Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network switching method and system based on multi-access edge computing

An edge computing and network switching technology, applied in electrical components, security devices, wireless communications, etc., can solve the security threats of mobile terminals, the inevitable malicious attack of other terminals, the implantation of Trojan horse viruses, and the impact on the security of mobile terminals. Achieve the effect of improving accuracy and comprehensiveness

Active Publication Date: 2022-01-04
慧之安信息技术股份有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the process of data interaction, the APP software end will inevitably be maliciously attacked by other terminals or Trojan virus implantation, etc., which will not only affect the normal operation of the APP software end, but also steal the personal information of mobile terminal users from the APP software end , thus posing a security threat to mobile terminals
Although the built-in antivirus software of the mobile terminal can kill the virus to a certain extent, when the virus intrusion on the mobile terminal comes from the mobile network currently connected, the antivirus software will not be able to completely and completely kill the invading virus , which will seriously affect the operational security of the mobile terminal. At this time, it is necessary to switch the mobile network to the mobile terminal in a timely and fast manner under the premise that the mobile terminal is determined to be attacked by a virus originating from the mobile network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network switching method and system based on multi-access edge computing
  • Network switching method and system based on multi-access edge computing
  • Network switching method and system based on multi-access edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0056] refer to figure 1 , is a schematic flowchart of a network switching method based on multi-access edge computing provided by an embodiment of the present invention. The network switching method based on multi-access edge computing includes the following steps:

[0057] Step S1, collecting the respective memory usage parameters of the software terminals currently in the running state of the mobile terminal; according to the memory usage parameters, determinin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network switching method and system based on multi-access edge computing. The method comprises the steps: carrying out the operation state monitoring of a software end of a mobile terminal in an operation state, so as to determine whether each software end is in an abnormal operation state or not; then performing virus checking and killing on interaction data between a software end in an abnormal running state and a mobile network, and determining whether the mobile terminal needs to be switched to be connected to other mobile networks or not according to a data transmission rate of the software end after virus elimination, so that comprehensive real-time monitoring can be performed on the software end on the mobile terminal; then performing virus searching and killing on collected data by utilizing an edge computing strategy, so that the accuracy and comprehensiveness of virus searching and killing are improved to the maximum extent. According to the method, the mobile terminal can be switched to be connected to a mobile network with a larger broadband according to the data transmission rate of a software end; therefore, the mobile terminal is effectively prevented from being continuously attacked by viruses and the communication speed of the mobile terminal is improved.

Description

technical field [0001] The present invention relates to the technical field of network access management, in particular to a network switching method and system based on multi-access edge computing. Background technique [0002] Different APP software terminals are usually installed in mobile terminals such as smart phones, and these APP software terminals will perform data interaction with the mobile network during operation. In the process of data interaction, the APP software end will inevitably be maliciously attacked by other terminals or Trojan virus implantation, etc., which will not only affect the normal operation of the APP software end, but also steal the personal information of mobile terminal users from the APP software end , thus posing a security threat to the mobile terminal. Although the built-in antivirus software of the mobile terminal can kill the virus to a certain extent, when the virus intrusion on the mobile terminal comes from the mobile network cur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/128H04W36/00H04W36/14H04W36/30
CPCH04W12/128H04W36/0085H04W36/14H04W36/30
Inventor 余丹兰雨晴邢智涣
Owner 慧之安信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products