge computing
  • Behavioral trust measurement method and device based on power edge computing
  • Behavioral trust measurement method and device based on power edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0059] The behavioral credibility measurement method based on power edge computing provided by this application can be applied to such as figure 1 shown in the application environment. The power system 104 includes a power MEC1041 and a power edge computing network 1042, wherein the power MEC (Multi-access Edge Computing, MEC) 1041 is a server that can be used for edge computing, and can be integrated with the power edge computing network 1042 on the same computer on the device.

[0060] The power MEC 1041 can communicate with the power edge computing network 1042 throug...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application relates to a method and device for measuring behavioral credibility based on power edge computing. The method includes: acquiring the running status metric information of the power MEC when it is running; determining that the running status of the power MEC is credible according to the running status metric information, establishing a connection between the power MEC and the power edge computing network; acquiring and establishing the connection, the power MEC and the power Based on the platform integrity information of the edge computing network, when the connection is judged to be credible according to the platform integrity information, the behavior feature vector of each measured object in the power system is obtained; Measure the behavioral credibility of the object to obtain the behavioral credibility measurement results of each measured object; based on the behavioral credibility measurement results of each measured object, control the behavior of the power system. By adopting the method of the embodiment of the present application, the power system can actively perform security defense while performing calculations, and effectively improve the security of the power system.

Description

technical field [0001] The present application relates to the technical field of trusted computing, in particular to a method and device for measuring behavioral credibility based on power edge computing. Background technique [0002] With the development of power edge computing in various fields, today's power edge computing technology, power edge computing architecture, power edge computing smart devices, etc. have gradually formed, satisfying the internal edge data flow in the industry, business application integration, and efficient service sharing. Convenient and other cutting-edge quantitative services for enterprises. Power edge computing is an application technology centered on the network edge nodes on the power supply side, based on the nearest basic data source and integrating power services, intelligent terminals, computing analysis, and storage. The key point is to achieve rapid response on the edge side , Frontier modeling of various data to reduce the operati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F21/57G06Q50/06
CPCG06F21/55G06F21/57G06Q50/06
Inventor 吴金宇陶文伟覃祖明苏扬曹扬庞晓健
Owner CHINA SOUTHERN POWER GRID COMPANY