Security system and method based on data exchange between cloud end and edge end

A data exchange and security system technology, applied in the field of information security, can solve problems such as production safety hazards, lack of safety protection, and inadequacy

Pending Publication Date: 2021-11-26
YUNNAN KUNGANG ELECTRONICS INFORMATION TECH CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Lack of or inadequate security protection will bring hidden dangers to the network security, information security, and even production safety of industrial enterprises

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security system and method based on data exchange between cloud end and edge end

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The technical solution of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are some, but not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0046]According to the principle of network security defense in depth, enterprise networks are usually divided into multiple security zones. For the convenience of description, this embodiment assumes that the enterprise network is divided into three security areas: the demilitarized zone (DMZ), the management information area, and the production control area: the demilitarized zone (DMZ) is located between the enterprise intranet and the extranet. It separates the sensitive internal network from other networks that provide...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security system and method based on data exchange between a cloud end and an edge end. The system comprises a data exchange front agent, which is disposed in a non-military area of an enterprise network, is connected with a public cloud network through an enterprise firewall, and carries out the bidirectional identity authentication based on a digital certificate. A security data exchange device is arranged between the management information area and the production control area of the enterprise; a data exchange post agent is arranged in the enterprise production control area; the rear agent exchanges data with the front agent in the non-military area through the security data exchange equipment; and the edge computing node in the enterprise production control area downloads the artificial intelligence model and parameters from the cloud through the rear agent, collects process data from the production equipment, and operates an artificial intelligence algorithm. The method accords with the existing security policy of an industrial enterprise, and solves the security problem of data exchange between the cloud end and the edge end in the industrial internet artificial intelligence application at three levels of a network layer, a transmission layer and an application layer.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a security system and method based on cloud and edge data exchange. Background technique [0002] The Industrial Internet usually adopts a collaborative architecture between the cloud and the edge. The edge terminal runs processing, analysis and other operations on the edge of the network close to the industrial site, and provides edge computing services nearby, which can better meet the key needs of the manufacturing industry in terms of agile connection, real-time optimization, safety and reliability. [0003] Artificial intelligence (AI) is an important part of the industrial Internet. Based on comprehensive perception, ubiquitous connection, deep integration and efficient processing, industrial artificial intelligence realizes precise decision-making and dynamic optimization, and completes the data optimization closed loop of the industrial Internet. In a typical ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/55G06F21/60G06K9/62H04L9/32
CPCH04L63/02H04L63/0823H04L63/083H04L63/0869H04L9/3263H04L9/3247H04L63/0442H04L63/1408G06F21/602G06F21/55H04L67/10H04L63/168H04L63/20H04L9/50G06F18/214
Inventor 皮坤许斌李平王化邝昌云范心怡贾鹏杰
Owner YUNNAN KUNGANG ELECTRONICS INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products