Unlock instant, AI-driven research and patent intelligence for your innovation.

Information security protection method and system for secure resources in k8s

A technology of information security and protection system, applied in the field of information security protection of secret resources in k8s, can solve the problems of insecure secret resource information, few security protection measures of secret resource information, etc., and achieve the effect of avoiding the inability to encrypt

Pending Publication Date: 2021-12-10
JINAN INSPUR DATA TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a method and system for information security protection of secret resources in k8s, aiming to solve the problem that there are few information security protection measures for secret resources in the prior art, resulting in insecure information of secret resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security protection method and system for secure resources in k8s
  • Information security protection method and system for secure resources in k8s
  • Information security protection method and system for secure resources in k8s

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0065] The main technical problems of the embodiments of the present invention are as follows:

[0066] k8s contains secret resources: the secret resources are used to store sensitive information such as user names, passwords, digital certificates, private keys, tokens, and ssh keys, so as to support various application instances through secret resources. However, at present, k8s only base64-encodes secret resources once, and does not actually encrypt sensitive information. This is not safe for sensitive information. Attackers can obtain original data information through simple base64 anti-encoding tools.

[0067] In order to solve the above problems, see figure 1 , figure 1 A schematic flowchart of an information security protection method for secret resources in k8s provided by an embodiment of the present inventi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security protection method and system for a secure resource in k8s, and the method comprises the steps: intercepting the created secure resource when a creation action of the secure resource in the k8s is monitored; performing information encryption on the intercepted secure resource according to a preset encryption algorithm; and storing the encrypted secure resource in the distributed key value database of the k8s. According to the technical scheme provided by the invention, the problem that the information of the secure resource is not secure due to few information security protection measures of the secure resource in the prior art can be solved.

Description

technical field [0001] The invention relates to the technical field of information storage, in particular to an information security protection method and system for secret resources in k8s. Background technique [0002] K8s, the full name of kubernetes is an open source container orchestration engine that supports automatic deployment, large-scale scalability, and application container management. k8s allows the creation of multiple containers, each of which runs an application instance, and then implements the management, discovery, and access of each group of application instances through the built-in load balancing strategy. [0003] Among them, k8s contains secret resources: the secret resources are used to store sensitive information such as user names, passwords, digital certificates, private keys, tokens, and ssh keys, so as to support various application instances through secret resources. [0004] In the era of cloud computing, k8s is widely used, especially in mi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06F21/44
CPCG06F21/6218G06F21/602G06F21/44
Inventor 刘鹏
Owner JINAN INSPUR DATA TECH CO LTD