Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Container application authentication method and system, computing device and readable storage medium

A technology of an application system and an authentication system, applied in the authentication method of container applications, computing equipment and readable storage media, and the system field, can solve the problem of identifying the difference between the container environment and the physical host and cannot realize the internal software protection of docker, so as to avoid arbitrary copying Effect

Active Publication Date: 2021-06-18
武汉深之度科技有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing application software usually reads and reads software operating environment parameters to obtain a software-related authentication string, which is sent to the server through the network for unified authentication. This method is effective for physical machines, but For docker, because docker is software, copying a docker actually copies a piece of software, and the running environment parameters of docker running on the same host are exactly the same. Realize the purpose of docker internal software protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Container application authentication method and system, computing device and readable storage medium
  • Container application authentication method and system, computing device and readable storage medium
  • Container application authentication method and system, computing device and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0023] According to the characteristic that the container application can be copied and run on the same host computer, in order to prevent other copied illegal container applications from running on the host computer, the present invention provides a method of controlling and implementing the authorization authentication of the container application through the service authentication mechanism.

[0024] figure 1 A schematic diagram...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a container application authentication method, which is suitable for being executed in a container application authentication system. The container application authentication system comprises an authentication server and a container application system, the container application system comprises a plurality of container application clients, a container application server and an authentication client, and the method comprises the following steps: starting the container application clients, generating a first authentication message at the container application client; authenticating the first authentication message through the container application server; if the first authentication message passes the authentication, determining that the container application client is successfully started; the authentication client obtaining the activation sequence code input by the user and authenticating the activation sequence code through the authentication server; if the activation sequence code passes the authentication, the authentication server sending authorization information to the authentication client; and the authentication client activating the container application client according to the authorization information. The invention also discloses a corresponding system, a computing device and a readable storage medium.

Description

technical field [0001] The invention relates to the field of security authentication, in particular to an authentication method, system, computing device and readable storage medium for container applications. Background technique [0002] Container technology has the advantages of light weight, standard, easy deployment, and easy maintenance. The application software running in the container requires a strict authentication and authorization to ensure the correct operation of the software. Existing application software usually reads and reads software operating environment parameters to obtain a software-related authentication string, which is sent to the server through the network for unified authentication. This method is effective for physical machines, but For docker, because docker is software, copying a docker actually copies a piece of software, and the running environment parameters of docker running on the same host are exactly the same. Realize the purpose of doc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455G06F21/51
CPCG06F9/45533G06F9/45558G06F21/51G06F2009/45575G06F2009/45595
Inventor 张磊
Owner 武汉深之度科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products