Power Internet of Things security component virtualization construction method and system

The invention discloses a power Internet of Things security component virtualization construction method and system. The method comprises the steps of obtaining a current application environment and a current security demand of a to-be-deployed position and a core basic mirror image corresponding to...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: CAO WANTIAN, SHAO ZHIPENG, CHEN LU, MA YUANYUAN, CHEN MU
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator CAO WANTIAN
SHAO ZHIPENG
CHEN LU
MA YUANYUAN
CHEN MU
description The invention discloses a power Internet of Things security component virtualization construction method and system. The method comprises the steps of obtaining a current application environment and a current security demand of a to-be-deployed position and a core basic mirror image corresponding to a minimum operation environment of a security component; based on the current application environment and the current security demand, screening security component mirror images from a preset security component mirror image library to form a security component mirror image set, wherein the preset security component mirror image library is used for storing mapping rules among the application environment, the security demand and the security components; and constructing a virtualized security component based on the core base mirror image and the security component mirror image set. According to the invention, through presetting the mapping rule among the application environment, the security requirement and the secu
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN113986463A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN113986463A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN113986463A3</originalsourceid><addsrcrecordid>eNrjZIgMyC9PLVLwzCtJLcpLLVHIT1MIycjMSy9WKE5NLi3KLKlUSM7PLcjPS80rUSjLLCopTczJrEosyczPA0rkFZcUlSaDObmpJRn5KQqJeSkKxZXFJam5PAysaYk5xam8UJqbQdHNNcTZQze1ID8-tbggMTkVaGG8s5-hobGlhZmJmbGjMTFqAH1_O_4</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Power Internet of Things security component virtualization construction method and system</title><source>esp@cenet</source><creator>CAO WANTIAN ; SHAO ZHIPENG ; CHEN LU ; MA YUANYUAN ; CHEN MU</creator><creatorcontrib>CAO WANTIAN ; SHAO ZHIPENG ; CHEN LU ; MA YUANYUAN ; CHEN MU</creatorcontrib><description>The invention discloses a power Internet of Things security component virtualization construction method and system. The method comprises the steps of obtaining a current application environment and a current security demand of a to-be-deployed position and a core basic mirror image corresponding to a minimum operation environment of a security component; based on the current application environment and the current security demand, screening security component mirror images from a preset security component mirror image library to form a security component mirror image set, wherein the preset security component mirror image library is used for storing mapping rules among the application environment, the security demand and the security components; and constructing a virtualized security component based on the core base mirror image and the security component mirror image set. According to the invention, through presetting the mapping rule among the application environment, the security requirement and the secu</description><language>chi ; eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220128&amp;DB=EPODOC&amp;CC=CN&amp;NR=113986463A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25544,76293</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220128&amp;DB=EPODOC&amp;CC=CN&amp;NR=113986463A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>CAO WANTIAN</creatorcontrib><creatorcontrib>SHAO ZHIPENG</creatorcontrib><creatorcontrib>CHEN LU</creatorcontrib><creatorcontrib>MA YUANYUAN</creatorcontrib><creatorcontrib>CHEN MU</creatorcontrib><title>Power Internet of Things security component virtualization construction method and system</title><description>The invention discloses a power Internet of Things security component virtualization construction method and system. The method comprises the steps of obtaining a current application environment and a current security demand of a to-be-deployed position and a core basic mirror image corresponding to a minimum operation environment of a security component; based on the current application environment and the current security demand, screening security component mirror images from a preset security component mirror image library to form a security component mirror image set, wherein the preset security component mirror image library is used for storing mapping rules among the application environment, the security demand and the security components; and constructing a virtualized security component based on the core base mirror image and the security component mirror image set. According to the invention, through presetting the mapping rule among the application environment, the security requirement and the secu</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZIgMyC9PLVLwzCtJLcpLLVHIT1MIycjMSy9WKE5NLi3KLKlUSM7PLcjPS80rUSjLLCopTczJrEosyczPA0rkFZcUlSaDObmpJRn5KQqJeSkKxZXFJam5PAysaYk5xam8UJqbQdHNNcTZQze1ID8-tbggMTkVaGG8s5-hobGlhZmJmbGjMTFqAH1_O_4</recordid><startdate>20220128</startdate><enddate>20220128</enddate><creator>CAO WANTIAN</creator><creator>SHAO ZHIPENG</creator><creator>CHEN LU</creator><creator>MA YUANYUAN</creator><creator>CHEN MU</creator><scope>EVB</scope></search><sort><creationdate>20220128</creationdate><title>Power Internet of Things security component virtualization construction method and system</title><author>CAO WANTIAN ; SHAO ZHIPENG ; CHEN LU ; MA YUANYUAN ; CHEN MU</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN113986463A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>CAO WANTIAN</creatorcontrib><creatorcontrib>SHAO ZHIPENG</creatorcontrib><creatorcontrib>CHEN LU</creatorcontrib><creatorcontrib>MA YUANYUAN</creatorcontrib><creatorcontrib>CHEN MU</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>CAO WANTIAN</au><au>SHAO ZHIPENG</au><au>CHEN LU</au><au>MA YUANYUAN</au><au>CHEN MU</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Power Internet of Things security component virtualization construction method and system</title><date>2022-01-28</date><risdate>2022</risdate><abstract>The invention discloses a power Internet of Things security component virtualization construction method and system. The method comprises the steps of obtaining a current application environment and a current security demand of a to-be-deployed position and a core basic mirror image corresponding to a minimum operation environment of a security component; based on the current application environment and the current security demand, screening security component mirror images from a preset security component mirror image library to form a security component mirror image set, wherein the preset security component mirror image library is used for storing mapping rules among the application environment, the security demand and the security components; and constructing a virtualized security component based on the core base mirror image and the security component mirror image set. According to the invention, through presetting the mapping rule among the application environment, the security requirement and the secu</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN113986463A
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Power Internet of Things security component virtualization construction method and system
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T21%3A34%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=CAO%20WANTIAN&rft.date=2022-01-28&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN113986463A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true