Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and equipment for generating a closed container

A closed container and container technology, applied in the field of communication, can solve problems such as hidden dangers in application security, and achieve the effect of improving security and ensuring flexibility

Active Publication Date: 2020-05-22
湖北省楚天云有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing technology, after the container is created, the physical location of the container can be retrieved by searching the container host, and then the information inside the container can be obtained. For example, after the application is deployed in the container, the application executable file package, application The required dependencies and the startup files generated by the application startup can be obtained by the external environment of the container by searching the container host machine, which poses hidden dangers to the security of the application itself, especially the executable file package of the application may be intercepted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and equipment for generating a closed container
  • Method, device and equipment for generating a closed container
  • Method, device and equipment for generating a closed container

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0036] In one or more embodiments in this specification, the method for generating a closed container can be applied to container creation work that requires high container security.

[0037] Specifically, the container described in this embodiment is a collection of interfaces between components and platforms in an application server. This embodiment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a generation method, a generation device and generation equipment of a closed container. In the generation method of the closed container, the container is created after a container creation instruction is received; self-generated keys of the container are acquired, and are stored into memory allocated for the container; the key pair is utilized to encrypt a disk, which is allocated for the container, to obtain an encrypted disk; and access authority is configured for the memory and the encrypted disk to generate the closed container, wherein the access authority onlyallows accesses of an application deployed by adopting the container. According to the method, a case where a server or another user extracts a relevant file of the application program from the closed container is avoided; and thus an effect that data in the container cannot be acquired through any means other than an interface of the application after the container is created is guaranteed to realize complete closure of the container from outsides, a source code package of the application inside the container is enabled to not be intercepted by the outsides, and the application is enabled toobtain maximum security protection.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular to a method, device and equipment for generating a closed container. Background technique [0002] At present, cloud computing technology can provide available, convenient, and on-demand network access through the increase, use, and delivery mode of Internet-related services, and access to a configurable computing resource sharing pool. These resources can be quickly provided to achieve High-speed computing capability, and users can perform calculations according to their own needs, requiring little management work. [0003] With the development of cloud computing technology, the cloud platform itself uses container technology to deploy applications, and the container is attached to the computer cluster. Therefore, in order to protect the application itself from infringement to the greatest extent, the container itself needs to be absolutely safe, and the sour...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/80G06F9/455
CPCG06F9/45558G06F21/80G06F2009/45562G06F2221/2141
Inventor 谢师王瀛杨谋鹏宋诗雨李文涛
Owner 湖北省楚天云有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products