US 12,335,332 B2
Device protection method, and devices
Fengxian Huang, Beijing (CN)
Assigned to NEW H3C TECHNOLOGIES CO., LTD., Zhejiang (CN)
Appl. No. 17/997,517
Filed by New H3C Technologies Co., Ltd., Zhejiang (CN)
PCT Filed Apr. 30, 2020, PCT No. PCT/CN2020/088413
§ 371(c)(1), (2) Date Oct. 28, 2022,
PCT Pub. No. WO2021/217616, PCT Pub. Date Nov. 4, 2021.
Prior Publication US 2023/0177153 A1, Jun. 8, 2023
Int. Cl. H04L 67/10 (2022.01); G06F 21/55 (2013.01)
CPC H04L 67/10 (2013.01) [G06F 21/554 (2013.01); G06F 2221/034 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A method of protecting a device, applied to an edge security device, the method comprising:
obtaining a plurality of pieces of first security event information generated during operation of the edge security device;
performing statistical analysis on the plurality of pieces of first security event information to obtain first statistical analysis information;
transmitting the first statistical analysis information to a central security device, so that the central security device generates a first target protection template based on the first statistical analysis information; wherein the first target protection template includes a security protection strategy generated based on the first statistical analysis information;
receiving the first target protection template transmitted by the central security device; and
protecting the edge security device based on the security protection strategy in the first target protection template,
wherein the method further comprises:
obtaining a to-be-processed security analysis task, the security analysis task including a plurality of subtasks;
for each of the subtasks,
selecting a target task processing node from a plurality of task processing nodes based on an amount of hardware resources used to complete the subtask and a remaining amount of hardware resources of the plurality of task processing nodes;
allocating the subtask to the target task processing node, so that the target task processing node processes the subtask,
wherein the plurality of task processing nodes include: the edge security device, at least one IoT device managed by the edge security device; or, the edge security device, at least one IoT device managed by the edge security device, and at least one IoT device managed by one or more edge security devices other than the edge security device.