Power Internet of Things security component virtualization construction method and system
The invention discloses a power Internet of Things security component virtualization construction method and system. The method comprises the steps of obtaining a current application environment and a current security demand of a to-be-deployed position and a core basic mirror image corresponding to...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | CAO WANTIAN SHAO ZHIPENG CHEN LU MA YUANYUAN CHEN MU |
description | The invention discloses a power Internet of Things security component virtualization construction method and system. The method comprises the steps of obtaining a current application environment and a current security demand of a to-be-deployed position and a core basic mirror image corresponding to a minimum operation environment of a security component; based on the current application environment and the current security demand, screening security component mirror images from a preset security component mirror image library to form a security component mirror image set, wherein the preset security component mirror image library is used for storing mapping rules among the application environment, the security demand and the security components; and constructing a virtualized security component based on the core base mirror image and the security component mirror image set. According to the invention, through presetting the mapping rule among the application environment, the security requirement and the secu |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN113986463A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN113986463A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN113986463A3</originalsourceid><addsrcrecordid>eNrjZIgMyC9PLVLwzCtJLcpLLVHIT1MIycjMSy9WKE5NLi3KLKlUSM7PLcjPS80rUSjLLCopTczJrEosyczPA0rkFZcUlSaDObmpJRn5KQqJeSkKxZXFJam5PAysaYk5xam8UJqbQdHNNcTZQze1ID8-tbggMTkVaGG8s5-hobGlhZmJmbGjMTFqAH1_O_4</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Power Internet of Things security component virtualization construction method and system</title><source>esp@cenet</source><creator>CAO WANTIAN ; SHAO ZHIPENG ; CHEN LU ; MA YUANYUAN ; CHEN MU</creator><creatorcontrib>CAO WANTIAN ; SHAO ZHIPENG ; CHEN LU ; MA YUANYUAN ; CHEN MU</creatorcontrib><description>The invention discloses a power Internet of Things security component virtualization construction method and system. The method comprises the steps of obtaining a current application environment and a current security demand of a to-be-deployed position and a core basic mirror image corresponding to a minimum operation environment of a security component; based on the current application environment and the current security demand, screening security component mirror images from a preset security component mirror image library to form a security component mirror image set, wherein the preset security component mirror image library is used for storing mapping rules among the application environment, the security demand and the security components; and constructing a virtualized security component based on the core base mirror image and the security component mirror image set. According to the invention, through presetting the mapping rule among the application environment, the security requirement and the secu</description><language>chi ; eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20220128&DB=EPODOC&CC=CN&NR=113986463A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25544,76293</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20220128&DB=EPODOC&CC=CN&NR=113986463A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>CAO WANTIAN</creatorcontrib><creatorcontrib>SHAO ZHIPENG</creatorcontrib><creatorcontrib>CHEN LU</creatorcontrib><creatorcontrib>MA YUANYUAN</creatorcontrib><creatorcontrib>CHEN MU</creatorcontrib><title>Power Internet of Things security component virtualization construction method and system</title><description>The invention discloses a power Internet of Things security component virtualization construction method and system. The method comprises the steps of obtaining a current application environment and a current security demand of a to-be-deployed position and a core basic mirror image corresponding to a minimum operation environment of a security component; based on the current application environment and the current security demand, screening security component mirror images from a preset security component mirror image library to form a security component mirror image set, wherein the preset security component mirror image library is used for storing mapping rules among the application environment, the security demand and the security components; and constructing a virtualized security component based on the core base mirror image and the security component mirror image set. According to the invention, through presetting the mapping rule among the application environment, the security requirement and the secu</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZIgMyC9PLVLwzCtJLcpLLVHIT1MIycjMSy9WKE5NLi3KLKlUSM7PLcjPS80rUSjLLCopTczJrEosyczPA0rkFZcUlSaDObmpJRn5KQqJeSkKxZXFJam5PAysaYk5xam8UJqbQdHNNcTZQze1ID8-tbggMTkVaGG8s5-hobGlhZmJmbGjMTFqAH1_O_4</recordid><startdate>20220128</startdate><enddate>20220128</enddate><creator>CAO WANTIAN</creator><creator>SHAO ZHIPENG</creator><creator>CHEN LU</creator><creator>MA YUANYUAN</creator><creator>CHEN MU</creator><scope>EVB</scope></search><sort><creationdate>20220128</creationdate><title>Power Internet of Things security component virtualization construction method and system</title><author>CAO WANTIAN ; SHAO ZHIPENG ; CHEN LU ; MA YUANYUAN ; CHEN MU</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN113986463A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>CAO WANTIAN</creatorcontrib><creatorcontrib>SHAO ZHIPENG</creatorcontrib><creatorcontrib>CHEN LU</creatorcontrib><creatorcontrib>MA YUANYUAN</creatorcontrib><creatorcontrib>CHEN MU</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>CAO WANTIAN</au><au>SHAO ZHIPENG</au><au>CHEN LU</au><au>MA YUANYUAN</au><au>CHEN MU</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Power Internet of Things security component virtualization construction method and system</title><date>2022-01-28</date><risdate>2022</risdate><abstract>The invention discloses a power Internet of Things security component virtualization construction method and system. The method comprises the steps of obtaining a current application environment and a current security demand of a to-be-deployed position and a core basic mirror image corresponding to a minimum operation environment of a security component; based on the current application environment and the current security demand, screening security component mirror images from a preset security component mirror image library to form a security component mirror image set, wherein the preset security component mirror image library is used for storing mapping rules among the application environment, the security demand and the security components; and constructing a virtualized security component based on the core base mirror image and the security component mirror image set. According to the invention, through presetting the mapping rule among the application environment, the security requirement and the secu</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN113986463A |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | Power Internet of Things security component virtualization construction method and system |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T21%3A34%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=CAO%20WANTIAN&rft.date=2022-01-28&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN113986463A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |