Computer technology for security enforcement during edge computations
摘要:
Computer technology that each edge computing device has appropriate security software, and associated configuration thereof, to be included in edge computing system deployment having a predetermined security level. The types of security software may include encryption/decryption software, encryption/decryption key handling software and/or security load sharing software. The edge computing devices may include unmanned aerial vehicles and/or other unmanned transport vehicles (for example, wheeled ground vehicles) to transport the respective edge computing devices into physical proximity with the client device that will be using the edge computing system deployment.
信息查询
0/0