Unlock instant, AI-driven research and patent intelligence for your innovation.

Edge cloud node and terminal user security management method

A security management and end-user technology, applied in the field of edge cloud node and end-user security management, can solve problems such as violation of security rules, misconfiguration, lack of managers or users, etc., and achieve the effect of a wide range of application scenarios

Inactive Publication Date: 2021-09-17
航天科工智能运筹与信息安全研究院(武汉)有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The edge cloud node monitor also provides a memory sharing method between edge cloud nodes, which may be exploited by malicious edge cloud nodes, and may also cause inexperienced managers or users to share in violation of security rules due to misconfiguration, or maliciously obtain user privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Edge cloud node and terminal user security management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and through specific implementation methods. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention. In addition, it should be noted that, for the convenience of description, only some structures related to the present invention are shown in the drawings but not all structures.

[0019] Before discussing the exemplary embodiments in more detail, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although the flowcharts describe the steps as sequential processing, many of the steps may be performed in parallel, concurrently, or simultaneously. Additionally, the order of steps may be rearranged. The process may be terminated when its operations are complete, but may also have addit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an edge cloud node and terminal user security management method, which comprises the following steps that: an edge node system based on edge cloud computing provides isolation based on user grouping so as to manage common edge nodes and monitor malicious software; access based on a rule base is implemented on a physical host of an edge node, so that a malicious manager is prevented from threatening privacy data of a user from a management domain, viruses and malicious codes are prevented from spreading from one user to other users, and security rule conflicts between user privacy and a fog computing provider are relieved; a special trusted environment edge cloud node is created based on a trusted computing technology, functions such as authorization, access rule configuration, trust proving and monitoring are moved from a management domain to the trusted environment edge cloud node, and interference of the management domain to a security function is avoided. According to the method, an edge cloud computing network manager can be prevented from tampering or stealing user privacy, and resource sharing of edge cloud nodes and terminal users can be flexibly controlled and managed.

Description

technical field [0001] The invention relates to the technical field of trusted computing in an edge cloud computing environment, in particular to a security management method for edge cloud nodes and end users. Background technique [0002] The edge cloud computing platform can allow users to access a dynamically configurable shared computing resource pool through ubiquitous and convenient access to the network. The shared computing resource pool includes network devices, servers, storage devices, and services. The edge cloud computing platform can use the edge cloud nodes to realize the rapid distribution and release of the above-mentioned configurable computing resources with a small management cost or a low interaction complexity between users and service providers. [0003] However, while edge cloud computing brings convenience to people, it also faces greater security challenges. On the one hand, in the mode of multi-user sharing of computing resources, the resources o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/57G06F21/62
CPCG06F21/56G06F21/577G06F21/6245
Inventor 陈晓东涂山山于石林郭洪文魏向元郑艺王小平
Owner 航天科工智能运筹与信息安全研究院(武汉)有限公司