Method for bidirectional secure communication over unidirectional network for edge computing

A one-way network and edge computing technology, applied in the field of communication, can solve problems such as network obstacles, long transmission paths, and Internet insecurity, and achieve the effect of reducing delay and improving efficiency

Active Publication Date: 2022-04-15
江苏博云科技股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the development of edge computing has entered the practical stage, the network is still a huge obstacle when multiple edge nodes across regions need to collaborate side by side. This is because: 1. The network where the edge nodes are located is usually a one-way network , the edge node does not have a fixed public IP address; 2. The Internet itself used by the edge network is an insecure network
[0004] At present, if multiple edge nodes across regions need to collaborate side by side, the edge node needs to establish a connection to the cloud first, send the information to the cloud, and then forward it to another edge node from the cloud, which leads to a long transmission path and slow transmission. Long delay, low transmission efficiency and other issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for bidirectional secure communication over unidirectional network for edge computing
  • Method for bidirectional secure communication over unidirectional network for edge computing
  • Method for bidirectional secure communication over unidirectional network for edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The specific implementation manners of the present application will be further described in detail below in conjunction with the drawings and embodiments. The following examples are used to illustrate the present application, but not to limit the scope of the present application.

[0043] First, some terms involved in this application are introduced.

[0044] Cloud computing (cloud computing) is a kind of distributed computing, which refers to decomposing a huge data computing processing program into countless small programs through the network "cloud", and then processing and analyzing these programs through a system composed of multiple servers. The applet gets the result and returns it to the user. In the early days of cloud computing, simply put, it was simple distributed computing, solving task distribution, and merging calculation results.

[0045] Cloud node: refers to the host / server used in cloud computing.

[0046] Edge computing: refers to an open platform...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This application relates to a method for implementing two-way secure communication on a one-way network for edge computing, which belongs to the field of communication technology, and includes sending the first edge node to the cloud node through the first communication connection with the cloud node. The actual IP address in; receive the IP information of the second edge node fed back by the cloud node; send a connection establishment request to the public network IP address of the second edge node through the first NAT router, and trigger the second edge node when the connection establishment request passes through the first NAT router A NAT router generates a routing conversion rule, and the routing conversion rule is used to indicate that the information data of the second edge node is forwarded to the first edge node; receiving the response message sent by the first NAT router based on the routing conversion rule; passing the first NAT based on the response message The router establishes a VPN tunnel with the second edge node; it can solve the problem of long transmission delay in the one-way network; it can shorten the transmission path, thereby reducing the delay.

Description

technical field [0001] The present application relates to a method for implementing two-way secure communication on a unidirectional network for edge computing, which belongs to the field of communication technology. Background technique [0002] Cloud computing (cloud computing) is a kind of distributed computing, which refers to decomposing a huge data computing processing program into countless small programs through the network "cloud", and then processing and analyzing these programs through a system composed of multiple servers. The applet gets the result and returns it to the user. [0003] Under the industrial environment in recent years, traditional cloud computing capabilities have been unable to support the increasingly large-scale and geographically dispersed data processing and computing needs. Based on this, edge computing should rise in response. Especially under the continuous promotion of new technologies such as 5G and Internet of Things, the edge computi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L67/10H04L67/14H04L61/2503H04L12/46H04L9/40
CPCH04L67/10H04L67/14H04L61/2503H04L63/18H04L12/4641H04L12/4633
Inventor 花磊耿浩涛崔骥张荣奇
Owner 江苏博云科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products