A container application authentication method, system, computing device and readable storage medium

An application system and authentication system technology, applied in the system, container application authentication method, computing device and readable storage medium field, can solve the problem of identifying the container environment, distinguishing the physical host from the inability to realize docker internal software protection, etc., to avoid arbitrary copying Effect

Active Publication Date: 2021-09-03
武汉深之度科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing application software usually reads and reads software operating environment parameters to obtain a software-related authentication string, which is sent to the server through the network for unified authentication. This method is effective for physical machines, but For docker, because docker is software, copying a docker actually copies a piece of software, and the running environment parameters of docker running on the same host are exactly the same. Realize the purpose of docker internal software protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A container application authentication method, system, computing device and readable storage medium
  • A container application authentication method, system, computing device and readable storage medium
  • A container application authentication method, system, computing device and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0023] According to the characteristic that the container application can be copied and run on the same host computer, in order to prevent other copied illegal container applications from running on the host computer, the present invention provides a method of controlling and implementing the authorization authentication of the container application through the service authentication mechanism.

[0024] figure 1 A schematic diagram...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a container application authentication method, which is suitable for execution in a container application authentication system. The container application authentication system includes an authentication server and a container application system. The container application system includes multiple container application clients, a container application server, and An authentication client, the method includes: starting the container application client, and generating a first authentication message on the container application client; authenticating the first authentication message through the container application server; if the first authentication message is authenticated, then determining the container The application client starts successfully; the authentication client obtains the activation serial code input by the user, and authenticates the activation serial code through the authentication server; if the activation serial code is authenticated, the authentication server sends authorization information to the authentication client; the authentication client Information to activate the container application client. The invention also discloses the corresponding system, computing equipment and readable storage medium.

Description

technical field [0001] The invention relates to the field of security authentication, in particular to an authentication method, system, computing device and readable storage medium for container applications. Background technique [0002] Container technology has the advantages of light weight, standard, easy deployment, and easy maintenance. The application software running in the container requires a strict authentication and authorization to ensure the correct operation of the software. Existing application software usually reads and reads software operating environment parameters to obtain a software-related authentication string, which is sent to the server through the network for unified authentication. This method is effective for physical machines, but For docker, because docker is software, copying a docker actually copies a piece of software, and the running environment parameters of docker running on the same host are exactly the same. Realize the purpose of doc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/455G06F21/51
CPCG06F9/45533G06F9/45558G06F21/51G06F2009/45575G06F2009/45595
Inventor 张磊
Owner 武汉深之度科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products