Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security protection method and device for edge computing platform

An edge computing and security protection technology, applied in the security field, can solve problems such as huge number, wide distribution, and complex environment

Active Publication Date: 2021-06-15
CHINA ACADEMY OF INFORMATION & COMM
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the wide distribution, complex environment, and huge quantity of edge computing, traditional security protection methods can no longer fully meet the protection needs of edge computing, resulting in greater security risks and challenges for edge computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection method and device for edge computing platform
  • Security protection method and device for edge computing platform
  • Security protection method and device for edge computing platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some, not all, embodiments of the application. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0025] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of practice in sequences other than those illustrated or des...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an edge computing platform security protection method and device, and the method comprises the steps: carrying out the following protection through an established edge computing platform security service model during the security protection of an edge computing platform: preventing a predicted attack event through a cloud side module; detecting an intrusion event through a grading and domain-dividing module, and if the intrusion event is detected, determining a security domain and a security level corresponding to the intrusion event; when the grading and domain dividing module detects a security domain and a security level corresponding to an intrusion event, searching a security policy corresponding to the security domain and the security level through an edge side module, and performing response processing based on the policy; after response processing is carried out through the edge side module, carrying out system recovery on the edge computing platform through the security operation and maintenance module. According to the method, comprehensive safety protection can be carried out on the edge computing platform.

Description

technical field [0001] The present invention relates to the field of security technology, in particular to a security protection method and device for an edge computing platform. Background technique [0002] In response to the development of application requirements for the Internet of Everything, edge computing, as a new computing model, emerged as the times require, and edge computing has become an emerging application support system. Among them, the edge computing platform is deployed at the edge of the network, and the operation objects include downlink data from the cloud side and uplink data from the device side data source, which means that edge computing is the hub of data sources and cloud computing resources: on the one hand, it undertakes cloud With the computing power of computing resources, cloud-edge collaboration completes large-scale computing and storage; on the other hand, through edge-end collaboration, edge computing provides data sources with nearby and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/1416H04L63/205H04L63/1441
Inventor 李洁郭亮李宁东王月王少鹏谢丽娜吴美希许可欣盛凯刘鹏云芦帅郑常奎邱奔常金凤柯芊宫伟文
Owner CHINA ACADEMY OF INFORMATION & COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products