US 11,757,710 B2
Computer technology for security enforcement during edge computations
Sarbajit K. Rakshit, Kolkata (IN); Partho Ghosh, Kolkata (IN); and Shailendra Moyal, Pune (IN)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by International Business Machines Corporation, Armonk, NY (US)
Filed on Jan. 20, 2022, as Appl. No. 17/648,427.
Prior Publication US 2023/0231765 A1, Jul. 20, 2023
Int. Cl. H04L 41/0806 (2022.01); H04L 41/00 (2022.01)
CPC H04L 41/0806 (2013.01) [H04L 41/20 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A computer-implemented method (CIM) comprising:
receiving, by a client edge device, a request to deploy computational work on the client edge computing device;
determining, by the client edge computing device, required security software that the client edge computing device must have to meet a predetermined level of security for securely performing the computational work on the client edge computing device;
instructing, by the client edge computing device, a vehicle-mounted secondary edge computing device that has the required security software to move into proximity of the client edge computing device;
subsequent to the vehicle-mounted secondary edge computing device moving into proximity of the client edge computing device, downloading the required security software from the vehicle-mounted secondary edge computing device to the client edge computing device;
installing the required security software on the client edge computing device; and
subsequent to the installation of the required security software on the client edge computing device, performing computational work on the client edge computing device.