Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety protection system and method for power edge computing

A security protection and edge computing technology, applied in transmission systems, electrical components, etc., can solve problems such as inability to apply, without consideration of monitoring processing, data security risks, etc., to improve data security and reliability, improve operational efficiency, and improve safety effect

Active Publication Date: 2021-01-29
CHINA SOUTH POWER GRID ELECTRIC POWER RES INST
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For the edge computing of the power system, the number of connected devices and the number of users are very large, and the traditional power edge computing security method does not consider the power edge computing communication between the communication device and the power edge computing platform. Behavior monitoring and processing will cause various security risks in the data in the power edge computing process, which cannot be applied to the increasingly complex power edge computing system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection system and method for power edge computing
  • Safety protection system and method for power edge computing
  • Safety protection system and method for power edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049] see figure 1 , is a schematic structural diagram of a power edge computing security protection system provided by the present invention. like figure 1 As shown, the embodiment of the power edge computing security protection system provided by the embodiment of the present invention includes a physical infrastructure security protection module, a data plane gateway security protection module, and a management platform protection module.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety protection system and method for power edge computing, and the system comprises a physical infrastructure safety protection module, a data plane gateway safety protection module, and a management safety protection module. By interface equipment and a micro-processor of the physical infrastructure safety protection module, identity registration and authentication identification are carried out on access equipment, automatic binding of interfaces of electrical equipment is carried out, real-time monitoring and sensitive data protection are carried out on attack behaviors through a data processor of the data plane gateway security protection module, and security protection of a data link is achieved. Password verification and log recording are carried out on platform operation and the like through a core processor of the management security protection module, so that the purpose of data security protection in the power edge computing system is achieved, and the data security and reliability of the whole power edge computing system are improved.

Description

technical field [0001] The invention relates to the field of power edge computing security, in particular to a power edge computing security protection system and method. Background technique [0002] Edge computing refers to an open platform that integrates network, computing, storage, and application core capabilities on the edge of the network close to the source of objects or data, and provides edge intelligent services nearby to meet the needs of industry digitization in agile connection, real-time business, data optimization, application intelligence, Key requirements in terms of security and privacy protection. Edge computing reduces the application hosting concentrated in the data center to the edge of the network, and is closer to consumers and data sources. It has the characteristics of ultra-low latency and ultra-high bandwidth. It is a project carrier platform for the combination of information technology and communication technology business. [0003] For the e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1416H04L63/0428H04L63/08H04L63/083H04L67/12
Inventor 张宇南蒋屹新许爱东
Owner CHINA SOUTH POWER GRID ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products