Dell Products L.P. (20240275821). AUTOMATED EDGE DRIVEN COLLABORATIVE DATA PROTECTION POLICY MANAGEMENT IN LARGE SCALE EDGE ENVIRONMENTS simplified abstract

From WikiPatents
Jump to navigation Jump to search

AUTOMATED EDGE DRIVEN COLLABORATIVE DATA PROTECTION POLICY MANAGEMENT IN LARGE SCALE EDGE ENVIRONMENTS

Organization Name

Dell Products L.P.

Inventor(s)

Jehuda Shemer of Kfar Saba (IL)

Girish Balvantrai Doshi of Pune (IN)

AUTOMATED EDGE DRIVEN COLLABORATIVE DATA PROTECTION POLICY MANAGEMENT IN LARGE SCALE EDGE ENVIRONMENTS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240275821 titled 'AUTOMATED EDGE DRIVEN COLLABORATIVE DATA PROTECTION POLICY MANAGEMENT IN LARGE SCALE EDGE ENVIRONMENTS

Simplified Explanation: The patent application describes a method for deploying a lightweight data protection component to an edge node in an edge computing environment, where a hybrid data protection policy is derived based on an operational attribute specific to the data at the edge node.

  • The method involves deploying a lightweight data protection component to an edge node in an edge computing environment.
  • A declaration file with an operational attribute is received from the edge node.
  • A central data protection policy is chosen and used to derive a hybrid data protection policy that includes the operational attribute.
  • The hybrid data protection policy is transmitted to the edge node for execution on the data residing there.

Key Features and Innovation:

  • Deployment of a lightweight data protection component to edge nodes.
  • Derivation of a hybrid data protection policy based on operational attributes.
  • Transmission of the hybrid data protection policy to the edge node for execution.

Potential Applications: This technology can be applied in various edge computing environments where data protection is crucial, such as IoT devices, smart cities, and industrial automation.

Problems Solved: The technology addresses the need for efficient data protection policies specific to edge nodes in edge computing environments.

Benefits:

  • Enhanced data protection at the edge nodes.
  • Customized data protection policies based on operational attributes.
  • Improved security and compliance in edge computing environments.

Commercial Applications: Potential commercial applications include data security solutions for edge computing providers, IoT device manufacturers, and industries requiring secure data processing at the edge.

Prior Art: Readers can explore prior art related to data protection policies in edge computing environments, lightweight data protection components, and hybrid data protection policies.

Frequently Updated Research: Stay updated on research related to data protection technologies in edge computing environments, advancements in lightweight data protection components, and hybrid data protection policies.

Questions about Edge Computing Data Protection: 1. What are the key challenges in implementing data protection policies at edge nodes in edge computing environments? 2. How does the use of operational attributes enhance the effectiveness of data protection policies in edge computing environments?


Original Abstract Submitted

one example method includes deploying a lightweight data protection component to an edge node of an edge computing environment, receiving, from the edge node, a declaration file comprising an operational attribute that is specific to data residing at the edge node, choosing a central data protection policy, deriving, using the central data protection policy, a hybrid data protection policy that comprises the operational attribute, and transmitting the hybrid data protection policy to the edge node, and the hybrid data protection policy is configured, when executed, to perform a data protection operation on the data residing at the edge node.